Académique Documents
Professionnel Documents
Culture Documents
Total
MTCST1.1
Mathematical Foundations
of Computer Science
Data Structures & Algorithms
Data Base Management Systems
Computer Networks
Elective-I
Elective-II
Data Structures & Programming Lab
Computer networks Lab
70
30
100
3
3
3
3
3
-
3
3
70
70
70
70
70
50
50
30
30
30
30
30
50
50
100
100
100
100
100
100
100
4
4
4
4
4
2
2
18
520`
280
MTCST1.2
MTCST1.3
MTCST1.4
MTCST1.5
MTCSTCN1.6
MTCST1.7
MTCSTCN1.8
Total
Credits
800
28
II SEMESTER
------------------------------------------------------------------------------------------------------------------------------------------------Code
MTCSTCN2.1
MTCSCNT2.2
MTCSTCN2.3
MTCSTCN2.4
MTCSTCN2.5
MTCSTCN2.6
MTCSTCN2.7
MTCSTCN2.8
MTCSTCN 2.9
Internet Technologies
Mobile Ad-hoc Networks
Sensor Networks
TCP/IP
Elective III
Elective IV
Wireless Networks Lab
Protocol Development Lab
Seminar
Total
3
3
-
70
70
70
70
70
70
50
50
-
30
30
30
30
30
30
50
50
100
520`
380
Total
Credits
100
100
100
100
100
100
100
100
100
4
4
4
4
4
4
2
2
2
800
30
Elective III: Multi Media Networks/ Performance Analysis of Network Architecture/Delay Tolerant
Networks
Elective IV: Network Simulation & Modeling /Internet of Things/IT Infrastructure Management
III SEMESTER
Common for M. Tech (CST, IT, CSTAIR, CSTBI, CSTCN )
------------------------------------------------------------------------------------------------------------------------------------------------Code
Max. Marks
Credits
MTCST3.1
100
10
1. Candidates can do their thesis work within the department or in any industry/research
organization for two semesters (i.e. 3rd and 4th semesters). In case of thesis done in an
industry/research organization, one advisor (Guide) should be from the department and
one advisor(CO-Guide) should be from the industry/research organization.
2. Thesis part I should be submitted at the end of 3rd semester and it will be evaluated by a
committee consisting of Chairman Board of Studies, Head of the Department and thesis
guide.
3. Although credits are allotted for the thesis work they will not be taken for the calculation
of CGPA.
IV SEMESTER
Common for M. Tech (CST, IT, CSTAIR, CSTBI, CSTCN )
------------------------------------------------------------------------------------------------------------------------------------------------Code
Max. Marks
Credits
MTCST4.1
100
14
Instruction: 3 Periods/week
Time: 3 Hours
Internal: 30 Marks
External: 70 Marks
Credits: 4
Total: 100 Marks
-------------------------------------------------------------------------------------------------------------------------1. Mathematical notions of sets, sequences and tuples, functions and relations, Primitive recursive
functions, computable functions, examples, graphs, strings and languages,
2.
Boolean logic properties and representation, theorems and types of proofs, deductive,
inductive, by construction, contradiction and counter-examples.
MTCST 1.2
External: 70 Marks
TEXT BOOK:
Data Structures & Algorithm Analysis in C++ , Mark Allen Weiss. Second edition, Pearson Edition.
Asia.
REFERENCE BOOKS:
1. Data Structures & Algorithm in C++, Adam Drozdek. Vikas publication House.
2. Data Structure, Algorithm and OOP, Gregory L. Heileman (Tata Mc Graw Hill Edition).
3. Data Structures, Algorithms and Applications in C++,Sartaj Sahni,Mc Graw-Hill International
Edition.
MTCST 1.3
Instruction:3 Periods/week
Internal: 30 Marks
Credits:4
External: 70 Marks
Time: 3 Hours
Total: 100 Marks
5.
MTCSTCN1.4
Instruction: 3 Periods/week
Internal: 30 Marks
COMPUTER NETWORKS
Time: 3 Hours
External: 70 Marks
Credits: 4
Total: 100
-----------------------------------------------------------------------------------------------------------------------------------------------
Time: 3 Hours
External: 70 Marks
Credits: 4
Total: 100 Marks
MTCST 1.5.2
Elective I
E-COMMERCE
Common for M.Tech (CST, IT, CSTAIR, CSTBI, CSTCN)
Instruction: 3 Periods/week
Time: 3 Hours
Credits: 4
Internal: 30 Marks
External: 70 Marks
Total: 100 Marks
-----------------------------------------------------------------------------------------------------------------1. Introduction: Electronic Commerce-Frame Work, Anatomy of E-Commerce Applications, E-Commerce
Consumer Applications, E-Commerce Organization Applications. Consumer Oriented Electronic
Commerce - Mercantile Process Models, Digital Economy and e-business Models
2. Electronic Payment Systems Types of Electronic Payment Systems, Digital Token-Based, Smart
Cards, Credit Cards, Risks in Electronic Payment Systems, Designing Electronic Payment Systems
Electronic Data Inter Change, Inter Organizational Commerce - EDI, EDI Implementation, Value Added
Networks.
3. Intra Organizational Commerce, Macro Forces And Internal Commerce, Work Flow Automation and
Coordination, Customization And Internal Commerce, Supply Chain Management., Business Cases for
Document Library, Digital Document Types, Corporate Data Ware-Houses.
4. Advertising And Marketing: Information Based Marketing, Advertising On Internet, Online Marketing
Process, Market Research. Consumer Search and Resource Discovery, Information Search and Retrieval,
Commerce Catalogues, Information Filtering.
5. Multimedia-Key Multimedia Concepts, Digital Video and Electronic Commerce, Desktop Video
Processing, Desktop Video Conferencing.
6. Business to consumer e-commerce: On line Marketing and Selling, Information Goods, Electronic
Markets and Auctions on the Internet
7. E-Business Intelligence: Data Mining, Web Merchandising and Recommender Systems, Intelligent
Agents in e-commerce, Business-to-Business e-commerce and Supply Chain Management
8. Security of Internet Hosts and Networks, Public Key Infrastructure, Safety of e-commerce Applications
Text Books:
1. Frontiers of Electronic Commerce, Kalakata and Whinston, Pearson.
References
1. E-Commerce fundamentals and Applications, Hendry Chan, Raymond Lee, Tharam Dillon, Ellizabeth
Chang, John Wiley.
2. E-Commerce, S.Jaiswal, Galgotia.
3. E-Commerce, Efrain Turbon, Jae Lee, David King, H.Michael Chang.
4. E-Commerce - Business, Technology and Society, Kenneth C.Taudon, Carol Guyerico Traver.
MTCST 1.5.3
Elective I
EMBEDDED SYSTEMS
Common for M.Tech (CST, IT, CSTAIR, CSTBI, CSTCN)
Instruction: 3 Periods/week
Time: 3 Hours
Credits: 4
Internal: 30 Marks
External: 70 Marks Total: 100 Marks
------------------------------------------------------------------------------------------------------------------1. Examples of Embedded Systems Typical Hardware Memory Microprocessors Busses
Direct Memory Access Introduction to 8051 Microcontroller Architecture-Instruction set
Programming.
2. Microprocessor Architecture Interrupt Basics The Shared-Data problem Interrupt
Latency.
3. RoundRobin Architecture - RoundRobin with Interrupts Architecture - Function-QueueScheduling Architecture Real-Time Operating Systems Architecture Selection of
Architecture.
4. Tasks and Task States Tasks and Data Semaphores and Shared Data Semaphore
Problems Semaphore variants.
5. Message Queues Mailboxes Pipes Timer Functions Events Memory Management
Interrupt Routines in RTOS Environment.
6. RTOS design Principles Encapsulation Semaphores and Queues Hard Real-Time
Scheduling Considerations Saving Memory Space Saving Power.
7. Host and Target Machines Linker/Locator for Embedded Software- Getting Embedded
Software into the Target System.
8. Testing on your Host Machine Instruction Set Simulators Laboratory Tools used for
Debugging.
Text Book:
The 8051 Microcontroller Architecture, Programming & Applications, Kenneth J. Ayala, Penram
International.
An Embedded Software Primer, David E. Simon, Pearson Education , 2005.
Reference Book:
Embedded Systems: Architecture , Programming and Design, Raj Kamal, Tata McGraw-Hill Education, 2008
External: 70 Marks
Credits: 4
-------------------------------------------------------------------------------------------------------------------------------------------------
Memory Management & File System Implementation: Logical Versus Physical Address
Space, Paging And Segmentation, Virtual Memory, Demand Paging, Page Replacement
Algorithms, Thrashing, File System Implementation -Access Methods, Directory Structure,
Protection, File System Structure, Allocation Methods, Free Space Management, Directory
Management, Device Drivers
5.
6.
MTCSTCN1.6.2 Elective II
CLOUD COMPUTING
Common for M.Tech (CST, IT,CSTCN)
Instruction: 3 Periods/week
Time: 3 Hours
Credits: 4
Internal: 30 Marks
External: 70 Marks
Total: 100 Marks
-----------------------------------------------------------------------------------------------------------------------------1. Cloud Computing Basics - Cloud Computing Overview, Applications, Intranets and the Cloud, First
Movers in the Cloud. The Business Case for Going to the Cloud - Cloud Computing Services, Business
Applications, Deleting Your Datacenter, Salesforce.com, Thomson Reuters.
2. Organization and Cloud Computing - When You Can Use Cloud Computing, Benefits, Limitations,
Security Concerns, Regulatory Issues, Cloud Computing with the Titans - Google, EMC, NetApp,
Microsoft, Amazon, Salesforce.com, IBMPartnerships.
3. Hardware and Infrastructure - Clients, Security, Network, Services. Accessing the Cloud - Platforms,
Web Applications, Web APIs,Web Browsers. Cloud Storage - Overview, Cloud Storage Providers,
Standards - Application, Client, Infrastructure, Service.
4. Software as a Service - Overview, Driving Forces, Company Offerings, Industries Software plus Services
- Overview, Mobile Device Integration, Providers, Microsoft Online.
5. Developing Applications - Google, Microsoft, Intuit QuickBase, Cast Iron Cloud, Bungee Connect,
Development, Troubleshooting, Application Management.
6. Local Clouds and Thin Clients - Virtualization in Your Organization, Server Solutions, Thin Clients,
Case Study: McNeilus Steel.
7. Migrating to the Cloud - Cloud Services for Individuals, Cloud Services Aimed at the Mid-Market,
Enterprise-Class Cloud Offerings, Migration, Best Practices and the Future of Cloud Computing - Analyze
Your Service, Best Practices, How Cloud Computing Might Evolve.
Text Books:
1. Cloud Computing-A Practical Approach, Anthony T. Velte, Toby J. Velte, Robert Elsenpeter.
McGrawHill.
ATM NETWORKS
Instruction: 3 Periods/week
Time: 3 Hours
Credits: 4
Internal: 30 Marks
External: 70 Marks
Total: 100 Marks
------------------------------------------------------------------------------------------------------------------------------
1. Transfer Modes :
Overview of ATM, Introduction, Circuit switching, Routing, virtual circuit Switching,
Comparison of transfer modes. Motivation for ATM, Basic properties.
2. ATM Reference Model:
Core aspects, ATM Networks, Architecture and interfaces, Internetworking,
Applications, BISDN and ATM, ATM Standardisation.
3. ATM Physical Layer:
TC sub layer, PMD sub layer, DS1 interface, DS3 interface, E1 Interface, E3
interface, SONET/SDH based interface.
4. ATM Layer and AAL:
ATM Layer and AAL, ATM cell header at UNI and NNI, ATM layer function,
AAL1, AAL2, AAL3/4.
5. ATM traffic and traffic management:
ATM traffic and traffic management. Traffic parameters, Service parameters, QOS
Parameters, Service categories, Traffic management, Traffic contact management.
6. ATM Switching:
Introduction, Component, Performance, Measurements, Switching issues, Shared
Memory Architecture, Shared medium architecture, Space division architecture,
Switching in ATM.
7. ATM Addressing, Signaling and Routing, Security:
AISA format, Group addressing, ATM signal protocol stack, SAAL, Routing, PNNI
Protocol, PNNI hierarchy, PNNI topology, ATM Network Management and Security
Text Book
1. Rainer Handel, Huber, ATM Network , Adison Wesley
MTCSTCN1.6.4 Elective II
Instruction: 3 Periods/week
Time: 3 Hours
Credits: 4
Internal: 30 Marks
External: 70 Marks
Total: 100 Marks
-----------------------------------------------------------------------------------------------------------------------------1.Introduction to Network Security: Introduction to Security, Security Approaches, Principles of
Security; Security Services and Mechanism-confidentiality,Confidentiality, Authentication, Integrity,
Non-repudiation, access Control and Availability; Conventional Encryption Principles, Conventional
encryption algorithms, cipher block modes of operation, location of encryption devices, key distribution
Approaches of Message Authentication, Secure Hash Functions and HMAC. A model for Internetwork
security, Internet Standards and RFCs, Buffer overflow & format string vulnerabilities, Introduction to
TCP/IPTCP , fire walls, session hijacking, ARP attacks, route table modification, UDP hijacking, and
man-in-the-middle attacks, Virtual Private Networks, Brief Study on Cryptography and Security
2.User Authentication Mechanisms and Public Key Infrastructure: Introduction, Authentication
Basics, Passwords authentication tokens, Certificate based authentications, Biometrics based
authentication , Kerberos, X.509 Directory Authentication Service, SSO Approaches,Public key
cryptography principles and algorithms, digital signatures, digital Certificates, Certificate Authority and
key management, Public Key Cryptography Standards, Private Key Management, XML,PKI and
Security, non directory based authentication protocols, Attacks on authentication protocols,
Authentication protocols in the real world
3.Symmetric and Asymmetric Key Cryptographic Techniques: Overview of symmetric Key
Cryptography Algorithm types and modes; DES, IDEA, RC5, BLOWFISH, AES Algorithms;
Differential and Linear Cryptanalysis, Overview of Asymmetric Key cryptography, RSA Algorithm,
Symmetric and Asymmetric Key Cryptography Together, Digital Signature, Knap sack Algorithm and
other Algorithms, provably secure and efficient public key cryptosystems.
4.IP Security, Fire walls and Practical Implementation of Cryptography &Security : IP Security
Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations and Key Management, Firewall Design principles, Trusted Systems,
Intrusion Detection Systems. Cryptographic Solutions using Java, Cryptographic Solutions Using
Microsoft, Cryptographic Tool Kit, Security and Operating Systems Pretty Good Privacy (PGP) and
S/MIME.
5.Crptosystems basics: Probability and Information Theory and computational complexity and number
theory , formal approaches to security establishment, semantic security and beyond, formal methods for
protocol checking and analysis, Zero knowledge protocols.
6. Digital Forensics: Capturing evidence, working on the evidence, documenting and reporting with
special emphasis on Internet/Email, network devices and mobile devices
Text Book:
Network Security Essentials:Applications and Standards, William Stallings PEA.
Cryptography and Network Security, AtulKahate, Tata McGraw Hill
Modern Cryptography : Theory and Practices, W. Mao, Pearson Ed
Computer Forensics, David Cowen
The basics of digital forensics: the primer for getting started in digital forensics, J. Sammons
Reference:
Hack Proofing your network, Ryan Russell, Dan Kaminsky, Rain Forest Puppy, Joe Grand, David
Ahmad, Hal Flynn IdoDubrawsky, Steve W.Manzuik, Ryan Permeh, Wiley Dreamtech,
Fundamentals of Network Security, Eric Maiwald (Dreamtech press)
Network Security - Private Communication in a Public World, Charlie Kaufman, Radia Perlman,
MikeSpeciner, PEA/PHI.
Principles of Information Security, Whitman, Thomson.
Cryptography and network Security, Third edition, Stallings, PHI/PEA
Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
Introduction to Cryptography, Buchmann, Springer.
MTCST 1.7
Instruction: 3 Periods/week
Internal: 50 Marks
Time: 3 Hours
External: 50 Marks
Credits: 2
Total: 100 Marks
MTCST CN 1.8
Instruction: 3 Periods/week
Time: 3 Hours
------------------------------------------------------------------------------------------------------------------------
a) Network Programming
1. Socket Programming
a. TCP Sockets
b. UDP Sockets
c. Applications using Sockets
2. Simulation of Sliding Window Protocol
3. Simulation of Routing Protocols
4. RPC
5. Development of applications such as DNS/ HTTP/ E mail/ Multi - user Chat
b)Web Programming
1. Design of the Web pages using various features of HTML and DHTML
2. Client server programming using servlets, ASP and JSP on the server side and java script
on the client side
3. Web enabling of databases
4. Multimedia effects on web pages design using Flash.
Reference Books:
1. Internet and Web Technologies by Raj Kamal, Tata McGraw-Hill
2. Programming the World Wide Web by Robert W. Sebesta, Pearson Education