MCA MGU 5th Sem Syllabus
MCA MGU 5th Sem Syllabus
Module I
Introduction: OSI Security Architecture, Security attacks, ,Security Services, Security
Mechanisms, Model for Network Security, Fundamentals of Abstract Algebra : Groups, Rings,
Fields, Modular Arithmetic, Euclidean Algorithm, Finite Fields of the form GF(p),Polynomial
Arithmetic, Finite Fields of the form GF(2
n
),Classical Encryption techniques, Block Ciphers and
Data Encryption Standard.
Module II
Advanced Encryption Standard, Multiple Encryption and Triple DES, Block Cipher Modes of
operation, Stream Ciphers and RC4, Confidentiality using Symmetric Encryption, Introduction to
Number Theory: Prime Numbers, Fermats and Eulers Theorems, Testing for Primality, The
Chinese Remainder Theorem, Discrete Logarithms, Public-Key Cryptography and RSA
Module III
Key Management, Diffie-Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve
Cryptography, Message Authentication and Hash Functions, Hash and MAC Algorithms
Digital Signatures and Authentication Protocols
Module IV
Network Security: Authentication Applications, Electronic Mail Security, IP Security, Web
Security, System Security: Intruders, Malicious Software, Firewalls Module
V
Hardware Solutions: Cryptographic Accelerator, Authentication Tokens, Smart Cards,
Biometrics,Digital cash ,Secret sharing schemes ,Zero-knowledge techniques, Folklore, Secret
Sharing , Interactive proof .
References
Stallings, W., Cryptography and Network Security. Principles and Practice, 4th edition,
Prentice Hall.
Steve Burnett & Stephen Paine RSA Security's Official Guide to Cryptography, Tata Mc
GrawHill
Kaufman, C., Perlman, R., Speciner, M., Network security. Private communication in a
public worls, Prentice Hall, 2002.
Trappe, W., Washingotn, L.C., Introduction to Cryptography with coding theory, Pearson-
Prentice Hall, 2006.
Stinson, D.,
Cryptography. Theory and Practice, 2nd edition, CRC Press.
Online resources
1. Online resources of Stallings's Cryptography and Network Security. Principles and Practice
http://williamstallings.com/Crypto3e.html
2. Online resources of Menez, van Oorschot, Vanstone's Handbook of Applied Cryptography
available at http://www.cacr.math.uwaterloo.ca/hac/
MCA 502 INTERNET TECHNOLOGY AND DISTRIBUTED
APPLICATIONS
Module I
Internetworking(Host to Host delivery):- Principles, TCP/IP reference model, Connectionless
Internetworking, Internet Protocol(IP). IP addressing: Classful addressing, Classless addressing,
Subnetting, VLSM, Supernetting. Other Network layer Protocols: ARP, RARP, ICMP, IGMP.
IPv6 and ICMPv6- Comparison of IPv4 and IPv6. Point to Point Protocol(PPP), PPPoE.
Module II
Autonomous Systems. Unicasting, Unicast Routing Protocols : Interior Gateway Routing Protocol-
RIP, OSPF. Exterior Gateway Routing Protocols - BGP.
Multicasting, Multicast applications, Multicast Routing Protocols: MOSPF, DVMRP. Host
Configuration Protocols: BOOTP, DHCP.
Private Networks, Virtual Private Network and Network Address Translation(NAT).
Module III
UDP: Process to Process Communication, User Datagram and Header format, UDP operation,
Use of UDP.
TCP:- TCP Services, TCP features, TCP Segment Header, TCP Connection management, TCP
State Transition Diagram, Flow Control, Error Control, Silly Window Syndrome, TCP Congestion
control, TCP timer management.
Module IV
Domain Name System(DNS) :- Name space, Domain name space, Distribution of name space,
DNS in the Internet, Resolution, DNS messages, Types of Records, Compression, DDNS.
TELNET:- Concept, Network Virtual Terminal, Embedding.
File Transfer Protocol(FTP):- Connections, communication, File Transfer, Anonymous FTP.
Trivial File Transfer Protocol (TFTP): Messages, Connection, Data Transfer.
Electronic Mail: Architecture, User agent - Sending Mail, Receiving Mail. Multipurpose Internet
Mail Extensions (MIME). Mail transfer agent: SMTP. Mail access protocols: POP and IMAP.
Web-based Mail.
World Wide Web- Hypertext and Hypermedia- Browser Architecture- Static documents- HTML-
Dynamic Documents- Common Gateway Interface(CGI)- Active Documents.
HTTP:- Transactions, Request messages, Response message, Headers, Some other features. WAP
Architecture, protocol stack and features.
Module V
Multimedia:- Digitizing Audio and Video, Audio and Video compression, Streaming Stored
Audio/Video, Streaming Live Audio/Video, Real Time interactive Audio/Video- Real Time
Transport Protocol (RTP), Real Time Transport Control Protocol (RTCP), Video On Demand,
Voice Over IP.
References
Behrouz A. Forouzan - TCP/IP Protocol Suite- Third Edition- Tata McGraw Hill
Comer, Douglas. The Internet Book: Everything you need to know about computer
networking and how the Internet works, 4th Ed., 2007
MCA 503 COMPUTER GRAPHICS
(All the Graphics techniques specified should be implemented using OpenGL)
Module I
Introduction: Applications of Computer graphics-Image processing and Graphics-Interactive
Graphics- Input devices-Display Methods-Hardware and software Standard Graphics
pipelinedrawing primitives. Basic raster graphics algorithms-filling- line clipping polygon
clipping.
Module II
Transformations: Basic 2D transformations - Reflection, Shear, Composite Transformations.
Window to viewport transformation-changing coordinate systems- Surface normal-Plane
equation. Modeling a 3D object Data structure for object representation
Module III
Projection: 3D Geometric transformations- Translation, Scaling, Rotation. Perspective parallel
Matrix representation 3D viewing 3D clipping
Module IV
Represetations of 3D Objects :Representation of curves and surfaces Parametric, Quadric-
Bezier, B-Splines, NURBS. Representing surfaces using polygon meshes- Sweep
representations, Boundary representations, Spatial-partitioning representations, Constructive solid
geometry.
Module V
Visible surface detection methods- Shading-diffused, specular - Illumination -Gouraud, Phong.
Comparison of different shading methods-Ray tracing.
References
Hearn D.,Baker M.P., Computer Graphics(using OpenGL), Prentice- Hall of India 2006.
Foley J.D. , Andries van Dam, Computer Graphics(latest) - Principles and Practice, ,
Addison-Wesley.
Goemetric tools for Computer Graphics Philip J. Schneider and David H. Eberly The
Morgan Kaufman series in Compter Graphics & Modeling
MCA 504 DATA MINING
Module I - Introduction to Data mining & Date Warehouse
What is Data mining, Data mining -On What kinds of Data, Data mining Functionalities, Classification of
Data mining Systems, Data Mining Task Primitives, Integration of Data mining systems, Major issues of
Data mining, What is Data Warehouse, Multidimensional Data Model, A three-tier Data Warehousing
Architecture.
Module IIData Preprocessing and Mining Frequent Patterns
Data Preprocessing
Data Cleaning, Data Integration and Transformation, Data Reduction, Data discretization and
concept hierarchy generation.
Association Rules
Basic Concepts, Efficient and Scalable Frequent Item set Mining Methods : Apriori Algorithm, Generating
association Rules from Frequent Item sets, Improving the Efficiency of Apriori. Mining Frequent item-sets
without Candidate Generation.
Module III-Classification and Prediction
Introduction to Classification and Prediction, Issues Regarding Classification and Prediction
Classification by Decision Tree Induction: Decision Tree induction, Attribute Selection Measures, Tree
Pruning, Bayesian Classification: Bayes theorem, Nave Bayesian Classification, Rule Based
Algorithms: Using If - Then rules of Classification, Rule Extraction from a Decision Tree, Rule Induction
Using a Sequential Covering algorithm, K- Nearest Neighbour Classifiers.
Prediction : Linear Regression, Nonlinear Regression, Other Regression-Based Methods
Module IV - Clustering
What is Cluster Analysis, Requirements of Cluster Analysis Types of Data in Cluster Analysis,
Categorization of Major Clustering Methods, Partitioning Methods :k-Means and k- Medoids, From
KMedoids to CLARANS , Hierarchical Method : Agglomerative and Divisive Hierarchical Clustering,
BIRCH, ROCK, Chameleon, DensityBased Method: DBSCAN, Grid Based Methods: STING:
STatistical INformation Grid, Wave Cluster, Model based Methods-Expectation-Maximization,
Conceptual Clustering, Neural Network Approach.
Module V-Applications and Trends in Data Mining
Data Mining Applications : Data Mining for Financial Data Analysis, Data Mining for the Retail Industry,
Data Mining for the Telecommunication Industry, Data Mining for Biological Data Analysis, Data Mining
in Other Scientific Applications, Data Mining for Intrusion Detection, Social Impacts of Data Mining,
Trends in Data Mining.
References
Data Mining Concepts and Techniques Jiawei Han and Micheline Kamber, Second Edition,
Elsevier, 2006
Data Mining BPB Editorial Board, BPB Publications, First Edition, 2004
Data Warehousing , Data Mining, & OLAP Alex Berson, Stephen J Smith, Tata McGraw Hill,
2004
Wilbent. O. Galitz ,The Essential Guide to User Interface Design, John Wiley& Sons,
2001.
Alan Cooper, The Essential of User Interface Design, Wiley Dream Tech Ltd., 2002.