Académique Documents
Professionnel Documents
Culture Documents
AURORA’S PG COLLEGE
i
STUDENT HANDBOOK
2012-2013
AURORA’S PG COLLEGE
RAMANTHAPUR, HYDERABAD - 500013
PH: 040-27030787 Fax: +9140 27036468
i
WELCOME NOTE
My dear Students,
The College has produced 13 MBA batches and 15 MCA batches of students till now. Majority of the students have
been placed in reputed Multinational Companies and many got admitted into renowned National and International
Institutes of higher learning. Now it is time for you to emulate your exemplary seniors and to reach higher echelons
of the society.
The College has a clearly defined goal of evolving into one of the best institutes for Post Graduate education. The
central concern of this institution is to strive for pedagogical and scholastic excellence. To reach the envisaged goal,
the college provides highly committed and qualified faculty and excellent infrastructural facilities for curricular, co-
curricular and extra-curricular activities. . Dynamism, experience and erudition characterize the teaching community
at Aurora. Highly qualified with MBA/MCA/M. Tech/M.Phil and Ph.D. degrees, the faculty bring their veritable
expertise and application oriented attitude to the classroom.
One of the innovative features of Aurora is its novel teaching-learning process, that synthesizes conventional
mechanisms of learning through lectures and laboratory sessions, with interactive process like Seminars, Guest
Lectures, Industry-Institute Interaction, Mini Projects, problem - solving sessions and Assignments that makes
learning a pleasure. This handbook, another unique feature of this college, helps you as a ready reckoner in giving
detailed institute interaction and assignment dates to prepare you well in advance. In addition, it also helps in
creating a base for you to prepare for competitive examinations like IES, GATE, GRE etc with its exhaustive reference
material.
The college has been successful in getting reputed organizations for placements and I am happy that preparations
are made to see that all the students of this college would have their future clearly defined.
From the Institute’s side, we assure you that we leave no stone unturned to implement and achieve the above goals.
You too, as a student, have a crucial role to play in this arduous but exciting enterprise of making Aurora synonymous
with learning.
Principal
ii
PURPOSE OF THE BOOK
Education has to be placed and organized in an effective manner, both from the institutions’ side as well as the
students’. This would help to achieve things with great clarity and commitment.
Aurora is the first in the country to give a comprehensive student handbook which forms a major aid for the students
to prepare for the classes in advance, know the details of various deadlines, details of the syllabus, co-and extra
curricular activities to be organized etc. It also gives indication of events and activities planned for each semester so
that the student will have an advanced view of all the academic schedules to be implemented in the course of the
semester.
The handbook seeks to inform the student about the rules and regulations of the college, in order that they may
conduct themselves in an appropriate manner. In addition, the handbook makes the student aware of the history of
the college, and the culture and values that it upholds.
The publication of this student handbook was taken up to help students chalk out a systematic plan of study and
to make optimal use of their time. Though a laborious task, our faculty took the preparation of the handbook as a
challenge and completed it in time with high sense of commitment.
The first part, or the administrative section, comprises the history of the college, college timings, courses offered,
festivals and functions, rules and regulations, code of conduct, facilities, student support system, student related
matters and activities, teaching-learning process & centers of excellence.
The second part gives academic details, like the departmental profile, departmental tree, purpose of the department
almanac for course duration and tentative dates of theory and lab exams; course structure for credits and the number
of hours allocated for various programs; time table - a week-wise calendar of the subject, class time, and the name of
the faculty handling the subject; subject-wise details like the session plan, question bank assignments, guest
lectures, and students seminars; laboratory details; adjunct courses; industrial tours and visits; and finally, the
schedule of unit tests.
The third part provides student details, distribution of students into learning groups and the tasks assigned to each
of these groups.
Everyone’s cooperation in the successful implementation of all the activities listed out in the handbook is earnestly
solicited. Suggestions for improvement are always welcome.
iii
ADMINISTRATIVE DETAILS
Page No
1. HISTORY 3
1.1 The Beginning
1.2 The Leap
1.3 The Name and Logo
1.4 The Icon & Heritage
1.5 The Traditions
1.6 The Culture
1.7 The Vision
1.8 The Mission
1.9 Quality Policy
2. THE COLLEGE 4
2.1 Introduction
2.2 The Goal
2.2.1 Research
2.2.2 Teaching
2.2.3 Training
2.3 Timings
3. COURSES OFFERED 4
3.1 Department of Management
3.1.1 Master of Business Administration
3.1.1.1 Course Objective
3.1.1.2 Distinct Features of the Course
3.1.1.3 Graduate Destinations
3.2 Department of Computer Applications
3.2.1 Master of Computer Applications
3.2.1.1 Course Objective
3.2.1.2 Distinct Features of the Course
3.2.1.3 Graduate Destinations
4. FESTIVALS AND EVENTS 5
4.1 Festivals
4.1.1 Independence Day
4.1.2 Teachers’ Day
4.1.3 Ganesh Chaturthi
4.1.4 Republic Day
4.1.5 Guru Purnima
4.1.6 Vasantha Panchami
4.2 Events and Celebrations
4.2.1 Induction Day
4.2.2 Foundation Day
4.2.3 Aurora Family Day
4.2.4 Annual Day
4.3 Events
4.3.1 National Paper Presentations
4.3.2 Adjunct Courses
5. RULES & REGULATIONS 7
5.1 Dress Code
5.2 ID Cards
5.3 Attendance
5.4 Cell Phones iv
Page No
6. CODE OF CONDUCT 8
6.1 Ragging
6.2 Discipline
6.3 Lab Code
6.4 Punctuality
6.5 Academic Punishments
7. FACILITIES 11
7.1 Academic Facilities
7.1.1 Library
7.1.2 Laboratory Facilities - MCA Department
7.1.2.1 Language Laboratory
7.1.2.2 DBMS & Application Lab
7.1.2.3 Software Engineering Laboratory
7.1.2.4 OS and Networks Lab
7.1.3 Laboratory Facilities - MBA Department
7.1.4 Laboratory Facilities - Communication Department
7.2 General Facilities
7.2.1 Internet
7.2.2 WIFI Facility
8. SUPPORT SYSTEMS 12
8.1 Placements
8.1.1 Academic Requirement
8.1.2 Attendance
8.1.3 Limited Opportunity
8.1.4 Penalization for Non-acceptance
8.1.5 Commitment
8.1.6 All About You
8.2 Website
9. STUDENT MATTERS 14
9.1 Admission Procedure
9.1.1 Eligibility
9.1.1.1 Management Quota
9.1.1.2 Merit Quota
9.1.2 Filling in the Form
9.1.3 Documents & Admission
9.2 Fees
9.3 Examination System
9.3.1 Internal Evaluation - MCA
9.3.1.1 Theory
9.3.1.2 Practicals
9.3.2 External Evaluation
9.3.2.1 Theory
9.3.2.2 Practicals
9.3.3 Project Evaluation
9.4 Promotion / Detention Rules
9.5 Eligibility for Degree
9.5.1 Award of Division
9.5.2 Award of MCA Degree
v
Page No
9.6 Readmission Rules
9.6.1 Detained for Shortage of Attendance
9.7 Issue of Documents
9.7.1 Bus Passes and Bonafide
9.7.2 Originals
9.7.3 Memorandum of Marks
9.8 Scholarships
1. Department Profile 28
2. Tree View-Theory 40
3. Almanac 41
4. Course Structure 42
5. Subject-Wise Details
5.1 Software Testing 43
5.2 Middleware Technology 51
5.3 Object Oriented System Development 65
5.4 E-Commerce 81
5.5 Software Reuse Techniques 93
5.6 XML and Web Services 109
5.7 Mobile Computing 121
5.8 Information Security 135
5.9 System Administration 145
5.10 Rich Internet Application 155
5.11 Software Project Management 161
6. Laboratory Details
6.1 Object Oriented System Development Lab 173
6.2 Middleware Technology Lab 181
vii
ADMINISTRATIVE DETAILS
1
2
1. HISTORY
3
2. THE COLLEGE
2.1 INTRODUCTION
The College is located at Ramanthapur, 10 km from the Secunderabad Railway Station. The college offers
postgraduate courses in Management and Computer Applications (MBA & MCA).
Aurora prepares not just students with PG degrees in their hands, but people with a rounded personality.
It is for this reason that Aurora has become a brand to be trusted among students looking for quality
education.
2.2.1 RESEARCH
The college acknowledges that the preservation and expansion of knowledge through scholarly
enquiry are functions that distinguish institutions of higher learning. The institution believes that
scholarly enquiry promotes effective teaching, besides being a service to society. Aurora, therefore,
seeks to preserve knowledge in its archives and libraries; employs teaching faculty holding research
degrees awarded by reputed institutions of advanced education; honours those who achieve
distinction as scholars; maintains laboratories, research centers, and numerous administrative
entities that function to promote the expansion of knowledge.
2.2.2 TEACHING
Aurora is committed to the transmission of knowledge. The Institution’s primary responsibility is
to its student clientele, and, in this regard, effective classroom teaching is Aurora’s most pervasive
medium for the dissemination of the results of its faculty’s scholarly endeavors. The central
concern of the Institution is, therefore, excellence in those instructional activities that provide
students with opportunities for a comprehensive education and a specialized professional training.
The Institution assigns substantial weight to teaching in its process of faculty evaluation,
recognizing that excellence requires not only knowledge on the part of a teacher but a continuing
quest for knowledge, a constant review of curricula and modern teaching methods, flexibility and
creativity in the classroom, and an unceasing effort to individualize instruction. Towards this end,
Aurora seeks to measure the quality of instruction through both student and peer evaluation, and
regularly subject its academic programs to external review by accrediting agencies.
2.2.3 TRAINING
Aurora is an educational institution striving to utilize the services of its highly motivated team of
people, whose collective expertise encompasses virtually every field of human endeavor for the
benefit of the community. Aurora reaches out to serve society by training young men and women
not only in their respective areas of specializations but also in all aspects of human development.
2.3 TIMINGS
The college functions 6 days a week, from 9:10 AM to 4:30 PM, with a lunch break of 40 minutes, from
12:30 to 1:10 PM.
3. COURSES OFFERED
The college offers two Post-Graduate Courses viz.,
1. Master of Computer Applications (MCA)
2. Master of Business Administration (MBA)
4
3.1 MASTER OF BUSINESS ADMINISTRATION
The first two semesters focus on the fundamentals of marketing, finance & human resources. Apart from
core specialization subjects, students are also taught general foundation courses like statistics, operations
research and operations management. The last two semesters provide in-depth knowledge in an area of
choice. In these semesters, students are taught general management subjects like strategic management
and technology management, which help them perform well in middle-level managerial positions.
4.1 FESTIVALS
4.1.1 INDEPENDENCE DAY
August 15 is one of the most important days celebrated at Aurora. The day does not hold mere
ceremonial significance for us. On this day, the faculty, staff and students of Aurora reaffirm their
commitment towards the process of nation-building. Various social development activities and community
services are initiated on this day.
4.1.2 TEACHERS’DAY
September 5, the birthday of Dr. Sarvepalli Radhakrishnan, is celebrated as Teachers’ Day all over the
country. One of the important days in the Aurora calendar, it is a day on which students give the campus
5
a festive look. Cultural programs and a formal get-together mark the occasion. The faculty highlight the
role and contribution of a teacher in a student’s life. The college presents the ‘Best Teacher’ award for
teachers who have distinguished themselves in their fields. Senior teachers from other institutions are
also invited and honoured on this day.
6
4.3 EVENTS
4.3.1 NATIONAL PAPER PRESENTATION
A national level paper presentation is intended to be organized in the month of October. More than 200
colleges from all over India are expected to participate. The event includes paper presentation. This event
will make Students & Faculty aware of the various developments in the field of Information Technology
& instill an interest for research for them.
For 2010-2011 academic year it was held on 9th & 10th of February 2011.
4.3.2 ADJUNCT COURSES
An adjunct course on LINUX Administration and Database Administration was conducted for the
faculty of Computer Applications on 8th, 9th & 10th of March 2011.
5.2 ID CARDS
Students will be issued ID cards only after they fill up their details in a prescribed form that will be issued to
them at the time of registration. Students are expected to come with their blood group details for this purpose.In
case the card is lost, a duplicate ID card will be issued against a payment of Rs 100. Students will not be allowed
into the college campus without the ID card.
5.3 ATTENDANCE
The continuous evaluation system adopted by the OU and the college clearly expects every student to be
responsible for regularity to class, internal tests and other tasks assigned to him/her in the course. As such,
students are advised not to absent themselves without the prior submission of leave letter to the respective
counselors.
1. A student has to put in a minimum of 75% attendance in aggregate of all the subjects in the semester.
2. Condonation of shortage of attendance in aggregate upto 10% (between 65% to 75%) in a semester may
be recommended by the College Academic Committee to the OU with supporting evidence only in
genuine and valid cases.
3. A student will not be promoted to the next semester unless he/she satisfies the attendance requirement
of the present semester.
4. Shortage of attendance below 65% in aggregate shall in no case be condoned.
5. Students whose shortage of attendance is not condoned are not eligible to take their examination of that
class and their registration shall stand cancelled. They may seek re-admission for that semester when
offered next.
6. A stipulated fee shall be payable towards condonation of shortage of attendance.
7. Students coming out in the middle of a class or entering late into a class will be seriously viewed and
attendance will not be given for that hour.
8. The monthly attendance of each student, along with the unit test marks, will be displayed on the
notice board in the first week of every month. Also a copy of that will be sent to the parents at the address
registered with the college. Postage costs will be borne by the student.
9. Students will not be given lab attendance unless they submit practical records of the previous lab
sessions.
10. In case of ill-health, a student has to submit the proof or evidence of absence and the leave application
to the Principal/Head of the department, immediately on rejoining the college. Late submission of leave
application will not be accepted for consideration at the time of condonation of shortfall of attendance.
11. Students with less than 75% of attendance will not be permitted to participate in co-curricular, extra
curricular and sports activities. No college facilities like bus pass, travel concessions, scholarships will
be admissible for them.
7
5.4 CELL PHONES
Students are NOT allowed to keep their cell phones in SWITCH ON mode on the college campus. If any
student is found in possession of camera cell phone, it will be seized by the college and will not be returned.
6. CODE OF CONDUCT
6.1 RAGGING
Ragging is a cognizable and punishable offence.Any student found indulging in ragging will be dealt with
severely as per the existing orders. It is to be noted that ragging in professional colleges has been banned
within or outside the college by the Government of AP, vide Act 26 1997. An extract of the Act is given below.
Ragging includes words either spoken or written, signs, sounds, gestures and visible representation meant to
harass and torture. Ragging is an act which causes or is likely to cause insult/annoyance or fear/apprehension/
threat/ intimidation/outrage of modesty/injury to a student.The full text of Act 26 is placed in the college library.
1. Students convicted of an offence under section 4 of this Act and punished with imprisonment for a term
shall be dismissed from the educational institution.
2. Any student convicted and punished under this Act for more than six months shall not be admitted in
any other educational institution.
3. Any student dismissed from a college for ragging will be debarred from seeking admission in any other
course of study in any college / university in the state.
4. A student against whom there is prima facie evidence of ragging in any form will be suspended from the
college immediately.
6.2 DISCIPLINE
Discipline is a priority for the success of any venture. Be it related to matters of general conduct, attendance,
punctuality, dress, body language or academic performance, discipline has a bearing on all aspects of a
student’s personality. At Aurora, discipline is valued and promoted, both among the staff and students.
Students are expected to abide by the rules of the college and refrain from any activity that harms the dignity
of the individual or casts a slur on the image of the institution. Any violation of the college norms shall be dealt
with strictly and the student will be penalized accordingly. Cooperation of parents/guardians is essential in
this regard.
1. Consumption of alcoholic beverages, narcotics and other addictive substances on the college premises,
or coming to college having consumed elsewhere, will entail dismissal from the college and conduct
certificate will not be issued.
2. Smoking on the college campus is strictly prohibited and the student will be suspended from the college
with immediate effect and recommended for punishment as per Section 4 of the “Cigarettes and Other
Tobacco Products Act 2003”.
8
3. Ragging is a legal offence as per “Act 26 of the AP Legislative Assembly 1997”. Students are cautioned
against indulging in any activity that may be classified as “ragging” in and around the college campus,
in student buses or at boarding/alighting points. Those found aiding and abetting are also equally
accountable for their actions. Ragging entails suspension, dismissal, heavy fines, and imprisonment.
4. Adherence to the Dress Code laid down by the college is a must.
5. Entry shall not be given if a student is late to college. Students are supposed to be present in the college
by 9:00 AM. The entry of latecomers will be regulated and monitored by the college authorities.
6. The kind of language we use is a reflection of our personality and our home environment. Use of slang
and abusive language, whistling in the college premises, are strictly discouraged and liable to be penalized.
7. Not attending classes while being on the premises and en masse absenteeism are both viewed with
displeasure.
8. Students are advised to mind their body language. It communicates more than words. Slouching in
corridors or sitting on the parapet walls or on the steps at the entrance are discouraged.
9. Any damage to college property, scribbling on walls, tables, drawing boards, is seriously viewed.
10. Rising to greet when a teacher enters the classroom adds value to one’s own personality Conduct
towards faculty and peer group should be impeccable.
6.3 LAB CODE
1. Students should report to the scheduled labs as per the time table.
2. Students who turn up late to the labs will in no case be permitted to perform the experiment scheduled for
the day.
3. After completion of the programs, certification of the staff in-charge in the observation book is necessary.
4. Students should bring a notebook of about 100 pages and should write the programs before entering the
Lab.
5. Any damage to the compuler or burn-out of components will be viewed seriously and is punishable
by penalty or the dismissal the student from the lab for the semester/year.
6. Students should be present in the labs for the total scheduled duration.
7. Requisition of Systems for extra practice should be done 24 hrs. prior to the practice.
6.4 PUNCTUALITY
1. All students shall strictly observe the college time. If any student comes late to college, he/she will not
be allowed to the class and attendance will not be marked for that hour.
2. If anyone is found to be regularly late, administrative action, including suspension from classes shall be
initiated.
3. All the students should strictly adhere to the deadlines specified for the submission of assignments,
laboratory reports, seminar and project reports, failing which students will be given academic punishment(s).
6.5 ACADEMIC PUNISHMENTS
A novel method of correcting acts of misconduct has been devised. Instead of monetary penalization, students
will be given academic punishments for a range of undesirable acts, like giving proxy attendance, not attending
classes regularly, cutting classes while on campus, not observing the dress code, scribbling on college property,
littering the classroom and many more such acts.
1. Make a power point presentation on a specified topic.
2. Give a seminar to junior students on a relevant topic.
3. Come to college on holidays or during vacation to take an examination based on previous question
papers.
4. Student may lose attendance for 5 days.
5. Prepare notes for all the subjects.
6. If found guilty of littering the campus, the student may have to conduct sanitation week in the college
premises.
7. If a student loses a library book, he/she has to replace the book with a new copy and write a brief on
library management.
8. Present a seminar on an issue related to environmental science.
9. Present a seminar on the topic covered in the class and clarify peer doubts.
10. Take notes of the hour and answer students’ queries on that topic in the next class.
11. Gather information on a topic that is not discussed in the prescribed textbook.
12. Write an appropriate program and submit along with updated observation book.
13. Student must give an apology letter stating that he/she will lose 2 days’ attendance if the action is
repeated.
9
14. Must answer a previous exam paper.
15. Prepare 20 objective-type questions from one unit and submit it in two days’ time.
16. Collect 5 communication protocols and explain them in detail.
17. In the event of harassing a junior, the student offers a detailed apology in the junior’s class.
18. Give a seminar on the subject that is a pre-requisite for the course under study.
19. Give a detailed list of the subjects studied so far.
20. Attempt not less than 3 lab exercises.
21. Type chapter notes. This will:
i. increase notemaking speed
ii. the student will learn something about what is being typed
iii. spellings of some key words will be known
iv. notes can be verified by the teacher and circulated to others in the class.
22. Download at least 1MB of tutorials from the Internet on a specified subject.
23. Record his/her reading voice on a cassette for a chapter or part, and submit to the teacher.
24. Do a “SWOT” (Strength, Weakness, Opportunities & Threats) analysis chart in a creative fashion under
the direction of one of the disciplinary committee members.
25. Do a “role play” in English on the topic given by the teacher for at least 7 minutes.
26. Prepare a mind map on the entire topic and present it to the class.
27. Give an extempore for at least 5 minutes on the topic being dealt with in the next class.
28. Solve a problem in the presence of the teacher from the syllabus covered.
29. Solve five problems related to the topic of the day.
30. Present the topic under discussion to the class in the next period itself.
31. Learn ten words given by the teacher. Student should write the synonyms, antonyms, and the different
forms of those words.
32. Write a composition (250-300 words) on a theme suggested by the teacher.
33. Answer essay type questions pertaining to the unit under discussion.
34. Derive all the equations present in the entire syllabus
35. Present a seminar on any topic in the presence of the Principal and the HOD.
36. Prepare a brief on a mathematician who has made significant contribution to the field.
37. Write five or more derivations pertaining to any subject and circulate copies in the class.
38. Repeat the same topic next day and engage the class for the full hour.
39. Prepare charts of difficult circuits, computer programs etc., for display in class.
40. Collect 50-100 jokes related to science & technology.
41. Draw cartoons for any magazine related to science & technology.
42. Suggest two books which are not available in the library. The title, author, publisher, cost, and the name
of the book shop where they are available should also be mentioned.
43. Download the literature on current trends pertaining to the subject under discussion.
44. Write an assignment three times on the topic of the day.
45. Give a seminar on discipline and respect.
46. Submit a write-up on discipline in public places.
47. Write a board stating, “Smoking is injurious to health”.
48. Write a board stating, “Tobacco is injurious to health”.
49. If a student is found scribbling on college property, he/she has to clean up the scribbled space.
50. Draw all circuit diagrams in the lab once.
51. Collect the profile of the faculty holding the session.
52. Submit wall posters for the lab.
53. Submit a write-up on the history of the college.
54. Collect information on advancements related to his/her field.
55. Collect related news from various journals.
56. Write a paper.
10
7. FACILITIES
7.1 ACADEMIC FACILITIES
7.1.1 LIBRARY
Our library is truly a learning centre with reading space for more than 100 students at a time. The library
stocks textbooks, reference books, journals, magazines and newspapers. It also has an archive of
editorial clippings on interesting subjects.The library subscribes to a large number of national and
international journals and also has a very large collection of reference books on advanced disciplines. In
all, the college library has more than 15,000 volumes and around 6000 titles covering various advanced
topics pertaining to the subjects offered by the college. A dynamic CD library presents data and information
in bytes. Furthermore, information is compiled for the students from various international websites and
is collated topic-wise in the form of printouts. All this is made available free to the students. Supporting
this excellent library facility is the computer-enabled digital library giving access to various international
journals. The college library also offers reprographic facilities like photocopying, lamination, spiral binding,
etc.The library provides facility for the borrowing of books, magazines, freeware and CDs. There is a
separate Book Bank facility supported by the Social Welfare Department of the Governmet of Andhra
Pradesh for SC/ST students.
11
7.1.3.4 OS AND NETWORKS LABORATORY
This is a lab with 60 networked state-of- the-art computing facilities. The lab has all the popular
operating systems like all the variants of Microsoft OS products, SCO Unix, and Linux. A core group
of faculty has been active in the Linux club that is proactively promoting and popularizing the concept
of Open Source Technologies. The group also conducts adjunct courses regularly in OST for students
who have undergone a course in at least one operating system. The team is also working towards
developing some projects in this area. The lab is equipped with suitable software for application and
reasearch work in networking technologies such as protocols and cryptographic implementations.
8. SUPPORT SYSTEMS
8.1 PLACEMENTS
1. The Placement Cell of Aurora works in tandem with the students to compile information about each and
every student under an exhaustive portfolio titled ‘All About You’.
2. Interaction with companies and organizations in the form of emailing, phone calls, mailing brochures,
hospitality and scheduling placement activities is done weeks in advance by the placement cell.
3. The placement cell coordinates with the Centre for Career Counselling, where the students are educated
about the difference between a job and a career. The Centre for Career Counselling strives to provide
information and counselling to students, which will enable them to identify not only their strengths but
also the areas that need further improvement.
4. The cell is also assisted by the Centre for Communication. This centre does the preliminary job of
scouting and grooming students who are potentially employable. The confidence and self-esteem of
students is enhanced through SWOT sessions, group discussions, mock interviews and sessions on
bodylanguage, etiquette etc.
5. All the final year students undergo interaction with the placement officer. During these interactive
sessions, the officer acquaints them with the activities of the placement cell and helps them to prioritize
their future plans.
6. Student placement coordinators are selected from final years in the months of July or August. Coordinators
are given the necessary orientation for helping their team members.
7. Students are categorized on the basis of their performance in an aptitude test conducted by the cell and
12
the centre for communication in the month of June. Based on the results, the students are groomed to
evolve into confident young professionals ready for recruitment.
8. An e-mail club has been established to facilitate communication with the students.
9. A placement fete is organized by the students. Distinguished personalities from the industry are invited
to address and motivate them about the prospects of early career placements. This fete also includes
several competitions like best resume competition, mock interviews, group discussions, JAM sessions,
interview-based dressing, etc.
10. The alumni of Aurora working in reputed organizations are invited to interact with students and explain
their strategies and share their hands-on experiences with them.
11. Students are encouraged to collect and display placement-related literature on the notice board.
The best contribution is duly rewarded.
Based on the observations made in the last few years with regard to the attitude of students
towards placements, the placement cell has come out with a Placement Charter, which sets guidelines
for the system to be effective and to maximize results. An extract from the charter is given below.
8.1.2 ATTENDANCE
A student with more than 75% attendance in each and every subject can get the benefit of registering
for placements.
8.1.5 COMMITMENT
Recruiting companies generally have a stipulation that an employee should hold the job at least for
a period of two years. The placement cell expects this commitment to be present in all the selected
students.
8.2 WEBSITE
Our website www.aurora.ac.in is a mine of information. Provided in the most interactive manner, it helps
in establishing a virtual family of students, faculty and parents.
13
9. STUDENT MATTERS
9.1 ADMISSION PROCEDURE
Students should have completed their study upto Degree level, and appeared for the ICET examination
Integrated Common Entrance Test (ICET) for Admission into M.B.A. / M.C.A. Courses of all Universities in
the Andhra Pradesh and their Affiliated Colleges (conducted on behalf of APSCHE).
9.1.1ELIGIBILITY
1. The candidates should be Indian Nationals and should satisfy local/non-local status requirements
laid down in the Andhra Pradesh Educational Institutions (Regulations of Admission) order, 1974 as
amended upto date (As per G.O. Ms No : 108, Higher Education Dept., dated 30-7-2005).
2. The candidates other than Indian nationals should satisfy the rules of the Universities concerned.
3. A pass (or) appeared at the final year examination of Bachelor’s Degree (except BOL and BFA) of any
University in Andhra Pradesh or any other university recognized as equivalent thereto.
4. The candidates seeking admission into MBA course should have passed a Bachelor’s Degree
Examination of not less than three years duration from any recognized University or equivalent
thereof besides passing SSC or equivalent examination with Mathematics as one of the subjects.
5. The candidates seeking admission into MCA course should have passed Bachelor’s Degree
Examination of not less than 3 years duration in any discipline with Mathematics at 10+2 level (OR)
should have passed Bachelor’s Degree Examination of not less than 3 years duration in any discipline
with Mathematics as one of the subjects.
6 The candidates who are appearing for the final year degree examination shall also be eligible to
appear for ICET- 2010.
Note: The college reserves the right to cancel the admission of a candidate at any stage if it is
detected that the admission is against the rules and regulations of the University.
9.2 FEES
Convener’s Quota Management Quota
I Year
Tuition Fee As per norms As per norms
Student Expenses Rs. 8,500 Rs. 8,500
II Year
Tuition Fee Rs.27,000 Rs.78,000
Student Expenses Rs. 2,500 Rs. 2,500
III Year
Tuition Fee Rs.26,700 Rs.73,100
Student Expenses Rs. 2,500 Rs. 2,500
9.2.1MODE OF PAYMENT
Two separate crossed Demand Drafts/Bankers Cheques for Rs. 27,000 and Rs. 8,500 drawn on any
nationalized bank favouring the Principal, Aurora’s PG College, and payable at Hyderabad, need
to be submitted along with registration.Those who fail to make the payment before the last date will
14
have to pay fine as detailed below, in addition to the tuition and other fees.
Period : 10 Days -- Rs.100
Next 20 days @ Rs.10 per day
The fine amounts may be added to the student expenses and consolidated Demand Drafts/Bankers
Cheques may be taken as outlined above.Tuition fees will not be accepted beyond 20 days and
admission of defaulters will be cancelled.
Registration
After payment of the fee, the student shall have to register for Odd Semester and shall attend the
counseling as per the schedule.
9.3.1.2 PRACTICALS
For Practical subjects, there shall be a continuous evaluation during the semester for 25 sessional
marks and 50 end examination marks. Of the 25 marks for Internals, 12.5 marks shall be awarded
for I Lab Internals and 12.5 marks for the II Lab Internals.
9.3.2.1 THEORY
The performance of a student in each semester shall be evaluated subject-wise with a maximum
of 100 marks . In addition, industry-oriented mini project, seminar and project work shall be
evaluated for Grading for MBA and 25 marks for MCA respectively.
For theory subjects, the distribution shall be 20 marks for internal evaluation and 80 marks for
the term end examination.
15
9.3.2.2 PRACTICALS
The end examination shall be conducted at the concerned colleges by the external examiner from
other college. The external examiner is appointed by the Osmania University. The evaluation of
papers is for 50.
Note: A student has to carry the hall ticket and identity card to the examination centre , else the
student may not be permitted to write the exam. Students are instructed not to carry any
objectionable material to the exam hall. All the students have to produce their hall tickets to the
invigilators and should be present in the examination hall at least 15 minutes before the
commencement of the examination.Any student found guilty of malpractice/improper conduct is
liable to disciplinary action as per the Osmania University Malpractice Rules. All such cases
are referred to the College Malpractice Prevention Committee, which, after going through the
reports, submits its recommendations to the Osmania Unversity Malpractice Committee
(Controller of Examinations) that has the final authority to decide the case.
9.3.3 EVALUATION OF PROJECT
Students will have to take up an industry-oriented mini project, in collaboration with an industry of
their specialization, during the academic year for MBA - II year and MCA - III year. The Major
Project is done in II Semester, MCA III year.
ii. A student who fails to fulfill all the academic requirements for the award of the degree within
3/3 years (regular student) from the time of admission, shall forfeit the seat in the course and
the seat shall stand cancelled.
16
class, and should register at the beginning of the semester/year only. Attendance is considered
from day one onwards.
9. 7.2 ORIGINALS
The original certificates and memoranda of marks submitted by the student will not be returned
during the study period. They can be issued to the student for valid reasons, after seeking approval
from the Principal. Students should submit an application to the Principal requesting for the same.
The documents have to be returned to the college at the earliest.
9.8 SCHOLARSHIPS
All the SC, ST, and BC students can apply for scholarships, subject to fulfillment of annual income
criteria. Fresh applications for scholarships have to be submitted at the College office.
The documents to be enclosed with the application are:
1. Caste & Income certificates issued by the MRO
2. Photocopies of SSC, intermediate marks memo
3. Transfer certificate
4. Photocopy of parents’ electoral card/ration card
Note : On scrutiny, if any student is found producing wrong evidence or information he/she will
be rusticated from the college.
17
9.9.3 SEMINARS
The students should submit their synopsis one week before the scheduled date. The synopsis
should mention the books referred to. Students who fail to give the seminar on the prescribed date
and time will have to give the seminar on another day approved by the coordinator for twice the
time of the normal seminar.
9.10 CHANGE OF ADDRESS
In case of change in permanent/contact address, students are required to incorporate the same in the
registration cards to be filled by them at the beginning of every semester. If there is a change in the
middle of any semester, students can forward an application for change of address to the college office
through the Administrative Officer.
9.11 TRANSFER OFADMISSION
10.4 IT CLUB
This club is a reflection of new ideas in the field of information technology. It shares the latest information on
emerging trends, events and personalities involved in designing and working of technologies.
18
sessions and projects, with interactive teaching-learning aids like seminars, guest lectures, expert sessions,
industrial visits, and assignments.
11.1.1 LECTURES
Lectures are designed to provide the framework of a subject. They normally last for an hour and are given
by expert faculty. Students are expected to note the main points. Handouts summarizing the important
points or explaining complex concepts are frequently given. OHPs, LCDs, smart classrooms and other
such advanced teaching aids are used to enrich the lectures.
11.1.2 LABORATORIES
Laboratory work is essential to science and engineering. It provides students with an opportunity to
apply their knowledge and develop appropriate practical skills. Both group and individual project work is
undertaken in the scheduled laboratory sessions.In addition to the programs prescribed in the syllabi,
students are expected to carry out application-oriented and advanced experiments in the laboratories.
11.1.3 PROJECTS
The knowledge acquired by the students during the course of their studies is reflected in the project work
undertaken. The project delineates not only the knowledge of students in various theoretical courses,
but also shows the applicational skills of the candidate. Needless to say that the project report submitted
by the student would be referred to a group of experts for assessment. The serious involvement of staff
members in the student’s project work will go a long way in increasing their rapport with the students and
the department also benefits by way of infrastructure and development.
19
a question bank for each unit (minimum of 30 questions) with questions drawn from the Osmania
University Examinations. These assignments will enable the students to prepare well for the final
examinations. Each learning group has to submit 5 assignments in all from every subject.
20
members and also the students currently studying in the College in various activities.
11.2.11 IT MEETS
The students of the college organise an IT Meet entitled ‘Abhyasa’every year inviting participation and
delegations from different colleges. It has various competitive events like programming contest, IT Quiz,
Brain Compiler etc., to stimulate interactive learning.
to assess the skills of the candidate. Students are advised to follow meticulously the guidelines given. The
serious involvement of staff members in the projects will go a long way in increasing their rapport with the
students. The department also reaps benefits in terms of infrastructure and development.
Final Year Project is the most important component of MCA program, which paves the way for the student’s
career choices and placement opportunities. This program is intended to focus on application of skills of
young and aspiring software professionals to lead and pursue IT Carreer by bridging the gap between the
campus and corporate worlds.
1. Every student of Final Year Project is expected to be in regular contact with the Faculty, for seeking
guidance and reporting on his/her progress from time-to-time.
2. Students must get an overview of the host organization for understanding their requirements. They
should prepare the software requirement specification, physical and logical design, user interfaces
accordingly using the desired high-level language and test within the stipulated period of 15 weeks.
3. Student should always observes formal dress code.
4. Students are expected to be courteous and polite in their interactions with host organization, maintaining
strict confidentiality of company information and cordial relationships with Company Managers and
Executives.
5. Students should never criticize the host organization’s Executives or policies and should desist from
making adverse comments about college and/or Faculty guide.
6. The tasks and assignments allotted to individual students by the host organization should always be
completed on time.
7. The students are expected to be punctual to their duties and are not expected to leave the office without
prior permission of external guide at the host organization.
8. Students should desist from inviting their friends to visit their work area at the host organization.
9. All the equipment/material/accessories provided by the host organization on returnable basis to the
student, must be returned and never held back by the student.
10. Students must facilitate the meeting of Faculty guide and the external guide regularly.
11. Students should strictly adhere to the deadlines for submission of weekly reports and making seminar
presentations.
21
11.4 GUIDELINES FOR INTERACTIVE LEARNING METHODOLOGY
23
Note :
1. Once proposed and approved, no further changes in the schedule of presentation or in the
seminar topics would be entertained.
2. a. If any student in the presentation group is absent for the seminar, he/she has to give a
seminar for 30 minutes on a new topic in the presence of their parents, if so warranted.
b. Students of the class, other than the presenting group, who absent themselves from the
seminar without taking prior permission from the coordinator are liable for severe academic
punishments, besides their parents being summoned and briefed about it, if considered
necessary.
25
12. CENTRES OF EXCELLENCE
The centres for excellence developed in various departments based on the expertise available help in
motivating the student community in cocurricular and extracurricular activities. Each department has
identified centres of excellence in a specific area, based on the research work being done by the faculty,
the industry-institute interaction in that specific area and the infrastructure facilities being developed
by the department. This enables the students to conduct their projects in an effective manner. These
centres not only guide the students in their project work but also motivate them to go for higher studies.
The following are the centres of excellence existing at Aurora’s P.G. College:
26
MCA III Year, Semester I
DEPARTMENT PROFILE
27
MCA III Year, Semester I
1. DEPARTMENT PROFILE
The Department of Computer Science has been in existence since 1992. The present intake of the Department
is 180
Fifteen batches of students have successfully completed their MCA Programme.
The pass percentage in 2004 was 96.67% with 27 first classes.
The pass percentage in 2005 was 94.6% with 38 first classes.
The pass percentage in 2006 was 96.42% with 36 first classes.
The pass percentage in 2007 was 94.80% with 53 first classes.
The pass percentage in 2008 was 97.88% with 52 first classes.
The pass percentage in 2009 was 98.18% with 65 first classes.
The pass percentage in 2010 was 100.00% with 57 first classes.
The pass percentage in 2011 was 100.00% with 106 first classes.
The pass percentage in 2012 was 98.00% with 130 first classes.
The Department has 20 strong Computer Science Faculty including 1 Statistics Faculty. The Department is
manned by dedicated teachers, devoted students, committed supporting staff and experienced technical
staff.
1.1 STAFF
A total of 20 faculty members and 4 technical staff are committed to the development of the department. In
addition to the departmental load of 35 theory courses and 28 lab courses, the department offers 2 theory
courses and 2 lab courses on an average per semester as service subjects.
1.2 STUDENTS
The students of MCA department are devoted to studies and the most technically competent.
They have conducted participated Formal events and Informal events like Quiz Mania/ Accumulating your
programming/ Proscenium/Script Mania/Fabricate PC/ Observation Test/Text Singing/Mind Switching and
Lan Gaming organized by other colleges as detailed below.
FOR THE ACADEMIC YEAR 2011-2012
28
MCA III Year, Semester I
Final Winner /
S.No Students Names Event Name Organization
Runner up
29
MCA III Year, Semester I
30
MCA III Year, Semester I
31
MCA III Year, Semester I
31 B. Mahesh Intense
32 V.Pardasarathi A to Z Pharmacy
33 M. Harish NCR Corporation
34 T. Mahesh Sum Total Systems
35 M. Santhosh Kumar Sum Total Systems
36 K. Uday Kumar Wipro
37 A. Pradeep Kumar Wipro
38 Santhosh Wipro
39 Kishore Archiees IT Pvt.Ltd.,
40 Srivani Muthoot Finance
41 Jyothi Apex
42 Uday Kumar Sum Total Systems
43 Vidya Sagar Sum Total Systems
44 Satyanarayana Verizon
45 G. Karunakar TCS
46 T.Anil Kumar Reddy Trigeo Tech
47 K. Satyanarayana Trigeo Tech
48 N.Srinivas Incessant Technology
49 A.Prabhakar USM Global System
50 P.Hemanth Kumar IBM
32
MCA III Year, Semester I
33
MCA III Year, Semester I
34
MCA III Year, Semester I
35
MCA III Year, Semester I
36
MCA III Year, Semester I
37
MCA III Year, Semester I
1.4 LABORATORIES
The department has 4 fully equipped laboratories with material worth about Rs.1.15 crores.
We have Licensed Software of Rational Rose 2003, Borland C++ and Microsoft Campus Agreement and
Corporate edition of Symantec Norton Antivirus 10.5.
2 LAB- II Windows XP, Redhat Linux Office-2003, Edit Plus, Turbo C++
50 PCs Borland C++, Oracle 8i, JDK 1.5,
CA, D2K
38
MCA III Year, Semester I
GUEST LECTURES
Student Seminars
Each student in a class gave a minimum of two seminars – one Technical and one General.
Based on assigned learning groups students should give seminars in seminar sessions.
Student Project
A group of 6 students of each II Year and III year MCA are given a Project – either Application or System,
to analyze and implement in a semester.
Student Assignment
Previous question papers of in University exams and Campus recruitment are given to students’ groups
as assignments. The assignments are corrected and thereby students are given guidance in attempting
typical questions.
Student Tutorials
The students are given programs in sessions monitored by faculties by the respective field of expertise.
The students in small groups are assisted to prepare themselves and to write logical and application
oriented programs.
Future Plans
1. Steps will be taken to improve the pass percentage by identifying the weak students. Accordingly, special
classes will be conducted on the subjects in which they required special coaching.
2. Attendance is strict with periodic warning given to those falling short of 75%.
3. A state level conference on latest trends is planned by the department in the next semester.
4. Adjunct courses will have to be conducted to make students aware of the new technologies.
5. Students are given mini projects to be supervised carefully by the faculty.
6. At least one technical visit has to be arranged for each batch in the entering semester.
7. Staff members have to be encouraged to pursue higher education.
8. Staff members will be deputed to National & International conferences to enhance their technical skills.
39
MCA III Year, Semester I
40
MCA III Year, Semester I
PRACTICE
BEYOND CLASS COMMUNICATION PERSONALITY
ROOM & SKILLS DEVELOPMENT
SYLLABUS
C++ LAB
WEB LOCAL STUDENTS SPORTS
EIT LAB
PROGRMMING INDUSTRIAL SEMINARS DEBATTING
LAB VISIT PROJECT ESSAY WRITING
SUMMER MINI REPORTS PROFESSIONAL
PROJECTS REPORTS ON STUDENTS
ADJUNCT GUEST FORUMS
DS LAB COURSES LECTURES SYMPOSIUMS
INDUSTRIAL LOCAL VISITS
TOURS INDUSTRIAL
UNIX –SYSTEM VISITS TO TOURS
PROGRMMING LAB INSTITUTES OF
DBMS & EXCELLENCE
LAB NETWORK
PROGRMMING LAB
CORE
JAVA
LAB
ADVANCED
JAVA LAB
UML LAB
3. ALMANAC I SEMESTER
II SEMESTER
Commencement of classes :
Last date of Instructions :
Theory Examinations I/I, Supplementary) :
Theory examinations (I/II Main) :
Practical Exams (Main & Supplementary) :
41
MCA III Year, Semester I
4. COURSE STRUCTURE
Note: All term end Examinations (theory and Practical) are of three hours duration
T : Theory P : Practicals
42
MCA III Year I Semster
5. SUBJECT DETAILS
5. 1 SOFTWARE TESTING
5.1.2 Scope
5.1.3 Prerequisites
5.1.6 Websites
5.1.8 Journals
43
MCA III Year I Semster
5.1.2 SCOPE
Software testing can also provide an objective, independent view of the software to allow the business to
appreciate and understand the risks of software implementation
5.1.3 PREREQUISITES
Students should have knowledge of fundamentals of computer science and Software Development Life
Cycle.
UNIT I
OBJECTIVE
It describes about the functional testing.
The unit introduces the subject by illustration the diversity of application areas and explore the basic feature of
SYLLABUS
A Mathematical Context: A perspectiveonTesting,Examples
Functional Testing : Boundary Value Testing, Equivalance Class Testing, Decision Table - Based Testing,
Retrospective on Functional Testing.
UNIT II
OBJECTIVE
It gives the clear concepts of different strictural testings.
SYLLABUS
Structural Testing: Path Testing, Dataflow testing, Retrospective on Structural Testing
UNIT -III
OBJECTIVE
This unit deals with various integration and system testing methods.
SYLLABUS
Integration and System Testing: Levels of Testing,Integration Testing, System Testing, Interaction Testing.
UNIT - IV
OBJECTIVE
This Unit discuss the various issues in object oriented testing
SYLLABUS
Object Oriented testing: Issues in Object-Oriented Testing, Class testing, Object-Oriented Integration
Testing, GUI Testing, Object-Oriented System Testing
44
MCA III Year I Semster
UNIT V
OBJECTIVE
This Unit discusses issues related to Millennium testing
SYLLABUS
Millennium Testing: Exploratory Testing, Model-Based Testing, Test-Driven Development, All-Pairs testing,
Software testing excellence.
TEXT BOOKS
T1 Paul C. Jorgensen, Software Testing: A Craftsman’s Approach, 3 rd Edition, CRC Press,2007
T2 Boris Beizer, Software Testing Techniques,DReamTech,2009
REFERENCE BOOKS
R1 Software Testing (2nd Edition) by Ron Patton
R2 Testing Computer Software, 2nd Edition by Cem Kaner, Jack Falk and Hung Q
R3 Lessons Learned in Software Testing by Cem Kaner, James Bach and Bret Pettichord
5.1.6 WEBSITES
1. http://www.softwaretestinghelp.com/category/web-testing
2. http://www.softwaretestinghelp.com/web-application-testing/
3. http://www.testinggeek.com
4. http://www.softwaretestingmentor.com/links/links.php
NATIONAL
1. Dr Harinath Pudippedi
Bangalore, Sr. Practice Manager at Cerner Corp.
45
MCA III Year I Semster
REGIONAL
1. Dr. Manoj Kumar Chaganpipati
Pin: 500072
2. Mrs. Katya
Miyapur, Hyderabad
5.1.8 JOURNALS
INTERNATIONAL
1. Software Testing, Verification and Reliability
2. STVR editorial information - George Mason University
3. International Journal of Software Engineering
NATIONAL
1. NJEducationExperts
2. Journal of Information, Information Technology, and organization.
1. Functional Testing
2. Structural testing
3. Integration and System Testing
4. Object-oriented testing
5. Millennium testing
46
MCA III Year I Semster
47
MCA III Year I Semster
T6
Data Flow testing Discuss various du-paths
II
T7
Data Flow testing Slice Based Testing
Retrospective on
T8 Metrics for Method Evaluation
Structural Testing
48
MCA III Year I Semster
UNIT - I
3. Write the Venn diagram for specified implemented and tested behavior.
UNIT - II
6. Write the redemdancs analysis for triangle problem using the structured implementation?
UNIT - III
49
MCA III Year I Semster
UNIT IV
1. What is the importance of Object Oriented Testing? How Object Oriented Testing plays a vital role in
current software development? (July 2012)
2. What is the importance of GUI testing? Explain. (July 2012)
3. What are the levels of object-oriented testing? Write the state chart for currency contdier application.
4. What is class testing?
5. Write briefly about object-oriented integration testing.
6. What is GUI testing? What is system for currency conversion program.
UNIT - V
1. What is the importance of test automation and how testing tools can speed up the testing process?
(July 2012)
50
MCA III Year, I Semester
5. SUBJECT DETAILS
5.2.2 Scope
5.2.3 Prerequisites
5.2.6 Websites
5.2.8 Journals
51
MCA III Yearm I Semester
52
MCA III Year, I Semester
The objective is to make students to learn about Client Server communication using middleware
technologies like Remote Method Invocation (RMI), Common Object Request Broker Architecture(CORBA)
,Enterprise java beans(EJB) and .NET
5.2.2 SCOPE
The syllabus is designed in such a way that students take up advanced courses on J2EE and C#.NET
to develop middleware applications
5.2.3 PRE-REQUISITES
UNIT - I
OBJECTIVE
This Chapter discus the basic concepts of client and server communications using middleware technolo-
gies. The students will acquire knowledge of database communication and server programming
SYLLABUS
Client Server File Server , Database Server , Group server Object server web server Middleware Service
specific Middleware .Client/Server Building Blocks ,RPC Message Peer to peer, Web services SOA SOAP
WSDL REST Services
UNIT - II
OBJECTIVE
This Chapter deals with the Architecture of EJB .This chapter further discusses of EJB Conversation
Building and Deploying EJB Roles of EJB
SYLLABUS
EJB Architecher Overview of EJB software architecture View of EJB Conversation Building and Deploying
EJB Roles of EJB
UNIT - III
OBJECTIVE
This Chapter highlights implementation of EJB Session beans like Stateless and state full beans and EJB
entity beans
SYLLABUS
EJB Session beans, EJB entity beans, EJB client, EJB Deployment
Building an application with EJB
UNIT - IV
OBJECTIVE
This chapter discusses CORBA Distributed Systems and Architecture overview of CORBA and Net-
working model . This chapter further discusses IDL ORB Building an application with CORBA
53
MCA III Yearm I Semester
SYLLABUS
CORBA - Distributed Systems, Purpose, Exploring CORBA alternatives, Architecture overview, CORBA
and Networking model, CORBA Object model, IDL, ORB, Building an application with CORBA.
UNIT - V
OBJECTIVE
This chapter deals with COM Data types and Stub Marshalling for implementing Server/Client interface
. This chapter further discusses the Introduction and overview to .NET
SYLLABUS
COM - Data types interfaces Proxy and Stub, Marshalling, Implementing Server /Client interface Pointers,
Object Creation, Invocation, Destuction Comparision of COM and CORBA.Introduction to .NET Overview
of .NET Architecture, Marshalling and Remoting.
TEXT BOOKS
T1. Robert Orfali,Dan Harkey and Jeri Edwards ,The Essential Client/Server Survival Guide” Galgotia
Publications Pvt Ltd ..2002.(Unit 1)
T2. Tom Valesky .”Enterprise Java Beans “, Pearson Educations ,2002 (Unit2&3).
T3. Jason Pritchard,”COM”,CORBA side by side”, Addison Wesley , (Unit 4&5)
T4. Jesse Liberty ,”Programming C# “, 2ed Edition ,O,Reilly Press ,2002(Unit 5)
T5. Arno Puder ,Kay Romer and Frank Pilhofer ,Distributed System Architecher Morgan Kaufman 2006.
REFERENCE BOOKS
R1. Mowbray ,”Inside CORBA “, Pearson Edition ,2002
R2. Jeremy Rosenberger, “Teach yourself CORBA in 14 days”
R3. Programming with java and CORBA
R4. Java Server Programming - Black Book
5.2.6 WEBSITES
1. http://www.omg.org/gettingstarted/corbafaq.htm
2. http://www.freewarejava.com
3. http://www.cafeaulait.org/books.html
4. www.developer.com/java
5. www.j2eebrain.com
6. www.rmitechnologies.com
54
MCA III Year, I Semester
3. Michael Franklin
Professor
687 Soda Hall
Tel: 510-642-1662
fax: 642-1042
Email franklin@cs
NATIONAL
1. Dr Syed Mansoor Sarware
PhD Computer Engineering, Iowa State University, USA, 1988
MS Computer Engineering, Iowa State University, USA 1985
BSc Electrical Engineering, UET Lahore, 1981
Operating Systems, Data Structures, Programming Languages
principal@pucit.edu.pk
3. Timothy A. Gonsalves
mothy A. Professor
Ph.D., Stanford, 1986
4. D. Janakiram Professor
Department of Computer Science and Engineering
Indian Institute of Technology Madras
Chennai - 600 036, INDIA
Email: djram@iitm.ac.in
REGIONAL
1. PROF. M. SURENDRA PRASAD BABU
Professor & Head of the Department
Department Of Computer Science & Systems Engineering
College of Engineering (Autonomous)
Andhra University, Visakhapatnam - 530 003
drmsprasadbabu@yahoo.co.in
2. S. Ramachandram, M.Tech.(O.U)
Systems Software and Distributed computing
(Co-coordinator, SSS) (Chairman, BoS, UCE)
55
MCA III Yearm I Semester
5.2.8 JOURNALS
INTERNATIONAL
1. G Canfora, A Cimitile, A De Lucia, GA Di Lucca - The Journal of Systems & Software, 2000– Elsevier
2. A Gokhale, DC Schmidt, B Natarajan, J Gray, N Wang - Middleware for Communications
3. R Prodan, T Fahringer - Journal of Parallel and Distributed Computing, 2004 - portal.acm.org
NATIONAL
1. The National Student Research Center. E-Journal of Student Research
2. AITP National Collegiate Conference 2008 - Post-thoughts ... Java
3. Java Web Services, Suan Dusit Rajabhat University, April 25-29, 2005 .... National Journals. o. P. Lekasapon
and K. Runapongsa
4. JH Gennari, H Cheng, RB Altman, MA Musen - International Journal of Human-Computers Studies, 1998
- smi-web.stanford.edu
1. Measuring and optimizing CORBA latency and scalability over high -speed networks
Building reliable distributed systems with CORBA
2. Data Redistribution and Remote Method Invocation in Parallel Component Architectures
1. Web servers
2. EJB – Architecture
3. Difference between CORBA and RMI
4. Comparsion of CORBA and COM
5. Distributed systems and client/server
56
MCA III Year, I Semester
57
MCA III Yearm I Semester
Tutorial Unit
Topic Salient topics to be discussed
No. No.
T1 I Database Server Different servers to develop an application
using database
T2 Web server Tomcat ,web logic , jboss to deploy the
web applications
T3 RPC Remote method invocation ,Protocols
T4 Web services Web services,SOAP,WSDL REST
Services
T5 II Introduction to EJB Where we are using EJBS
T6 Architecture
EJB Architecture
T7 Roles in EJB Different Roles, ACID Properties,
Transactions
T8 Building and Deploy EJB s
T9 III EJB Session Beans Stateless Session beans , Stateful Session
beans
T10 EJB Entity Beans Bean Managed Persistence ,Container
Managed Persistence
T11 EJB Client
T12 EJB Deployment About Deployment in different, Server
T13 IV CORBA Distributed Introduction to CORBA , Distributed
Systems Systems
T14 CORBA Architecture Architecture
T15 CORBA and Networking CORBA and Networking Model
Model
T16 CORBA IDL IDL Architecture
T17 V COM COM
T18 Proxy and Stub Proxy and Stub
T19 .NET Architecture NET Architecture
T20 Marshalling and Remoting Marshalling and Remoting
58
MCA III Year, I Semester
UNIT - I
5. Compare and contrast between general middleware and service specific middleware with suitable examples.
Write about WSDL. (Aug 11)
8. Explain about the following in detail: a). WSDL and RIST b). RPC (May 11)
11. i What is service oriented architecture?How SOA works and what is the need of SOA?
ii. Explain different types of servers. (Dec 10)
13. i. Differentiate between general middleware and service specific middleware with suitable example.
ii. What is service oriented architecture? How SOA works and what is the need of SOA? (July 10)
15. Explain different servers with suitable example for each. Explain client-server building blocks. (Nov 09)
59
MCA III Yearm I Semester
17. i. Draw the block diagram of Client Server software infrastructure and explain each component.8M.
ii. What is Message Oriented Middleware (MCM)? Describe the different ways of exchangomg messages
between clients & servers using MCM. (July 09)
UNIT - II
1. i. What are the tasks that clients undertake in EJB architecture? Explain in detail? (July 12)
ii. Write about various clients in EJB
4. i. Write and explain steps in building and deployment of EJB. (Feb 12)
ii. Briefly describe about different types of beans.
6. Explain in detail about diffrent types of Beans in EJB, give suitable examples for each. (Aug 11)
8. i. Write complete steps for building and for building and deploying EJBs. (May 11)
ii. Whst are the different types of EJBs? What are its applications?
10. Explain in detail about different types of Beans in EJB, give suitable examples for each. (Jan 11)
14. Explain in-detail about different types of Beans in Enterprise Beans. Give an suitable example for each.
(July 10)
15. Draw a neat diagram of a high-level sketch of the EJB architecture and explain each component in it.
(Nov 09)
60
MCA III Year, I Semester
17. i. Describe the two approaches that lets clients to locate a bean. 8M (July 09)
ii. Describe the various services offered by EJB containers. 8M
UNIT - III
2. i. Develop a stateful session bean that provides addition and substraction of given two numbers.
ii. Discuss in detail about the deployment descriptor class. (July 12)
9. i What are the activities that take place during the lifecycle of entity bean?
ii Write a program for stateless session bean. (Jan 11)
11. i. Explain about message driven bean life cycle. (Dec 10)
ii. Differentiate between session and entity beans.
12. Differentiate between Bean Managed Persistant Bean BMP and contain of Manager persiatant bean(CMP)
with example programs. (Dec10)
61
MCA III Yearm I Semester
16. Explain how different EJB clients can access the bean. Give example. (Nov-09)
18. i. Write the steps needed for building an EJB application. 8M (July-09)
ii. Write a program for the implementation of remote interface of stateless session bean. 8M
19. i. With the help of an example explain the life cycle of Stateful Session Bean (DEC-08)
ii. Write a program to implement EJB for Banking Transaction
20. Describe the process of implementing and deploying an EJB Application (DEC-08)
UNIT - IV
1. i. Discuss the methods used for developing distributed applications. (July 12)
ii. What are the goals of distributed systems? Explain.
4. Write short note on the following : (a) POA (b) IIOP. (Feb 12/ Aug 11)
7. Write short note on the following : a). IDL B). different CORBA services. (May 11)
11. Write short notes on : a). IDL interface b). ORB. (Dec 10)
12. Explain in-detail about CORBA Architecture. (July 10)
13. i. What does IIOP Stands for and what is its significance? (July 10)
ii. Explain the CORBA object model.
62
MCA III Year, I Semester
15. Write a CORBA application which accesses the remote palindrome service (Nov 09)
16. i Write CORBA application where server has a C++ program and Java has a client program for student result
calculation with respective IDL
ii. Discuss about CORBA initialization protocol. 6M (July 09)
17. i What are features of CORBA? Write a sample client-server program using CORBA. 8M
ii. Explain architecture & working of CORBA. 8M (July 09)
UNIT - V
2. i. What are the differences between COM and CORRA? (July 12)
ii. Give an overview of .NET framework?
63
MCA III Yearm I Semester
14. i. Compare and contrast between COM & CORBA. (July 10)
ii. Give advantages and disadvantages with .NET . Give sample code in .Net language.
64
MCA III Year, I Semester
5. SUBJECT DETAILS
5.3.2 Scope
5.3.3 Prerequisites
5.3.6 Websites
5.3.8 Journals
65
MCA III Year, I Semester
66
MCA III Year, I Semester
The study of UML provides a standard way to write a systems blue print, covering conceptual things as
well as concern things. UML is a graphical language for visualizing, specifying, constructing and
documenting the artifacts of software intensive systems.The subject is useful to students in pursing career
in software development.
5.3.2 SCOPE
The subject presents the UML as a tool to visualized, specified and design the artifacts of a software
system.
5.3.3 PRE-REQUISITES
The student is required to have knowledge of object oriented programming concepts and as well as
alignment with client, server and web, server technology.
UNIT - I
OBJECTIVE
It introduces modeling concept that is central part of all activities that lead to a good software. Basic
building blocks of UML are examined. Focus is on structural modeling that includes class diagram and their
relationships.
SYLLABUS
UML Introduction: Why we Model, Introducing the UML, Hello World,
Bacic Structural Modeling: Classes, Relationships, Common Mechanisms, Diagrams, Class diagrams.
Advanced Structural Modeling: Advanced Classes, Advaned Relationships, Interfaces, Types and Roles,
Packages, Instances, Object Diagrams, Components.
UNIT - II
OBJECTIVE
The behavioral modeling concepts like use case, interaction and activity diagrams are examined, which
represents behavior over time and space.
SYLLABUS
Basic Behavioral modeling: interactions, use cases, use case diagrams, interaction diagrams, activity dia-
gram, Advanced Bechavioral Modeling: events and signals, state machines processes and threads, time
and space, state chart diagrams.
UNIT - III
OBJECTIVE
The unit introduces architectural modeling concepts with in detail explanation of components diagrams
and deployment diagrams. It is very important as it controls the incremental development of a system
throughout its life cycle.
67
MCA III Year, I Semester
SYLLABUS
Architectural modeling: Artifacts, deployment, collaborations, patterns and frame works, Artifacts dia-
grams, deployment diagrams, systems, and models
UNIT - IV
OBJECTIVE
It describes the Unified Software Development Process in a nut-shell, emphasizing that it is use-case driven
architecture centric, iterative and incremental. The process uses UML.
SYLLABUS
Unified software process: The unified process, The four Ps, A Use-Case-Driven Process. An Architecture-
Centric Process, An Iterative and Incremental Process.
UNIT - V
OBJECTIVE
It discuss the core workflows which includes requirements capture including usecases, analysis, design,
impentation and test.
.
SYLLABUS
Core Workflows: Requirements Capture, Capturing Requirements as Use Case, Analysis, Design,
Implementation, Test.
TEXT BOOKS
T1 Grady Booch, James Rumbaugh, Ivor Jacobson, “the unified modeling language user guide”, pearson
education India, 1999.
T2 Ivor Jacbson, Grady Booch, James Rumbaugh “the unified software development “
T3 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman & Graig, Pearson Education, Applying UML & Patters : An Introduction to object oriented
analysis and design and the unified prorest.
R2 Broum & David William, John Wiley & sons, An Introduction to object oriented analysis: object and UML
in plain English,
R3 Emits & Pauel,A UML Pattern language, BPB publications
5.3.6 WEBSITES
1. www.uml.org
2. www.cetuslinks.org
3. www.umltutorials.trireme.com
4. www.omg.org
5. www.tlas.kennesan.edu
68
MCA III Year, I Semester
NATIONAL
1. Mr. Deepak B. Phatak
IIT Bangalore
Ph: 91-22-2576-7747
Email: dbp@it.iitb.ac.in
REGIONAL
5.3.8 JOURNALS
INTERNATIONAL
1. IBM Application System/400 Technology Journal
2. Journal for Advances in Engineering Software
3. IBM Journal of R & D
4. International Journal of Document Analysis and Recognition
69
MCA III Year, I Semester
NATIONAL
1. An Object-Oriented systems modeling method based on the Jackson Approach.
2. Theory and Practice of object system
70
MCA III Year, I Semester
71
MCA III Year, I Semester
72
MCA III Year, I Semester
Topics in
Sl. Lecturer Books
OU Modules and sub Modules Remarks
No. No. Referred
Syllabus
Use Cases Driven Process, L 43, L44 T2-Ch.3
Capture the value Adding T3-Ch.4
Requirements, Analysis
Model.
Architecture Centric Process L45 T2-Ch.4
– Need, Steps to an T3-Ch.4
Architecture and
Description
Iterative and incremental L46 T2-Ch.5
process T3-Ch.4
UNIT-V
5 The Core Requirements Capture L 47 T2-Ch.6
Workflows T3-Ch.4,5
Capturing the requirements L48 T2-Ch.7
as use case. T3-Ch.4
Analysis and Design, L49 T2-Ch.8
Analysis in the software T3-Ch.5
Life Cycle
Artifacts, Workers and L 50 T2-Ch.8
workflow analysis T3-Ch.5
Role of Design Software L51 T2-Ch.9
Life Cycle and workflow, T3-Ch.5
Artifacts
Implementation, the role of L52 T2-Ch.10
implementation in the T3-Ch.5
software life cycle.
Testing in the software life L53 T2-Ch.11
cycle. T3-Ch.5
73
MCA III Year, I Semester
74
MCA III Year, I Semester
UNIT -I
6. i. Briefly explain the following relationships with uml notational. (May 11)
(i) Dependency (ii) Generalization (iii) Association (iv) Aggregations
ii. Discuss in detail about interfaces, roles, packages
8. Explain in detail about interfaces their types and roles with suitable examples (Dec 10)
9. Discuss in detail about the structural and behavioural diagrams in the UML. (July 10)
13. Explain the building blocks of the uml with example. (May 09)
75
MCA III Year, I Semester
16. i. Discuss the concept of stereotypes and tagged values with the help of an example.
ii. Explain in brief the following dependency relationships. ((())
(a) bind (b) desire (c) friend. (Dec 08)
UNIT - II
1. i. Draw usecase diagram for a library information system of a college.state your assumptions. (July 12)
ii. Explain the steps involved in modeling the requirements of system?
3. i. Explain the concept of use cases and use case diagrams in detail with suitable examples? (Feb 12)
ii. List of differences between the 2 kinds of interaction diagrams?
6. i. What is transition? Explain the parts of of transition with an example. (May 11)
ii. Explain how to model IPC using processes and threads.
7. Discuss the concepts of use cases and use case diagrams in detail. (Dec 10)
9. Give a detailed analysis of Bak ATM System through use case diagrams. (July 10)
10. i. Describe the Modeling of Flow of cotrol by Time Orderig with a example.
ii. Explain the Modeling of Iterprocess Commuication. (July 10)
12. i Discuss about Interaction diagrams with suitable examples. (Dec 09)
ii. Write notes on events and signals.
13. i. Describe the steps invovled in modellinng and interaction diagra. (May 09)
ii. Explain the steps invoved in forward and reverse egineering.
76
MCA III Year, I Semester
15. Discuss the contents and common uses of use case diagrams. (Dec 08)
16. What is an activity diagram? Discuss the following concepts related to them
(a) Activity states (b) Branching (c) Swim lanes (d) Object flow. (Dec 08)
UNIT – III
1. i. Explain about the structural and behavioural aspects of collaborations. (July 12)
ii. Explain about deployment diagrams.
3. i. What are component diagrams and briefly describe the common uses of component diagram? (Feb 12)
ii. Explain about deployment diagrams with examples?
5. i. Write about different componetnts and explain std stereotyped that apply to components. (May 11)
ii. Explain how to model desing patterns using patterns.
9. i. Dicuss the types of componenets and the standad stereotypes correspoding to componets.
ii. Explian about the deployment diagrams. (Jul-10)
11. What are Collaborations?Discuss the structural and behavioural aspects in detail. (Dec-09)
77
MCA III Year, I Semester
15. i. Prepare a class diagram for the object diagram given below: (Dec 08)
16. i. List and explain the two common uses of interaction diagrams.
ii. Write a state machine in unit? Discuss the various parts of a state and transition. (Dec 08)
UNIT - IV
5. Discuss in detail the concept of unified softwared development process with help of diagrams. (May 11)
12. Discuss the Unified Software Development Process(USDP) in detail wih a neat diagram (Dec-09)
78
MCA III Year, I Semester
14. i. explain the business modelling for undestanding the system context. (May 09)
ii. give the overview of requirements captue.
15. Discuss in detail the concept of Unified Software Development Process(USDP) with the help of a diagram.
(Dec 08)
16. What is a Use case driven process”? How is it different from “Architecture-centric process?
(Dec 08)
UNIT - V
1. i. How business model is suseful to understand system context, explain. (July 12)
ii. Give the artifacts involved when capturing requirements as usecases.
2. i. Differentiate between usecase model and the analysis model. (July 12)
ii. Briefly describe the responsibilities of a test designer in the testing workflow.
4. i. Discuss the workflow in implementation, including the participating workers and their activities.(Feb 12)
ii. What is the importance of testing?
5. i. Write about how requirements are captured as use case. (May 11)
ii. Explain in detail artifcts and workers of analysis model.
6. i. Write about differences between usecase model and analysis model. (May 11)
ii. Explain in detail workers and artifacts involved in testing.
79
MCA III Year, I Semester
15. i. Discuss with examples the unit facts associated with testing. (Dec 08)
ii. Explain the participating workers and their activities in the analysis phase.
80
MCA III Year, I Semester
5. SUBJECT DETAILS
5.4.2 Scope
5.4.3 Prerequisites
5.4.6 Websites
5.4.8 Journals
81
MCA III Year, I Semester
SYLLABUS
Electronic payment systems, digital token-based, smart cards, credit cards, risks in electronic payment
systems Digital Token Based Electronic paymen systems, credit card based electronic payment systems,
risk and electronic payment systems, Designing Electronic Payment Systems
UNIT - I I I
OBJECTIVE
Here we will discuss another broad applications of E-commerce.
1. Inter-Organizational E-commerce whose implementation is based on the technology, protocols and stan-
dards related to Electronic Data Interchange.
2. Intra – Organizational E-commerce
SYLLABUS
Consumer Inter organizational commerce- EDI, Electronic data interchange, EDI applications in business,
EDI ;ega;. security and privacy issues, EDI and Electronic commerce
EDI Implementation MIME, value added networks.Standardization and EDI EDI s/w implementation, EDI
envolope for message transport, value-added netwroks, internet-based EDI
Inter organizational commerce- work flow automation, customization and internal commerce, supply chain
management
82
MCA III Year, I Semester
UNIT - IV
OBJECTIVE
Here we learn about the corporate digital libraries and data warehouse which help us to implement the Intra-
organizational E-commerce, also examine the emerging changes in marketing and advertising that have
been facilitated by technology.
SYLLABUS
Corporate digital library-Dimensions of Internal electronic commerce systems, types of digital documents.
Issue ;behind Document infrastructure, corporate data warehouse.
Advertising and marketing on the internet-Information based ;marketing, advertising on interne, on-line
marketing process, market research.
UNIT - V
OBJECTIVE
This unit discusses the development and implementation of E-commerce interfaces, namely interactive
catalogs, directories and information search and retrieval methods.
SYLLABUS
Consumer search and resource discovery-Search and resource discovery paradigms, information search
;and retrieval, electronic commerce catalogues or directories, information filtering, consumer-data interface3:
Emerging tools.
Multimedia and Digial Video-Key multimedia concepts, digital video and electronic commerce, Desktop
video processing, Desktop video conferencing.
TEXT BOOKS
T1. Ravi Kalakota & A.B. Whintson – “Frontiers of Electronic Commerce” Pearson Education, India 1999.
T2. Daniel Minoli,Emma Minoli: “Web Commerce Technology Handbook” Tata McGraw Hill 2007.
REFERENCE BOOKS
R1. Electronic Commerce, Greenstein and Feinmas
R2. Electronic Commerce – A Managerial Perspective, Efraim Turban, Jae Lee, David king and H. Michael Ching
5.4.6 WEBSITES
1. www.cyberwebglobal.com
2. www.techtutorials.com
3. www.online-commerce.com
4. www.dci.in
5. www.the webbrains.com
6. www.indianinfo.com
INTERNATIONAL
1. Prof. Grammati Pantziou,
Development of Informatics,
Technological Educational Institution of Athens Ag.
Spyridonos St.12210, Athens, Greece.
Email : Pantziou@teiath.gr
83
MCA III Year, I Semester
NATIONAL
1. Mr. S.V. Raghuram
IIT Madras,
Ph: 91-44-2257-4359
Email:svr@cs.iitm.ernet.in
REGIONAL
1. Dr.(Smt) Valli Kumari
Professor, Dept of CS & System Engineering
Andhra University
Email : valli_kumari @rediffmail.com
Ph : +91 9440065256
5.4.8 JOURNALS
INTERNATIONAL
1. International Journal of E.C – American Marketing (IJEC)
2. HCI Research Issues in E-Commerce.
84
MCA III Year, I Semester
NATIONAL
1. Journal of Electronic Commerce
2. Journal of Electronic Commerce Research and Current issue
3. National Journal Group Resources on BNET
4. IKO- Electronics Commerce
UNIT - II
2. Electronic Introduction to Electronic payment L12 T1-Ch.8.1
Payment systems T2-Ch.8.1
System : Types of Electronic payment systems L13 T1-Ch.8.1
T2-Ch.8.1
85
MCA III Year, I Semester
86
MCA III Year, I Semester
87
MCA III Year, I Semester
UNIT - I
1. Explain generic framework for e-commerce with neat diagram. (July 12)
4. i Discuss various stages in commerce oriented Merchantail process model (Feb 12)
ii Explain inventory management and organizational applications in E-commerce
10. Explain Mercantile Process models from Merchants perspective (Jan 11)
88
MCA III Year, I Semester
UNIT - II
1. Define smart card.how many types of smart cards do we have.explain them. (July 12)
6. i. List and Explain 3 basic categories of credit card payment in online Network. (Aug 11)
ii Discuss about risks in Electronic payment system.
9. What is e-cash? Give the properties of e-cash. Explain the working of e-cash (Jan 11)
10. What is e-chaque? Explain the working of e-cheque and give its advantages (Jan 11)
12. i. List and explain the 3 basic categories of credit card payment on on-line networks.
ii. Discuss the 6-step process of OTPPs. (July 10)
13. i. List and explain the types of electronic tokens.
ii. Write notes on electronic cash(e-cash). (Dec 09)
14. i. Describe the processing of payments using encrypted credit cards. (Dec 09)
ii. Describe the factors that must be addressed before designing a new electronic payment system.
15. Explain in detail about different Electronic payment systems. (May 09)
89
MCA III Year, I Semester
UNIT - III
7. Define EDI. Give the EDI architecture and differentiate between EDI and EFT (May 11)
9. What is VAN? Give function of Third party VAN along with neat diagram (Jan 11)
12. Discuss in detail about Value Added Networks (VANS) and VAN service providers. (July 10)
14 i. Discuss in detail about push-based supply chain and pull-based supply chain. (Dec 09)
ii. Write notes on efficient Customer Response (ECR)
90
MCA III Year, I Semester
UNIT - IV
1. Define digital documents and explain the types of digital documents. (July 12)
5. Explain in detail about the issues behind Document infrastructure. (Aug 11)
11. Explain in detail about the issues behind Document Infrastructure. (July 10)
14. Discuss about the new age of Information-Based marketing in detail. (Dec 09)
91
MCA III Year, I Semester
UNIT - V
1. Explain information filtering and information search and retrieval. (July 12)
2. Explain digital video or a core element with the help of neat diagram. (July 12)
8. Explain two information Search and resource discovery Paradigms (May 11)
9. Explain any two Search and Resource Discovery Paradigms. (Jan 11)
92
MCA III Year I Semster
5. SUBJECT DETAILS
5.5.2 Scope
5.5.3 Prerequisites
5.5.6 Websites
5.5.8 Journals
93
MCA III Year I Semster
94
MCA III Year I Semster
5.5.2 SCOPE
The reuse of good practices and well proven techniques has always been central to the various disciplines
of engineering. In fact it is no surprise that reuse is one of the core ideas in software engineering.
5.5.3 PREREQUISITES
Students should have knowledge of fundamentals of computer science and Software Engineering concepts
in general and unified modeling language and Java in particular.
UNIT I
OBJECTIVE
It describes about the introductory concepts of the reuse driven Software Engineering Business and
various UML Components like use case ,object etc.
The unit introduces the subject by illustration the diversity of application areas and explore the basic feature of
SYLLABUS
Software reuse sucess factors, Reuse driven software engineering business, Object oriented software
engineering, Applications and Component subsystems, Use case components and Object components.
UNIT II
OBJECTIVE
It gives the clear concepts of different design patterns which focus more on reuse of recurring architectural
design themes, while frameworks focus on detailed design and implementation.
SYLLABUS
Design Patterns-Introduction.
Creational Patterns-Factory, Factory method, Abstract factory, Singleton, Builder Prototype.
UNIT -III
OBJECTIVE
It describes about the structural patterns which explains how classes and objects can be combined to
form larger structures
Behavioral Patterns are those patterns that are most specifically concerned with communication between
objects.
SYLLABUS
Structural Patterns-Adapter, Bridge, Composite, Decorator, Facasde, Flyweight, Proxy.
Behavioral Patterns-Chain of Responsibility, Command, Interpreter,
95
MCA III Year I Semster
UNIT - IV
OBJECTIVE
This Unit discuss some more Behavioral patterns like Iterator, mediator etc as well as other Design patterns
like wholepart,master-slave etc.
SYLLABUS
Behavioral Patterns Iterator, Mediator, Memento, Observer, State, Strategy, Template, Visitor
Other design patterns-Wholepart, Masterslave, View handler, Forwarder-receiver, Client-dispatcher-server,
Publisher-subscriber.
UNIT V
OBJECTIVE
This Unit discusses various Architectural Patterns which express fundamental structural organization
schemas for software systems. They provide a set of predefined subsystems, specify their responsibilities,
and include rules and guidelines for organizing the relationships between them.
SYLLABUS
Architectural Patterns-Layers, Pipes and Filters, Blackboard, Broker, Model-view controller, Presentation-
abstraction-control, Micro kernel, Reflection.
TEXT BOOKS
T1 Ivar Jacobson, Martin Griss, Patrick Jonsson-Software Reuse: Architecture, Process and Organization for
Business Success, Pearson Education, 2007.
T2 Erich Gamma, Richard Helm, Ralph Johnson, John Vissides-Design Patterns Elements in Reusable Object
Oriented Software, Pearson Education 2007.
T3 Frank Buchmann et al. – Pattern Oriented Software Architecture – Volume 1, Wiley, 2001.
T4 James W Cooper - Java Design Patterns, a tutotial , Addison 2000, Pearson Education
REFERENCE BOOKS
R1 Carma McClure Software Reuse Techniques: Adding Reuse to the System Development Process by
(Hardcover - Jan 1997)
R2 Eric Freeman, Head First Design Patterns.
R3 Eric Freeman, Elisabeth Freeman, and Bert Bates, First Edition October, 2004 : Software Reuse Techniques
5.5.6 WEBSITES
1. http://www.fluffycat.com/Java-Design-Patterns
2. http://www.allapplabs.com/java_design_patterns/structural_patterns.htm
3. www.exforsys.com/tutorials/csharp/structural-and-behavioral-design-patterns
4. www.vincehuston.org/dp/structural_rules.html
5. www.dcl.hpi.uni-potsdam.de/LV/Components04/VL4/03_Patterns-Structural.pdf
96
MCA III Year I Semster
NATIONAL
1. Dr Philip T. Cox
Professor
Faculty of Computer Science
Dalhousie University
Email: pcox@cs.dal.ca
Phone: 902-494-6460
Website: http://users.cs.dal.ca/~pcox/
Address
Dr Philip T. Cox
Faculty of Computer Science
Dalhousie University
6050 University Avenue
Halifax, Nova Scotia
Canada B3H 1W5
REGIONAL
1. Dr. M.S. Prasad Babu
Andhra University
Email: dramsprasadbabu@yahoo.co.in
Ph: 91-891-2844862. 91-891-2755898.
97
MCA III Year I Semster
5.5.8 JOURNALS
INTERNATIONAL
1. IBM Application System/400 Technology Journal
2. Journal for Advances in Engineering Software
3. IBM Journal of R & D
4. International Journal of Document Analysis and Recognition
NATIONAL
1. An Object-oriented systems modeling method based on the Jackson Approach.
2. Theory and practice of object system
1. A tangent subdivision scheme”, Evelyne Aanvaes, Adhemar Bultheel, PP: 340-355. ACM transactions on
Graphics. Vol-25, issue 2, April 2006.
2. “Forward Rasteriztion”, Voicu popeson, Paul Rosen PP: 375-411. ACM transaction on Graphics Vol.25,
issue2, April 2006.
3. “Accurate detection of symmetries in 3D shapes”, Aurelien Nertinet, lyril soler, Nicolas Holzschuch, Francois
X. Sillion – PP: 439-464.
4. “Salient geometric features for partial shape matching and similarity”, Ran Gal, Daniel Colen , PP130-150,
ACM transaction on Graphics Vol.25, issue 1, Jan 2006.
98
MCA III Year I Semster
99
7
Topics in
Sl. Lecture Books
OU Modules and Sub modules Remarks
No. No. Referred
Syllabus
1 Structure the use case model to
T1
ensure component reuse L8
The use case model shapes the rest of
T1
the system
Use Case Reusing concrete or abstract actor T1
components and use case components
L9 T1
Expressing use case variability
Packaging and documenting use case T1
components
Object models define system T1
architecture and design
Reusing analysis and design T1
components L10
Object
components Expressing variability in object T1
model
components
Reusable analysis components T1
Fly-weight L22 T2
Proxy L23 T2
Behavioural Chain of responsibility ,Command L22 T2
Patterns Interpreter pattern L23 T2
100
MCA III Year I Semster
T2
Template, Visitor patterns L29
4 Other Design T3
Whole part L30
Patterns
T3
Master-slave L31
T3
View handler L32
T3
Forwarder-receiver L33,L34
T3
Client-dispatcher-server L35,L36
T3
Publisher-subscriber L37
UNIT – V
5 Architectural
Layers L38,L39 T3
Patterns
Pipes & Filters L40,L41,L42 T3
Black board L43 T3
L44
Broker T3
101
MCA III Year I Semster
102
MCA III Year I Semster
UNIT - I
1 i. What are the management functions, approaches in establishing and managing a reuse business
ii. “Application system reuse components” explain the statement with simple example. (July 12)
2. i. Explain the incremental adoption of reuse in an organization with the benefits obtained with increment in
investments, experience and time. (July 12)
ii. What is a facate ? how is it.
3. i. What are the business characteristics of a reuse business. how can reuse be made cost effective
ii. “Application families allow significant reuse” Explain with suitable example (Feb 12)
4. i. What are the concurrent process involved in systametic reuse? (Feb 12)
ii. What are variation points and variability mechanisms when using components for building system?Explain.
7. i. Describe briefly about usecase components and object components. (Aug 11)
ii. Explain about software reuse factors
13. i. What are the various principles that an organization should follow in order to achieve systematic software
reuse.
ii. Explain how concrete components and abstract components can be reused in application systems.
(May 09)
14. i. Why does the management of a reuse business have responsibility above the management of individual
projects and processes? Explain the overall management functions of a reuse software engineering business.
103
MCA III Year I Semster
ii. What is “Variability mechanism’? Explain the typical variability mechanisms and state how they can besend
with one another. (May 09)
UNIT - II
1. i. What are desing patterns? how are they different from frameworks. (July 12)
ii. What are the participents and benefits of a singleton pattern
2. i. How can we use a design pattern ? Give a simple approach to applying a design pattern effectively
ii. Explain the applicability , structure and benefits of the prototype pattern (July 12)
3. i. What is a design pattern ? What kind of template is normally used to describe it? (Feb 12)
ii When can a factory method pattern be used? Explain its structure, participants and consequences.
4. i. There are several design patterns in the cataloge to choose from ? What are the different approaches to
find a suitable design pattern (Feb 12)
ii. Explain about the builder pattern by using its structure, participants, collaborations, concequences
5. i. What is meant by design pattern? Write intent motivation and implementation factory and single for
patterns? (April 11)
ii. Discuss intent applicability structure of prototype pattern
6. Explain about decorator and facade patterns with suitable examples. (April 11)
7. i. Define design pattern ? Discuss the characteristics of design pattern. (Aug 11)
ii. Explain about intent, structure and participants of factory and prototype pattern.
8. What are structural patterns ? Explain about adaptor and lyweight pattern with the help of an example.
(Aug 11)
9. What is a design pattern? Explain the characteristics of design patterns. (July 10)
10. Describe the intent and structure of abstract factory pattern with the help of an example. (July 10)
11. Explain the motivation, applicability and consequences of using these patterns:
Factory methods. (May 09)
13 Explain the applicability, collaborations and implementaion of the builder pattern (Dec 08)
14. Discuss the motivation, participants and consequences of Abstract Factory. (Dec 08)
15. Explain about Singleton pattern. How does a singleton pattern ensure single instance. (Nov 08)
104
MCA III Year I Semster
16. Write short notes on the following creational patterns: (Nov 08)
i. Factory Method pattern.
ii. Abstract Factory pattern.
UNIT - III
1. Discuss about any two structural patterns explaining their motivation, structure and consequences.
(July 12)
2. Discuss about any two of these behavioural patterns
(a) Chain of responsibility (b) Command pattern (c) interpretor pattern (July 12)
3. What are structural patterns? Explain any two with structure, motivation, consequences and implementation.
(Feb 12)
4. Differentiate between the command pattern and interpretor pattern with structure, motivation, consequences
and implementation. (Feb 12)
5. i. Differentiate between the client dispatcher server and publish subscriber patterns. (April 11)
ii. Write the motivation, application and implementation of Chain of responsibility and stratergy.
6. Describe motivation, application, structure and implementation of mediator and memento patterns.
(April 11)
7. i. Describe motivation, application and implementation of template pattern
ii. Write the intent, structure, participants and implementation of observer pattern (Aug 11)
8. i. Explain the difference between whole part and master-slave patterns. (Aug 11)
ii. Explain in detail about visitor pattern
12. Describe the intent,structure and participants of chain of responsibility pattern. (Dec 09)
13. Explain the motivation, applicability and consequences of using these patterns: (May 09)
(i) Composite pattern. (ii) Proxy pattern.
14. Explain the consequences and implementation of Chain of responsibility. (May 09)
15. Explain the applicability, collaborations and implementaion of the adapter pattern. (Dec 08)
16. .Discuss the motivation, participants and consequences of Facade pattern. (Dec 08)
105
MCA III Year I Semster
18. Explain the Intent, Motivation, Applicability, Structure of Chain of Responsibility pattern. (Nov 08)
UNIT - IV
1. i. Compare and contrast between the benefits and liabilities of mediator and observer patterns. (July 12)
ii. Explain the applications of Publisher-Subscriber pattern
2. i. the “State pattern” is an important behavioural pattern. Explain its applicability, consequences and
implementation issues of this pattern.
ii. What is the important of the “master-slave “ pattern ? Explain with suitable example. (July 12)
3. i. Where is the use of “strategy pattern ”important? What are the primary benefits and drawbacks of this
pattern? Explain?
ii. To manage multiple views tht a software system provides, how is the view-handler design pattern useful?
Explain? (Feb 12)
6. Explain about intent applicability and implementation of micro kernel and broker patterns (April 11)
7. Explain about filter and kernel patterns with examples (Aug 11)
10. i. Describe the intent and structure of momento pattern. (July 10)
ii. What are the advantages of observer pattern over other behavioural patterns?
11. Describe the intent,structure and participants of forwarder-receiver patterns. (Dec 09)
12. Explain the consequences and implementation of Observer pattern. (May 09)
106
MCA III Year I Semster
16. Discuss any four sections of Observer Behavioural pattern. (Nov 08)
UNIT - V
1. i. Explain about the use and benefits of layers pattern and broker pattern.
ii. Bring out the implementation steps of micro kernel archetectural pattern. (July 12)
3. i. Explain about the importance and implementation steps of black board archetectural pattern.
ii. Explain thebenefits and liabilities of reflection patterns. (Feb 12)
6. Describe structure participants and responsibilities of presentation tier pattern and business patterns.
(Aug 11)
7. i. Explain five tier model for logical seperation of concerns which of their tiers addresses J2EE pattern
cataloge ? Jusify
ii. Explain about responsibility pattern (April 11)
9. Explain the following architectural patterns with the help of one example each: (July 10)
i. Broker
ii. Reflection
11. Explain the use of Model-View-Controller pattern with its structure, suitable Scenarios and implementatio
steps. (May 09)
12 Discuss the importance of Layers pattern along with their benefits and liabilities. (Nov 08)
107
MCA III Year I Semster
13. Discuss the uses and steps to impement a Presentation-Abstract -Control architecture.What are its benefits
and liabilities. (May 09)
17. What are some presentation Tier patterns? Expllain with their structure, sequence diagram and strategies.
(Dec 08)
108
MCA III Year, I Semester
5. SUBJECT DETAILS
5.6.2 Scope
5.6.3 Prerequisites
5.6.6 Websites
5.6.8 Journals
109
MCA III Year, I Semester
110
MCA III Year, I Semester
5.6.2 SCOPE
The primary goal of XML and web servies is to design and build the web pages using an advanced
architectures like SOAPAnd discuss the XML security features.
5.6.3 PREREQUISITES
Students should have knowledge of fundamentals of computer science and HTML concepts in general .
UNIT I
OBJECTIVE
The objective of this unit is to discuss the basic concepts of XML with its architecture
The unit introduces the subject by illustration the diversity of application areas and explore the basic feature of
SYLLABUS
Introduction: Role Of XML-XML and The Web-XML Language Basics-SOAP-Web Services-Revolution
of XML-Service Oriented Architecture
UNIT II
OBJECTIVE
The objective of this unit is dealing with the XML name spaces and DTD techniques and transformations.
SYLLABUS
XML Technology: XML Technology,XML-Name Spaces-Structuring With Schemas and DTD-Presentation
Techinques-Transformation-XML Infrastructure.
UNIT -III
OBJECTIVE
The objective of this unit is the detailed explanation of SOAP.
SYLLABUS
SOAP: Overview Of SOAP-HTTP-XML-RPC-SOAP:Protocol-Message Structure-Intermediaries-Actors-
Design Patterns and Faults-SOAP With Attachments.
UNIT - IV
OBJECTIVE
The objective of this unit is the explanation of UDDI-WSDL concepts.
SYLLABUS
WEB Services: Overview-Architecture-Key Technologies-UDDI-WSDL-ebXML-SOAP And Web Services
in E-com-Overview of .NET and J2EE
111
MCA III Year, I Semester
UNIT V
OBJECTIVE
The objective of this unit is dealing with the XML security features.
SYLLABUS
XML Security: Security overview-Canonicalization-XML Security Framework-XML Encryption-XML
Digital Signature-XKMS Structure-Guidelines For signing XML Documents-XML in Practice.
TEXT BOOKS
T1 Ramesh Nagappan, Robert Skoczylas and Rima Patel Sriganesh,Developing Java Web services, Wiley
publishing Inc,.2004.
T2 Sandeep Chatterjee,James Webber, Developing Enterprise Web Services, Pearson Education,2004.
T3 McGOvern,et al., Java Web Services Architecture, Morgan Kaufmann Publishers,2005. Gustavo A,Fabio
C, Harumi K, Vijay M.Web Services: Concepts, Architecture and Applications. Springer, 2004.
T4 Frank.P.Coyle, XML, Web Services And The Data Revolution, Pearson Education,2002.
5.6.6 WEBSITES
1. www.w3schools.com
2. www.zvon.org
3. www.wdvl.com
NATIONAL
1. Ramesh R Nagappan,
MS, CISSP, CISA, Technologist at Sun Microsys.
IIT, Chennia
email: nramesh@brandies.edu
Email: vkj@cse.iitb.ac.in
Ph: 91-22-2576-7730
5.6.8 JOURNALS
INTERNATIONAL
1. acm sigcse:computer science education.
2. IEEE Conforence publications (bridging two biomedical journal databases with XML)
3. IBM Journals and Magazines (Technical Context and Cultural Consequences of XML)
112
MCA III Year, I Semester
NATIONAL
1. Journal of computer science and applications.
2. Applying XML for Designing and interchanging information for multi-dimentional model.
1. A method of decomposing and query xml document under the circumstances of uncertain data computer
science and information technology (ICCSIT), 2010, 3rd, Author J.Wang, Aug 2010, Vol:18, Issue:6.
2. Using XML to build efficent transaction time temporal database systems on relational database. data
engineering 2006, AApril 2006
3. Towards effective XML keyword search, knowledge and data engineering IEEE transaction August 2010,
Author Zhifeng Bao, National University of Singapore, Volume 22, Issue 8.
1. SOAP
2. Name spaces and DTD techniques
3. UDDI-WSDL concepts.
4. Web Services in E-com-Overview of .NET and J2EE
113
MCA III Year, I Semester
Topics in
Sl Lecture Books
O.U. Modules and Sub-modules Remarks
.No. Number Referred
Syllabus
Unit - I
1 Introduction Introduction to XML L1 T1-Ch.1
XML : Extending the Enterprise L2 T1-Ch.1
Role of XML L3 T1-Ch.1
XML and the Web L4 T1-Ch.1
SOAP, Web Services L5 T1-Ch.1
Revolutions of XML L6, L7 T1-Ch.1
SOA L8, L9 T1-Ch.1
Unit – II
2 XML XML Technologies L10 T1-Ch.2
Technology XML Namespaces L11 T1-Ch.2
Structuring with Schemas : DTD L12 T1-Ch.2
Structuring with Schemas : XML L13 T1-Ch.2
Schema
Structuring with Schemas : XML L14 T1-Ch.2
Processing, DOM, SAX
Presentation Technologies L15, L16 T1-Ch.2
Transformation L17, L18 T1-Ch.2
XML Infrastructure L19, L20 T1-Ch.2
Unit – III
3 SOAP Overview of SOAP L21 T1-Ch.4
HTTP L22 T1-Ch.4
RPC L23 T1-Ch.4
SOAP: Protocol L24 T1-Ch.4
SOAP: Message Structure L25 T1-Ch.4
SOAP: Intermediaries, Actors, L26, L27 T1-Ch.4
Design Patterns and Faults
SOAP with Attachments L28, L29 T1-Ch.4
Unit – IV
4 Web Overview, Architecture L30 T1-Ch.5
Services Key Technologies L31 T1-Ch.5
UDDI L32 T1-Ch.5
WSDL L33 T1-Ch.5
ebXML L34 T1-Ch.5
SOAP and Web Services in E-Com L35, L36 T1-Ch.6
.NET L37, L38 T1-Ch.6
J2EE L39, L40 T1-Ch.6
Unit – V
5 XML Security Overview L41, L42 T1-Ch.7
Security Canonicalization L43 T1-Ch.7
XML Security Framework L44, L45 T1-Ch.7
Xml Encryption L46 T1-Ch.7
XML Digital Signature L47 T1-Ch.7
XKMS Structure L48 T1-Ch.7
Guidelines for Signing XML L49, L50 T1-Ch.7
Documents
114
MCA III Year, I Semester
Tutorial Unit
Topic Salient topics to be discussed
No. No.
T1 I Introduction Introduction to XML
T2 XML : Extending the Enterprise
T3 Role of XML
T4 XML and the Web
T5 SOAP, Web Services
T6 Revolutions of XML, SOA
115
MCA III Year, I Semester
UNIT - I
1. i. Explain the difference between valid and well formed XML documents. (July 12)
ii. Discuss the role of xml.
6. Define web service. How and on what platforms webservices are build. (Aug 11)
11. i. Write syntax rules for writing an XML document. (July 10)
ii. Differentiate between valid and well formed XML documents
13. i. Write syntax rules for writing an XML document. (April 09)
ii. Explain how SOAP is used enable communications across the web
14. i. Explain the role of XML in providing Web services. (April 09)
ii. Explain about the 3 revolutions of XML.
UNIT - II
116
MCA III Year, I Semester
5. Describe how XML data and documents are to be formatted by using XSL. (Aug 11)
7. i. What is meant by XML name spaces Discuss about XML schema? (May 11)
ii. Discuss about presentation techniques in XML.
8. i. Explain about XML transformation ? Discuss about XSLT in detail. (May 11)
ii. Explain about XML infrastructure.
9. i. Write syntax rules for specifying the attributes of an XML document using DTD. (Jan 11)
ii. Explain about Remote Procedure Call.
10. Write an XML document that contains Breakfast menu having item name, calories, price and convert into
a HTML table using XSLT. (Jan 11)
12. Write an XML document that contains CD catalog having title, author, and price and convert into a HTML
table using XSLT. (July 10)
13. Explain about name spaces? What are the rule for writing document type definition give an example.
(May 09)
14 Write an XML Document to contain the information of a CD catalog (CD name, author and price ) write an
XSL to transform the above XML doc. In the form a HTML table. (May 09)
15 What is meant by XML name spaces Discuss about XML schema. Give an Example. (Dec 08)
16 Write an XML Document to contain the information of a CD catalog (CD name, author and price ) write
an XSL to transform the above XML doc. In the form a HTML table. (Dec 08)
UNIT - III
117
MCA III Year, I Semester
13. What is SOAP? Explain its importance in extending the enterprise. (May 09)
14. Explain about the working of XML-RPC. (May 09/ Dec 08)
15. What is the format for writing a SOAP message? Explain how a SOAP message can reference an
attachment. (Dec 08)
UNIT-IV
7. Define and explain about UDDI and discuss its implementation. (May 11)
118
MCA III Year, I Semester
15. Explain how UDDI protocol is used for communicating with registries. (Dec 08)
UNIT-V
4. i. What are the guide lines for signing XML document? Explain? (Feb 12)
ii. Discuss the importance of XML digital signature in XML security?
5. i. List out guide lines for signing XML document. (Aug 11)
ii. Explain briefly XKMS, X-KRSS
119
MCA III Year, I Semester
120
MCA III Year, I Semester
5. SUBJECT DETAILS
5. 7 MOBILE COMPUTING
5.7.2 Scope
5.7.3 Prerequisites
5.7.6 Websites
5.7.8 Journals
121
MCA III Year, I Semester
122
MCA III Year, I Semester
5.7.2 SCOPE
This subject makes the students capable of understanding the type of mobile network that is used.
Makes them understend the capabilities of wirelss networks.
To undestand the applications and usage of wirless and mobile devices.
5.7.3 PREREQUISITIES
1. The students can have a basic knowledge about mobile communication. of a high level Programming
Language.
2. Its better to have an idea of Networks, Distributed COMputing and Web Programming.
UNIT I
OBJECTIVE
To give an overview of what is mobilty and wireless.
To understand the basic techniques of medium access control and to find out which is suitable for them.
Spread spectrum techniques involves spreading the band width needed to transmit the data.
SYLLABUS
Introduction and applications of mobile computing, Wireless transmission: Frequencies, Signals,
Antennas, Signal Propagation, Multiplexing,Modulation, Spread spectrum, Cellular system. Medium
access control, SDMA, FDMA,TDMA, CDMA, Comparisons.
UNIT II
OBJECTIVE
To understand the basic telecommunication system.
The history of the basic communication system and the comparision of various systems.
To understand how broadcasting is done using different types of signals.
SYLLABUS
Telecommunication system, GSM, DECT, TETRA, UMTS & IMT-2000, Satellite systems: Applications,
Basics, routing, localization,Handover. Broadcast systems: Cyclic representation of data, Digital Audio
Broadcasting. Digital video broadcasting,Convergence of Broadcasting and Mobile Communications.
UNIT III
OBJECTIVE
To understand the diiferent schemes that are used to form a wireless lan.
To analyse how exactly they differ.
To study about the special layer which is used for wirelss lans.
SYLLABUS
Wireless LAN: Infrared Vs Radio transmission,Infrastructure and Adhoc Networks, IEEE 802. 11,
HIPERLAN, Bluetooth.
123
MCA III Year, I Semester
UNIT IV
OBJECTIVE
To study and understand how internet can be efficiently accessed through mobile and wireless device.
To understand what is the mobile IP and TCP to make the internet wireless.
To understand the detailed study about mobile internet.
SYLLABUS
Mobile IP, Dynamic Host Configuration Protocol, Mobile Adhoc Networks, Mobile Transport Layer
Traditional TCP , Classical TCP improvements , TCP over 2.5/3G ,Wireless Networks,Performance Enhancing
Proxies.
UNIT V
OBJECTIVE
To understand about the operating systems for Mobile devices
To understand how file system is supported foe mobile network.
To understand what protocol is used for accessing world wide web.
To know about WML.
SYLLABUS
Operating Systems for Mobile Devices: Features of Windows CE, Palm OS, Symbian OS, Java Card
Support for Mobility: File systems, World Wide Web, Wireless Application Protocol.
TEXT BOOKS
T1 Jochen,M.Schiller, Mobile Communication,2nd Edition Pearson Education, India 2003
T2 Frank Adelstein, Sandeep K.S. Gupta “Fundamentals of Mobile and Pervasive Computing”,Tata MCGraw-
Hill 2005.
T3 Dharma P.Agarwal,Qing An Zeng:”Introduction to wireless and Mobile Systems” 2nd Edition , Thomson
India-2007
T4 Hansmann, Merk,Nicklous,Stober,Principles of Mobile Computing,@nd Edition, Springer International
Edition,2003.
T5 Ivan Stojmenovic: “Handbook of Wireless and Mobile Computing” , Wiley India 2006.
REFERENCE BOOKS
R1 Andrew S. Tenenbaum “ComputerNetworks” Prentice Hall
5.7.6 WEBSITES
1. www.mobilecomputing.com
2. www.oncemartclick.com
3. www.internetnews.com
4. www.wap-forum.org.
5. www.wapfourrn.org
INTERNATIONAL
1. Charles Colbourn
Arizona State University,
Phone : 480.727.6631,
E-mail: charles.colbourn.asu.edu.
124
MCA III Year, I Semester
3. Bill Hooper
Bellmont University.
NATIONAL
1. A.Kakkar
Amity University,Noida,Delhi
E-mail:akakkar@aiit.amity.edu
3. Dr.Prof. P.Narayanasamy,
Anna University,Chennai
Phone:(044) 24474475.
E-mail:sam@annauniv.edu
REGIONAL
1. Dr. Prof. I.V.Ramana,
JNTU,Hyderabad.
2. Dr. V.VijayaKumar,
Assistant Professor,
JNTU,Hyderabad.
5.7.8 JOURNALS
INTERNATIONAL
1. Networking IEEE Trans on
2. Network Society
3. IEEE Trans on Communications
4. Computer Networks (Previously “& ISDN Networks”)
5. IEE Proc. – Communications
6. International Journal of Communication Systems
7. The International Journal on the Development and Application of Standards for
8. Computers, Data Communications and Interfaces
NATIONAL
1. Data Communication Principles
2. Mobility Aware Technology and Application
3. Journal of Network and Computer Applications
4. Speech Communications
5. Wireless communications and mobile computing
125
MCA III Year, I Semester
126
MCA III Year, I Semester
UNIT – II
2 Telecommunication GSM Introduction L14 T1-Ch.4.1
Satellite and T2-Ch.17.3
Broadcast Systems T3-Ch.10.4
R1-Ch 2.6
System Architecture and L15, T1-Ch.4.1.2,
Security L16 4.1.7
T2-Ch.17.4
DECT and TETRA L17 T1-Ch.4.2, 4.3
T3-Ch.10.5
T4-Ch.14.2.1
UMTS L18 T1-Ch.4.4
T3-Ch.10.7.5
T5-Ch 7.4
IMT – 2000 L19 T1-Ch.4.4
T3-Ch.10.7
T5-Ch 7.4
T4-Ch.14.1.3.2
T5-Ch 7.4
Satellite system History and L20 T1-Ch.5.1, 5.2
Applications T3-Ch.11.1
Basics, Routing L21 T1-Ch.5.3
T3-Ch.13.4
Broadcast System overview L22 T1-Ch.6.1, 6.2
And cyclic rep of data T2-Ch.3.4.3
Digital audio and video broad L23, 24 T1-Ch.6.3, 6.4
Casting T4-Ch.5.1.2
T5-Ch.12.1
Convergence of Broadcasting L25 T1-Ch.6.5
and Mobile communication
127
MCA III Year, I Semester
128
MCA III Year, I Semester
T6 Digital audio & video broad casting Audio and video signal processing
T7 Satellite system History & applications History of satellite system.
T8 Convergence of Broadcasting & Broadcasting and mobility combined
Mobile communication
T9 III IEEE 802.11 Different standards of wireless lans,
T10 Hyperlan Development of hiperlan
T11 BLUETOOTH Development of bluetooth
T12 BLUETOOTH Recent applications of bluetooth
T13 IV Mobile IP Internet protocol for mobile device
T14 Mobile transport layer Traditional & classical TCP
T15 TCP over 2.5/3G Wireless networks and performance
enhancing proxies.
T16 Mobile ad-hoc N/W Types of mobile networks
T17 V File systems Electronic directories real time
examples
T18 WWW Mobile www., how protocols used
T19 Operating Systems for Mobile Devices Features of Windows CE, Palm OS,
Symbian OS.
T20 Wireless application protocol Web details
129
MCA III Year, I Semester
UNIT - I
1. i. Define device portability and explain different types of frequencies and antennas. (Aug 12)
ii. Define multiplexing and write about FDM and TDM.
2. i. Define MACA and explain how it can avoid the problem of hidden and exposed terminal. (Aug 12)
ii. Write short notes on: (a) Spread Spectrum (b) CDMA.
4. i. Explain the problem of near and far terminal and give a solution to solve it. (Feb 12)
ii. Write a short notes on: (a) CSMA/CD (b) CDMA
iii. What are advantages of small cell size.
5. i. Discuss the applications of Wireless networks and Mobile Communications. (Aug 11)
ii. What is Multiplexing? Explain the four dimentions in which it can be achieved.
6. i. Specify the range of frequencies used in wireless networks for C-band, Ku-band and Ka-band. (Aug 11)
ii. Distinguish between hidden and exposed terminal.
iii. Explain how MACA solves hidden and exposed terminal problem.
11. i. Define Hidden and Exposed and Near and Far terminals. (Dec 09)
ii. Explain about FDMA CDMA.
130
MCA III Year, I Semester
UNIT - II
7. Describe the mobile service offered by GSM and its system architecture. (May 11)
8. i. List and explain the four possible hand over scenario in GSM.
ii. Discuss about video broadcasting. (May 11)
10. With a neat diagram describe the system architecture of GSM and explain about RSS, NSSand OSS.
(Jan 11)
11. i. Discuss about DAB.
ii. Write note on satellite Systems (July 10)
14. Discuss about the protocol layers of DECT in detail. (Dec 09)
16. Explain cyclic representation of data digital audio broadcasting. (May 09 old)
20. Explain the concept of UMTS and IMT -2000. (Dec 08)
131
MCA III Year, I Semester
UNIT - III
1. i. Define access point (AP) and its use in infrastructure network with a neat diagram.
ii. Explain IEEE 802.11standard with its architecture (Aug 12)
3. i. Define WLAN and its advantages and disadvantage of WLAN compare to LAN.
ii. Explain the need of ADHOC networks and explain in detail about bluetooth. (Feb 12)
10. i. Compare and contrast between infrastructure Networks and Adhoc Networks.
ii. Discuss briefly about IEEE 802.11 and its protocol. (Jan 11)
13. i. Differntiate between Infrared transmission and Radio transmission. (Dec 09)
ii. Briefly discuss about infrastructured networks and adhoc networks.
14. Discuss about HYPERLAN and Bluetooth (Dec 09/ May 09 Old)
UNIT - IV
1. i Define topological correct address and write about quick solution for mobile IP.
ii. Explain DHCP and write about mobile Adhoc Networks. (Aug 12)
132
MCA III Year, I Semester
4. i. Explain DHCP.
ii. Write about: (a) Performance enhancing proxies (b) IP-in-IP encapsulation. (Feb 12)
7. Discuss in detail about Agent Discovery, Registration ,Tunneling and Encapsulation in Mobile IP.
(May 11)
8. Explain about congestion control, slow start and fast transmit/ fast Recovery in traditional. (May 11)
10. i. Discuss in detailabout DSDV and DSR protocols in mobile Adhoc networks .
ii. Write note on Indirect TCP. (May 11)
13. Explain about snooping TCP and indirect TCP. (Dec 09)
14. Discuss in detail about DHCP with its advantages and disadvantages. (Dec 09)
15. Explain the concept of : (a) Indirect TCP (b) Snooping TCP (May 09)
133
MCA III Year, I Semester
134
MCA III Year I Semster
5. SUBJECT DETAILS
5. 8 INFORMATION SECURITY
5.8.2 Scope
5.8.3 Prerequisites
5.8.6 Websites
5.8.8 Journals
135
MCA III Year I Semster
136
MCA III Year I Semster
5.8.2 SCOPE
The reuse of good practices and well proven techniques has always been central to the various disciplines
of engineering. In fact it is no surprise that reuse is one of the core ideas in software engineering.
5.8..3 PREREQUISITES
Students should have knowledge of fundamentals of computer science and Software Engineering concepts
in general and unified modeling language and Java in particular.
UNIT II
OBJECTIVE
It gives the clear concepts of security and managing
SYLLABUS
Law and ethics in Information Security,International laws and Legal Bodies,Ethics and Information
Security,Overview,Risk Identification,Risk Assessment,Risk Control Strategies and selecting a risk control
strategy,Quantitive Versus qualitative Risk Control Practices,Risk Management Discussion
points,Recommended risk control practices.
UNIT -III
OBJECTIVE
This unit deals with various policies of the government and their standards.,
SYLLABUS
Security Policy,Standards and Practices,Security Blue Print,Security Education,Continuity
Strategies,Physical Deign,Firewalls, Protecting Remote Connections
137
MCA III Year I Semster
UNIT - IV
OBJECTIVE
This Unit discuss the concepts of Cryptography Algorithms
SYLLABUS
Intrusion Detection,Access Control and other security tools,Intrusion Detection and Prevention Sys-
tem ,Scanning and Analysis Tools,Access Control Devices ,Foundations of Cryptography,Cipher
Methods,Cryptographic Algorithms ,Cryptographic Tools,Protocols for secure Communication, At-
tacks on cryptosystems.
UNIT V
OBJECTIVE
This Unit discusses about the implementation of security
SYLLABUS
Implementing Security Project Management,Technical Topics of Implementation,Non Technical Aspects
of Implementation,Security Certification and accreditation,Positioning and staffing security function,
Employment Policies and Practices,Internal Control Strategies,Security Management Models,The
Maintenance Model,Digital Forensics.
TEXT BOOKS
T1 Principle and Practices of Information Security
REFERENCE BOOKS
R1 Fundamentals Of Cryptology
R2 Introduction to Modern Cryptography
R3 IT Security Cookbook
5.8.6 WEBSITES
1. www.searchsecurity.techtarget.com
2. www.scmagazine.com
3. www.infoseccorp.com
4. www.digital-library.theiet.org/IET-IFS
138
MCA III Year I Semster
NATIONAL
1. Dr Philip T. Cox
Professor
Faculty of Computer Science
Dalhousie University
Email: pcox@cs.dal.ca
Phone: 902-494-6460
Website: http://users.cs.dal.ca/~pcox/
Address
Dr Philip T. Cox
Faculty of Computer Science
Dalhousie University
6050 University Avenue
Halifax, Nova Scotia
Canada B3H 1W5
2. Mr. Deepak B. Phatak
IIT Bangalore
Ph: 91-22-2576-7747
Email: dbp@it.iitb.ac.in
REGIONAL
1. Dr. M.S. Prasad Babu
Andhra University
Email: dramsprasadbabu@yahoo.co.in
Ph: 91-891-2844862. 91-891-2755898.
5.8.8 JOURNALS
INTERNATIONAL
1. International Journal of Information Security
2. The Application of Mixed Method in Developing a Cyber Terrorism Framework
NATIONAL
1. A New Steganography Method Based on the Complex Pixels
139
MCA III Year I Semster
1. A tangent subdivision scheme”, Evelyne Aanvaes, Adhemar Bultheel, PP: 340-355. ACM transactions on
Graphics. Vol-25, issue 2, April 2006.
2. “Forward Rasteriztion”, Voicu popeson, Paul Rosen PP: 375-411. ACM transaction on Graphics Vol.25,
issue2, April 2006.
3. “Accurate detection of symmetries in 3D shapes”, Aurelien Nertinet, lyril soler, Nicolas Holzschuch, Francois
X. Sillion – PP: 439-464.
4. “Salient geometric features for partial shape matching and similarity”, Ran Gal, Daniel Colen , PP130-150,
ACM transaction on Graphics Vol.25, issue 1, Jan 2006.
Attacks
Software Development T1-Ch3.2
L12
UNIT – II
Legal, Ethical T2-Ch1
and Professional Law and ethics in Information Security L13 T2-Ch3
Issues
2 L14 T2-Ch4
Relevant U.S International laws and Legal Bodies
Laws
L15 T2-Ch4
Ethics and Information Security
140
7
Security T3-Ch3.3
Physical Deign L29
Technology
T3-Ch3.5
Firewalls L30
T3-Ch3.6
Protecting Remote Connections L31
UNIT – IV
4 Security L32
Intrusion Detection T3-Ch2.2
Technology
L33
Access Control and other security tools T3-Ch2.2
141
MCA III Year I Semster
Tutorial Unit
Topic Salient topics to be discussed
No. No.
T1 I History History
T2 Critical Characteristics of Information Information
T3 NSTISSC security Model security Model
T4 Components of an Information System Components
T5 II Law and ethics in Information Security ethics in Information Security
T6 International laws and Legal Bodies Legal Bodies
T7 Ethics and Information Security Ethics of IS
T8 Overview Overview
T9 III Security Policy Policy
T10 Standards and Practices Standards
142
MCA III Year I Semster
Tutorial Unit
Topic Salient topics to be discussed
No. No.
T11 III Security Blue Print Security
T12 Security Education Security Education
T13 IV Intrusion Detection Detection
T14 Access Control and other security tools Access To Security Tools
T15 Intrusion Detection and Prevention System Detection and Prevention
T16 Scanning and Analysis Tools Scanning
T17 V Implementing Security, Project Management Implementing Security
T18 Technical Topics of Implementation Implementation
T19 Non Technical Aspects of Implementation Non Technical Aspects
T20 Security Certification and accreditation Security Certification
UNIT - I
2. i. List out and briefly explain the various types of Threats. (July 12)
ii. What are the software development security problems?
UNIT - II
UNIT - III
1. Explain: (i) EISP (ii) ISSP (iii) Policy Management (July 12)
143
MCA III Year I Semster
UNIT - IV
4. i. What is the importance of Digital Signature and Digital Certificates? (Feb 12)
ii. How to secure a wireless networks with WEP and WPA?
UNIT - V
2. i. Write about: (i) GIAC (ii) SCP (iii) CCE (iv) ISACA (July 12)
ii. Explain briefly the internal control strategies.
144
MCA III Year I Semster
5. SUBJECT DETAILS
5. 9 SYSTEM ADMINISTRATION
5.9.2 Scope
5.9.3 Prerequisites
5.9.6 Websites
5.9.8 Journals
145
MCA III Year I Semster
146
MCA III Year I Semster
5.9.2 SCOPE
The primary goal of system administration is to to provide the basic knowledge of sytem hardware and
configuaration to the students.
5.9.3 PREREQUISITES
Students should have knowledge of fundamentals of different types of operating system specially a unix
operating system and network related concepts.
UNIT II
OBJECTIVE
It deals with how to provide complete security to the users of the system.
SYLLABUS
User accounts,security,managing system resources-system performace,managing cpu usage memory,disk
i/o automatings task with scripts.
UNIT -III
OBJECTIVE
This unit deals with the maintenance of hardware components and takking the back-ups.
SYLLABUS
Files system annd disk-mounting addding disk,cd rom device and backup and restore terminals,modems
and printers
UNIT - IV
OBJECTIVE
This Unit discusses how to do the network management .
SYLLABUS
TCP/IP network mgmt-tcp/ip networking,adding a new host,NFS/NIS,monitoring the
network,email,configurig and building kernel for LINUX.
147
MCA III Year I Semster
UNIT - V
OBJECTIVE
It describes the windows 2003 server and its basic processes of how to start and shut down the system.
SYLLABUS
Windows 2003 server-startup,shutdown server configuration user accounts,managing processes,disk
and files system security.
TEXT BOOKS
T1. Aeleon frisch,Essential system administration,O’Reilly,1995,2nd edition.
T2. Aeleon frisch,Essential system administration,O’Reilly,1998,1st edition.
T3. Nemeth,Unix system administration,Pearson education,2000.
5.9.6 WEBSITES
1. www.wikipedia.org/system administration.
2 www.wikipedia.org/system/unix.
2. ”Improving Throughput of Starved TCP Flow by Sidestepping Bottleneck Nodes Using Concurrent
Transmission,” with Rajesh Verma, Arun Prakash, and Rajeev Tripathi Published in International Journal
of Mobile Computing and Multimedia Communications (IJMCMC), pages 68-83, vol. 2, issue 1, 2010
3. ”Energy Efficient Wireless Networks” with Awadhesh Kumar, Ajeet Kumar, Rati Agrawal Accepted for
publication in IJCNS May issue (Vol.2 No.5), 2010
4. ”Performance Evaluation of Spider Mobility Model using AODV for VANET” with Ravi Shakar Shukla
Accepted for publication in Journal of International Academy of Physical Science volume 14, no.2 2010
NATIONAL
1. Accepted for publication “ Cell Range and Capability Analysis of WiMax and LTE Network with Sandeep
Singh Sengar in International Conference on Parallel, Distributed Computing technologies and Applications
(PDCTA-2011) to be held on September 23 – 25, 2011, at Tirunelveli, India.
2. “Performance Evaluation of Mobility Model and Routing Protocols for Inter Vehicular Communication
System.” With Ravi S Shukla in International Conference on Networks and Computer Communications
(ETNCC2011) April 22 – 24 2011, at Udaipur, India
3. “Cross Layer Self OrganizedRouting Protocol for MANET.” With Awadhesh Kumar in International
Conference on Computer Communication and Management ( ICCCM 2011) held on May 2-4 2011, Sydney,
Australia.
148
MCA III Year I Semster
REGIONAL
1. “Performance enhancement of multi-hop Ad-hoc Networks through Concurrent Transmission” with Rajesh
Verma and Rajeev Tripathi in proceedings of the national seminar on Recent Advances on Information
Technology (RAIT-2009), Feb 6-7, 2009 ISM Dhanbad, India, pp 25-29.
2. “Multicast based Fast Hand0ff in Hierarchical Mobile IPv6”, with P. Thejeswara Reddy, published in the
first National Seminar on Emerging Wireless Technology, I2IIT, Pune, India February 2005.
5.9.8 JOURNALS
INTERNATIONAL
1. IEEE-Trans on Networking
2. IEEE-Trans on Computers
NATIONAL
1. Journal of High Performance Comm. System & Networking.
2. Indian Journal of Computer Science & Information Technology.
149
MCA III Year I Semster
150
MCA III Year I Semster
Tutorial Unit
Topic Salient topics to be discussed
No. No.
T1 I Functions of System
administration
T2 Unix Files, processes ,devices
T3 File Systems
T4 Essential administrative Grep,awk, files and directory commands,
tools starting and shut down process
T5 II User accounts
T6 securit
T7 Managing system System performance, managing cpu usage,
resources memory, disk I/O automating
T8 III File system and disk
T9 mounting
T10 Adding disk
T11 cd-rom devices
T12 Back up and restore
terminals modems and
printers
T13 IV TCP/IP network NFS/NIS
management
T14 Monitoring the network
T15 Tcp/ip networking
T16 Adding new host
e-mail
Configuring and building kernel for linux
T17 V Windows 2003 server Start up, shut down
T18 Server configuaration
T19 User accounts
T20 Managing processes
Disk and file system security
151
MCA III Year I Semster
UNIT - I
1. i. Explain unix file system in detail? (Aug 11)
ii. Briefly describe the starting and shutdown process in unix?
2. i. List out the various functions of system dministrator? (Aug 11)
ii. What is grep?Discuss about the grep in detail?
5. i. What are steps unix follows in starting of its operating system? (Jan 11)
ii. What is GREP command?write its usage with all the options?
6. What are essential unix administrative tools?Explain the functions of these tools? (Jan 11)
8. i. What are the basic classes of access to file? Give examples. (May 09)
ii. How to find files? What are different find matching criteria?
9. i. Under manual booking environment of a Unix system what is a role played by a system Administrator.
ii. Describe five typical startup scripts under Unix. (Nov 08)
10. i. Under Unix file system explain file permissions and I nodes
ii. Explain in detail the need for a super user? (Nov 08)
UNIT - II
2. i. Briefly explain how user tacking activities are performed? (Aug 11)
ii. Write about smart cards?
5. i. Explain how disk can be managed in unix system with the help of scripting? (Jan 11)
ii. What are the techniques you follow in knowing the system performance in unix?Explain?
152
MCA III Year I Semster
9. i. What is the role of an Administrator while adding a new user to a system (Nov 08)
ii. How can an administrator manage the cpu usage.
10. Explain in deatail the performance factor in UNIX system.How to tune them. (Nov 08)
UNIT - III
8 i. What are the factors to be considered in developing backup plan? (May 09)
ii. Write about dump command and its options?
9. i. Explain the standard serial and parallel I/O devices used in a system. (Nov 08)
ii. What is a SCSI device. how it is different from IDE system
10. Explain in detail the process of adding an extra disk in UNIX environment. (Nov 08)
UNIT - IV
1. i. Define daemon? List out the various important daemon? (Aug 11)
ii. Briefly describe the various Linux kernel networking options?
4. i. Explain the problems arise during TCP/IP networking under Linux system. (May 11)
ii. How to configure local mail system and relay host?
6. i. List the problems with NFS-NIS .Briefly explain the solution of each problem? (Jan 11)
ii. List the checklist of items to help better secure your NFS implementation?
153
MCA III Year I Semster
UNIT - V
2. i. What are different file system types supported by windows NT? (Aug 11)
ii. What are the security plans in windows NT?
4. i. Explain the important characteristics of NTFS file system type? (May 11)
ii. How does windows NT manages various processes? Explain?
154
MCA III Year, I Semester
5. SUBJECT DETAILS
5.10.2 Scope
5.10.3 Prerequisites
5.10.6 Websites
5.10.8 Journals
155
MCA III Yearm I Semester
5.10.2 SCOPE
The syllabus is designed in such a way that students take up advanced courses in DHTML,
JavaScript,Perl,CGI.
5.10.3 PRE-REQUISITES
Students should have the basic knowledge of HTML.
UNIT - I
OBJECTIVE
This Chapter discus the basic concepts of social networking and web 2.0
SYLLABUS
Web 2.o folksonomies and web 2.0,software as a service,multile delivery channels(voice VOXML,and
ANT(HTML).social networking.
UNIT - II
OBJECTIVE
This Chapter deals with client side programming
SYLLABUS
Client side programming-overview of javascript,objects of javascript,regular expressions,overview of
XML,DTD and XML schema,DOM and SAX parsers,CSS,XSLT.
UNIT - III
OBJECTIVE
This Chapter deals with web services and JSON format.
SYLLABUS
UNIT - IV
OBJECTIVE
This chapter deals with building RIA.
SYLLABUS
Building Rich Internet Application-Flash player,Flex frame work,MXML Introduction,action script
introduction,working with action script,flex data binding,common UI components with data grids,Tree
controls,Pop up controls etc.
156
MCA III Year, I Semester
UNIT - V
OBJECTIVE
This chapter deals with web services in Flex, Resource Description Framework and OWL.
SYLLABUS
Mash-up using Flex and Ajax.Web services in Flex,Semantic Web(Web 3.0) Resource Descripton Frame
Work,Use an example,ontologies,Web ontology language(OWL).
TEXT BOOKS
T1. Ivan Bayross,Web Enabled Commercial Application Development using HTML,DHTML,Javascript,perl
CGI,BPB publications,2007.
T2. Colin Moock,Essential Action script 3.0,O’Reilly publications,2007.
T3. Steven Holzner,Ajax Bible Wiley India Edition,2007.
T4. Justin Gehtland et al, A Web 2.0 Primer Pragmatic Ajax,SPD Publications,2006.
REFERENCE BOOKS
R1. Pro JavaScript RIA Techniques: Best Practices, Performance by Dennis Odell
R2. WCF RIA Services by Brain Noves.
R3. Data Visualization with Flash Builder: Designing RIA Applications with Remote Data Sources (Visualizing
the Web) by Cesare Rocchi
5.10.6 WEBSITES
1. www.adobe.com/resources/business/rich_internet_apps.
2. www.wakeuplater.com/website-building/introduction-to-rich-internet-applications.aspx.
3. www.theserverside.com/news/1365070/Web-201-a-Rich-Internet-Application-Example.
INTERNATIONAL
1. Ivan Bayross
Chairman and MD at Silicon Chip Tech,
New-York,USA.
2. Steven Holzner
PHD, Ithaca, New-York.
NATIONAL
1. Ivan Bayross
Chairman and MD at Silicon Chip Tech,
Mumbai,India.
2. Dr.Sukhendu Das,
Dept. of CSE,
IIT, Madras,India.
157
MCA III Yearm I Semester
REGIONAL
1. PROF.Dr.B.Sashidar Rao(O.U)
Professor in IT,Osmania University.
2. S. Ramachandram, M.Tech.(O.U)
Rich Internet Applications
(Co-coordinator, SSS) (Chairman, BoS, UCE)
5.10.8 JOURNALS
INTERNATIONAL
1. Luca Mainetti, Roberto Paiano - International Journal of Web Information Systems
2. Nooralisa MohdTuah and Dg. Senandong Ajor - The Emerging of Rich Internet Applications in Web
Applications: Their Usability towards Good User Experience
NATIONAL
1. Stefan P. Albaum, Heiko Neuweger - Qupe—a Rich Internet Application to take a step forward in the
analysis of mass spectrometry-based quantitative proteomics experiments
1. Web 2.0
2. XML Schema and parsers, SAX Parsers.
3. Web services,AJAX.
4. Building RIA
5. Flex
158
MCA III Year, I Semester
UNIT – II
2. Client side Overview of JavaScript L15 T1
programming:
Objects in JavaScript L16, L17 T1
UNIT – IV
4 Building RIA Flash Player, Flex Framework L29 T2
MXML introduction L30, L31 T2
159
MCA III Yearm I Semester
UNIT - I
UNIT - II
1. i. Discuss about control structures in java script. (July 12)
ii Write a java script program to print fibonocci series upto a given no.
2. i. Describe various types of cascading style sheets. (July 12)
ii Give the overview of XML.
UNIT - III
1. i. What are the REST services.? Explain. (July 12)
ii Describe about JSON format with an example.
2. Write short notes on the following: (a) WSDL (b)AJAX (July 12)
UNIT - IV
1. i. Explain the role of flash player in building rich internet application. (July 12)
ii Describe briefly about MXML
2. i. What are pop up controls? Explain with ex. (July 12)
ii What is meant by flex data binding.
UNIT - V
1. Explain how mashup is related with flex and ajax. Differentiate between web 2.0 and web 3.0. (July 12)
160
MCA III Year I Semster
5. SUBJECT DETAILS
5.11.2 Scope
5.11.3 Prerequisites
5.11.6 Websites
5.11.8 Journals
161
MCA III Year I Semster
162
MCA III Year I Semster
5.11.2 SCOPE
The primary goal of Software Project Management is to increase awareness of the need to set project
management in the context of programme management.
5.11.3 PREREQUISITES
Students should have knowledge of fundamentals of computer science and different phases of System
Development Life Cycle.
UNIT II
OBJECTIVE
It gives the clear concepts of selection of a project approch and software effort estimation.
SYLLABUS
Selection of an Appropriate Project Approach, Software Effort Estimation, Activity Planning
UNIT -III
OBJECTIVE
This unit deals with the Risk Management, Resource Allocation, etc..
SYLLABUS
Risk Management, Resource Allocation, Monitoring & Control
UNIT - IV
OBJECTIVE
This Unit discuss how to manage contracts, people in software environments.
SYLLABUS
Managing Contracts, Managing people in Software Environments, Working in Teams
163
MCA III Year I Semster
UNIT V
OBJECTIVE
This Unit discusses about the PRINCE 2 concepts
SYLLABUS
Software Quality, An Overview of PRINCE 2
5.11.5 SUGGESTED BOOKS
TEXT BOOKS
T1 Bob Hughes and Mike Cotterell, Software Project Management, Tata McGraw Hill, 5th Edition-2010
T2 Walker Royce, Software Project Management: A Unified Framework Addison Wesely,1998
REFERENCE BOOKS
R1 Fundamentals of s/w engineering project Management
R2 The Project Management Book, by MikeHarding Roberts.
R3 A Project Management Primer, by Nick Jenkins
R4 The Project Management Life Cycle by Jason Westland
R5 Powerful Project Leadership by Wayne Strider
5.11.6 WEBSITES
1. http://www.wikipedia.org/wiki/sofware_project_management
2. http://www.une.edu.au/courses/units/comp393
3. http://www.softwareprojects.org/software-project-management.html
4. http://www.forum.jntuworld.com
5. http://www.comp.glam.ac.uk
2. Mike Cotterell
Programreader, School of computing mathematical & info.
University of Brighton,UK
3. Johan Gouws
B.Eng. & M.Eng.(Elec.)(Rand Afrikaans University, South Africa)
MRA (Heriot-Watt University, Scotland)
Ph.D.(Wageningen, the Netherlands)
NATIONAL
1. Leonie E.Gouws
B.Eng.(Mech.)(Rand Afrikaans University, South Africa)
M.Eng. (Engineering Management) (Rand Afrikaans University, South Africa)
164
MCA III Year I Semster
REGIONAL
1. Dr. M.S. Prasad Babu
Andhra University
Email: dramsprasadbabu@yahoo.co.in
Ph: 91-891-2844862. 91-891-2755898.
5.11.8 JOURNALS
INTERNATIONAL
1. International Journal of software and usability engineering
2. International Journal of software engineering and its application
NATIONAL
1. Journal of software project management and quality assurance published by international Science Press
2. Journal for Advances in Engineering Software
1. “Using agents for distributed software project management”, Johan Gouws and Leonie E.Gouws , IEEE
paper on SPM,Vol.49, issue 12, December 2006
2. “Enhanced software project management by application of metrics & cost estimation techniques”, Dr Philip
T. Coxpp and Dr Philip T. Cox , IEEE paper on SPM, vol.29. issue 21, November 2006.
3. Impact of cost estimation on software project management”, W.hiang and Y.hill, IEEE Transactions on
software project management , vol.6, issue 1, pp: 2-11, Jan 2007.
165
MCA III Year I Semster
Conclusions T1-Ch2.12
166
7
UNIT – III
3 Risk T1-Ch7
Nature and Type of Risk L25
Management
T1-Ch7
Hazard identification and analysis L26
T1-Ch7
Evaluating, planning and controlling risk L27
Resource T1-Ch8
Identifying and scheduling recourses L28
Allocation
T1-Ch8
Creating critical paths and counting costs L29
Being specific and publishing recourse T1-Ch8
L30
schedule
T1-Ch8
Cost schedules and scheduling sequences L31
Monitoring T1-Ch9
Creating framework and collecting data L32
and control
T1-Ch9
Cost monitoring and prioritizing L33
Getting project back to target, Change T1-Ch9
L34
control
167
MCA III Year I Semster
168
MCA III Year I Semster
169
MCA III Year I Semster
UNIT - I
2. i. Explain about analyse project characteristics step in step wise Planning. (Feb 12)
ii. Discuss about Programme Management.
3. Explain the difference between software projects and other projects in detail.
12. Explain the steps in project planning with case studies example.
UNIT - II
2. Explain any two approaches to identifying the activities or tasks that make up a Project. (Feb 12)
170
MCA III Year I Semster
UNIT - III
2. i. What factors are considered when allocating individuals to tasks? (Feb 12)
ii. What is Cost monitoring?
iii. What is Earned Value analysis.?
7. W hatisthe difference forward passand backw ard passexplain with exam ple.
9. Explain thecategoriesofrisk.
UNIT - IV
171
MCA III Year I Semster
10. Explain time and material contract with advantages and disadvantages
12. What are the typical terms of a contract? Explain with examples.
UNIT - V
172
MCA III Year, I Semester
6. LAB DETAILS
6.1.2 Prerequisites
6.1.5 Websites
173
MCA III Year, I Semester
174
MCA III Year, I Semester
The main objective of this lab course is to gain practical hands on experience by exposing the concepts of
object oriented Analysis and Design, Designing tool,Rational Rose.Using designing tool we can provide
the graphical representation of any Application before developing.This tool will give the over all idea
about your project in a blue print
6.1.2 PREREQUISITES
The student should have the knowledge of object oriented concepts,object oriented designinig steps and
usage of Rational Rose tool.
PREAMBLE
This lab covers experiments in UML(Rational Rose) subject.The students have to perform OOAD Steps
on a given case study.
6.1.3 SYLLABUS – OU
EXPERIMENT NO.1
Overview of UML
OBJECTIVE
To Understand the elements of UML
PREREQUISITE
Knowledge on Modelling
DESCRIPTION
To understand each element of UML to model a software project
APPLICATION
In Drawing UMl diagrams.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.2
Use Case Modelling
OBJECTIVE
To Identify all the classes and relationships between them for a given case study
PREREQUISITE
Knowledge on use cases
DESCRIPTION
The students will identify use cases,actors and relationships for a given case study.
APPLICATION
In designing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
175
MCA III Year, I Semester
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.3
Structural Modelling - Class Diagrams
OBJECTIVE
To Identify all the classes and relationships between them for a given case study
PREREQUISITE
Knowledge on object oriented concepts
DESCRIPTION
The students will identify classes and relationships between them for a given case study.
APPLICATION
In designing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2: Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.4
Structural Modelling - Object Diagram
OBJECTIVE
To Identify all the objects and their relationships at a point in time
PREREQUISITE
Knowledge on object oriented concepts
DESCRIPTION
The students will identify an instance of class and draw the object diagram
APPLICATION
In designing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.5
Behavioural Modelling - Sequence Diagram
OBJECTIVE
To Visualise time ordering of messages
176
MCA III Year, I Semester
PREREQUISITE
Knowledge of a particular scenario of the project
DESCRIPTION
The students will Identify a particular instance of the class andmessages passed between them and draw
the sequence diagram
APPLICATION
In describing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.6
Collaboration Diagram
OBJECTIVE
To Visualise the organization of the objects that participate in an interaction
PREREQUISITE
Knowledge of a particular scenario of the project
DESCRIPTION
The students will draw collaboration diagram by placing the objects that participate in the interaction and
adorn the links with the links messages that objects send and recieve
APPLICATION
In describing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.7
State chart diagram
OBJECTIVE
To show the changing states of an object using state chart diagram
PREREQUISITE
Knowledge of particular scenario of an project
DESCRIPTION
The students will draw state chart diagram that shows a state machine emphasizing the flow of control
from state to state .
APPLICATION
In describing the project.
177
MCA III Year, I Semester
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.8
Activity Diagram
OBJECTIVE
Modelling the sequencial steps in a computational process
PREREQUISITE
Knowledge of flow charts and functionality of an object
DESCRIPTION
The students will draw activity diagram that emphasizes the flow of an object as it moves from state to
state at different points in the flow of control
APPLICATION
In describing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
EXPERIMENT NO.9
Architectural Modelling - Component Diagram
OBJECTIVE
To model the physical aspects of object oriented system
PREREQUISITE
Knowledge on components and dependencies between them for the project
DESCRIPTION
The students will be able to draw component diagrams which is used to model the static implementation
view of a system.
APPLICATION
In describing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
178
MCA III Year, I Semester
EXPERIMENT NO.10
Deployment Diagram
OBJECTIVE
To model the physical aspects of Object Oriented system
PREREQUISITE
Knowledge of systems configuration used in the project
DESCRIPTION
The students will draw Deployment diagram that shows the configuration of runtime processing nodes
and the components that live on them
APPLICATION
In describing the project.
TEXT BOOKS
T1 Grady Booch,James Rumbaugh,Ivor Jacobson,”The Unified Modelling Language User Guide”
T2 Pierre Alain Muller “Instand UML”
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
REFERENCE BOOKS
R1 Harman and Graig, Pearson Education, Applying UML and Patterns : An Introduction To Object Oriented
Analysis and Design ,
R2 Emits and Pauel BPB Publications, A UML Pattern Language.
6.1.5 WEBSITES
1. www.uml.org
2. www.cetuslinks.org
3. www.umltutorials.trireme.com
4. www.omg.org
5. www.tlas.kennesan.edu
179
MCA
MCA III
III Year,
Year, II Semester
Semester
NATIONAL
1. Mr. Deepak B. Phatak
IIT Bangalore
Ph: 91-22-2576-7747
Email: dbp@it.iitb.ac.in
2. Prof. P.Krishna Reddy
IIIT, Gachibowli, Hyderabad
Email: pkredy ET iit.ac.in
Ph : 91-40-23001967/9 Ext: 131/322
REGIONAL
1. Dr. M.S. Prasad Babu
Andhra University
Ph: 91-891-2844862. 91-891-2755898.
Email: dramsprasadbabu@yahoo.co.in
180
MCA III Year, I Semester
6. LAB DETAILS
6.2.2 Prerequisites
6.2.5 Websites
181
MCA III Year, I Semester
182
MCA III Year, I Semester
The main objective of this lab course is to gain practical hands on experience by exposing the concepts of
Middleware Technologies. Using this technology we can develop a distributed applications using RMI,
CORBA, EJB and C#.NET.
6.2.2 PREREQUISITES
The student should have the knowledge of Core Java, EJB Basics and Deployment in different servers.
PREAMBLE
This lab covers experiments in RMI, EJB, CORBA, C#.NET. The students have to perform Different types
of steps in middleware technologies.
6.2.3 SYLLABUS – OU
EXPERIMENT NO.1
Create a distributed name server (like DNS) RMI
OBJECTIVE
The object of this programming is to develop a client and server communication using RMI
PREREQUISITE
Students should know the concept of JNDI and functionalities in programming
DESCRIPTION
In the program stub and skeleton will generate for each client and server . How the client and server
communicate will be explained with implementation
APPLICATION
Server service according to client request
TEXT BOOKS
T1 The complete reference j2ee
EXPERIMENT NO.2
Create a java bean to draw various graphical shapes and display it using or without using BDK.
OBJECTIVE
The objective of this program is to draw various graphical shapes using BDK.
PREREQUISITE
Students should know the AWT package
DESCRIPTION
Using java beans or BDK ,we can develop application for drawing different shapes.
183
MCA III Year, I Semester
APPLICATION
Used fro drawing different graphical shapes using java beans or bdk
TEXT BOOKS
T1 The complete reference java
EXPERIMENT NO.3
Develop on enterprise java bean for student information system.
OBJECTIVE
Using this program we can develop a distributed application for student information using enterprise java
bean.
PREREQUISITE
Knowledge on object oriented concepts
DESCRIPTION
This programs works on different services like jboss, web logic ,websphere.We can understand how to
deploy in web logic server using back end servers like sql ,MS Excel.
APPLICATION
Using enterprise java beans we develop a student information system,likecreation,updates,insert,retriving.
TEXT BOOKS
T1 Enterprise java beans
T2 Java server programming -Black Book
EXPERIMENT NO.4
Develop on enterprise java bean for library operations.
OBJECTIVE
Using this program we can develop a distributed application for library operations.
PREREQUISITE
Students should know EJB programming on statefull, stateless, entity beans.
DESCRIPTION
In this program EJB s works on web logic server .We should know to display application how we get
different operations.
APPLICATION
Using EJB ’s we can develop a distributed applications. In this we develop a application for library
operation. Like inserting books information and check weather it is available or not.
TEXT BOOKS
T1 Enterprise java beans, Java server programming -BlackBook
184
MCA III Year, I Semester
EXPERIMENT NO.5
Create an Active-x control for time table.
OBJECTIVE
The objective of this program is to develop application for time table using Active-x control and Active x
components.
PREREQUISITE
Students should know the c#.net environment.
DESCRIPTION
Using this Active-x control we can develop different application
APPLICATION
Using Active-x control we can develop any time table.
TEXT BOOKS
T1 C# Black Book
T2 O’ Reilly Programming C#
EXPERIMENT NO.6
Develop a component for converting the currency values usingcom/.Net
OBJECTIVE
Using this we can develop a .Net application a component for converting currency values.
PREREQUISITE
Student should know the c#.net
DESCRIPTION
This program explains different currency values by inserting one currency value.
APPLICATION
This program is for converting the different currency into rupee
TEXT BOOKS
T1 C# Black Book
T2 O’ Reilly, Programming C#.
EXPERIMENT NO.7
Develop a component for developing CD- catalog using c# or VB.Net.
OBJECTIVE
By using this program we can find different CD’s and the contents i.e. software name etc.
PREREQUISITE
Student should know the C# .Net
185
MCA III Year, I Semester
DESCRIPTION
This component or application displays a user interface which takes one input as a identification by this
displays deals of CD’s available regarding topic.
APPLICATION
Using c# and .Net features we build a UI it contains details of cds availability.
TEXT BOOKS
T1 C# Black Book
T2 O’ Reilly, Programming C#
EXPERIMENT NO.8
Develop a component for retrieving information from message box using DCOM or .Net.
OBJECTIVE
By using we can retrieve information from component.
PREREQUISITE
Student should know C#.Net.
DESCRIPTION
This component contains some links or buttons when a event generated appropriate information is
displayed in one message box.
APPLICATION
Using C# and VB.Net feature we can build UI it contains the information in the form of buttons or
components.
TEXT BOOKS
T1 C# Black Book
T2 O’ Reilly, Programming C#.
EXPERIMENT NO.9
Develop a middle ware component for retrieving stock market exchange information using CORBA.
OBJECTIVE
The objective of this program is to develop a component for retrieving stock market exchange information
using common object request brokers architecture.
PREREQUISITE
Student should know the static and dynamic implementation of CORBA programming.
DESCRIPTION
Students can understand the information about the stack market what is the trading for single stack, we
can know.
APPLICATION
Using this application we can develop middleware component for stack market by using static CORBA.
186
MCA III Year, I Semester
TEXT BOOKS
T1 Teach yourself CORBA in 14 days
T2 Programming with Java and CORBA
EXPERIMENT NO.10
Develop a middleware component for retriving bank balance using CORBA.
OBJECTIVE
The objective of this program is to draw develop a component for retriving bank balance using dynamic
common object request brokes architecture.
PRE-REQUISITES
Student should know implementation with dynamic, static CORBA, compiling and running with CORBA.
DESCRIPTION
This program work in visibrokes software or jdk1.4.we should get the difference.
APPLICATION
Using this application we develop a dynamic application for retrieving the information of balance of
particular person account.
TEXT BOOKS
T1 Teach yourself CORBA in 14 days
T2 Programming with Java and CORBA
TEXT BOOKS
T1 Teach yourself CORBA in 14 days
T2 Programming with Java and CORBA
6.2.5 WEBSITES
1. www.java.sun.com
2. www.roseindia.com
3. www.de.laliluna.com
4. http://www.omg.org/gettingstarted/corbafaq.htm
5. http://www.cafeaulait.org/books.html
187
MCA
MCA III
III Year,
Year, II Semester
Semester
NATIONAL
1. Mr. Ashwin Gumaste
IIT Bombay
Ph: 91-22-2576-7911
Email: ashwin@cse.iitb.ac.in
2. D. Janakiram Professor
Department of Computer Science and Engineering
Indian Institute of Technology Madras
Chennai - 600 036, INDIA
Email: djram@iitm.ac.in
REGIONAL
1. Prof. M. Surendra Prasad Babu
Professor & Head of the Department
Department Of Computer Science & Systems Engineering
College of Engineering (Autonomous)
Andhra University, Visakhapatnam - 530 003
drmsprasadbabu@yahoo.co.in
2. S. Ramachandram, M.Tech.(O.U)
Systems Software and Distributed computing
(Co-coordinator, SSS) (Chairman, BoS, UCE)
188
www.aurora.edu.in
AURORA’S PG COLLEGE
RAMANTHAPUR, HYDERABAD - 500013.
PH: 040-27030787 Fax: +9140 27036468
i