Vous êtes sur la page 1sur 39

ANNA UNIVERSITY OF TECHNOLOGY MADURAI

MADURAI 625 002

REGULATIONS 2010 CURRICULUM AND SYLLABI M.E. COMPUTER SCIENCE AND ENGINEERING

SEMESTER III COURSE CODE


10244CS201 10244CS202 10244CS203 10244CS208

S.NO
1 2 3 4

COURSE TITLE
THEORY Advanced Distributed Computing Soft Computing and Simulators Computer Network Security PRACTICAL Soft Computing & Network Security Laboratory

L
3 3 3 0

T
0 0 0 0

P
0 0 0 3 3 3 3 2

SEMESTER IV COURSE CODE


10244CS204 E02 E03 10244CS207

S.NO
1 2 3 4

COURSE TITLE THEORY


Compiler Design Elective II Elective III PRACTICAL Compiler Laboratory

L
3 3 3 0

T
0 0 0 0

P
0 0 0 3 3 3 3 2

SEMESTER V

S.NO
1 2 3 4

COURSE CODE
10244CS301 E04 E05 10244CS304

COURSE TITLE
Virtualization and Cloud Computing Elective IV Elective V PRACTICAL Project Thesis Phase I TOTAL

L
3 3 3 0

T
0 0 0 0

P
0 0 0 0 3 3 3

5 14

SEMESTER VI COURSE CODE


10244CS401

S.NO
1

COURSE TITLE PRACTICAL


Project Thesis Phase II

L
0

0 0 TOTAL

12 12

List of Electives

S.NO

COURSE CODE
10244CSE21 10244CSE22 10244CSE23 10244CSE24 10244CSE25

COURSE TITLE
ELECTIVE II (E02) Open Source Systems Software Project Management XML & Web Services Middleware technologies Parallel computing and Multicore technologies ELECTIVE III (E03) Mobile Technologies Software reliability and project management E:Commerce Real time systems Network System Design Using Network Processor ELECTIVE IV (E04) Embedded Systems Operation research Adhoc Networks Bioinformatics Recent trends in Mobile computing Semantic Web ELECTIVE V (E05) Data Warehousing and Data Mining Agent based intelligent Systems High speed networks Decision support systems Fault tolerant systems Grid Computing Wireless Sensor networks

3 3 3 3 3

0 0 0 0 0

0 0 0 0 0

3 3 3 3 3

10244CSE31 10244CSE32 10244CSE33 10244CSE34 10244CSE35

3 3 3 3 3

0 0 0 0 0

0 0 0 0 0

3 3 3 3 3

10244CSE41 10244CSE42 10244CSE43 10244CSE44 10244CSE45 10244CSE46

3 3 3 3 3 3

0 0 0 0 0 0

0 0 0 0 0 0

3 3 3 3 3 3

10244CSE51 10244CSE52 10244CSE53 10244CSE54 10244CSE55 10244CSE56 10244CSE57

3 3 3 3 3 3 3

0 0 0 0 0 0 0

0 0 0 0 0 0 0

3 3 3 3 3 3 3

10244CS201 ADVANCED DISTRIBUTED COMPUTING L T 3 0

P 0

C 3

UNIT I FUNDAMENTALS 9 Characterization of Distributed Systems Examples Resource Sharing and the Web Challenges System Models Architectural and Fundamental Models Interprocess Communication The API for the Internet Protocols External Data Representation and Marshalling ClientServer Communication Group Communication Case Study Distributed Objects and Remote Invocation Communication between Distributed Objects Remote Procedure Call Events and Notifications Java RMI Case Study. UNIT II OPERATING SYSTEM ISSUES I 9 The OS Layer Protection Processes and Threads Communication and Invocation OS Architecture Security Overview Cryptographic Algorithms Digital Signatures Cryptography Pragmatics Case Studies Distributed File Systems File Service Architecture Sun Network File System The Andrew File System. UNIT III OPERATING SYSTEM ISSUES II 9 Name Services Domain Name System Directory and Discovery Services Global Name Service X.500 Directory Service Clocks Events and Process States Synchronizing Physical Clocks Logical Time and Logical Clocks Global States Distributed Debugging Distributed Mutual Exclusion Elections Multicast Communication Related Problems. UNIT IV DISTRIBUTED TRANSACTION PROCESSING 9 Transactions Nested Transactions Locks Optimistic Concurrency Control Timestamp Ordering Comparison Flat and Nested Distributed Transactions Atomic Commit Protocols Concurrency Control in Distributed Transactions Distributed Deadlocks Transaction Recovery Overview of Replication and Distributed Multimedia Systems. UNIT V PARALLEL PROGRAMMING USING MPI 9 Parallel Architectures : Parallel Algorithm Design : Message:Passing Programming : Shared:memory Programming : Combining MPI and OpenMP : Matrix Multiplication

Total: 45 REFERENCES: 1. George Coulouris, Jean Dollimore and Tim Kindberg, Distributed Systems Concepts and Design, Pearson Education, 3rd Edition, 2002. 2. Sape Mullender, Distributed Systems, Addison Wesley, 2nd Edition, 1993. 3. Albert Fleishman, Distributed Systems Software Design and Implementation, Springer Verlag, 1994. 4. M. L .Liu, Distributed Computing Principles and Applications, Pearson Education, 2004.

5. Andrew S Tanenbaum, Maartenvan Steen, Distributed Systems, Principles and Pardigms, Pearson Education, 2002. 6. Mukesh Singhal, Niranjan G Shivaratri, Advanced Concepts in Operating Systems, Tata McGraw Hill Edition, 2001. 7. Michael Quinn, Parallel Programming In C With Mpi And Open Mp, Tata Mcgraw Hill, 2003

10244CS202 SOFT COMPUTING AND SIMULATORS L T 3 0

P 0

C 3

UNIT I INTRODUCTION TO SOFT COMPUTING AND NEURAL NETWORKS

Evolution of Computing : Soft Computing Constituents From Conventional AI to Computational Intelligence : Machine Learning Basics UNIT II FUZZY LOGIC 9

Fuzzy Sets Operations on Fuzzy Sets Fuzzy Relations Membership Functions: Fuzzy Rules and Fuzzy Reasoning Fuzzy Inference Systems Fuzzy Expert Systems Fuzzy Decision Making. UNIT III NEURAL NETWORKS 9

Machine Learning Using Neural Network, Adaptive Networks Feed forward Networks Supervised Learning Neural Networks Radial Basis Function Networks : Reinforcement Learning Unsupervised Learning Neural Networks Adaptive Resonance architectures Advances in Neural networks. UNIT IV GENETIC ALGORITHMS 9

Introduction to Genetic Algorithms (GA) Applications of GA in Machine Learning : Machine Learning Approach to Knowledge Acquisition. UNIT V MATLAB 9

Introduction to Matlab Matlab Workspace Arrays and array operations Functions and Files Study of neural network toolbox and fuzzy logic toolbox Simple implementation of Artificial Neural Network and Fuzzy Logic. TOTAL : 45

REFERENCES: 1. Jyh:Shing Roger Jang, Chuen:Tsai Sun, Eiji Mizutani, Neuro:Fuzzy and Soft Computing, Prentice:Hall of India, 2003. 2. George J. Klir and Bo Yuan, Fuzzy Sets and Fuzzy Logic:Theory and Applications, Prentice Hall, 1995. 3. James A. Freeman and David M. Skapura, Neural Networks Algorithms, Applications, and Programming Techniques, Pearson Edn., 2003. 4. Melanie Mitchell, An introduction to Genetic Algorithm, Prentice:Hall of India, New Delhi, Edition: 2004 5. S.Rajasekaran and G.A Vijayalakshmi Pai,Neural Networks, Fuzzy logic and Genetic Algorithms, Synthesis and Applications, Prentice Hall of India, New Delhi:2003. 6. MATLAB Toolkit Manual

10244CS203 COMPUTER NETWORK SECURITY L T P C 3 0 0 3 UNIT I FUNDAMENTALS Introduction Services, Mechanisms and Attacks, OSI security Architecture Classical Encryption Techniques Stegnography Block Ciphers and Data Encryption Standard Block Cipher Principles : Advanced Encryption Standard AES Cipher; Contemporary Symmetric Ciphers: Triple DES, Blowfish, RC5, Characteristics of Advanced Symmetric Block Ciphers, RC4 Stream Cipher; Confidentiality using Symmetric Encryption: Placement of Encryption Function, Traffic Confidentiality, Key Distribution, and Random Number Generation. UNIT II PUBLIC:KEY ENCRYPTION AND HASH FUNCTIONS Public Key Cryptography and RSA: Principles of Public Key Cryptosystems, RSA Algorithm; Key Management and other public key cryptosystems: Key Management, Diffie:Hellman Key Exchange, Elliptic Curve arithmetic, Elliptic Curve Cryptography; Message Authentication and Hash Functions: Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions and MACs; Hash Algorithms: MD5 Message Digest Algorithm; Secure Hash Algorithm, RIPEMD 160, HMAC; Digital Signatures and Authentication Protocols: Digital Signatures, Authentication Protocols, Digital Signature Standards. UNIT III NETWORK SECURITY PRACTICE Authentication Applications: Kerberos, X.509 Authentication Service; Electronic Mail Security: Pretty Good Privacy, S/MIME; IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations; Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Secure Electronic Transaction.

UNIT IV

SYSTEM SECURITY

Intruders: Intruder Detection, Password Management; Malicious Software: Virus and Related Threats, Virus Counter Measures; Firewalls: Firewall Design Principles, Trusted Systems. UNIT V COMPUTER PRIVACY

Privacy at Risk Privacy at Home Privacy on the NET Privacy at Work Privacy in Public Privacy in the Future. TOTAL:45 REFERENCES 1. William Stallings, Cryptography and Network Security, 3ed. Prentice Hall of India, New Delhi ,2004 2. William Stallings, Network Security Essentials, 2 ed. Prentice Hall of India, New Delhi, 2004 3. Charlie Kaufman , Network Security: Private Communication in Public World, 2 ed. Prentice Hall of India, New Delhi ,2004 4. Dan Tynan, Computer Privacy Annoyances, OReilly Media, July 2005 10244CS204 COMPILER DESIGN L 3 T 0 P 0 C 3

UNIT I LEXICAL ANALYSIS Compilers Analysis of Source Program : Phases of Compiler Compiler Construction Tools Role of a Lexical Analyzer Specification and Recognition of Tokens Finite Automata Regular Expression to Finite Automation. UNIT II SYNTAX ANALYSIS Role of a Parser Context Free Grammars Top:Down Parsing Bottom:Up Parsing LEX and YACC. UNIT III INTERMEDIATE CODE GENERATION Intermediate Languages Declaration Assignment Statements Boolean Expressions Flow Control Statements Back Patching. UNIT IV CODE OPTIMIZATION Code Optimization Principal Sources of Optimization Basic Blocks and Flow Graphs Optimization of Basic Blocks Code Improving Transformations. UNIT V CODE GENERATION Issues in the Design of a Code Generator Run:Time Storage Management Next Use Information A Simple Code Generator DAG Representation of Basic Blocks Peephole Optimization Code Generation from DAG. TOTAL:45 REFERENCES

1. A.V. Aho, Ravi Sethi, J. D. Ullman, Compilers : Principles, Techniques and Tools, Addison:Wesley Publishing Company, 1988. 2. Allen I. Holub, Compiler Design in C, Prentice Hall of India, 1993. 3. Fischer Leblanc, Crafting Compiler, Benjamin Cummings, Menlo Park,1988

10244CS207 COMPILER LABORATORY 1. Implementation of a Lexical Analyser 2. Computation of FIRST and FOLLOW sets 3. Construction of Predictive Parsing Table 4. Implementation of Shift Reduce Parsing 5. Computation of Leading and Trailing Sets 6. Computation of LR(0) items 7. Construction of DAG 8. Intermediate Code Generation 9. Use YACC and LEX to implement a parser for the same grammar as given in problem 10. Implement a recursive descent parser for an expression grammar that generates arithmetic
expressions with digits, + and *.

11. Use LEX tool to implement a lexical analyzer. 12. Write semantic rules to the YACC program in problem 5 and implement a calculator that takes an expression with digits, + and * and computes and prints its value. 13. Implement the front end of a compiler that generates the three address code for a simple language with: one data type integer, arithmetic operators, relational operators, variable declaration statement, one conditional construct, one iterative construct and assignment statement. 14. Implement the back end of the compiler which takes the three address code generated in problem 13, and produces the 8086 assembly language instructions that can be assembled and run using a 8086 assembler. The target assembly instructions can be simple move, add, sub, jump. Also simple addressing modes are used. Note: Use C compiler to implement 1 8 and Lex & Yacc tool for the rest.

10244CS208 SOFT COMPUTING & NETWORK SECURITY LAB 1. Implementation of any two Symmetric Key Algorithms 2. Implement RSA algorithm 3. Analyse the components of a Digital Certificate and Display it.

4. Capture and Analyze the Network traffic using Packet Analyser Tools. 5. Design and Simulate any one Arificial Neural Netwrok using MATLAB 6. Implementation of any one Real Time Problem using GA 7. Design and Simulate any one Real Time Problem using Fuzzy Based Systems. Note: Use Java / Dot NET compiler to implement 1 3 and MATLAB tool for 5 7 and Wire Shark or any tool for 4.

SEMESTER III 10244CS301 VIRTUALIZATION AND CLOUD COMPUTING L T P 3 0 0

C 3

UNIT I CLOUD COMPUTING Understanding the Cloud Computing Cloud Architecture Cloud Storage Advantages, Disadvantages of Cloud Computing Companies in the Cloud Today Developing Cloud Services Web:Based Application Pros and Cons of Cloud Service Development Types of Cloud Service Development Software as a Service Platform as a Service Web Services On:Demand Computing Discovering Cloud Services Development Services and Tools Amazon Ec2 Google App Engine IBM Clouds UNIT II CLOUD COMPUTING FOR EVERYONE Centralizing Email Communications Collaborating on Schedules, To:Do Lists, Contact Lists and Group Projects and Events Cloud Computing for the Community and Corporation, Using Cloud Services: Collaborating on Calendars, Schedules and Task Management Exploring Online Scheduling Applications, Online Planning and Task Management Collaborating on Event Management, Contact Management, Project Management, Word Processing and Databases Storing and Sharing Files UNIT III VIRTUALIZATION & CLOUD COMPUTING * Virtualization & Cloud Computing Overview Case Study: Enterprise Virtualization & Cloud Computing Definitions Hypervisor / Virtual Machine Monitor Architecture CPU Virtualization Extensions Network and Storage Virtualization Architecture UNIT IV VIRTUALIZED ENTERPRISE * Smashing the Virtualized Stack Case Study: Owning the Virtualized Enterprise CPU & Chipsets VMM/Hypervisor/Host VMs/Guest Control & Management planes & APIs. UNIT V CLOUD SECURITY AND PRIVACY

Infrastructure security Data Security and Storage Identity and access management Security management in the cloud privacy Security as a cloud service. TOTAL:45 REFERENCES 1. Michael Miller, Cloud Computing: Web:Based Applications That Change the Way You Work and Collaborate Online, Que Publishing, August 2008. 2. Christofer Hoff, Rich Mogull, Craig Balding, Hacking Exposed: Virtualization & Cloud Computing: Secrets & Solutions [Paperback], McGraw:Hill Osborne (20 Jan 2012) * 3. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for On:demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008. 4. Tim Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance, By O'Reilly Media, 2009

10244CSE11 OBJECT ORIENTED SYSTEMS ENGINEERING L 3 T 0 P 0 C 3

UNIT I CLASSICAL PARADIGM System Concepts Project Organization Communication Project Management UNIT II PROCESS MODELS Life cycle models Unified Process Iterative and Incremental Workflow Agile Processes UNIT III ANALYSIS Requirements Elicitation Use Cases Unified Modeling Language, Tools Analysis Object Model (Domain Model) Analysis Dynamic Models Non:functional requirements Analysis Patterns UNIT IV DESIGN System Design, Architecture Design Principles : Design Patterns Dynamic Object Modeling Static Object Modeling Interface Specification Object Constraint Language UNIT V IMPLEMENTATION, DEPLOYMENT AND MAINTENANCE Mapping Design (Models) to Code Testing : Usability Deployment Configuration Management Maintenance Total: 45 REFERENCES

1. Bernd Bruegge, Alan H Dutoit, Object:Oriented Software Engineering, 2nd ed, Pearson Education, 2004. 2. Craig Larman, Applying UML and Patterns 3rd ed, Pearson Education, 2005. 3. Stephen Schach, Software Engineering 7th ed, McGraw:Hill, 2007. 4. Ivar Jacobson, Grady Booch, James Rumbaugh, The Unified Software Development Process, Pearson Education, 1999. 5. Alistair Cockburn, Agile Software Development 2nd ed, Pearson Education, 2007.

10244CSE12 MULTIMEDIA SYSTEMS L 3 UNIT I INTRODUCTION AND QOS Introduction:QOS Requirements and Constraints:Concepts:Resources: hase:Run:Time Phase:Management Architectures. T 0 P 0 C 3

9 Establishment

UNIT II OPERATING SYSTEMS 9 Real:Time Processing:Scheduling:Interprocess Communication:Memory and anagement:Server Architecture:Disk Management. UNIT III FILE SYSTEMS AND NETWORKS 9 Traditional and Multimedia File Systems:Caching Policy:Batching:Piggy backing thernet:Gigabit Ethernet:Token Ring:100VG AnyLAN:Fiber Distributed Data Interface (FDDI): ATM Networks:MAN:WAN. UNIT IV COMMUNICATION 9 Transport Subsystem:Protocol Support for QOS:Transport of Multimedia:Computer upported Cooperative Work:Architecture:Session Management:MBone Applications. UNIT V SYNCHRONIZATION Synchronization in Multimedia Systems:Presentation:Synchronization ynchronization Methods:Case Studies:MHEG:MODE:ACME. 9 Types:Multimedia

Total: 45 REFERENCES 1. Ralf Steinmetz and Klara Nahrstedt, Multimedia Systems, Springer, I Edition 2004. 2. Ralf Steinmetz and Klara Nahrstedt, Media Coding and Content Processing, Prentice hall, 2002. 3. Vaughan Taeltimedia, Tata McGraw Hill, 1999. 4. Mark J.B., Sandra K.M., Multimedia Applications Development using DVI echnology, McGraw Hill, 1992.

5. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovacovic, D. A. Milovacovic , ultimedia Communication Systems: Techniques, Standards, and Networks, Prentice Hall, 1st Edition, 2002 6. Ze:Nian Li and Mark S. Drew, Fundamentals of Multimedia, Pearson, 2004.

10244CSE13 ADVANCED JAVA TECHNOLOGY L 3

T 0

P 0

C 3

UNIT I JAVA FUNDAMENTALS 9 Java Virtual Machine Reflection I/O Streaming Filter And Pipe Streams Byte Codes Byte Code : Interpretation Dynamic Reflexive Classes Threading Java Native Interfaces GUI Applications. UNIT II NETWORK PROGRAMMING IN JAVA 9 Stream Customization Sockets Secure Sockets Custom Sockets UDP Datagrams Multicast Sockets URL Classes Reading Data From The Server Writing Data Configuring The Connection Reading The Header Content Handlers Telnet Application Java Messaging Services. UNIT III DISTRIBUTED COMPUTING IN JAVA 9 Remote Method Invocation Activation Models RMI Custom Sockets Object Serialization Call Back Model RMI IIOP Implementation CORBA IDL Technology Naming Services CORBA Programming Models JAR File Creation. UNIT IV MULTI TIER APPLICATION DEVELOPMENT 9 Server Side Programming Servlets Session Management Cookies HTTP Communication JDBC Multimedia Data Handling Java Media Framework Enterprise Applications. UNIT V MOBILE APPLICATION DEVELOPMENT 9 Mobile Information Device Profile Deployment Of Mobile Objects Foundation Profile RMI Profile For Mobile Devices Development Of Midlets Mobile Networking Applications. TOTAL: 45

REFERENCES 1. Elliotte Rusty Harold, Java Network Programming, OReilly Publishers, 2000. 2. Cay S.Horstmann, Gary Cornell, Core Java, Volume 1 And 2, 5th Edition, Pearson Education Publishers, 2003. 3. Topley, J2ME In A Nutshell, OReilly Publishers, 2002. 4. Hunt, Guide to J2EE Enterprise Java, Springer Publications, 2004.

5. Ed Roman, Enterprise Java Beans, Wiley Publishers, 1998. 6. Avstin, Advance Programming For The Java2 Platform Pearson Education, 2001.

10244CME13 DIGITAL IMAGE PROCESSING L 3

T 0

P 0

C 3

UNIT I DIGITAL IMAGE FUNDAMENTALS Elements of digital image processing systems, Elements of visual perception, psycho visual model, brightness, contrast, hue, saturation, mach band effect, Color image fundamentals :RGB,HSI models, Image acquisition and sampling, Quantization, Image file formats, Two:dimensional convolution, correlation, and frequency responses. UNIT II IMAGE TRANSFORMS 1D DFT, 2D transforms DFT, DCT, Discrete Sine, Walsh, Hadamard, Slant, Haar, KLT, SVD, Radon, and Wavelet Transform. UNIT III IMAGE ENHANCEMENT AND RESTORATION Histogram modification and specification techniques, Noise distributions, Spatial averaging, Directional Smoothing, Median, Geometric mean, Harmonic mean, Contra harmonic filters, Homomorphic filtering, Color image enhancement. Image Restoration degradation model, Unconstrained and Constrained restoration, Inverse filtering, Wiener filtering, Geometric transformations spatial transformations, Gray: Level interpolation, UNIT IV IMAGE SEGMENTATION AND RECOGNITION Edge detection. Image segmentation by region growing, region splitting and merging, edge linking, Morphological operators: dilation, erosion, opening, and closing. Image Recognition Patterns and pattern classes, matching by minimum distance classifier, Statistical Classifier. Matching by correlation, Neural network application for image recognition. UNIT V IMAGE COMPRESSION Need for image compression, Huffman, Run Length Encoding, Arithmetic coding, Vector Quantization, Block Truncation Coding. Transform Coding DCT and Wavelet. Image compression standards. Total: 45

REFERENCES: 1. Rafael C. Gonzalez, Richard E.Woods, Digital Image Processing, Pearson Education, Inc., Second Edition, 2004. 2. Anil K. Jain, Fundamentals of Digital Image Processing, Prentice Hall of India, 2002. 3. David Salomon : Data Compression The Complete Reference, Springer Verlag New York Inc., 2nd Edition, 2001 4. Rafael C. Gonzalez, Richard E.Woods, Steven Eddins, Digital Image Processing using MATLAB, Pearson Education, Inc., 2004. 5. William K.Pratt, Digital Image Processing, John Wiley, NewYork, 2002. 6. Milman Sonka, Vaclav Hlavac, Roger Boyle, Image Processing, Analysis, and Machine Vision, Brooks/Cole, Vikas Publishing House, II ed., 1999. 7. Sid Ahmed, M.A., Image Processing Theory, Algorithms and Architectures, McGrawHill, 1995. 8. Lim, J.S., Two Dimensional Signal and Image Processing, Prentice:Hall, New Jersey, 1990.

10244CSE15 UNIX INTERNALS L 3 UNIT I GENERAL OVERVIEW OF THE SYSTEM T 0 9 P 0 C 3

History System structure User perspective Operating system services Assumptions about hardware. Introduction to the Kernel : Architecture of the UNIX operating system Introduction to system concepts Kernel data structures System administration Summary and Preview. UNIT II BUFFER CACHE 9

Buffer headers Structure of the buffer pool Advantages and disadvantages of the buffer cache. Internal representation of files : Inodes Structure of a regular file Directories Conversion of a path name to an Inode Super block Other file types. UNIT III SYSTEM CALLS FOR FILE SYSTEM 9

Open Read Write File and record locking Adjusting the position of file I/O LSEEK Close File creation Creation of special files Pipes Dup Mounting and unmounting file systems UNIT IV THE STRUCTURE OF PROCESSES 9

Process states and transitions Layout of system memory The context of a process Saving the context of a process. Process Control: Process creation Signals Process termination Awaiting process termination Invoking other programs The shell System boot and the INIT process.

UNIT V

PROCESS SCHEDULING AND MEMORY MANAGEMENT POLICIES 9 Process Scheduling Memory Management Policies: Swapping A hybrid system with swapping and demand paging. The I/O Subsystem: Driver Interfaces Disk Drivers:Terminal Drivers. TOTAL:45 REFERENCES 1. Maurice J. Bach, The Design of the Unix Operating System, Prentice Hall of India, 2004. 2. Vahalia, Unix Internals: The New Frontiers, Pearson Education Inc, 2003.

10244CSE21 OPEN SOURCE SYSTEMS L 3 T 0 P 0 C 3

Unit I 9 Overview of Free/Open Source Software:: Definition of FOSS & GNU, History of GNU/Linux and the Free Software Movement , Advantages of Free Software and GNU/Linux, FOSS usage , trends and potentialglobal and Indian.GNU/Linux OS installation:: detect hardware, configure disk partitions & file systems and install a GNU/Linux distribution ; Basic shell commands : logging in, listing files, editing files, copying/moving files, viewing file contents, changing file modes and permissions, process management ; User and group management, file ownerships and permissions, PAM authentication ; Introduction to common system configuration files & log files ; Configuring networking, basics of TCP/IP networking and routing, connecting to the Internet (through dialup, DSL, Ethernet, leased line). Unit II 9 Configuring additional hardware : sound cards, displays & display cards, network cards, modems, USB drives, CD writers ; Understanding the OS boot up process; Performing every day tasks using gnu/Linux :: accessing the Internet, playing music, editing documents and spreadsheets, sending and receiving email, copy files from disks and over the network, playing games, writing CDs ; X Window system configuration and utilities :: configure X windows, detect display devices ; Installing software from source code as well as using binary packages. Setting up email servers:: using postfix (SMTP services), courier (IMAP & POP3 services), squirrel mail ( web mail services) ; Setting up web servers :: using apache ( HTTP services), php (server:side scripting), perl ( CGI support) ; Setting up file services :: using samba ( file and authentication services for windows networks), using NFS ( file services for gnu/Linux / Unix

networks) ; Setting up proxy services :: using squid ( http / ftp / https proxy services) ; Setting up printer services : using CUPS (print spooler), foomatic (printer database) Unit III 9 Setting up a firewall : Using netfilter and ip tables; Using the GNU Compiler Collection GNU compiler tools ; the C preprocessor (cpp), the C compiler (gcc) and the C++ compiler (g++), assembler (gas) ; Understanding build systems :: constructing make files and using make, using autoconf and autogen to automatically generate make files tailored for different development environments ; Using source code versioning and management tools :: using CVS to manage source code revisions, patch & diff. Unit IV 9 Understanding the GNU Libc libraries and linker :: linking against object archives (.a libraries) and dynamic shared object libraries (.so libraries), generating statically linked binaries and libraries, generating dynamically linked libraries ; Using the GNU debugging tools :: gdb to debug programs, graphical debuggers like ddd, memory debugging / profiling libraries mpatrol and valgrind ; Review of common programming practices and guidelines for GNU/Linux and FOSS ; Introduction to Bash, sed & awk scripting. Basics of the X Windows server architecture.

Unit V 9 Basics of the X Windows server architecture ; Qt Programming ; Gtk+ Programming ; Python Programming ; Programming GUI applications with localization support. TOTAL:45 REFERENCES: 1. N. B. Venkateshwarlu (Ed); Introduction to Linux: Installation and Programming, B S Publishers; 2005. 2. Matt Welsh, Matthias Kalle Dalheimer, Terry Dawson, and Lar Kaufman, Running Linux, Fourth Edition, O'Reilly Publishers, 2002. 3. Carla Schroder, Linux Cookbook, First Edition, O'Reilly Cookbooks Series, 2004 On:line material 1. Open Sources: Voices from the Open Source Revolution, First Edition, January 1999, ISBN: 1:56592:582:3. URL: http://www.oreilly.com/catalog/opensources/book/toc.html 2. The Linux Cookbook: Tips and Techniques for Everyday Use, First Edition, Michael Stutz, 2001. URL: http://dsl.org/cookbook/cookbook_toc.html 3. The Linux System Administrators' Guide, Lars Wirzenius, Joanna Oja, Stephen Stafford, and Alex Weeks, December 2003. URL: http://www.tldp.org/guides.html 4. Using GCC, Richard Stallman et al. URL: http://www.gnu.org/doc/using.html 5. An Introduction to GCC, Brian Gough. URL: http://www.networktheory.co.uk/docs/gccintro/ 6. GNU Autoconf, Automake and Libtool, Gary V. Vaughan, Ben Elliston, Tom Tromey and Ian Lance Taylor. URL: http://sources.redhat.com/autobook/ 7. Open Source Development with CVS, Third Edition, Karl Fogel and Moshe Bar. URL: http://cvsbook.red:bean.com/ 8. Advanced Bash Scripting Guide, Mendel Cooper, June 2005. URL:

http://www.tldp.org/guides.html 9. GTK+/GNOME Application Development, Havoc Pennington. URL: http://developer.gnome.org/doc/GGAD 10. Python Tutorial, Guido van Rossum, Fred L. Drake, Jr., Editor. URL: http://www.python.org/doc/current/tut/tut.html

10244CSE22 SOFTWARE PROJECT MANAGEMENT L T 3 0

P 0

C 3

Unit 1 Introduction 9 Introduction to Software Project management and control Scope of Project management:Project Management Life cycle:Software Evolution and economics Software Management Process Framework:Disciplines of Software Management:Measures and Measurements Unit 2 Software Cost Estimation 10 Software Estimation Problems with estimation Decomposition Techniques : Cost estimation Process Delphi Technique SLIM: COCOMO II Function Point Analysis Estimation for Agile and Web development Activity Based Costing and Economic Value Added (EVA): Balanced Score Card Unit 3 Software Risk Management 9 Software Risks Risk management Paradigm: Risk Categories Risk Assessment : Identification Analysis : Prioritize Ranking : Control Risk Projection and Refinement FMEA Unit 4 Software Metrics 10 Need of Software metrics Software Metrics Classification Product Metrics : Size : Function Based Quality : Source Code Testing : Maintenance Process metrics Empirical Models : Statistical Models : Theory:based Models : Composite Models : Reliability Models. Unit 5 Project Management 7 Management Spectrum : People Product Process Project Client Relationship management Total : 45 Reference Books 1. McConnell, S. Software Project: Survival Guide, Microsoft Press, 1998. Royce, W. Software Project management: A Unified Framework, Addison Wesley, 1998 2. Cooper, R., The Rise of Activity:Based Costing: PartOne: What is an Activity:Based Cost System? Journal of Cost Management, Vol.2, No.2 (Summer 1988), pp.45 54 3. Roger S.Pressman., Software Engineering: A Practitioners approach, 6th edition,McGraw Hill International Edition

4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software, January 1991, pp32:41 5. Fenton, N.E., and Pfleeger, S.L.. Software Metrics: A Rigorous and Practical Approach, Revised Brooks Cole, 1998 6. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall, New Jersey 7. Demarco, T. and Lister, T. Peopleware: Productive Projects and Teams, 2 nd Ed., Dorset House, 1999 10244CSE23 XML AND WEB SERVICES L 3 T 0 P 0 C 3

1. INTRODUCTION 9 Role Of XML XML and The Web XML Language Basics SOAP Web Services Revolutions Of XML Service Oriented Architecture (SOA). 2. XML TECHNOLOGY 9 XML Name Spaces Structuring With Schemas and DTD Presentation Techniques Transformation XML Infrastructure. 3. SOAP 9 Overview Of SOAP HTTP XML:RPC SOAP: Protocol Message Structure Intermediaries Actors Design Patterns And Faults SOAP With Attachments. 4. WEB SERVICES 9 Overview Architecture Key Technologies : UDDI WSDL ebXML SOAP And Web Services In E:Com Overview Of .NET And J2EE. 5. XML SECURITY 9 Security Overview Canonicalization XML Security Framework XML Encryption XML Digital Signature XKMS Structure Guidelines For Signing XML Documents XML In Practice. Total: 45 REFERENCE BOOKS: 1. Frank. P. Coyle, XML, Web Services And The Data Revolution, Pearson Education, 2002. 2. Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, Developing Java Web Services, Wiley Publishing Inc., 2004. 3. Sandeep Chatterjee, James Webber, Developing Enterprise Web Services, Pearson Education, 2004. 4. McGovern, et al., Java Web Services Architecture, Morgan Kaufmann Publishers, 2005.

10244CSE24 MIDDLEWARE TECHNOLOGIES

L 3

T 0

P 0

C 3

UNIT I CLIENT / SERVER CONCEPTS 9 Client:Server File server Database server Group server Object server Web server Middleware General middleware Service specific middleware Client / server building blocks RPC Messaging Peer:to:Peer. UNIT II EJB ARCHITECTURE 9 EJB EJB architecture Overview of EJB software architecture View of EJB Conversation Building and Ddeploying EJBs Roles in EJB. UNIT III EJB APPLICATIONS 9 EJB session beans EJB entity beans EJB clients EJB deployment Building an application with EJB. UNIT IV CORBA 9 CORBA Distributed systems Purpose Exploring CORBA alternatives Architecture overview CORBA and networking Model CORBA object model IDL ORB Building an application with CORBA. UNIT V COM 9 COM Data types Interfaces Proxy and stub Marshalling Implementing Server/Client Interface pointers Object creation Invocation Destruction Comparison COM and CORBA Introduction to .NET Overview of .NET architecture Marshalling Remoting. Total: 45 REFERENCES 1. Robert Orfali, Dan Harkey and Jeri Edwards, The Essential Client/Server 2. Survival Guide, Galgotia Publications Pvt. Ltd., 2002. 3. Tom Valesky, Enterprise Java Beans, Pearson Education, 2002 4. Jason Pritchard, COM and CORBA side by side, Addison Wesley, 2000 5. Jesse Liberty, Programming C#, 2nd Edition, OReilly Press, 2002. 6. Mowbray, Inside CORBA, Pearson Education, 2002. 7. Puder, Distributed System Architecture A Middleware Approach,Elsevier, 2008.

10244CSE25 PARALLEL COMPUTING AND MULTICORE TECHNOLOGIES L 3 UNIT I PIPELINING AND ILP T 0 P 0 9 C 3

Fundamentals of Computer Design : Measuring and Reporting Performance : Instruction Level Parallelism and Its Exploitation : Concepts and Challenges : Overcoming Data Hazards with Dynamic Scheduling Dynamic Branch Prediction : Speculation : Multiple Issue Processors Case Studies. UNIT II ADVANCED TECHNIQUES FOR EXPLOITING ILP 9

Compiler Techniques for Exposing ILP : Limitations on ILP for Realizable Processors : Hardware versus Software Speculation : Multithreading: Using ILP Support to Exploit Thread:level Parallelism : Performance and Efficiency in Advanced Multiple Issue Processors : Case Studies. UNIT III MULTIPROCESSORS 9 Symmetric and distributed shared memory architectures Cache coherence issues : Performance Issues Synchronization issues Models of Memory Consistency : Interconnection networks Buses, crossbar and multi:stage switches. UNIT IV MULTI:CORE ARCHITECTURES 9

Software and hardware multithreading SMT and CMP architectures Design issues Case studies Intel Multi:core architecture SUN CMP architecture IBM cell architecture.: hp architecture. UNIT V MEMORY HIERARCHY DESIGN 9 Introduction : Optimizations of Cache Performance : Memory Technology and Optimizations : Protection: Virtual Memory and Virtual Machines : Design of Memory Hierarchies : Case Studies. TOTAL : 45 REFERENCES 1. 2. 3. John L. Hennessey and David A. Patterson, Computer Architecture A quantitative approach, Morgan Kaufmann / Elsevier, 4th. Edition, 2007. David E. Culler, Jaswinder Pal Singh, Parallel Computing Architecture: A hardware/ software approach, Morgan Kaufmann / Elsevier, 1997. William Stallings, Computer Organization and Architecture Designing for Performance, Pearson Education, Seventh Edition, 2006.

10244CSE31 MOBILE TECHNOLOGIES L 3 T 0 P 0 C 3

UNIT I MOBILE DEVICE TECHNOLOGIES 9 Mobile Computing devices characteristics Adaptation Data dissemination and Management Heterogeneity Interoperability Context awareness Language localization issues User Interfacedesign issues Difference between UI design for mobile devices and conventional systems Mobile Agents : UNIT II TERMINAL SOFTWARE PLATFORM TECHNOLOGIES 9 Introduction Symbian OS: Introduction, Architecure,Applications for Symbion: Controls and compound controls: Active objects: Localization: Security on the Symbion.Palm OS, Windows CE.NET QUALCOMM, BREW, J2ME, Pocket PC UNIT III TELECOMMUNICATIONS: 9 GSM: DECTTETRA UMTS: IMT:200 Satellite Systems, CDMA and 3G: Introduction , SpreadSpectrum,Technology:IS 95:CDMA versus GSM:Wireless Data: third GenetrationNetworks, Applications on 3G.

UNIT IV LOCAL AREA AND WIDE AREA WIRELESS TECHNOLOGIES 9 IEEE 802.11 technologies Infrared technologies Bluetooth networks (OBEX Protocol) Personal Area Networks Mobility Management Mobile IP Establishing Wide area wireless networks Concept and structure of cell Call establishment and maintenance Channel management Frequency Assignment techniques. UNIT V TRANSPORT AND APPLICATION LAYER: 9 Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery: Transmission/ Timeout Freezing Selective Retransmission: Transaction Oriented TCP, WAP Architecture Datagram Protocol: Transport Layer Security: Transaction Protocol: Session Protocol: Application Environment:Wireless Telephony Application. Total: 45 References 1. F.Adelstein, S.K.S. Gupta, Fundamentals of Mobile and Pervasive Computing Tata McGraw Hill, 2005. 2. Ashoke Talukdar and Roopa Yavagal, Mobile Computing, Tata McGraw Hill, 2005 3. Next Generation Mobile Systems : 3G and Beyond:Wiely publications 4. 3G wireless Demystified: MCGraw Hill 5. 1. J.Schiller, Mobile Communication, Addison Wesley, 2000.

10244CSE32 SOFTWARE RELIABILITY AND PROJECT MANAGEMENT L T P C

Unit 1 Introduction 7 Software Reliability Ideas of Software Reliability Ingredients of software reliability :Challenges and difficulties in Software Reliability Reliability Measurement :Computation of Software reliability Software Availability Unit 2 Software Reliability Models 10 Classes of software reliability models : General procedure for reliability modeling : Time Dependent Software Reliability Models: Time between failure reliability Models, Fault Counting Reliability Models : Time Independent Software Reliability Models: Fault injection model of Software Reliability, Input Domain Reliability Model, Orthogonal defect classification, Software availability Models Unit 3 Project Management 9 Software project management and control Activities of Project Management Project Planning Stepwise Project Planning:Project management Life cycle:Management process framework:Software Risk Management:Risk Assessment:Risk Projection and Refinement Unit 4 Metrics and Estimation 10 Software Metrics:Classification : Product Metrics : Function Based, Quality Metrics, Halsteds Metrics Process metrics : Empirical Models : Statistical Models and Reliability Models Software Estimation Issues Cost estimation method COCOMO II: Software Project Schedule Unit 5 Team Management 9 Management Spectrum Client Relationship management : Organizational Behaviour : Selecting The RightPerson For The Job Motivation Hackman Job Characteristics Model Working In Groups Becoming A Team Decision Making Leadership organizational Structures Stress Health And Safety Case Studies. Total : 45 References 1. Hoang Pham, Software Reliability, Springer Verlag, New York. 2. John D. Musa, Software Reliability Engineered Testing, Mc. Graw Hill, New York. 3. Bob Hughes, Mikecotterell, Software Project Management, Third Edition, Tata McGraw Hill, 2004 4. Boehm, B. W. "Software Risk Management: Principles and Practices" in IEEE Software, January 1991, pp32:41 5. Doron Reled, Software Reliability Methods, Springer Verlag, New York 6. R. Ramakumar, Reliability Engineering: Fundamentals and Applications, Prentice Hall, New Delhi 7. McConnell, S. Software Project: Survival Guide, Microsoft Press, 1998. Royce, W. Software Project management: A Unified Framework, Addison Wesley, 1998 8. Roger S.Pressman., Software Engineering: A Practitioners approach, 6th edition,McGraw Hill International Edition 10244CSE33 E:COMMERCE

L 3

T 0

P 0

C 3

UNIT I INTRODUCTION 9 Infrastructure for Electronic Commerce : Networks : Packet Switched Networks : TCP/IP Internet protocol : Domain name Services : Web Service Protocols : Internet applications : Utility programs Markup Languages : Web Clients and Servers : Intranets and Extranets : Virtual private Network. UNIT II CORE TECHNOLOGY 9 Electronic Commerce Models : Shopping Cart Technology : Data Mining : Intelligent Agents Internet Marketing : XML and E:Commerce UNIT III ELECTRONIC PAYMENT SYSTEMS 9 Real world Payment Systems : Electronic Funds Transfer : Digital Payment :Internet Payment Systems Micro Payments : Credit Card Transactions : Case Studies. UNIT IV SECURITY 9 Threats to Network Security : Public Key Cryptography : Secured Sockets Layer : Secure Electronic Transaction : Network Security Solutions : Firewalls. UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE 9 EDI : EDI application in business : legal, Security and Privacy issues : EDI and Electronic commerce : Standards : Internal Information Systems : Macro forces : Internal commerce : Workflow Automation and Coordination : Customization and Internal commerce : Supply chain Management. TOTAL: 45 REFERENCES 1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce, Addison Wesley, 1996 2. Pete Loshin, Paul A Murphy , Electronic Commerce, 2nd Edition , Jaico Publishers,1996. 3. Joseph P T , S J,E:Commerce : An Indian Perspective, second edtion, Prentice Hall of India.2006. 4. David Whiteley, e : Commerce : Strategy, Technologies and Applications : McGraw Hill,2000

10244CSE34 REAL TIME SYSTEMS. L 3 T 0 P 0 C 3

UNIT I INTRODUCTION 9 Introduction : Issues in Real Time Computing, Structure of a Real Time System. Task Classes, Performance Measures for Real Time Systems, Estimating Program Run times. Task Assignment and Scheduling : Classical Uniprocessor scheduling algorithms, UniProcessor scheduling of IRIS Tasks, Task Assignment, Mode Changes, and Fault Tolerant Scheduling.

UNIT II PROGRAMMING LANGUAGES AND TOOLS 9 Programming Language and Tools Desired Language characteristics, Data Typing, Control structures, Facilitating Hierarchical Decomposition, Packages, Run:time (Exception) Error handling, Overloading and Generics, Multitasking, Low Level programming, Task scheduling, Timing Specifications, Programming Environments, Run:time Support. UNIT III REAL TIME DATABASES 9 Real time Databases : Basic Definition, Real time Vs General Purpose Databases, Main Memory Databases, Transaction priorities, Transaction Aborts, Concurrency Control Issues, Disk Scheduling Algorithms, Two:phase Approach to improve Predictability, Maintaining Serialization Consistency, Databases for Hard Real Time systems. UNIT IV COMMUNICATION 9 Real:Time Communication : Communications Media, Network Topologies Protocols, Fault Tolerant Routing. Fault Tolerance Techniques : Fault Types, Fault Detection. Fault Error containment Redundancy, Data Diversity, Reversal Checks, Integrated Failure handling. UNIT V EVALUATION TECHNIQUES 9 Reliability Evaluation Techniques : Obtaining Parameter Values, Reliability Models for Hardware Redundancy, Software Error models. Clock Synchronization : Clock, A Nonfault:Tolerant Synchronization Algorithm, Impact of Faults, Fault Tolerant Synchronization in Hardware, Fault Tolerant Synchronization in Software. TOTAL : 45 REFERENCES: 1. C.M. Krishna, Kang G. Shin, Real:Time Systems, McGraw:Hill International Editions, 1997. 2. Stuart Bennett, Real Time Computer Control:An Introduction,Second edition, Prentice Hall PTR, 1994. 3. Peter D. Lawrence, Real time Micro Computer System Design An Introduction, McGraw Hill, 1988. 4. S.T. Allworth and R.N. Zobel, Introduction to real time software design, Macmillan, II Edition, 1987. 5. R.J.A Buhur, D.L. Bailey, An Introduction to Real:Time Systems, Prentice:Hall International, 1999. 6. Philip.A.Laplante Real Time System Design and Analysis PHI , III Edition, April 2004.

10244CSE35 NETWORK SYSTEM DESIGN USING NETWORK PROCESSOR L T P C 3 0 0 3 UNIT I INTRODUCTION : PROTOCOLS AND PACKET FORMATS Network systems and the Internet, Applications, packet processing, protocols and layering, layer 1 and 2, layer 3, layer 4, protocol port numbers and de:multiplexing, Encapsulation and transmission.

UNIT II PACKET PROCESSING Introduction, packet buffer allocation, packet buffer size and copying, protocol layering and copying, Heterogeneity and network byte order, IP datagram fragmentation and reassembly, IP forwarding algorithm

UNIT III TCP ALGORITHM TCP connection recognition algorithm, TCP splicing algorithm, Functions Address lookup and packet forwarding, error detection and correction, Fragmentation, segmentation and reassembly, frame and protocol de:multiplexing, packet classification, queuing and packet discard, Scheduling and timing, Authentication and privacy, traffic measurement and policing , traffic shaping, timer management. UNIT IV NETWORK PROCESSORS: Introduction, motivation for embedded processors, RISC Vs CISC, need for custom silicon, definition of NP, flexibility through programmability, instruction set, scalability with parallelism and pipelining, cause and benefits of NP, NP functionality, packet processing functions, Ingress and Egress processing, Parallel and distributed architecture, architectural roles of NP, NP architectures Introduction, architectural variety, primary architectural characteristics, Architecture, packet flow and clock rates, software architecture, assigning functionality to the process hierarchy, issues in scaling an NP. UNIT V IXP2XXX Introduction, IXP2xxx Architecture, Micro engines, Programming Models, Packet processing in a single thread, Advanced programming, Applications: Switches, Routers, Firewall, and Active Networks. Total:45 REFERENCES: 1. Douglas E.Comer, Network Systems Design using Network Processors, Intel IXP version,, Pearson Education. March 2003 2. Erik J. Johnson and Aaron Kunze, IXP 2400/2800 Programming, Intel Press, April 2003 3. Uday R. Naik and Prashant R. Chandra, Designing High Performance Networking Applications Essential Insights for Developers of IXP2XXX Network Processor Based Systems, Intel Press, November 2004 4. Donald F. Hooper, Using IXP2400/2800 Development Tools A Hands on Approach to Network Processor Software Design, Intel Press, August 2004 5. Patrick Crowley, Peter Z. Onufryk, Mark A. Franklin, Haldun Hadimioglu, Network Processors 2002: Design Principles and Practices, Vol 1, Morgan Kaufmann Publications, September 2002. 6. Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk Network Processor Design: Issues and Practices, Vol 2, Academic Press, December 2003.

7. Panos C. Lekkas, Network Processors: Architectures, Protocols and Platforms (Telecom Engineering), McGraw Hill, July 2003

10244CSE41 EMBEDDED SYSTEMS L 3 T 0 P 0 C 3

UNIT I EMBEDDED COMPUTING 9 Challenges of Embedded Systems Embedded system design process. Embedded processors ARM processor Architecture, ARM and Thumb Instruction sets UNIT II EMBEDDED C PROGRAMMING 9 C:looping structures Register allocation Function calls Pointer aliasing structure arrangement bit fields unaligned data and endianness inline functions and inline assembly portability issues. UNIT III OPTIMIZING ASSEMBLY CODE 9 Profiling and cycle counting instruction scheduling Register allocation conditional execution looping constructs bit manipulation efficient switches optimized primitives. UNIT IV PROCESSES AND OPERATING SYSTEMS 9 Multiple tasks and processes Context switching Scheduling policies Interprocess communication mechanisms Exception and interrupt handling : Performance issues. UNIT V EMBEDDED SYSTEM DEVELOPMENT 9 Meeting real time constraints Multi:state systems and function sequences. Embedded software development tools Emulators and debuggers. Design methodologies Case studies Complete design of example embedded systems. TOTAL : 45 REFERENCES 1. Andrew N Sloss, D. Symes, C. Wright, ARM System Developers Guide, Morgan Kaufmann / Elsevier, 2006. 2. Michael J. Pont, Embedded C, Pearson Education, 2007. 3. Wayne Wolf, Computers as Components: Principles of Embedded Computer System Design, Morgan Kaufmann / Elsevier, 2nd. edition, 2008. 4. Steve Heath, Embedded System Design, Elsevier, 2nd. edition, 2003.

10244CSE42 OPERATIONS RESEARCH L 3 T 0 P 0 C 3

UNIT I QUEUEING MODELS 9 Poisson Process Markovian Queues Single and Multi:server Models Littles formula Machine Interference Model Steady State analysis Self Service Queue. UNIT II ADVANCED QUEUEING MODELS 9 Non: Markovian Queues Pollaczek Khintchine Formula Queues in Series Open Queueing Networks Closed Queueing networks. UNIT III SIMULATION 9 Discrete Even Simulation Monte Carlo Simulation Stochastic Simulation Applications to Queueing systems. UNIT IV LINEAR PROGRAMMING 9 Formulation Graphical solution Simplex method Two phase method : Transportation and Assignment Problems. UNIT V NON:LINEAR PROGRAMMING 9 Lagrange multipliers Equality constraints Inequality constraints Kuhn : Tucker conditions Quadratic Programming. L: 45 REFERENCES: 1. Winston.W.L. Operations Research, Fourth Edition, Thomson Brooks/Cole, 2003. 2. Taha, H.A. Operations Research: An Introduction, Ninth Edition, Pearson Education Edition, Asia, New Delhi, 2002. 3. Robertazzi. T.G. Computer Networks and Systems Queuing Theory and Performance 4. Evaluation, Third Edition, Springer, 2002 Reprint.

5. Ross. S.M., Probability Models for Computer Science, Academic Press, 2002.

10244CSE43 ADHOC NETWORKS L 3 T 0 P 0 C 3

Unit 1. INTRODUCTION Introduction:Fundamentals of Wireless Communication Technology The Electromagnetic Spectrum : Radio Propagation Mechanisms : Characteristics of the Wireless Channel : IEEE 802.11a,b Standard Origin Of Ad hoc: Packet Radio Networks : Technical Challenges : Architecture of PRNETs : Components of Packet Radios Ad hoc Wireless Networks :What Is an Ad Hoc Network? Heterogeneity in Mobile Devices : Wireless Sensor Networks : Traffic Profiles : Types of Ad hoc Mobile Communications : Types of Mobile Host Movements : Challenges Facing Ad Hoc Mobile Networks:Ad hoc wireless Internet Unit 2. AD HOC ROUTING PROTOCOLS Introduction : Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks : Classifications of Routing Protocols :Table:Driven Routing Protocols Destination Sequenced Distance Vector : Wireless Routing Protocol : Cluster Switch Gateway Routing : Source:Initiated On:Demand Approaches : Ad Hoc On: Demand Distance Vector Routing : Dynamic Source Routing : Temporally Ordered Routing Algorithm : Signal Stability Routing : Location:Aided Routing : Power:Aware Routing : Zone Routing Protocol. Unit 3. MULTICAST ROUTING IN AD HOC NETWORKS Introduction : Issues in Designing a Multicast Routing Protocol : Operation of Multicast Routing Protocols : An Architecture Reference Model for Multicast Routing Protocols : Classifications of Multicast Routing Protocols : Tree:Based Multicast Routing Protocols: Bandwidth Efficient Multicast Routing Protocol, Multicast Routing based on Zone Routing, Associatively Based Ad Hoc Multicast Routing, Weight Based Multicast Protocol, Multicast Ad Hoc On Demand Distance Vector Routing Protocol, Ad Hoc Multicast Routing Protocol, Adaptive Shared Tree Multicast Routing Protocol :Mesh:Based Multicast Routing Protocols : Energy:Efficient Multicasting : Multicasting with Quality of Service Guarantees : Application:Dependent Multicast Routing . Unit 4. TRANSPORT LAYER, SECURITY PROTOCOLS Introduction : Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks : Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks :Classification of Transport Layer Solutions : TCP Over Ad Hoc Wireless Networks : Other Transport Layer Protocols for Ad Hoc Wireless Networks : Security in Ad Hoc Wireless Networks : Network Security Requirements : Issues and Challenges in Security Provisioning : Network Security Attacks : Key Management : Secure Routing in Ad Hoc Wireless Networks Unit 5. QoS AND ENERGY MANAGEMENT Introduction : Issues and Challenges in Providing QoS in Ad Hoc Wireless Networks :Classifications of QoS Solutions : MAC Layer Solutions: Cluster TDMA, IEEE 802.11e : Network Layer Solutions: Ticket Based QoS Routing Protocol, Predictive Location Based QoS Routing Protocol, Bandwidth Routing Protocol, On Demand Link State Multipath QoS Routing Protocol : QoS Frameworks for Ad Hoc Wireless Networks: QoS Models, QoS Resource Reservation Signaling, INSIGNIA,SWAN: Energy Management in Ad Hoc Wireless Networks Introduction : Need for Energy Management in Ad Hoc Wireless Networks : Classification of Energy Management Schemes : Battery Management Schemes : Transmission Power Management Schemes : System Power Management Schemes

TOTAL:45 REFERENCE BOOKS: 1. C. Siva Ram Murthy and B.S. Manoj Ad Hoc Wireless Networks: Architectures and Protocols, Prentice Hall PTR,2004 2. C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR, 2001 3. Charles E. Perkins, Ad Hoc Networking, Addison Wesley, 2000

10244CSE44 BIO INFORMATICS L 3 T 0 P 0 C 3

1. INTRODUCTION 7 The Central Dogma Killer Application Parallel Universes Watsons Definition : Top Down Vs Bottom Up Approach Information Flow Conversance:Communications. 2. DATABASE AND NETWORKS 9 Definition Data Management Data Life Cycle Database Technology Interfaces Implementation Networks: Communication Models Transmission Technology Protocols Bandwidth Topology Contents Security Ownership Implementation. 3. SEARCH ENGINES AND DATA VISUALIZATION 10 Search Process Technologies Searching And Information Theory Computational Methods Knowledge Management Sequence Visualizations Structure Visualizations User Interfaces Animation Vs Simulation 4. STATISTICS, DATA MINING AND PATTERN MATCHING 11 Statistical Concepts Micro Arrays Imperfect Data Basics Quantifying Randomness Data Analysis Tools Selection Alignment Clustering Classification Data Mining Methods Technology Infrastructure Pattern Recognition Discovery Machine Learning Text Mining Pattern Matching Fundamentals Dot Matrix Analysis Substitution Matrix Dynamic Programming Word Method Bayesian Method Multiple Sequence Alignment Tools. 5. MODELING SIMULATION AND COLLABORATION 8 Drug Discovery Fundamentals Protein Structure System Biology Tools Collaboration And Communication Standards Issues Case Study. Total: 45 REFERENCE BOOKS: 1. Bryan Bergeron, Bio Informatics Computing, Prentice Hall, 2003. 2. T.K. Affward, D.J. Parry Smith, Introduction to Bio Informatics, Pearson Education, 2001. 3. Pierre Baldi, Soren Brunak, Bio Informatics The Machine Learning Approach, 2nd Edition, First East West Press, 2003

10244CSE45 RECENT TRENDS IN MOBILE COMPUTING L 3 T 0 P 0 C 3

Unit I. INTRODUCTION 9 Medium Access Control : Motivation for Specialized MAC: SDMA: FDMA: TDMACDMA: Comparison of Access mechanisms Tele communications : GSM: DECTTETRA UMTS: IMT:200 Satellite Systems: Basics: Routing: Localization: Handover: Broadcast Systems: Overview Cyclic Repetition of Data: Digital Audio Broadcasting Digital Video Broadcasting Unit II. WIRELESS NETWORKS 9 Wireless LAN: Infrared Vs Radio Transmission Infrastructure Networks: Ad hoc Networks: IEEE 802.11 HIPERLAN Bluetooth: Wireless ATM: Working Group: Services: Reference Model Functions Radio Access Layer Handover: Location Management: Addressing Mobile Quality of Service: Access Point Control Protocol Unit III. MOBILE NETWORK LAYER 9 Mobile IP : Goals Assumptions and Requirement Entities IP packet Delivery: Agent Advertisement and Discovery Registration Tunneling and Encapsulation Optimization Reverse Tunneling IPv6 DHCP: Ad hoc Networks , Mobile Transport Layer, Application Layer Unit IV. MOBILE TRANSPORT LAYER 9 Traditional TCP: Indirect TCP: Snooping TCP: Mobile TCP: Fast retransmit/ Fast Recovery: Transmission/ Timeout Freezing Selective Retransmission: Transaction Oriented TCP Unit V. WAP 9 Architecture Datagram Protocol: Transport Layer Security: Transaction Protocol: Session Protocol: Application Environment:Wireless Telephony Application TOTAL:45 REFERENCE BOOKS 1. J.Schiller, Mobile Communication, Addison Wesley, 2000. 2. William Stallings, Wireless Communication and Networks, Pearson Education, 2003. 3. Singhal, WAP:Wireless Application Protocol, Pearson Education, 2003 4. Lother Merk, Martin. S. Nicklaus and Thomas Stober, Principles of Mobile Computing, Second Edition, Springer, 2003. 5. William C.Y.Lee, Mobile Communication Design Fundamentals, John Wiley, 1993.

10244CSE46 : SEMANTIC WEB L 3 T 0 P 0 C 3

1. INTRODUCTION 8 History Semantic Web Layers Semantic Web technologies Semantics in Semantic Web XML: Structuring Namespaces Addressing Querying Processing 2. RDF 10 RDF and Semantic Web Basic Ideas : RDF Specification RDF Syntax: XML and Non: XML : RDF elements RDF relationship: Reification, Container, and collaboration RDF Schema Editing, Parsing, and Browsing RDF/XML:RQL:RDQL 3. ONTOLOGY 10 Why Ontology Ontology movement OWL OWL Specification : OWL Elements OWL constructs: Simple and Complex Ontology Engineering : Introduction Constructing ontologies Reusing ontologies On:To:Knowledge Semantic Web architecture 4. LOGIC AND INFERENCE 9 Logic Description Logics : Rules Monotonic Rules: Syntax, Semantics and examples Non:Monotonic Rules Motivation, Syntax, and Examples Rule Markup in XML: Monotonic Rules, and Non:Monotonic Rules 5. APPLICATIONS OF SEMANTIC WEB TECHNOLOGIES 8 RDF Uses: Commercial and Non:Commercial use Sample Ontology e:Learning Web Services Web mining Horizontal information Data Integration Future of Semantic Web TOTAL: 45 REFERENCES 1. Grigorous Antoniou and Van Hermelen : A Semantic Web Primer:The MIT Press 2004 2. Spinning the Semantic Web: Bringing the world wide web to its full potential The MIT Press 2004 3. Shelley Powers Practical RDF Oreilly publishers First Indian Reprint : 2003

10244CSE51 DATA WAREHOUSING AND DATA MINING L 3 T 0 P 0 C 3

UNIT I DATA WAREHOUSING 9 Data Warehousing and Business Analysis : Data warehousing Components Building a Data warehouse Mapping the Data Warehouse to a Multiprocessor Architecture DBMS Schemas for Decision Support Online Analytical Processing (OLAP) OLAP and Multidimensional Data Analysis.

UNIT II DATAMINING : PREPROCESSING AND ASSOCIATION RULE MINING 9 Data Mining : Data Mining Functionalities Data Preprocessing Data Cleaning Data Integration and Transformation Data Reduction Data Discretization and Concept Hierarchy Generation. Association Rule Mining : Efficient and Scalable Frequent Item set Mining Methods Mining Various Kinds of Association Rules. UNIT III CLASSIFICATION AND PREDICTION 9 Classification and Prediction : Issues Regarding Classification and Prediction Classification by Decision Tree Introduction Bayesian Classification Rule Based Classification Classification by Back propagation Support Vector Machines Associative Classification Other Classification Methods Prediction Accuracy and Error Measures Evaluating the Accuracy of a Classifier or Predictor UNIT IV CLUSTERING 9 Cluster Analysis : Types of Data in Cluster Analysis A Categorization of Major Clustering Methods Partitioning Methods Hierarchical methods Density:Based Methods Grid:Based Methods Model:Based Clustering Methods Clustering High:Dimensional Data Constraint: Based Cluster Analysis Outlier Analysis. UNIT V RECENT TRENDS 9 Mining Object, Spatial, Multimedia, Text and Web Data: Multidimensional Analysis and Descriptive Mining of Complex Data Objects Spatial Data Mining Multimedia Data Mining Text Mining Mining the World Wide Web. Total : 45 REFERENCES 1. Jiawei Han and Micheline Kamber Data Mining Concepts and Techniques Second Edition, Elsevier, Reprinted 2008. 2. Alex Berson and Stephen J. Smith Data Warehousing, Data Mining & OLAP, Tata McGraw Hill Edition, Tenth Reprint 2007. 3. K.P. Soman, Shyam Diwakar and V. Ajay Insight into Data mining Theory and Practice, Easter Economy Edition, Prentice Hall of India, 2006. 4. G. K. Gupta Introduction to Data Mining with Case Studies, Easter Economy Edition, Prentice Hall of India, 2006. 5. Pang:Ning Tan, Michael Steinbach and Vipin Kumar Introduction to Data Mining, Pearson Education, 2007.

10244CSE52 AGENT BASED INTELLIGENT SYSTEMS L T P C 3 0 0 3 UNIT I INTRODUCTION 9 Definitions : Foundations : History : Intelligent Agents:Problem Solving:Searching : Heuristics : Constraint Satisfaction Problems : Game playing.

UNIT II KNOWLEDGE REPRESENTATION AND REASONING 9 Logical Agents:First order logic:First Order Inference:Unification:Chaining: Resolution Strategies:Knowledge Representation:Objects:Actions:Events UNIT III PLANNING AGENTS 9 Planning Problem:State Space Search:Partial Order Planning:Graphs:Nondeterministic Domains:Conditional Planning:Continuous Planning:MultiAgent Planning. UNIT IV AGENTS AND UNCERTAINITY 9 Acting under uncertainty Probability Notation:Bayes Rule and use Bayesian Networks:Other Approaches:Time and Uncertainty:Temporal Models: Utility Theory : Decision Network Complex Decisions. UNIT V HIGHER LEVEL AGENTS 9 Knowledge in Learning:Relevance Information:Statistical Learning Methods:Reinforcement Learning:Communication:Formal Grammar:Augmented Grammars: Future of AI. Total: 45 REFERENCES: 1. Stuart Russell and Peter Norvig, Artificial Intelligence : A Modern Approach, 2nd Edition, Prentice Hall, 2002 2. Michael Wooldridge, An Introduction to Multi Agent System, John Wiley, 2002. 3. Patrick Henry Winston, Artificial Intelligence, III Edition, AW, 1999. 4. Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992.

10244CSE53 HIGH SPEED NETWORKS L 3 T 0 P 0 C 3

UNIT I HIGH SPEED NETWORKS 9 Frame Relay Networks Asynchronous transfer mode ATM Protocol Architecture, ATM logical Connection, ATM Cell ATM Service Categories AAL. High Speed LANs: Fast Ethernet, Gigabit Ethernet, Fibre Channel Wireless LANs. UNIT II CONGESTION AND TRAFFIC MANAGEMENT 9 Queuing Analysis: Queuing Models Single Server Queues Effects of Congestion Congestion Control Traffic Management Congestion Control in Packet Switching Networks Frame Relay Congestion Control. UNIT III TCP AND ATM CONGESTION CONTROL 9 TCP Flow control TCP Congestion Control Retransmission Timer Management Exponential RTO backoff KARNs Algorithm Window management Performance of TCP over ATM. Traffic and Congestion control in ATM Requirements Attributes Traffic Management Frame work, Traffic Control ABR traffic Management ABR rate control, RM cell formats, ABR Capacity allocations GFR traffic management. UNIT IV INTEGRATED AND DIFFERENTIATED SERVICES 9 Integrated Services Architecture Approach, Components, Services: Queuing Discipline, FQ, PS, BRFQ, GPS, WFQ Random Early Detection, Differentiated Services.

UNIT V PROTOCOLS FOR QOS SUPPORT 9 RSVP Goals & Characteristics, Data Flow, RSVP operations, Protocol Mechanisms Multiprotocol Label Switching Operations, Label Stacking, Protocol details RTP Protocol Architecture, Data Transfer Protocol, RTCP. L:45 T:15 Total:60 REFERENCES 1. William Stallings, High Speed Networks and Internet, Second Edition, Pearson Education, 2002. 2. Warland, Pravin Varaiya, High Performance Communication Networks, Second Edition, Jean Harcourt Asia Pvt. Ltd., 2001. 3. Irvan Pepelnjk, Jim Guichard, Jeff Apcar, MPLS and VPN Architecture, Cisco Press, Volume 1 and 2, 2003.

10244CSE54 DECISION SUPPORT SYSTEMS L 3 T 0 P 0 C 3

UNIT:I INTRODUCTION Introduction : DSS definition: characteristics: History of DSS: Components of DSS: Data and Model Management:DSS knowledge base: user interfaces: DSS user: categories and classes of DSSs: Decision and Decision Makers : Decision Makers: Decision styles: Decision effectiveness: Hardness of Decisions UNIT:II DECISION MAKING Typology of Decisions: Decision theory: Rational Decision Making: Bounded Rationality:Process of choice Cognitive processes:Heuristics in Decision Making: Effectiveness and efficiency: Decisions in the Organization: Understanding the Organization: Organization culture: power and politics: organization Decision making UNIT:III DECISION PROCESSES Modeling Decision Processes: Problem definition and its structure decision models: types of probability and its forecasting techniques: sensitivity analysis: Group Decision Support : Group Decision making: the problem with groups: concepts and definition of MDM technology MDM activities: virtual workplace:Executive Information system(EIS):history of EIS:characteristics of executives: EIS components:making EIS workfuture of executive Decision making and EIS. UNIT:IV SYSTEM PERSPECTIVE OF DSS Perspective of DSS: System DSS in the context of information system: Information quality issues in DSS design: DSS information system architecture: role of Internet in DSS development and use: Designing and Building DSS: Strategies of DSS Analysis and Design: DSS Developer:tools for DSS development: DSS user

Interface Issues UNIT:V IMPLEMENTATION OF DSS Implementing DSS: DSS Implementation: Patterns of Implementation: System Evaluation:Importance of Integration:Creativity Decision making: Definition of creativity: occurrence of creativity: creative problem solving techniques:introduction to intelligent DSS (AI, Expert system and Knowledge based systems) DSS in the 21st century:future of DSS, EIS and DSS technologies REFERENCES 1. George M .Marakas, "Decision Support Systems", 2nd Edition, Pearson Education, 2005. 2. Efraim Turban, Jay E.Aronson, Ting:Peng Liang, "Decision Support Systems and Intelligent Systems", 7th Edition, Pearson Education, 2006.

10244CSE55 FAULT TOLERANT SYSTEMS L 3 T 0 P 0 C 3 UNIT I Fundamental Concepts Definitions of fault tolerance, fault classification, fault tolerant attributes and system structure. Fault:Tolerant Design Techniques: Information redundancy, hardware redundancy, and time redundancy. UNIT II Dependability Evaluation Techniques Reliability and availability models: (Combinatorial techniques, Fault:Tree models, Markov models), Performability Models. Architecture of Fault:Tolerant Computers (case study): General:purpose systems, high:availability systems, long:life systems, critical systems. UNIT III Software Fault Tolerance Software faults and their manifestation, design techniques, reliability models. UNIT IV Fault Tolerant Parallel/Distributed Architectures Shared bus and shared memory architectures, fault tolerant networks. UNIT V Recent topics in fault tolerant systems Security, fault tolerance in wireless/mobile networks and Internet. TOTAL:45

REFERENCES

1. Fault:Tolerant Computer System Design D.K. Pradhan, 2003 2. Design and Analysis of Fault:Tolerant Digital Systems, B.W.Johnson, Addison:Wesley, 1989 3. Fault:Tolerant Computing, Theory and Techniques, Volumes I and II , D.K. Pradhan, Prentice Hall, 1986 4. Reliable Computer Systems: Design and Evaluation, D.P.Siewiorek and R.S.Swartz, Digital Press, 1992 5. Probability and Statistics with Reliability, Queueing and Computer Science Application, K.S.Trivedi, Prentice Hall, 1982

10244CSE56 GRID COMPUTING L 3 T 0 P 0 C 3

1. GRID COMPUTING INITIATIVES Introduction : Definition : Scope of grid computing Grid Computing Organizations and their roles Grid Computing analog Grid Computing road map. 2. GRID COMPUTING APPLICATIONS AND TECHNOLOGIES Merging the Grid services Architecture with the Web Services Architecture OGSA Sample use cases OGSA platform components OGSI OGSA Basic Services. 3. GRID COMPUTING TOOL KITS The Globus Toolkit 4 GT4 Java WS core: state full webservice Singleton, Multiple Resources Life Cycle Management Persistent Resources GT4 Security: GSI The security Descriptor Authentication Authorization Resource level security. 4. GLOBUS TOOL KIT Installing the Globus Toolkit 4 WSDL Primer Command Line Clients Examples. 5. CASE STUDY Case Study: GridSim: Installing the simulator examples Alchemi Toolkit: Owner, Manager and Executor cluster Prime number generation example. (Web References) TOTAL:45 REFERENCE BOOKS: 1. Joshy Joseph & Craig Fellenstein, Grid Computing, PHI, PTR:2003. 2. Borja Sotomayor & Lisa Childers, Globus Toolkit 4: Programming Java Services, Morgan Kaufmann, 2006

3. Ahmar Abbas, Grid Computing: A Practical Guide to technology and Applications, Charles River media 2003.

10244CSE57 WIRELESS SENSOR NETWORKS L T P C 3 0 0 3 UNIT I INTRODUCTION Over view of sensor networks: Constraints and challenges Advantages of sensor networks: Applications: Collaborative processing Key definitions in sensor networks Tracking scenario Problem formulation Distributed representation and interference of states Tracking multiple objects sensor models: Performance comparison and metrics. UNIT II NETWORKING SENSORS Key assumption : Medium access control S:MAC protocol IEEE 802.15.4 standard and ZigBee : General Issues : Geographic, Energy Aware Routing : Attribute based routing.

UNIT III INFRASTRUCTURE ESTABLISHMENT Topology control Clustering :Time Synchronization Localization Task driven sensing Role of sensor nodes Information based tasking : Routing and aggregation. UNIT IV SENSOR NETWORK DATABASE Sensor Database Challenges Querying the physical environment Interfaces In:network aggregation Data centric storage Data indices and range queries Distributed Hierarchical aggregation Temporal data. UNIT V SENSOR NETWOR PLATFORMS AND TOOLS Sensor Node Hardware Sensor network programming challenges Node level software platforms Operating system TinyOS Node level simulators State centric programming Applications and future directions. Total: 45 REFERENCE: Feng Zhao, Leonidas Guibas, Wireless sensor networks an information processing approach, Mogan kanufmann publishers, 2004.