B.Tech (Computer Science & Technology) Syllabus
COURSE CODECOURSE NAMECREDITS
Introduction: Network Architecture – Historical review – Network software architecture: layers and protocol, OSI vs TCP. Network hardware architecture: topologies, devices. Introduction to types of networks-Optical Networks, Sensor networks.
Physical And Data Link Layers: Basics for Data communications—Transmission Media— Guided and unguided transmission media — Communication satellites - Data link Layer design issues—Error Detection & Correction—Elementary Data link Protocols—Sliding window Protocols.
Mac & Network Layers: Media access control and LANs: The channel allocation – Methods and protocols for LANs – IEEE 802 standards and LAN technologies – Ethernet, token ring – hardware addressing - Network layer design issues—Routing Algorithms—Congestion Control Algorithms
Transport Layer: Transport services—Elements of transport Protocols—A simple transport Protocols—UDP—TCP— Performance issues.
Application Layer: DNS-E-mail—WWW-Multimedia—Introduction to Cryptography–basic concepts-firewalls.
- 1. Andrew S. Tanenbaum, "Computer Networks", Pearson, Fourth Edition.
- 2. Behrouz A. Forouzan, "Data communication and Networking", Tata McGraw-Hill.
- 3. James F. Kurose and Keith W. Ross, "Computer Networking: A Top-Down ApproachFeaturing the Internet", Pearson Education.
- 4. William Stallings, "Data and Computer Communication", Pearson Education.
Assembler,Macros, Loader & Linker: Assembler: Overview of the assembly process - Design of two pass assembler- Single pass assembler - Macros : Macro definition and usage- schematics for macro expansion - Design of a Macro pre- processor - Design of a Macro assembler ; Introduction to Loaders and Linkers.
Introduction To Compilers: Compiler: Introduction - Analysis of the source program - phases of a compiler - Compiler construction tools-Lexical analysis - Role of the lexical analyzer - Specification of tokens - Recognition of tokens -Lexical analyzer generators- Design aspects of Lexical Analyzer.
Syntax Analysis – Parsing: Syntax Analysis: Role of the parser - Context free grammars - Top-down parsing: shift reduce- predictive parsing; Bottom- up parsing: Operator precedence, LR parsers (SLR, Canonical LR,LALR) - Parser generators-Design aspects of Parser.
Semantic Analysis – Translation & Runtime Storage: Syntax-directed translation: Syntax-directed definitions - S-attributed definition - L-attributed definition - Top-down and bottom-up translation- Type checking - Type systems -Specification of a type checker; Run time environment -Source language issues -Storage organization –Storage allocation strategies - Access to non-local names - Parameter passing - Symbol tables- Design aspects of Syntax Directed Translation
Code Generation & Optimization: Intermediate code generation: Intermediate languages - Declaration - Assignment Statement - Boolean expression - Procedure calls - Code optimization: Introduction - Sources of optimization - Introduction to data flow analysis- Code generator : Issues in the design of a code generator- the target machine- A simple code generator- Design aspects of Code Optimizer.
- 1. Alfred V. Aho, Ravi Sethi& Jeffrey. D. Ullman, "Compilers Principles, Techniques &Tools",Pearson Education, third edition, 2007.
- 2. D.M.Dhamdhere, "System Programming and Operating Systems", 2nd Edition., Tata Mcgraw Hill,1995
- 3. Kenneth C. Louden, Compiler Construction, Principles and Practice, Thomson Books.
- 4. Aho. A.V & Ullman J.D, "Principles of Compiler Design", Narosa publications, 1985.
- 5. S.S. Muchnick Harcourt Asra," Advanced Compiler Design implementation", Morgan Kaufman, 1997.
- 6. Anrew W. Appel, "Modern Compiler Implementation in JAVA", Cambridge University Press, 2003.
Information Security and Cyber Law:
History of Information Systems and its Importance, basics, Changing Nature of InformationSystems, Need of Distributed Information Systems, Role of Internet and Web Services,Information System Threats and attacks, Classification of Threats and Assessing Damages 18Security in Mobile and Wireless Computing- Security Challenges in Mobile Devices,authentication Service Security, Security Implication for organizations, Laptops SecurityBasic Principles of Information Security, Confidentiality, Integrity Availability and other termsin Information Security, Information Classification and their Roles.
Security Threats to E Commerce, Virtual Organization, Business Transactions on Web, EGovernance and EDI, Concepts in Electronics payment systems, E Cash, Credit/Debit Cards.Physical Security- Needs, Disaster and Controls, Basic Tenets of Physical Security and PhysicalEntry Controls,Access Control- Biometrics, Factors in Biometrics Systems, Benefits, Criteria for selection ofbiometrics, Design Issues in Biometric Systems, Interoperability Issues, Economic and SocialAspects, Legal Challenges.
Model of Cryptographic Systems, Issues in Documents Security, System of Keys, Public KeyCryptography, Digital Signature, Requirement of Digital Signature System, Finger Prints,Firewalls, Design and Implementation Issues, Policies.
Network Security- Basic Concepts, Dimensions, Perimeter for Network Protection, NetworkAttacks, Need of Intrusion Monitoring and Detection, Intrusion DetectionVirtual Private Networks- Need, Use of unneling with VPN, Authentication Mechanisms,Types of VPNs and their Usage, Security Concerns in VPN.
Security metrics- Classification and their benefitsInformation Security & Law, IPR, Patent Law, Copyright Law, Legal Issues in Data mIningSecurity, Building Security into Software Life CycleEthics- Ethical Issues, Issues in Data and Software PrivacyCyber Crime Types & overview of Cyber Crimes.
- 1. Godbole," Information Systems Security", Willey
- 2. Merkov, Breithaupt," Information Security", Pearson Education
- 3. Yadav, "Foundations of Information Technology", New Age, Delhi
- 4. Schou, Shoemaker, " Information Assurance for the Enterprise", Tata M. Hill
- 5. Sood, "Cyber Laws Simplified", McGraw Hill
- 6. Furnell, "Computer Insecurity", Springer7. IT Act 2000
Computer Graphics & Animations::
Introduction and Line Generation: Types of computer graphics, Graphic Displays- Random scan displays, Raster scan displays, Frame buffer and video controller, Points and lines, Line drawing algorithms, Circle generating algorithms, Mid point circle generating algorithm, and parallel version of these algorithms.
Transformations: Basic transformation, Matrix representations and homogenous coordinates, Composite transformations, Reflections and shearing. Windowing and Clipping: Viewing pipeline, Viewing transformations, 2-D Clipping algorithms- Line clipping algorithms such as Cohen Sutherland line clipping algorithm, Liang Barsky algorithm, Line clipping against non rectangular clip windows; Polygon clipping – Sutherland Hodgeman polygon clipping, Weiler and Atherton polygon clipping, Curve clipping, Text clipping.
Three Dimensional: 3-D geometric primitives, 3-D Object representation, 3-D Transformation, 3-D viewing, projections, 3-D Clipping.
Curves and Surfaces: Quadric surfaces, Spheres, Ellipsoid, Blobby objects, Introductory concepts of Spline, Bspline and Bezier curves and surfaces. Hidden Lines and Surfaces: Back
Face Detection algorithm, Depth buffer method, A- buffer method, Scan line method, basic illumination models – Ambient light, Diffuse reflection, Specular reflection and Phong model, Combined approach, Warn model, Intensity Attenuation, Color consideration, Transparency and Shadows.04
Departmental Elective I (E-Commerce/Soft Computing/TCP/IP Principles and Architecture/Visual Programming):
Introduction: History of E- Commerce – Overview of E- Commerce framework – E- Business models – Network infrastructure - Role of Internet – E- commerce and World wide Web
E Commerce: Consumer oriented E- Commerce applications – Mercantile process models; Electronic Payment Systems – Digital Token based EPS – Smart cards – Credit cards – Risks – designing EPS.
Organizational Commerce and Edi: Electronic Data Interchange – EDI applications in Business – EDI and e Commerce – EDI standardization and implementation – Internet based EDI.
Security: Internet security standards – secure electronic payment protocols ; cryptography and authentication – security issues – encryption techniques; e commerce payment mechanisms –SET protocol – electronic check – electronic cash; E-commerce ethics, regulations and social responsibility.
Intelligent Agents: Definition and capabilities – limitation of agents – security – web based marketing – search engines and Directory registration – online advertisements – Portables and info mechanics – website design issues.
- 1. Ravi Kalakota and Andrew B Whinston, " Frontiers of Electronic Commerce ",Pearson Education Asia, 1999.( Chapters 1,2,3,6-10,16)
- 2. Marilyn Greenstein and Todd M Feinman , " Electronic commerce: Security, Risk Management andControl" Tata McGraw-Hill , 2000.(Chapters 7,8,10-12)
- 3. Judy Strauss and Raymond Frost , " E Marketing ", PHI, 2002
- 4. Brenda Kienan , " Managing e Commerce Business" , PHI,2001
- 5. Vivek Sharma and Rajiv Sharma , " Developing e Commerce Sites – an integrated approach " , Pearson Education Asia, 2000
Basics of Neuroscience and Ann Models: The Brain as a Neural network-Basic Properties of Neurons – Neuron Models – Rosenblatt's Prceptron – The widrow -Hoff LMS Learning Algorithm-Order of a Predicate and a Perceptron – Complexity of Learning using Feedforward Networks.
Fuzzy Systems: Fuzzy Sets and Fuzzy Reasoning – Fuzzy Matrices – Fuzzy Functions – Decompositions – Fuzzy Automata and Languages – Fuzzy Control Method – Fuzzy Decision Making.
Neuro-Fuzzy Systems: Introduction to Neuro – Fuzzy Systems –Fuzzy System Design Procedures – Fuzzy Sets and Logic Background - Fuzzy / ANN Design and Implementation
Genetic Algorithms: Introduction – Robustness of Traditional Optimization and Search Techniques – The goals of optimization-Computer Implementation-Data Structures, Reproduction, Crossover and Mutation – Mapping Objective Functions to fitness form – Some Applications of Genetic Algorithms.
Artificial Intelligence: AI technique-Level of the Model – Problems, Problem Spaces and Search – Issues in the Design of Search Programs – Heuristic Search Techniques – Knowledge Representations and Mappings
- 1. N. K. Bose and P. Liang , "Neural Network Fundamentals"
- 2. Timothy J. Ross , "Fuzzy Logic with Engineering Applications", McGraw- Hill International Editions,1995
- 3. Elaine Rich and Kelvin knight ,"Artificial Intelligence",McGraw- Hill 2000
- 4. David E. Goldberg, "Genetic Algorithms-In Search, optimization and Machine Learning", Pearson Education.
- 5. Robert J. Schalkoff, "Artificial Neural Networks", McGraw-Hill International Editions.
- 6. Freeman J.A. & D.M. Skapura , "Neural Networks: Algorithms, Applications and ProgrammingTechniques", Addison Wesley, 1992.
- 7. G.J. Klir& B. Yuan, "Fuzzy Sets & Fuzzy Logic", PHI, 1995.
- 8. Melanie Mitchell, "An Introduction to Genetic Algorithm", PHI, 1998.
TCP/IP Principles and Architecture:
Introduction: Intermediate communication entities- Layering network addresses-DNS-Client server model- Port numbers-Standardization process-RFC's-Standard simple services-Application programming interfaces-Ethernet &IEEE 802 – encapsulation-SLIP-PPP-loop back interface-MTU-path MTU-ARP cache – Packet format – proxy ARP &Gratitions ARP –ARP command – RARP- Structure TCP/IP s/w in operating system.
Network Layer and Application: Introduction- IP header- IP routing - Subnet addressing- Subnet mask- Special case IP addresses – Examples - Ifconfig – Netstat- routing principles - ICMP host and Network unreachable errors - ICMP redirect errors – ICPM router discovery messages- Dynamic routing - UNIX routing daemons- routing information protocol (RIP)-OSPF-CIDR – Case study: Voice over IP for two way Communication
UDP And Applications: Introduction- UDP header- UDP checksum- examples-IP fragmentation - ICMP unreachable errors – Path MTU discovery- Interaction between UDP and ARP-UDP datagram size- ICMP source quench error- Broad casting and Multi casting - IGMP- NFS- -TFTP-BOOTP
TCP: Introduction- TCP services- TCP header – Connection establishment and termination – Maximum size – TCP half close – TCP state transition diagram – Reset segments- Simultaneous open and close – TCP options – Interactive input – Delayed acknowledgement – Nagle algorithm – Window size advertisement- Normal data flow – Sliding window – Window size - PUSH flag – Slow start– Bulk data throughput – Urgent mode
Transport Layer Reliability and Application: CP/IP time out – Retransmission – Roundtrip time measurement – Congestion avoidance algorithms – Fast retransmit and fast recover algorithm – Repacaketization - ICMP errors- TCP persistent – TCP features and performance – Telnet and rhogin - SMTP – TCP dump
- 1. W. Richard Stevens, "TCP/IP Illustrated,The Protocol-Volume I" , Addison-Wesley Pub Co,1st Edition,1994
- 2. DouglesE.Comer, "Internetworking with TCP/IP–Principles, Protocols & Architecture", Pearson education, 4th Edition,2000
- 3. Behrouz A. Forouzam, "TCP/IP Protocol Suite", Tata McGraw Hill, 2000
- 4. Michael Santifaller, "TCP/IP – ONC/NFS, Internetworking in UNIX Environment", Addison Wesley Professional, 2nd Edition, 1994.
- 5. Richard Stevens, " TCP/IP Illustrated",Vol 1,2,3 Pearson education India.
Introduction To Windows Programming: Different paradigms of programming – Structured Programming- Object Oriented Programming-Functional Programming- Logic programming- Visual Programming- Concurrent Programming – Comparison – Event driven programming – Windows programming fundamentals – Applications.
Visual Basic Programming: Visual Basic Applications – Creating and using Controls – Menus and Dialogs – Managing projects – Programming fundamentals – Objects and instances – Debugging – Responding to mouse events – Using grid control – Creating graphics for application – Displaying and printing information – Interacting with the environment – File system controls - Processing files – Accessing databases with the data controls.
Visual C++ Programming: Visual C++ components – Developing simple applications – Microsoft Foundation classes – Controls – Message handling - Document-view architecture – Dialog based applications – Mouse and keyboard events.
Visual Java – Introduction: Java basics – Java classes – Object references – Inheritance – Exception handling - File I/O – Java tools – Developing Java applications
- 1. Charles Petzold, "Windows Programming", Microsoft Press, 1995.(Unit–I)
- 2. Marion Cottingham "Visual Basic",Peachpit Press, 1999. (Unit–II)
- 3. Kate Gregory 'Using Visual C++", Prentice Hall of India Pvt., Ltd. (Unit–III)
- 4. H.M.Deitel and P.J.Deitel, "Java how to program with an Introduction to Visual
- 5. J++", Prentice Hall, 1998. (Unit – IV & V)
- 6. C.H. Pappas, W.H. Murray, III "Visual C++: The Complete Reference", Tata McGraw-Hill Publishing Company, 1999.
- 7. Stephen R.Davis, "Lean Java Now", Microsoft Press, 1996.
- 8. Jamie Jaworski, "Java Unleashed", SAMS Techmedia Publication, 1999.
- 9. Jason Blooberg. Jeff Kawski, and Paul Treffers, "Web Page Scripting Techniques", Hayden books, 1996
Computer Network Lab:
List of Experiments
- 1. Write a socket Program for Echo/Ping/Talk commands.
- 2. Create a socket (TCP) between two computers and enable file transfer between them.
- 3. Write a program to implement Remote Command Execution ( Two M/Cs may be used )
- 4. Create a socket (UDP)
- 5. Write a code simulating ARP /RARP.
- 6. Create a socket for HTTP for web page upload & Download.
- 7. Write a program for TCP module Implementation.(TCP services)
- 8. Write a program for File Transfer in client-server architecture using following methods.
- a) USING RS232C
- a) USING RS232C
- 9. Write a program to implement RMI (Remote Method Invocation)
- 10. Perform a case study about the different routing algorithms to select the network path with its optimum and economical during data transfer.
- • Shortest path routing
- • Flooding
- • Distance Vector
- 11. Implement client in C and server in Java
- 12. Using QUAL NET 4.0
- a) Create a scenario with the following specifications
- • No of subnets – 2
- • No. of nodes – 40
- • Traffic FTP- 11 to 21 FTP - 30 to 40 UDP - 5 to 7
- • Routing Protocol – AODV
- • 802.16
- Show the throughput using different bandwidths i.e., 10 Mbps and 100 Mbps respectively.
- b) Create a scenario as described below.
- • No of students – 2
- • SN -1 Nodes – 15
- • SN -2 Nodes - 10
- • Generate FTP Traffic & HTTP traffic between Nodes 1 to 11 (FTP)
- • 14 to 7 (HTTP / Gen FTP)
List of Experiments
- 1. Implementation of a Linker
- 2. Implementation of a Loader
- 3. Implementation of an Assembler
- 4. Implementation of Macro processor
- 5. Implementation of a Lexical Analyser
- 6. Converting a regular expression to NFA
- 7. Converting NFA to DFA
- 8. Computation of FIRST and FOLLOW sets
- 9. Construction of Predictive Parsing Table
- 10. Implementation of Shift Reduce Parsing
- 11. Computation of Leading and Trailing Sets
- 12. Computation of LR(0) items
- 13. Construction of DAG
- 14. Intermediate Code Generation
- 15. Design of Simple Compiler using native language words
- 16. Trace the execution of another program - debugger
Reference: Laboratory Manual02