Cse Syllabus
Cse Syllabus
COURSE OUTCOME
After completion of course, students would be able to:
• Use different computational models (e.g., divide-and-conquer), to analyze the complexity/performance of
different algorithms.
• Understand the difference between the lower and upper bounds of various problems and their importance in
deciding the optimality of an algorithm.
• Use various techniques for efficient algorithm design (divide-and-conquer, greedy, and dynamic algorithms)
and be able to apply them while designing algorithms.
• Augment various data structures(trees and arrays) to support specific application
• To understand various advanced design and analysis techniques such as greedy algorithms, dynamic
programming
• Know the concepts of tractable and intractable problems and the classes P, N an NP-complete problems
REFERENCE(s):
1. Cormen, Leiserson, Rivest, Stein, “Introduction to Algorithms”, Prentice Hall of India.
2. Horowitz, Sahini, “Fundamentals of algorithms”, University Press.
3. Brassard, Bratley, “Fundamentals of algorithms”, Prentice Hall of India.
4. Knuth, “The Art of Computer Programming”, Vol. I-III, Pearson Education.
5. Kleinberg and Tardos, “Algorithm Design”, Pearson Addison-Wesley
Course Name ADVANCED COMPUTER NETWORKS
Course Code CSN502
Credits 3
LTP 300
Pre-Requisites UG level course in Computer Networks
NO. OF
LECTURE WITH BREAKUP LECTURES
INTRODUCTION
Overview of computer networks, seven-layer architecture, TCP/IP suite of protocols. (02)
MEDIUM ACCESS
MAC protocols for high-speed LANS, MANs, and wireless LANs. (For example, FDDI, DQDB, (06)
HIPPI, Gigabit Ethernet, Wireless Ethernet, etc.), CSMA/CD, CSMA/CA, Simple performance
models; WAN access methods - PPP.
INTERNETWORKING AND ROUTING
Packet Switching, The Internetworking Problem, Internet Routing Architecture: Internet Service (08)
Providers and Peering Border Gateway Protocol (BGP), Border Gateway Protocol (continued),
BGP instability, Fair queuing, Wireless TCP, The IP/TCP split connections, Scaling IP, Routers:
Forwarding and Routing, The IP forwarding path, Unicast Internet routing: Intra and Inter domain
routing, Internet Routing-in-the-wild, Router Design and Implementation, Security problems with
Internet Architecture, IPV6, Mobile IP.
RESOURCE MANAGEMENT
End-to-End Congestion Control, Router-Assisted Congestion Control: Active Queue (08)
Management, Fair Queuing and Variants, Modeling and Measurement: Packet Trains, TCP
Congestion Control Impediments, Adaptive Network Applications, QoS: Why QoS; Basic
Models and Architecture, Mechanisms and Properties, Modeling and Measurement: Traffic Self-
Similarity.
GROUP COMMUNICATION
Multicast Routing and Transport, IP Multicasting: Multicast routing protocols, address (05)
assignments, session discovery, Multicasting in mobile networks.
TRANSPORT LAYER PROTOCOL (05)
TCP protocol dynamics, TCP extensions for high-speed networks, transaction-oriented
applications. Other new options in TCP, Application protocols for email, ftp, web, DNS.
WIRELESS NETWORKS
Wireless LAN architecture, Mobile IP, Broadcast file system, Agent technology, Satellite (04)
technology.
SECURITY
Network security at various layers. Secure-HTTP, SSL, Transport Layer security, ESP, (04)
Authentication header, Key distribution protocols. Digital signatures, digital certificates.
COURSE OUTCOME
NO. OF
LECTURE WITH BREAKUP LECTURES
COMBINATORICS
General Counting methods, Recurrence relations, Generating Functions, Principle of Inclusion-
Exclusion, Posets and Lattices - Permutations, Groups and algebraic structures.
COURSE OUTCOME
REFERENCE(s):
2. Probability and Random Processes with Applications to Signal Processing , Henry Stark/John W. Woods,
Pearson Education
Wireless PANs
Bluetooth AND Zigbee, Introduction to Wireless Sensors, Introduction to Vehicular Adhoc Networks
(03)
Security in wireless Networks
Vulnerabilities, Security techniques, Wi-Fi Security, IEEE 802.11x and IEEE 802.11i standards, DoS (08)
in wireless communication
COURSE OUTCOME
After completion of course, students would be able to:
• Grasp the concepts and characteristics of wireless signals and transmission channels
• Understand various types of multiple radio access techniques, cellular and underlying propagation and
performance analysis concepts
• Identify the various design issues of WLAN, its architecture and related issues
• Understand the working principles and design issues of various wireless networks
TEXTBOOK(s):
1. Schiller J., Mobile Communications, Addison Wesley (2000).
REFERENCE(s):
1. Stallings W., Wireless Communications and Networks, Pearson Education (2005).
2. Stojmenic Ivan, Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons Inc (2002).
3. Yi Bing Lin and Imrich Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons Inc, (2000).
4. Pandya Raj, Mobile and Personal Communications Systems and Services, PHI (2004)
Course Name ADVANCED TOPICS IN DATABASE SYSTEMS
Course Code CSN506
Credits 3
LTP 300
Pre-Requisites Knowledge of relational database management systems
OUTCOME
After completion of course, students would be able to:
1. Analyze the advanced concepts along with their application areas
2. Implement applications based on decision support systems
3. Implement advanced concepts of databases to resolve various research issues
4. Design efficient algorithms to solve various database problems
5. Design recovery protocols for distributed databases and parallel database architectures
REFERENCE(s):
1. Abraham Silberschatz, Henry F. Korth, S. Sudarshan: Database System Concepts, 6th Edition, McGrawHill,2010.
2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition,McGraw-Hill,2003
3. Elmasri and Navathe: Fundamentals of Database Systems, Pearson Education, 2007.
4. Connolly and Begg: Database Systems, 4th Edition, Pearson Publications, 2005.
Course Name SOFTWARE QUALITY MANAGEMENT
Course Code CSN507
Credits 3
LTP 300
Pre-Requisites -
Trend Analysis: Error quantity, error frequency, program unit complexity, compilation frequency. 10
Corrective action as to Cause: Identifying the requirement for corrective action, determining the action
to be taken, implementing the corrective action, documenting the corrective action, periodic review of
actions taken.
12
CASE tools and their effect on Software Quality: Software Quality Metrics, Standards, certification
and assessment, Quality management standards, Quality standards with emphasis on ISO approach,
Capability Maturity Models-CMM and CMMI, TQM Models, Bootstrap methodology, The SPICE
project, ISO/IEC 15504, Six Sigma Concept for Software Quality.
COURSE OUTCOME
After completion of course, students would be able to:
• To develop ability to analyze the relations among software product, process and project in quality assurance and
management.
• To describe and apply professional practices in managing the development of quality software.
• Explain and plan quality assurance activities in software projects.
• To understand the relationships between software process improvement and software quality management
TEXTBOOK(s):
1. Mordechai Ben-Manachem, Garry S. Marliss, Software Quality: Producing Practical, Consistent Software,
International Thomson Computer Press.
REFERENCE(s):
1. Daniel Galin, Software Quality Assurance from Theory to Implementation, Pearson Education.
2. Robert Dunn, Software Quality: Concepts and Plans, Prentice Hall.
3. Watts Humphery, A discipline for Software Engineering, Addison Wesley, Massachusetts.
4. Kamna Malik, Praveen Choudhary, Software Quality - A Practitioner’s Approach, Tata McGraw Hill.
COURSE OBJECTIVE
• To further the state of the art on the theoretical and practical aspects of developing declarative programming
tools in logic programming, functional programming and constraint logic programming.
• Introduction into formal concepts used as a theoretical basis for both paradigms, basic knowledge and practical
experience.
COURSE OUTCOME
After completion of course, students would be able to:
• Understanding of the theory and practice of functional and logic programming.
• The ability to write functional and logic programs.
• The ability to solve problems in and using functional and logic programming.
TEXTBOOK(s):
1. John Kelly, “The Essence of Logic”, Prentice-Hall India.
2. Saroj Kaushik, “Logic and Prolog Programming”, New Age International ltd
REFERENCE(s):
1. Tasami Hagiya and Philip waddle, “Functional and Logic Programming” ,8/E, 2006
2. Testsuo Ida,Atsushi ohori and Masato Takichi, “Functional and Logic Programming”, 2006
3. Chang, C.L and Lee R.C .T, “Symbolic Logic and Mechanical theorem proving”, Academic Press, New York,
2006
4. J.W. Lloyed, Springer Verlog, “Foundation of logic programming”, New York, 2/E, 1987
COURSE OUTCOME
After completion of course, students would be able to:
1. Understand the advanced concepts of computer architecture.
2. Investigate modern design structures of Pipelined and Multiprocessors systems.
3. Understand the interaction amongst architecture, applications and technology
TEXTBOOK(s):
1. Advanced Computer Architectures - A Design space approach, Dezso Sima, Terence Fountain, Peter Kacsuk,
Pearson Education 1997.
REFERENCE(s):
1. K Hwang, Advanced Computer Architecture, Tata McGraw-Hill Education, 2003
2. David E. Culler, Jaswider Pal, Parallel computer Architecture, Gulf Professional Publishing, 1999
3. John L. Hennessy and David A. Patterson, Computer Architecture: A Quantitative Approach, Third Edition,
Morgan Kaufmann, May 2002.
4. High-performance Computer Architecture, by Harold Stone Addison Wesley (1993) 3rded.
5. Parallel Computer Architecture: A Hardware/Software Approach David Culler and J.P. Singh with Anoop Gupta,
Morgan Kaufmann (August 1998).
COURSE OBJECTIVE
• To learn about the concepts and principles of mobile computing
• To explore both theoretical and practical issues of mobile computing
• To develop skills of finding solutions for mobile computing applications
• To perform research in upcoming technologies of mobile computing
COURSE OUTCOME
After completion of course, students would be able to:
• Grasp the concepts and features of mobile computing technologies and applications
• Have a good understanding of how the underlying wireless and mobile communication networks work, their
technical features, and what kinds of applications they can support
• Identify the important issues of developing mobile computing systems and applications
• Organize the functionalities and components of mobile computing systems into different layers and apply various
techniques for realizing the functionalities
TEXTBOOK(s):
1. Theodore S. Rappaport, Wireless Communications: Principles and Practice, Second Edition, Prentice Hall,
2002.
2. Ivan Stojmenovic, Handbook of Wireless Networks and Mobile Computing, John Wiley & Sons, 2002.
REFERENCE(s):
1. Mohd. Ilyas & Imad Mahgoub, Mobile Computing Handbook, CRC Press/Aurbach Publications, ISBN 0-
8493-1971-4, Boca Raton USA, 2005
2. Reza B’Far, Mobile Computing Principles: Designing and Developing Mobile Applications with UML and
XML, Cambridge University, 2004
3. Reto Meie, Professional Android Application Development (Wrox Programmer to Programmer), Wrox, 2008
4. Axel Küpper, Location-Based Services: Fundamentals and Operation, Wiley, 2005.
COURSE OBJECTIVE
• To learn about the concepts and principles of distributed computing systems
• To explore both theoretical and practical issues of distributed computing systems
• To develop skills of finding solutions for distributed computing applications
• To perform research in upcoming technologies of distributed computing
12
REMOTE INVOCATION, INTER-PROCESS COMMUNICATION AND FILE
SYSTEM
Communication between distributed objects, Remote Procedure Call, Remote Object
Invocation, Events and notification, Message-and Stream-oriented communication, Message
passing communication, Remote procedure call. Inter-process communication: Transaction
communication, Group communication, Broadcast atomic protocols, File service architecture.
Sun NFS. Recent advances. Case Studies: CORBA, DCOM
COURSE OUTCOME
After completion of course, students would be able to:
• Explain the need to design a distributed system and its desired properties
• List the principles underlying the functioning of distributed systems, describe the problems and challenges
associated with these principles and evaluate the effectiveness and shortcomings of their solutions
• Design a distributed system that fulfills requirements for desired properties
• Describe and distinguish synchronization and concurrency control for a distributed computing system
• Design algorithms on various issues like mutual exclusion, fault-tolerance, commit etc.
TEXTBOOK(s):
1. Distributed Systems: Concepts and Design - George Coulouris, Jean Dollimore, and Tim Kindberg.
2. A.D. Kshemkalyani, M. Singhal, Distributed Computing: Principles, Algorithms, and Systems, ISBN:
9780521189842, Cambridge University Press, March 2011.
REFERENCE(s):
1. Distributed Systems: Principles and Paradigms - Andrew Tanenbaum and Maarten van Steen, Prentice Hall, 2007.
2. Distributed Algorithms by Nancy Lynch, Morgan Kaufman Press
3. Elements of Distributed Computing - Vijay K. Garg, Wiley, 2002.
4. Research Papers
COURSE OBJECTIVE
• To study a modern operating system in detail.
• To study the architecture of distributed systems and real time operating systems.
• To introduce the theory and implementation of advanced operating systems
INTRODUCTION (02)
Functions of Operating system, Design approaches, Why advanced operating systems,
Types of advanced operating systems, Synchronization mechanisms.
COURSE OUTCOME
After completion of course, students would be able to:
• Describe the architecture of distributed and real time operating systems.
• To describe, contrast and compare deferring structures for operating systems
REFERENCE(s):
1. M Singhal and NG Sivaratri, Advanced Concepts in Operating Systems, Tata McGraw, Hill Inc., 2001.
2. Silberschatz and P. Galvin, Operating System Concepts, VI edition, Addison Wesley 2004.
3. A.S. Tanenbaum, Distributed Operating System, Pearson Education Asia, 2001.
4. A. S. Tanenbaum and M. V. Steen, Distributed Systems – Principles and Paradigms, Second Edition, Pearson
Prentice Hall, 2007.
5. Modern Operating Systems by A. Tanenbaum, 1992, Prentice-Hall.
6. Operating Systems Internals and Design Principles by William Stallings, 4 ed., 2001, Prentice-Hall
Course Name BUSINESS INTELLIGENCE
Course No. CSN513
Credits 03
LTP 300
Pre-requisites
COURSE OUTCOME
After completion of course, students would be able to:
1. Describe the components of a Enterprise data warehouse, Model the relational database required for an enterprise
data warehouse.
2. To extract, cleanse, consolidated, and transform heterogeneous data into a single enterprise data warehouse and
analyze data to generate information and knowledge that lead to informed decisions for businesses.
3. To perform “what-if” analysis in real time and will also be able to show how ERP business intelligence can be
derived from data warehouses. Student will also be able to create standard reports for business users and derive
insightful trends using data mining techniques.
TEXTBOOK(s):
1. Fundamentals of Business Intelligence by R. N. Parsad and Seema Acharya, Wiley
REFERENCE(s):
1. Business Intelligence by David Loshin
2. Business intelligence for the enterprise by Mike Biere
3. Business intelligence roadmap by Larissa Terpeluk Moss, Shaku Atre
4. An introduction to Building the Data Warehouse – IBM
5. Business Intelligence For Dummies – Swain Scheps
6. Successful Business Intelligence: Secrets to making Killer BI Applications by Cindi Howson
Information dashboard design by Stephen Few
COURSE OUTCOME
After completion of course, students would be able to:
• understand and practice the process of project management and its application in delivering successful Software
projects;
• Evaluate a software project to develop the scope of work, provide accurate cost estimates and to plan the various
activities;
• Understand and use of risk management analysis techniques that identify the factors that put a project at risk and to
quantify the likely effect of risk on project timescales;
• identify the resources required for a project and to produce a work plan and resourceschedule;
• monitor the progress of a project and to assess the risk of slippage, revising targets or counteract drift;
• distinguish between the different types of project and follow the stages needed to negotiate an appropriate contract.
TEXTBOOK(s):
1. A GUIDE TO THE PROJECT MANAGEMENT BODY OF KNOWLEDGE (PMBOK® Guide) –Fifth Edition
REFERENCE(s):
1. Pankaj Jalote, Software Project Management in Practice, Pearson Education Asia (2002).
2. Bob Hughes and Mike Cotterell, Software Project Management, Tata McGraw Hill Publishing Company Ltd., New
Delhi (2006) 3rd ed.
3. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall, New Jersey (1982).
4. Watts S. Humphrey, Winning with Software An Executive Strategy, Pearson Education Asia (1998).
5. Philip Metzger, Managing A Programming Project, Prentice Hall, New Jersey (1983).
6. Tom Glib, Finzi Susannah, Principles of Software Engineering Management, Addison Wesley, England (2000).
7. Gopalaswamy Ramesh , Global Software Project Management, Tata McGraw Hill.
Course Name DESIGN OF EXPERIMENTS & RESEARCH METHODOLOGY
Course Code CSN520
Credits 03
LTP 300
Pre-Requisites --
Total Number of Lectures:42
COURSE OBJECTIVE
• To understand some basic concepts of research and its methodologies
• To select and define appropriate research problem and Parameters
• To organize and conduct research in a more appropriate manner
• To understand statistical methods to formulate hypotheses
• To prepare a project proposal
• To write a research report
COURSE OUTCOME
After completion of course, students would be able to:
• To define research and describe the research process and research methods
TEXTBOOK(s):
1. Probability and Statistics for Engineers and scientists, Walpole, Myers, Myers and Ye, 8th ed Pearson Education
2. Research methodology- methods and techniques, C.R. Kothari New Age International publisher
REFERENCE(s):
1. Adrian Wallwork ,English for writing research papers, Springer;
2. Charles X Ling, Quang Yang, Crafting your research Future , Morgan & claypool Publishers;
COURSE OUTCOME
After completion of course, students would be able to:
• To develop testable software.
• Will develop testing psychology
• The importance of Software Testing in various phases of Software Development.
• To generate test cases effectively from Requirements, Design Models, Code etc.
• To generate test cases automatically.
• To apply various test cases to industrial applications.
TEXTBOOK(s):
1. Boris Beizer, Software Testing Techniques, John Wiley & Dreamtech.
REFERENCE(s):
1. William E. Perry, Effective Methods for Software Testing, John Wiley & Sons.
2. Aditya P. Mathur, Foundations of Software Testing, Pearson Education.
3. Glenford J. Myers, The Art of Software Testing, Wiley India Pvt. Ltd.
4. John D. McGregor & David A, A practical guide to testing object-oriented software, Addison- Wesley object
technology series.
Course Name SPECIAL TOPICS IN SOFT COMPUTING
Course Code CSN522
Credits 3
LTP 300
Pre-Requisites Artificial Intelligence
APPLICATIONS (10)
GA application to power system optimization problem, Identification and control of linear and
nonlinear dynamic systems, stability analysis of Fuzzy control systems.
COURSE OUTCOME
After completion of course, students would be able to:
• Identify and describe soft computing techniques and their roles in building intelligent machines
• Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems
• Apply genetic algorithms to combinatorial optimization problems
• Apply neural networks to pattern classification and regression problems
• Evaluate and compare solutions by various soft computing approaches for a given problem.
REFERENCE(s):
1. S. Russel and P. Norvig, “Artificial Intelligence: A Modern Approach”, Prentice Hall.
2. David.E. Goldberg, ”Genetic Algorithms in search, optimization and Machine Learning”, Pearson Education India
3. Elaine Rich, Kevin Knight, “Artificial Intelligence”, Mc-Raw Hill.
4. Kosko.B. “Neural Networks and Fuzzy Systems”, Prentice Hall of India Pvt. Ltd., 1994.
Course Name DATA WAREHOUSING AND MINING
Course Code CSN524
Credits 3
LTP 300
Pre-Requisites Knowledge of Database Design and SQL
COURSE OUTCOME
After completion of course, students would be able to:
• Demonstrate the knowledge gained through solving problems
• Use of data mining tools during Projects to build reliable products, the current demand of the industry.
TEXTBOOK(s):
1. Data Mining – Concepts and Techniques - JIAWEI HAN & MICHELINE KAMBER Harcourt India.
REFERENCE(s):
1. Data Warehousing in the Real World – SAM ANAHORY & DENNIS MURRAY. Pearson Ed. Asia.
2. Data Warehousing Fundamentals – PAULRAJ PONNAIAH. WILEY STUDENTEDITION
3. The Data Warehouse Life cycle Tool kit – RALPH KIMBALL. WILEY STUDENTEDITION
4. Data Mining Introductory and advanced topics –MARGARET H DUNHAM. PEARSON EDUCATION
OBJECT RECOGNITION 06
Hough transforms and other simple object recognition methods, Shape correspondence and shape
matching, Principal component analysis, Shape priors for recognition.
CASE STUDY 06
Study of industrial applications, medical applications, etc. using computer vision methods.
COURSE OUTCOME
After completion of course, students would be able to:
• Understand the various edge detectors and Implement several image filtering algorithms.
• Understand the different ways that the shape of an object can be represented.
• Analyze image segmentation, representation, description, and recognition techniques
TEXTBOOK(s):
1. D. Forsyth, J. Ponce, “Computer Vision-A modern approach”, Prentice Hall of India
2. R. Gonzalez and R.E. Woods, “Digital Image Processing”, Pearson Education.
REFERENCE(s):
1. B.K.P Horn, “Robot Vision”, McGraw Hill.
2. E. Trucco and A. Verri, “Introductory techniques for 3D computer vision”, Prentice Hall
Formal Methods: Basic concepts, mathematical preliminaries, Applying mathematical notations for 06
formal specification, formal specification languages, using Z to represent an example software component,
the ten commandments of formal methods, formal methods- the road ahead.
Client/Server Software Engineering: The structure of client/server systems, software engineering for c/s 06
systems, analysis modeling issues, design for c/s systems, testing issues.
Web Engineering: The attributes of web-based applications, the WebE process, a framework for WebE, 07
formulating/analyzing web-based systems, design for web-based applications, testing web-based
applications, management issues.
Reengineering: Business process reengineering, software reengineering, reverse reengineering, 05
restructuring, forward reengineering, economics of reengineering.
Software Changes Impact Analysis: Software Changes analysis, Software Clones Detection, Automated 05
Test Cases Generation, Latest Trends. Various certifications in software engineering.
COURSE OUTCOME
After completion of course, students would be able to:
• Recognize the limitations of current approaches and systems and identify unsolved problems in Software Engineering
• Apply any implementations of recent developments e.g. tools, languages, techniques or frameworks etc.
• Build prototype or proof of concept tools to demonstrate and/or evaluate recent developments
• Read, review, and critically appraise software engineering research papers
REFERENCE(s):
1. Roger S. Pressman, Software Engineering a Practitioners Approach, McGraw-Hill..
2. J. Bowan, Formal Specification and Documentation using Z - A Case Study Approach, International Thomson Computer
Press.
3. Antoni Diller, Z., An Introduction to Formal Methods (second edition), Wiley, 2ndedition.
4. M. Dyer, The Cleanroon Approach to Quality Software Development, Wiley.
5. Prowell, S., Trammell, C.J. and Poore, J.H, Cleanroom Software Engineering: Technology and Process, Addison-Wesley,
Massachusett.
6. Allen, Frost, Yourdon, Component-Based Development for Enterprise Systems: Applying the Select Perspectives,
Cambridge University Press.
7. Zantinge and Adriaans, Managing Client/Server, Addison-Wesley.
COURSE OBJECTIVE
• To describe the ways in which multimedia information is captured, processed, and rendered.
• To discuss the ways in which multimedia data is transmitted across networks
• To introduce Storage Media and Data Compression techniques.
COURSE OUTCOME
After completion of course, students would be able to:
• Understand the relevance and underlying infrastructure of the multimedia systems.
• Understand core multimedia technologies and standards
• Understand various multimedia document interchange formats.
REFERENCE(s):
1. P.K. Andleighand K. Thakrar, Multimedia System Design
2. R. Steinmetz and K. Nashtedt, Multimedia Computing, Communication & Applications
3. Li and Drew, Fundamentals of Multimedia
4. F. Hulshall, Multimedia Communication
5. S. Fisher, Multimedia Authoring: Building and Developing Documents
Course Name HIGH PERFORMANCE COMPUTER ARCHITECTURE
Course Code CSN528
Credits 3
LTP 300
Pre-Requisites UG level course in Computer Architecture
COURSE OBJECTIVE
• The main objective of this course is to provide students with an understanding and appreciation of the fundamental
issues and tradeoffs involved in the design and evaluation of modern computers.
• Topics will include, design and evaluation of instruction set architectures, pipelining techniques, multi-level memory
hierarchies, superscalar processor design, multi-threading and multi-processing.
MEMORY HIERARCHIES
Inclusion, Coherence and locality properties; Cache memory organizations, Techniques for reducing (07)
cache misses; Virtual memory organization, mapping and management techniques, memory replacement
policies.
COURSE OUTCOME
After completion of course, students would be able to:
• understand modern memory system design techniques including single and multi-level cache and virtual memory
• Understand processor pipeline issues, including pipeline hazards and associated mitigation techniques.
• understand the advanced scheduling techniques and instruction-level parallelism used in modern super-scalar
processors.
• understand relevant design issues for multiprocessor systems, including cache coherency issues
TEXTBOOK(s):
1. Advanced Computer Architectures - A Design space approach, Dezso Sima, Terence Fountain, Peter Kacsuk,
Pearson Education 1997.
REFERENCE(s):
1. K Hwang, Advanced Computer Architecture, Tata McGraw-Hill Education, 2003
2. David E. Culler, Jaswider Pal, Parallel computer Architecture, Gulf Professional Publishing, 1999
3. John L. Hennessy and David A. Patterson, Computer Architecture: A Quantitative Approach, Third Edition,
Morgan Kaufmann, May 2002.
Laboratory:
The lab work will be based on the setting up of network firewalls, Intruder Detection systems,
security and performance analysis of basic cryptography algorithms and digital signature algorithms,
tcpdump.
COURSE OUTCOME
After completion of course, students would be able to:
1. Evaluate vulnerability of an information system and establish a plan for risk management.
2. Demonstrate basic principles of Web application security
3. Evaluate the authentication and encryption needs of an information system.
4. Demonstrate how to secure a network
5. Evaluate a company’s security policies and procedures
TEXTBOOK(s):
1. Computer Security: Principles and Practice, William Stallings; Lawrie Brown
REFERENCE(s):
1. Introduction to Computer Security, 2004 Matt Bishop, Addison-Wesley, ISBN 0-321-24744-
2. Buchmann J. A., Introduction to Cryptography, Springer Verlag (2001).
3. Stallings William, Cryptography and Network Security, Pearson Education (2006).
4. Schneier Bruce, Applied Cryptography, John Wiley and Sons (1996).
5. Britz M., Computer Forensic and cyber crime, Upper Saddle River, Prentice Hall (2003).
COURSE OBJECTIVE
1. Provide an introduction to basic number theory, with a focus on computational aspects with applications in
cryptography.
2. Understand basic design principals of symmetric and asymmetric cryptography, what makes certain designs weak
and why key lengths are not always indicators of a systems security;
3. Learn how many standard cryptanalytic attacks work and thereby how to avoid common design flaws;
4. Specify how cryptographic tools are applied to achieve privacy and authentication
5. To understand hash functions and existing techniques like AES, RSA, and Discrete Log.
6. To emphasize algorithmic complexity and understand security vs performance trade off.
Cryptographic Protocols
Introduction to Protocols, Communications using Symmetric Cryptography, One-Way Functions, (08)
Communications using Public-Key Cryptography, Digital Signatures, Digital Signatures with Encryption,
Random and Pseudo-Random Sequence Generation, Basic Protocols: Key Exchange, Authentication,
Authentication And Key Exchange, Formal Analysis Of Authentication And Key-Exchange Protocols,
Multiple-Key Public-Key Cryptography.
Cryptographic Techniques (10)
Key Length & Management: Symmetric Key Length, Public-Key Key Length, Comparing Symmetric
And Public-Key Key Length, , Generating Keys, Nonlinear Keyspaces, Transferring Keys, Verifying
Keys, UPDATING KEYS, Storing Keys, Backup Keys.
COURSE OUTCOME
After completion of course, students would be able to:
1. Students should be able to apply the basic rules of public key and symmetric encryption for practical cryptographic
problems.
2. Be able to demonstrate the design and use of hash functions, digital signatures, and key distribution with a wide
range of key types.
3. Be able to understand the current popular techniques of AES and RSA, digital signatures and key establishment
protocols.
4. Given a problem in cryptography, be able to design an algorithm to implement the solution to that problem.
TEXTBOOK(s)
1. Applied Cryptography protocols, algorithms, and source code in C, Second Edition, Bruce Schneier, John
Wiley & Sons, 1996.
REFERENCE(s)
1. Handbook of Applied Cryptography, by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, CRC
Press ISBN: 0-8493-8523-7 , October 1996.
COURSE OBJECTIVE
1. Examine how the online world has borne new crimes and law enforcement response.
2. Investigate how the computer has become both a target of attack and a tool for criminal activity
3. Analyze the usage of internet as a tool of crime in cyber space
4. Explore through various case studies the number of emerging cybercrimes (cyber-stalking, hacking, and attacks to
critical infrastructure), and also explores how old crimes are affected in new mediums
5. Gain insights to application of IT Laws for different types of cyber crimes
COURSE OUTCOME
After completion of course, students would be able to:
1. Analyze various types of cyber crime and formulate real world cyber crime investigations
2. Understand the unique challenges posed to law enforcement agents, policy makers and prosecutors
3. Ability to find solutions in cyber crime investigations, evidence and applicable law for real world case studies
4. Analyze the software tools and methods currently available for finding illegal activities on computer disks and in
computer networks.
5. Analyze the criminal activity on the Internet and propose available tools to prevent such activity.
TEXTBOOK(s):
1. Handbook of Cyber Laws, by Vakul Sharma ,Macmillan.
REFRENCE(S):
1. Articles in various journals and conference proceedings
COURSE OBJECTIVE
(02)
Security Policy
Firewalls Are Policy, How to Develop Policy, Perimeter Considerations
Virtual Private Networks (03)
VPN Basics, Advantages and Disadvantages of VPNs, IPSec Basics
(04)
Network Intrusion Detection & Prevention Systems
Network Intrusion Detection Basics, the Roles of Network IDS in a Perimeter Defense, IDS Sensor
Placement, IPS, IPS Limitations, NIPS, Host-Based Intrusion Prevention Systems, Case Studies
(08)
Host Hardening & Defense Components
The Need for Host Hardening, Removing, Disabling or Limiting Access of Unnecessary Programs or
Data and Configuration Files, Controlling User and Privileges, hardening hosts and the Perimeter,
Antivirus Software, Host-Based Firewalls, Host-Based Intrusion Detection, Challenges of Host Defense
Components, Preventing TCP/UDP exploits from DoS attacks.
(07)
Designing a Secure Network Perimeter
The Role of a Router, The Router as a Perimeter & Security Device, Router Hardening, Fundamentals
of Secure Perimeter Design, Gathering Design Requirements, Design Elements for Perimeter Security,
Separating Resources, Security Zones, Common Design Elements, VLAN-Based Separation
(04)
Maintaining a Security Perimeter
System and Network Monitoring, Incident Response, Accommodating Change
(04)
Network Log Analysis
The Importance of Network Log Files, Log Analysis Basics, Analyzing Router Logs, Analyzing
Network Firewall Logs, Analyzing Host-Based Firewall and IDS Logs
COURSE OUTCOME
After completion of course, students would be able to:
1. Gain insight to fundamentals of network vulnerabilities and attacks.
2. Demonstrate the skill to penetrate service vulnerability.
3. Implement, monitor and maintain a secure networks consisting of network devices such as routers, switches and
firewalls.
4. Gain understanding in the role of AAA and IPSec in securing networks.
5. Design network policies in securing the perimeter of a network
6. Learn to design/develop/ implement security policies, strategies and the security solution for a given use case.
TEXTBOOK(s):
1.Inside Network Perimeter Security,Second Edition, Stephen Northcutt; Lenny Zeltser; Scott Winters;
Karen Kent; Ronald W. Ritchey, Sams
REFERENCE(s):
1. Network Perimeter Security: Building Defense In-Depth ,Cliff Riggs, Proteris Group, Waterbury,
Vermont, USA
2. W. Stallings, Network Security Essentials (3rd Edition), Prentice-Hall, 2007
3. W. R. Stevens, TCP/IP Illustrated, Vol. 1: The Protocols, Addison-Wesley, 1993
4. D. E. Comer, Internetworking with TCP/IP, Vol.1 (4th Edition), Prentice Hall, 2000
5. R. Oppliger, Internet and Intranet Security (2nd edition), Artech House, 2002
6. W. R. Cheswick and S.M. Bellovin, Firewalls and Internet security (2nd edition), Addison-Wesley, 2003.
COURSE OBJECTIVE
1. Cover a broad range of approaches to biometrics reflecting both fundamental principles and the current state-of-the-
art practices.
2. To develop an understanding of the fundamental components common to all biometric systems.
3. To develop the student’s ability to design, implement, test and evaluate biometric systems that conform to
international standards.
4. To develop the students ability to carry out research in biometrics
Biometrics Introduction
Benefits of biometrics over traditional authentication systems, benefits of biometrics in identification 07
systems, comparison of various biometric traits, selecting a biometric for system, Applications. Key
biometric terms and processes, biometric verification and identification, how biometric matching
works, Accuracy in biometric systems, Metrics for evaluating biometric systems: FAR, FRR, ERR etc.
Physiological Biometric Technologies
Fingerprints: Technical description, characteristics, Competing technologies, strengths, weaknesses and (15)
deployment.
Facial scan: Technical description, characteristics, weaknesses and deployment.
Iris scan: Technical description, characteristics, strengths, weaknesses and deployment.
Retina vascular pattern: Technical description, characteristics, strengths, weaknesses and deployment.
Hand scan: Technical description, characteristics, strengths, weaknesses and deployment.
Behavioral Biometric Technologies
Handprint Biometrics, Signature and handwriting technology: Technical description, classification, (10)
keyboard /keystroke dynamics, Voice: data acquisition, feature extraction, characteristics, strengths,
weaknesses, deployment
Multi biometrics
Multi-modal biometric Systems: Face and Hand geometry, Fingerprint and iris recognition etc, (05)
Multimodal fusion techniques- score fusion, z-norm fusion etc., Normalization techniques
COURSE OUTCOME
After completion of course, student would be able to:
1. Modern biometric technologies and the generic components of a biometric system.
2. Pattern recognition and feature extraction in biometrics, Voice and face recognition systems.
3. Select the most appropriate biometric for a given application.
4. Work with signal and image acquisition systems, Deploying biometric systems.
5. Defend proposed biometric systems for a given real world problem and analyze its security aspects.
TEXTBOOK(s):
1. Anil K. Jain, Michigan State University, USA, Patrick Flynn University of Notre Dame, USA, Arun A. Ross
West Virginia University, USA , “Handbook of Biometrics”, 2008.
REFERENCE(s):
1. Implementing Biometric Security (Wiley Red Books)by John Chirillo, Scott Blaul.
2. Anil K. Jain Michigan State University, E. Lansing, Michigan and Ruud Bolle and Sharath Pankanti IBM, T.J.
Watson Research Center Yorktown Heights, New York Kluwer Academic ,” Biometrics Personal Identification
in Networked Society”, 2002 Kluwer Academic Publishers New York, Boston, Dordrecht, London, Moscow.
3. Articles in various journals and conference proceedings.
COURSE OBJECTIVE
1. An overview of the concepts, processes, and best practices needed to successfully secure information within
Cloud infrastructures.
2. Students will learn the basic Cloud types and delivery models and develop an understanding of the risk and
compliance responsibilities and Challenges for each Cloud type and service delivery model.
3. The student will also learn how to apply trust-based security model to real-world security problems.
4. The course provides guidance for building private Clouds and a lab exercise where the student will implement
a public cloud using a 3rd party provider’s interface
COURSE OUTCOME
After completion of course, students would be able to:
1. Identify security aspects of each cloud model
2. Develop a risk-management strategy for moving to the Cloud
3. Implement a public cloud instance using a public cloud service provider
4. Apply trust-based security model to different layers in the infrastructure stack
5. Distinguish between cloud providers and 3rd party managed service providers
TEXTBOOK(s):
1. Cloud Computing Explained: Implementation Handbook for Enterprises, John Rhoton, Publication Date:
November 2, 2009
REFERENCE(s):
1. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice), Tim
Mather, ISBN-10: 0596802765,O'Reilly Media, September 2009
2. Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, Publisher: O'Reilly
Media; 1 edition (April 10, 2009), ISBN-10: 0596156367, ISBN-13: 978-0596156367
3. Cloud Computing Bible by Barrie Sosinsky (Jan 11, 2011), Wiley Publication, ISBN-10: 0470903562
4. Introduction to Cloud Computing by Timothy Chou (Dec 27, 2010)
COURSE OUTCOME
After completion of course, students would be able to:
1. Architect a secure wireless network infrastructure for their organization, including strong encryption and
centralized authentication;
2. Gain insight to the hackers threats and the major techniques used against hacking wireless networks;
3. Master hacking and vulnerability assessment tools to assess the security of wireless networks, including
cracking WEP and WPA security;
4. Identify (and fix) vulnerabilities and mis-configurations in wireless network technologies;
TEXTBOOK(s):
1. Wireless and Mobile Network Security-Security basics, Security in On-the-shelf and emerging
technologies,Hakima Chaouchi, Maryline Maknavicius, ISBN: 9781848211179, June 2009, Hardback
REFERENCE(s):
1. Mobile and Wireless Network Security and Privacy, Springer, ISBN: 0387710574, edition 2007