0% found this document useful (0 votes)
85 views22 pages

Third Semester MCA

This document outlines the third semester course schedule for a computer science program. It includes 9 courses totaling 26 credits over 34 working hours. The courses cover topics like data mining, computer networks, Linux programming, artificial intelligence, advanced web technologies, cloud computing, software testing and quality assurance, and soft skills. Practical courses include Linux lab and computer networking lab using NS2 simulation tool. The document provides objectives, outcomes, contents and book references for the "Data Mining and Data Warehousing" course.

Uploaded by

VaiSh CH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views22 pages

Third Semester MCA

This document outlines the third semester course schedule for a computer science program. It includes 9 courses totaling 26 credits over 34 working hours. The courses cover topics like data mining, computer networks, Linux programming, artificial intelligence, advanced web technologies, cloud computing, software testing and quality assurance, and soft skills. Practical courses include Linux lab and computer networking lab using NS2 simulation tool. The document provides objectives, outcomes, contents and book references for the "Data Mining and Data Warehousing" course.

Uploaded by

VaiSh CH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Third Semester

Sl. HC/S Credit Pattern


No C Wor
Code Title FC Credits king
L T P Hrs

M18CA3010 4
1 Data Mining and Data Warehousing HC 2 1 0 3
M18CA3020 4
2 Computer Networks HC 4 0 0 4
M18CA3030 4
3 Linux Programming HC 2 1 0 3
M18CA3040 4
4 Artificial Intelligence HC 4 0 0 4
M18CA3051
Advanced Web Technology
5 SC 2 0 1 3 4
M18CA3052
Advanced Database Systems
M18CA3061
Cloud Computing
6 SC 2 0 1 3 4
M18CA3062
Software Testing and Quality Assurance

7 M18CA3070 Soft Skills RULO 2 0 0 2 2

Practical Courses

8 M18CA3080 Linux Lab HC 0 0 2 2 4

9 M18CA3090 Computer Networking Lab using NS2 HC 0 0 2 2 4

Total Credits 18 2 6 26 34

THIRD SEMESTER
DATA MINING AND DATA WAREHOUSING

Course Code: M18CA3010 Total Credits: 3


Total Hrs: 60 L: T: P – 2:1:0

COURSE OBJECTIVES:

 To understand Data Mining principles and techniques and introduce Data Mining as a
cutting edge business intelligence.
 To discover interesting patterns, to analyze supervised and unsupervised models and
estimate the accuracy of the algorithms.
 To identify Applications and Trends of Data mining.
 To expose the students to the concepts of Data Warehousing Architecture and
Implementation.

COURSE OUTCOMES:
Upon Completion of the course, the students will be able to,
 Discover and measure interesting patterns from different kinds of databases.
 Evolve Multidimensional Intelligent model from typical system.
 Discover the knowledge imbibed in the high dimensional system.
 Evaluate various mining techniques on complex data objects.

COURSE CONTENTS:

UNIT 1:Data Mining & Techniques 15 Hours

Data Mining: Introduction, Basic data mining tasks, data mining versus knowledge discovery in
databases, Data mining issues, Data mining metrics, Social implications of data mining, Data
mining from a database perspective. Data Mining Techniques: Introduction – A Statistical
Perspective on data mining – Similarity Measures – Decision Trees.

UNIT 2:Classification, Clustering 15 Hours

Classification: Introduction, Issues in Classification, Statistical, based algorithms, Distance,


based algorithms, Decision tree, based algorithms, Neural network, based algorithms, Rule-based
algorithms, Combining techniques.
Clustering: Similarity and Distance Measures, Outliers, Hierarchical Algorithms:
Agglomerative Algorithms, Divisive Algorithms, Partitional Algorithms: Minimum Spanning
Tree, Squared Error Clustering algorithm, K-Means Clustering, Nearest neighbor algorithm,
PAM algorithm, Bond Energy algorithm, Clustering with neural networks, clustering with
genetic algorithms.

UNIT 3: Association rules& Applications 15 Hours


Association rules: Introduction - Large item sets - Basic algorithms: Apriori algorithm,
Sampling Algorithm, Partitioning, Parallel and Distributed algorithms, Advanced Association
Rules Techniques, Measuring the quality of rules.
Data Mining Applications: Data Mining for Financial Data Analysis , Data Mining for the
Retail Industry, Data Mining for the Telecommunication Industry, Data Mining for Intrusion
Detection.

UNIT 4: Data Warehouse & Modeling 15 Hours


Basic concepts : What is a Data Warehouse, Differences between operational database systems
and Data Warehouses, Multi-tiered Architecture, Data Warehouse models, Extraction,
Transformation and Loading, Metadata repository.
Data Warehouse modeling: Data Cube and OLAP, Data cube: A Multidimensional Data model,
Schemas for multidimensional data models, Dimensions: The role of concept hierarchies,
Measures: Their categorization and computation, Typical OLAP operations.

TEXT BOOKS:
1. Margaret H. Dunham, “Data mining introductory and advanced topics”, Pearson education,
2003. [Units 1,2 and 3]
2. Jiawei Han, MichelineKamber&Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufmaan Publishers, 2011. [Unit 3 and 4]

REFERENCE BOOKS:
1. ArunK.Pujari, “Data Mining Techniques”, Universities Press (India) Pvt. Ltd., 2003.
2. Alex Berson, Stephen J. Smith, “Data warehousing, Data mining, & OLAP”, TMCH, 2001.
3. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition,
Prentice Hall of India, 2006.
4.Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2007.
COMPUTER NETWORKS

Course Code: M18CA3020 Total Credits: 4


Total Hrs: 60 L: T: P – 4:0:0

COURSE OBJECTIVES:

 The subject will introduce the basics of computer networks to students through a study of
layered models of computer networks and applications.
 To analyze the functions and design strategies of various layers.
 To understand network architectures and components required for data communication.
 To understand networking concepts and basic communication model.
 To gain knowledge of various application protocols standard developed for internet Layer

COURSE OUTCOMES:
After completion this course students will be able to
 Trace the flow of information from one node to another node in the network.
 Identify the components required to build different types of networks.
 Estimate the functionalities needed for data communication into layers
 Choose the required functionality at each layer for given application
 Understand the working principles of various application protocols
 Identify the security issues and services available.

COURSE CONTENTS:

UNIT 1: Introduction to Data communication & Network Models 15 Hours


Introduction: Data communications-components, transmission modes; Networks- Intranet,
Internet; Components of Network- Network hardware, Network software, types of addressing;
Network types-LAN, MAN, WAN; Network Topology, Network Architecture- Peer-Peer,
Client-Server, Distributed.
Reference Models: OSI reference Model, TCP/IP model, Comparison between OSI &TCP/IP;
Protocols & Network Standardization.
UNIT 2:Physical Layer 15 Hours
Definition, functionalities, guided transmission media, wireless transmission media, data
interface types- packet transmission, cell transmission; LAN transmission equipment – NIC,
Repeater, Hub, Bridge, Switch, Gateway; WAN transmission -Modems Router, Multiplexers;
Multiplexing –FDM, WDM, TDM; Switching techniques- message, circuit, packet switching;
LAN transmission methods: Ethernet.
UNIT 3: Data Link Layer 15 Hours
Definition, functionalities, Framing, Error correction & detection, Stop-and-wait protocol, Flow
control, Sliding-window protocol, Multiple access Protocol- ALOHA1‐ _persistent, p‐persistent
and non‐persistent; CSMA/CD & CSMA/CD; Collision free protocols.

UNIT 4: Network & Transport Layer 15 Hours


Network Layer: definition, functionalities, Routing Algorithm types, Static & Dynamic routing
algorithm-distance vector, link ‐ state, Congestion control algorithms, IP protocol- IPV4, IPV6;
Internet control protocol- ICMP, ARP.
Transport Layer: definition, functionalities, process-to-process delivery, TCP, UDP.

Text Books:
1. Data communications and Networking by Berhrouz A Forouzan , McGraw-Hill
Publication [Chapters: 1,23]
2. Computer Networks by Andrew S. Tanenbaum , Pearson Publication.[Chapters:
1,2,3,4,5&6]
3. A guide to designing & Implementing Local and wide area network by Michael Paimer,
Robert Bruce Sinclair, Thomson Publication. [Chapters:3,4,5]
4. Data and Computer Communications by William Stalling, Pearson Publication.

Reference Books:
1. W. Tomasi: Introduction to Data Communications and Networking, Pearson Education.
2. P.C. Gupta: Data Communications and Computer Networks, Prentice-Hall of India.

LINUX PROGRAMMING

Course Code: M18CA3030 Total Credits: 3


Total Hrs: 60 L: T: P – 2:1:0

COURSE OBJECTIVES:
 Introduce the student to Unix/Linux Kernel programming techniques
 Teach advanced C systems programming and debugging techniques in a Unix/Linux
environment.
 Review basic concepts covered in the core Operating Systems course prerequisite as they
are realized in the Linux platform.
 Discuss correct synchronization techniques for both application programs and kernel
code running on Unix process as well as multiprocessor platforms.
 Review basic concepts covered in the core Operating systems course
COURSE OUTCOMES:
 Describe the LINUX Operating Systems features.
 Discuss the fundamental LINUX system tools and utilities
 Write shell scripts in order to perform basic shell programming
 Describe the LINUX file systems.
 Describe the directory layout of a typical Linux system, and maintain and secure Linux
directories and files
 Use basic Linux commands.
 Use Linux pipes and file redirection efficiently to manipulate data.

COURSE CONTENTS:

UNIT 1:Linux Operating System 15 Hours


Overview : Linux history, Linux features, distributions, Operating Systems and Linux, difference
between Linux and Unix ,Linux software , Documentation .Getting Started : Install Issues
,Accessing Linux System ,the GNOME and KDE Desktops , Start up scripts, Linux Security,
Command line Interface, Help Resources ,Windows Access and Applications .

UNIT 2: Linux Files, Directories and Archives 15 Hours


Linux Files, File Structure, Types File and directory management commands, File and Directory
Operations, Archiving and Compressing Files , system calls , The shell History ,Features ,Types
of Shells
The Process: Process basic , Ps, Internal and External Commands , running jobs in background
,nice ,at and batch ,cron, time commands File name Extension ,Standard Input/ Output and
Redirection ,pipes : Pipes, FIFOs, System V IPC, Memory Management, library and system calls
for memory.

UNIT 3: Shell Scripts and Programming 15 Hours


Shell variable , shell commands, shell meta characters, file name substitution, command
substitution, the environment, quoting, test command, expr, read, set and shift control structures,
looping structure arithmetic in shell, shell script examples, Filters- Simple filter : pr, head, tail,
cut, paste ,sort ,uniq ,tr commands The grep family, advanced filters-sed and awk.

UNIT 4: System Administration 15 Hours


file permissions, file ownership, links-soft links and hard links , root, administrator’s privileges
,startup and shutdown ,Managing disk space ,GNOME Interface ,GNOME Desktop ,KDE
Desktop , KDE Menus, Quitting KDE ,Desktop Operation, Accessing System Resources from
the File Manager ,Desktop Like Files and URL Locations ,KDE Windows ,Virtual Desktops
Text Books:
1. Richard Petersen “The Complete Reference Linux “, sixth Edition Petersen TATA McGraw
HILL [Chapter 1,2,3,4,5]
2. Sumitabha Das, “Unix Concepts and Applications”, TMH, 4th Ed., 2009. 3. M>G
Venkateshmurthy,”Unix and Shell Programming “ Pearson Education
3. R. Stevens, “UNIX Network Programming”, PHI, 3rd Ed., 2008.

Reference Books:
1. Ellen Siever, Stephen Figgins, Robert Love, Arnold Robbins, “Linux in a Nutshell”, O'Reilly
Media, 6th Ed., 2009.
2. Neil Matthew, Richard Stones, Alan Cox, “Beginning Linux Programming”, 3rd Ed., 2004.
3. Robert Love, “Linux System Programming” ,O'Reilly Media, 2nd Ed., 2007.
4. Evi Nemeth, Garth Snyer, Trent R. Hein, “Linux Administrator Handbook”, Pearson, 2nd
Ed., 2007.
5. Mark G. Sobell, “A Practical Guide to Ubuntu Linux”, Pearson, 2nd Ed., 2008.
6. Cox K, “Red Hat Linux Administrator’s Guide”, PHI, 2001.

ARTIFICIAL INTELLIGENCE

Course Code: M18CA3040 Total Credits: 4


Total Hrs: 60 L: T: P – 4:0:0

COURSE OBJECTIVES:
 Familiarize students with Artificial Intelligence principles and techniques
 Introduce the facts and concepts of cognitive science by computational model and their
applications
 Explore problem-solving paradigms, search methodologies and learning algorithms

COURSE OUTCOMES:
On successful completion of this module, students should be able to:
 Apply knowledge of computing and mathematics appropriate to the discipline
 Analyze a problem, identify and define the computing requirements appropriate to its
solution
 To design, implement, and evaluate a computer-based system, process, component, or
program to meet desired needs
 Design efficient algorithm to achieve optimized solution in complex situation
 Apply heuristic methodologies in state-space problems
 Characterize various ways to represent the environmental knowledge and to infer from it
 Design the adaptive mechanism in case of uncertainty
 Implement learning algorithms to apply and resolve in real world problems.

COURSE CONTENTS:

UNIT 1: 15 Hours
Artificial Intelligence: Definition, AI Problems-Task Domains of Artificial Intelligence; The
Underlying Assumption - Physical Symbol System Hypothesis; AI technique - Knowledge
properties, Knowledge Representation.
Problems, Problem Spaces and Search: Steps in building a System; Production Systems;
Control Strategies-Requirements of a good control strategy; Problem Characteristics; Production
System Characteristics-Categories of Production Systems
Heuristic search techniques: Generate-and-test, Hill Climbing-Simple Hill Climbing, Best First
Search-OR Graphs

UNIT 2: 15 Hours
Intelligent Agents: Agents and Environments; A Rational Agent – Performance measures;
Examples of Agent Types and PEAS (Performance Measure, Environment, Actuators, Sensors )
descriptions, Properties of Task environment; The Structure of Agents, Types of Agent Programs
Knowledge Representation: Introduction, Definition, Importance, Representation and
Mappings-mappings between facts and representations, Representation of Facts; Approaches to
Knowledge Representation-Properties, Types of Knowledge; Issues in Knowledge
Representation-Important Attributes, Relationship among Attributes.

UNIT 3: 15 Hours
Symbolic Reasoning under Uncertainty: Introduction to Nonmonotonic Reasoning; Logics for
Nonmonotonic Reasoning, Default Reasoning and Minimalist Reasoning;
Learning: Introduction, Different methods of Learning – Rote Learning, Inductive Learning,
Reinforcement Learning, Unsupervised Learning, Supervised Learning, Analogy , Derivational
and Transformational
Expert Systems: Introduction, Rule based and Knowledge based, knowledge acquisition,
Maintenance and Manipulations
Planning: Components of a Planning System; Goal Stacks Planning - A very Simple Blocks
World Problem; Reactive Systems; Other Planning techniques.

UNIT 4: 15 Hours
Parallel and Distributed AI: Psychological modeling; Parallelism in Reasoning Systems;
Distributed Reasoning Systems
Perception and Action: A design for Autonomous Robot; Perception-Vision, Speech
Recognition; Action-navigation, Manipulation; Robot Architectures
Fuzzy Logic Systems: Introduction; Crisp Sets; Fuzzy Sets; Fuzzy Terminology; Fuzzy Logic
Control-Fuzzy Room Cooler.
Prolog: Introduction; Converting English to Prolog Facts and Rules; Goals; Prolog
Terminology; Variables; Control Structures; Arithmetic Operators; Matching in Prolog;
Backtracking; Recursion.
LISP: Introduction, Syntax and Numeric Functions, Basic List Manipulation Functions,
Functions, Predicates and Conditionals Input, Output and Local variables, Iteration and
Recursion, Property List and Arrays.

Text Book:
1. Elaine Rich, Kevin Knight, Shivashankar B Nair, ”Artificial Intelligence”, 3rd Edition,
Tata McGraw Hill, 2013

Reference Books:
1. Jean-Louis Ermine,”Expert Systems : Theory and Practice”,Prentice Hall of India, 1995

2. Stuart Russel, Peter Norvig,”Artificial Intelligence: A Modern Approach”, 3rdPearson 3rd


edition 2013.

ADVANCED WEB TECHNOLOGIES

Course Code: M18CA3051 Total Credits: 3


Total Hrs: 60 L: T: P – 2:0:1

COURSE OBJECTIVES:
 Review the need of AngularJS
 Discuss the perl scripting and concepts of server programming by using PHP
 Differentiate use of AJAX objects over normal HTML objects

COURSE OUTCOMES:
On successful completion of this course, the student will be able to:
 Construct Angular views and templates by implementing expressions and built-in
directives
 Design server webpage by using perl scripting
 Describe a server side webpage by using PHP
 Apply AJAX objects over normal HTML objects
 Develop a server side scripting by using SOAP architecture
COURSE CONTENTS:
UNIT 1: Introduction to Angular JS 15 Hours
Introduction, Client – Side Templates, Model View Controller(MVC), Data Binding,
Dependency Injection, Directives, Examples. Anatomy of an Angular JS Application, Invoking
Angular, Model View Controller, Templatees and Data Binding, Organizing Dependencies with
Modules, Formating Data with Filters, Changing Views with Routes and $location, Talking to
Servers, Changing the DOM with DirectivesValidating User Input.

UNIT 2: Programming in Perl 15 Hours


Origins and uses of Perl, Scalars and their operations, Assignment statements and simple input
and output, Control statements, Fundamentals of arrays, Hashes, References, Functions, Pattern
matching, File input and output, Examples. CGI Scripting, Developing CGI Applications,
Processing CGI, CGI.pm, CGI.pm methods, An Example, Adding Robustness, Carp, Cookies.

UNIT 3: Introduction to PHP 15 Hours


Origins and uses of PHP, Overview of PHP, General syntactic characteristics, Primitives,
operations and expressions, Output, Control statements, Arrays, Functions, Pattern matching,
Form handling, Files, cookies, Sessions Tracking. Building Web applications with PHP,
Tracking users, Using Databases, Handling XML.

UNIT 4: Introduction to Ajax and Ruby 15 Hours


Introduction to Ajax: Overview of Ajax, Basics of Ajax, Return Document Forms, Ajax
Toolkits, Security and Ajax,JSON.
Introduction to Ruby: Origins and Users of Ruby, Scalar Types and Their Operations, Simple
Input and Output, Control Statements, Fundamentals of Arrays, Hashes, Methods, Classes,
Blocks and Iterators, Pattern Matching.

Text Books:
1. Brad Green &ShyamSeshadri: AnhularJS, O’ReillyPublications, 2015.[Chapter 1
&2]
2. Robert W. Sebesta: Programming the World Wide Web, 4th & 7thedition Pearson
Education, 2009. [Chapter 8 & 11 - 4th edition, 10 & 14 – 7th edition]
3. Chris Bates: Web Programming Building Internet Applications 3rd edition Willey
india, 2006. [Chapter 10, 13]

Reference Books:
1. Professional AJAX 2nd Edition, Nicholas C Zakas et al, Wrox publications, 2007.
2. SOA: Concepts, Technology and Design – Thomas Erl, Pearson, 2005.
3. P.J. DEITEL & H.M.DEITEL: Internet &World Wide Web How to Program, 4th
edition.
ADVANCED WEB LAB
Part - A
1. Write a Perl Script which counts the word in a given file
2. Using PHP and MySQL develop a program to accept book information viz. Accession
number, title, authors, edition and publisher from a web page and store the information in a
database and to search for a book with the title specified by the user and to display the search
results with proper headings.
3. Create a registration form using PHP which contains name, email, contact no, address and
gender, display the details in other server page when user clicks the submit button.
4. Create a PHP programs necessary to implement the ticket reservation system using MYSQL
Database.
5. Write an AJAX program for parsing a JSON file and formatting the output
6. Develop a web application for Airline Reservation System using PHP & AJAX

Part – B
Design a simple client side webpage using PHP and AJAX with following constraints
 Should be a team project with max of two members
 Most of the controls should be used from AJAX
 Java script should be used for client scripting

ADVANCED DATABASE SYSTEMS

Course Code: M18CA3052 Total Credits: 3


Total Hrs: 60 L: T: P – 2:0:1

COURSE OBJECTIVES:

 Acquire knowledge on parallel and distributed databases and its applications.


 Articulate how data is stored in both primary and secondary storage
 Gain the information on various indexing techniques
 learn emerging and advanced data models
 Work with various query evaluation methods
 Acquire inquisitive attitude towards research topics in databases

COURSE OUTCOMES:
 Select the appropriate high performance database like parallel and distributed database
 Master the basics of query evaluation techniques and query optimization
 Design a semantic based database to meaningful data access
 Embed the rule set in the database to implement intelligent databases
 Represent the data using XML database for better interoperability
 Model and represent the real world data using object oriented database
 Solve the issues related to the data storage and retrieval

COURSE CONTENTS:
UNIT 1: Overview of Storage and Indexing 15 Hours
Memory hierarchy: RAID, Disk space management, Buffer manager: Files of records, Page
formats and record format, Structured Indexing, Data on external storage, File organizations and
Indexing, Index data structures, Comparison of file organizations, Indexes and performance
tuning. Intuition for tree indexes, Indexed sequential access method, B+trees , Hash-Based
Indexing.
UNIT 2: Overview of Query Evaluation, External Sorting and Relational Query Optimizer

18 Hours
The system catalog, Introduction to operator evaluation, Algorithm for relational operations,
Introduction to query optimization, A simple two-way merge sort, External merge sort,
Evaluating Relational Operators,Translating SQL queries in to Relational Algebra, Estimating
the cost of a plan, Relational algebra equivalences, alternative plans, Nested sub-queries, other
approaches to query optimization.

UNIT 3: Physical Database Design and Tuning 12 Hours


Normalization, Guidelines for index selection, examples, Clustering and indexing, Indexes that
enable index-only plans, Tools to assist in index selection, Overview of database tuning, Choices
in tuning the conceptual schema, Choices in tuning queries and views, Impact of concurrency,
DBMS benchmarking, Operational databases, transaction management.
UNIT 4: Advanced databases 15 Hours
Parallel databases, Distributed databases, Information retrieval and XML data, Object relational
databases, Mobile databases, Multimedia databases, geographic databases, temporal databases,
biological databases,Cloud Based Databases
Text Books:
1. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition,
McGraw-Hill, 2003[Chapters:8,9,10,11,12,13,14,19,22,23,27,29]

Reference books:
1. Michael Rosenblum and Dr. Paul Dorsey,” PL/SQL FOR DUMMIES”,WILLEY
Publications 2006
2. Elmasri and Navathe: Fundamentals of Database Systems,5th Edition, Pearson
Education, 2007.
3. Conolly and Begg: Database Systems, 4th Edition, Pearson Education, 2002.
4. Steven Feuerstein,”oracle PL/SQL Programming”,OREILLYpublications,Sixth edition
2014

CLOUD COMPUTING

Course Code: M18CA3061 Total Credits: 3


Total Hrs: 60 L: T: P – 2:0:1

COURSE OBJECTIVES:

 To introduce the broad perceptive of cloud architecture and model


 To distinguish between the various types of Virtualization.
 To be familiar with the lead players in cloud.
 To choose the right cloud providers as per need.
 To learn to design the trusted cloud Computing system

COURSE OUTCOMES:
 Compare the strengths and limitations of cloud computing.
 Identify the architecture, infrastructure and delivery models of cloud computing.
 Apply suitable virtualization concept.
 Choose the appropriate cloud player, Programming Models and approach.
 Address the core issues of cloud computing such as security, privacy and
interoperability.
 Explain the basics behind Designing and deploy Cloud Services .
 List the various public cloud players.

COURSE CONTENTS:

UNIT1: Fundamentals of Cloud Computing 15 Hours


Cloud computing at a glance, the vision of cloud computing, Defining a cloud, A closer look,
Historical developments, Building cloud computing environments Application development.
Characteristics of Cloud computing. Scalability, types of scalability. Horizontal Scalability and
Cloud Computing. Computing platforms and technologies, Principles of Parallel and Distributed
Computing.

UNIT 2: Fundamental concept and Models 15 Hours


Basics of Virtualization, Characteristics of virtualized environments, and Taxonomy of
virtualization techniques, - Types of Virtualization- OS virtualization, Application level
virtualization, Programming Language virtualization and Desktop Virtualization. Virtualization
and cloud computing, Technology examples, Xen: paravirtualization, VMware: full
virtualization.

UNIT 3: Cloud Infrastructure Mechanisms and Architecture 15 Hours


Fundamentals of Cloud Architecture, The cloud reference model, Cloud Delivery Models:
Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS),
Comparing Cloud Delivery Models, Cloud Deployment Models: Public Clouds, CommUnity
Clouds, Private Clouds, Hybrid Clouds, Introduction to Cloud Software Environments ,
Aneka.Framework overview, Anatomy of the Aneka container, Aneka Deployment modes-
Private, Public and Hybrid.

UNIT4: AWS Cloud platform 15 Hours


Amazon Web Services Cloud: Amazon Web Services overview, working with Amazon
Simple Storage Service (S3), Elastic compute cloud: security groups, key pair, launch Linux and
windows instances.Working with Amazon Machine Images. Deploy applications to Amazon
EC2.
Amazon machine images modification, EC2 applications, Simple queue Service, SQS
applications, Elastic Block Storage, RDS, beanstalk
Text Books:
1. RajkumarBuyya, Christian Vechiolla, ThamaraiSelvi, “Mastering Cloud Computing ,
Elsevier publications, 2013, USA ( Chapter 1, 2, 3, 4, 5.1, 5.2, 5.3, 9.1 and 10)
2. Programming Amazon Web Services: S3, EC2, SQS, FPS, and SimpleDB Paperback ,by
James Murty
3. AWS System Administration: Best Practices for Sysadmins in the Amazon Cloud
Paperback – March 25, 2015 by Mike Ryan (Author)
4. Amazon Web Services For Dummies Paperback – September 10, 2013 by Bernard
Golden
Web Link:
1. https://aws.amazon.com/documentation

Reference Books:
1. RajkumarBuyya, James Broberg, AndrzejGoscinski, “Cloud Computing: Principles and
Paradigms”, Wiley, India .
2. Kai Hwang, Geoffrey C Fox, Jack G Dungaree, “Distributed and Cloud Computing,
From ParallelProcessing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
3. Thomas Erl, Zaigham,Mahmood, Ricardo Puttini, “ Cloud Computing:Concepts,
Technology & Architecture”, Prentice Hall/Pearson

Online References:
1. 1. Getting started with Amazon book series available on AWS Book references
http://www.amazon.com/Getting-Started-AWS-Amazon-Services-ebook
2. For Azure online documentations https://docs.microsoft.com/en-us/azure/

CLOUD COMPUTING LAB


List of Experiments:
1. Amazon Elastic Block Store( Hands on lab by students)

a) Create Standard Volume


b) Create and delete snapshots
c) Create Provisioned I/o Volume
d) Assign volumes to Windows server 2012 and Ubuntu 14.04 server
e) Disassociate and Delete volumes

2. Amazon Elastic Load Balancing (ELB)( Hands on lab by students)


a) Exercise 2.1
i. Launch Two Ubuntu EC2 Instances- apache web servers with user data
ii. Edit HTML files to both the servers
iii. Test your web Servers through internet
b) Exercise 2.2
i. Create Elastic Load Balancer
ii. Add both the Ubuntu servers to ELB
iii. Test your Elastic Load Balancer
iv. Delete your Elastic Load Balancer

3. Auto Scaling and Bootstrapping (Hands on lab by students)

a) Overview Of Autoscaling
b) ELB: Configuring The Elastic Load Balancer for Autoscaling group
c) Configuring The AMI For Our Web Application
d) Auto Scaling And Bootstrapping
e) Scale out VM’s though stress test
f) Scaling VM ‘s based on low utilization
4. AWS- Webappand RDS( Hands on lab by students)

a) RDS- An overview
b) RDS –read replica
c) RDS- Multi AZ failover
d) RDS snapshots
i. Lab 1 : Create a RDS instance
ii. Lab 2 : connecting to an RDS instance
iii. Lab 3 : creating a RDS snapshots and restoring snapshot
iv. Lab 4: Deleting RDS snapshots
e) Deploy Web application in Amazon Ec2 ( media wiki)
f) Connect your Media wiki web application with RDS instances securely
g) Make media wiki available on public url for user sign up and write knowledge wiki
h) Delete Your RDS instance

5. AWS S3 ( Hands on lab by students)

a) AWS s3- Overview and pricing


b) Create Bucket and Folder
c) Upload, download, share and delete object
d) Delete Bucket

References:
1. RajkumarBuyya, ChristaianVecchiola, S. ThamaraiSelvi Master Cloud Computing,
TMH Education, 2013
2. ArshdeepBahga, Vijay Madisetti, Cloud Computing: A Hands-on Approach, Universities
Press, 2014..
3. https://aws.amazon.com/training/intro_series/
4. https://aws.amazon.com/getting-started/
5. https://aws.amazon.com/
6. https://aws.amazon.com/free/
7. https://blog.webspecia.com/cloud/iaas-paas-saas-explained-examples-comparison
8. http://aws.amazon.com/training/self-paced-labs/
9. Instructor led AWS Training - http://aws.amazon.com/training/

COURSE OUTCOMES:
1. Create EC2 cloud Instances and Launch a given application on AWS Cloud
2. Create storage space using S3 and setup database servers on AWS.
3. Demonstrate Upgrading and downgrading the infrastructure based on the requirement
using Cloud.
4. Demonstrate load balancing with different instances of EC2.
SOFTWARE TESTING AND QUALITY ASSURANCE

Course Code: M18CA3062 Total Credits: 3


Total Hrs: 60 L: T: P – 2:0:1

COURSE OBJECTIVES:
 Explain the concepts and process of testing activates that occur within the process.
 Describe the various Testing Technique and Design different type of Test cases.
 Characterize the look and feel and usage aspects of Usability and Accessibility Testing.
 Describe the Test Planning, Management, and Execution and design checklist and
Templates for planning and Execution.
 Demonstrate the framework, Design of Test Automation.
 Analyze the different perspective of test metrics and measurements.

COURSE OUTCOMES :
At the end of this course, the students will be able to:
 Carryout Test Analysis and Design, Test Implementation and Execution, Evaluating Exit
Criteria and Reporting, and Specification-Based Techniques, Equivalence Partitioning,
Avoiding Equivalence Partitioning Errors.
 Demonstrate white box and black box testing and design different types of test cases.
 Identify the System and Acceptance Testing and apply the methodology for Performance
Testing And Regression Testing and Types of Regression Testing.
 Identify Approach to Usability, Quality Factors for Usability; Test Planning,
Management, Execution, and Reporting.
 Perform Software Test Automation and challenges in automation.
 Illustrate Test Metrics and Measurements and design metrics.

COURSE CONTENTS:
UNIT 1: A perspective on Testing, Examples 15 Hours
Basic definitions, Test cases, Insights from a Venn diagram, Identifying test cases, Level of
testing, Examples: Generalized pseudo code, The triangle problem, the Next Date function, The
commission problem, The SATM (Simple Automation Teller Machine) problem, The currency
converter, Saturn windshield wiper.

UNIT 2: Boundary value testing, Equivalence class testing, Decision table based testing
15 Hours
Boundary value analysis, Robustness testing, Worst-case testing, special value testing,
Examples, Random testing, Equivalence classes, Equivalence test cases for triangle problem,
Next Date function and commission problem, Guidelines and observations, Decision tables, Test
cases for triangle problem.

UNIT 3: Path Testing, Data flow testing, Levels of Testing, Integration Testing 15 Hours
DD Paths, Test coverage metrics, Basis path testing, guidelines and observations, Definition Use
testing, Slice based testing, Guidelines and observations. Traditional view of testing levels,
Alternative life cycle models, the SATM systems, separating integration and system testing.case
studies: Development of test cases using various software testing tools like UFT,SELENIUM
etc.

UNIT 4: Software Quality, Maturity Models 15 Hours


Five views of software quality, McCall’s quality and criteria, ISO 9126 Quality characteristics,
Quality Metrics, ISO 9000:2000 Software Quality Standard, The basic idea in Software Process,
Capability Maturity Model, Test Process Improvement, Testing Maturity Model.

Text Books:
1. Paul C Jorgensen, “Software Testing A Craftsman's Approach”, Aueredach
publications, 3rd edition, 2011. [Chapters: 1, 2, 5, 6, 7, 9, 10, 12, 13]
2. KshirasagaraNaik, PriyadarshiTripathy: Software Testing and Quality Assurance, Wiley
India 2012.[Chapters 17 & 18]

Reference Books:
1. Mauro Pezze, Michael Young, Software testing and Analysis- Process, Principles and
Techniques, Wiley India, 2012.
2. M.G.Limaye: Software Testing-Principels, Techniques and Tools – McGraw Hill,
2009.

SOFTWARE TESTING LAB


COURSE CONTENTS:
1. Design and develop a program in a language of your choice to solve the triangle problem
defined as follows: Accept three integers which are supposed to be the three sides of a
triangle and determine if the three values represent an equilateral triangle, isosceles
triangle, scalene triangle, or they do not form a triangle at all. Derive test cases for your
program based on decision-table approach, execute the test cases and discuss the results.
2. Design and develop a program in a language of your choice to solve the triangle problem
defined as follows: Accept three integers which are supposed to be the three sides of a
triangle and determine if the three values represent an equilateral triangle, isosceles
triangle, scalene triangle, or they do not form a triangle at all. Assume that the upper limit
for the size of any side is 10. Derive test cases for your program based on boundary-value
analysis, execute the test cases and discuss the results.
3. Design and develop a program in a language of your choice to solve the triangle problem
defined as follows: Accept three integers which are supposed to be the three sides of a
triangle and determine if the three values represent an equilateral triangle, isosceles
triangle, scalene triangle, or they do not form a triangle at all. Assume that the upper limit
for the size of any side is 10. Derive test cases for your program based on equivalence class
partitioning, execute the test cases and discuss the results.
4. Design, develop, code and run the program in any suitable language to solve the
commission problem. Analyze it from the perspective of dataflow testing, derive different
test cases, execute these test cases and discuss the test results.
5. Design, develop, code and run the program in any suitable language to solve the
commission problem. Analyze it from the perspective of boundary value testing, derive
different test cases, execute these test cases and discuss the test results.
6. Design, develop, code and run the program in any suitable language to solve the
commission problem. Analyze it from the perspective of equivalence class testing, derive
different test cases, execute these test cases and discuss the test results.
7. Design, develop, code and run the program in any suitable language to solve the
commission problem. Analyze it from the perspective of decision table-based testing,
derive different test cases, execute these test cases and discuss the test results.

SOFT SKILLS
M18CA3070 Soft Skills RULO 2 0 0 2 2

Note: The students will have to undergo Skill Development course being conducted by Training and
Placement cell of the University.

LINUX LAB

Course Code: M18CA3080 Total Credits: 2 L: T: P – 0:0:2

COURSE OBJECTIVES:
 Teach advanced C systems programming and debugging techniques in a Unix/Linux
environment.
 Discuss correct synchronization techniques for both application programs and kernel
code running on Unix process as well as multiprocessor platforms.

COURSE OUTCOMES:
 Write shell scripts in order to perform basic shell programming
 Use basic Linux commands.
 Use Linux pipes and file redirection efficiently to manipulate data.

COURSE CONTENTS:
1. Write a non-recursive shell script which accepts any number of arguments and prints
them in the reverse order (For example, if the script is named rags, then executing args A
B C should produce C B A on the standard output
2. Write a shell script that accepts two file names as arguments, checks if the permissions
for these files are identical and if the permissions are identical, output common
permissions and otherwise output each file name followed by its permissions
3. Write a shell script which accepts valid log-in names as arguments and prints their
corresponding home directories, if no arguments are specified, print a suitable error
message.
4. Write a shell script that accept one or more filenames as argument and convert all of them
to uppercase, provided they exist in current directory
5. Write a shell script that accepts as filename as argument and display its creation time if
file exist and if it does not send output error message.
6. Write a shell script to display the calendar for current month with current date replaced
by * or ** depending on whether the date has one digit or two digits
7. Write a shell script to compute the sum of number passed to it as argument on command
line and display the result.
8. Write a shell script that delete all lines containing a specific word in one or more file
supplied as argument to it.
9. Write a shell script that gets executed displays the message either “Good Morning” or
“Good Afternoon” or “Good Evening” depending upon time at which the user logs in
10. Write a shell script that accept a list of filenames as its argument, count and report
occurrence of each word that is present in the first argument file on other argument files.
11. Write a shell script that determine the period for which a specified user is working on
system.
12. Write a shell script that accept the file name, starting and ending line number as an
argument and display all the lines between the given line number
13. Write an awk script to delete duplicated line from a text file. The order of the original
lines must remain unchanged.
COMPUTER NETWORK LAB USING NS2

Course Code: M18CA3090 Total Credits: 2 L: T: P – 0:0:2

COURSE OBJECTIVES:

 To understand networking concepts and basic communication model.


 To gain knowledge of various application protocols standard developed for internet Layer

COURSE OUTCOMES:
After completion this course students will be able to
 Estimate the functionalities needed for data communication into layers
 Understand the working principles of various application protocols

COURSE CONTENTS:

Part - A[Programs using Packet tracer]

1. Study of different types of Network cables and practically implement the cross-wired
cable and straight through cable using clamping tool.
2. Study of basic network command and Network configuration commands using command
prompt and packet tracer.
3. Connect the computer in local area network.
4. Set upNetwork topology using packet tracer software.

Part –B [Programs using NS2]

1. Create a Simple Star Topological LAN in windows and provide provision for sharing the
files using NS2
2. By using NS2 simulator setup a star topology with 7 nodes (n1 to n7) with n1 as source
and n7 as destination n1 should be connected to router n2 and n7 is connected to network
router n6 except n1 and n7 all reaming nodes are connected to n4.
3. Set up network using NS2 with source n1 connected to n4 through n2 and n3. Create an
application with TCP as transport layer and calculate amount of time spent in
retransmissions.
4. Create a network as like program 3 and measure number of pocket dropped at n4 because
of congestion.
5. Capture the traffic of your LAN and identify the IP Address of your default router

Part - C
1. Create a messenger application by using the socket programming which should establish
communication between two systems
OR
2. Create a FTP application to transfer the file from one application to other application in
different system

You might also like