BIT 8th Semester Syllabus
BIT 8th Semester Syllabus
Course Title: Network and System Administration Full Marks: 60+ 20+20
Course No: BIT451 Pass Marks: 24+8+8
Nature of the Course: Theory + Lab Credit Hrs: 3
Semester: VIII
Course Description:
This course focuses on the network and system operation and management and covers subjects of day-
to-day administrative tasks such as Network and Server Configurations, management of user accounts
and disk space, and the trouble-shooting skills future networking and system administrations.
Course Objectives:
To provide the concept of network and system operation, management and administration,
Furthermore, it discusses about different configurations and trouble-shooting.
Course Contents:
101
Unit 7: Print and FTP Server Administration (4 Hrs.)
General Samba Configuration, CUPS Configuration Basics, FTP Principles, Anonymous FTP, Server
Configuration
Laboratory works:
The laboratory works should include all the features mentioned in the course
Samples:
1. Server/Client Installation over VMware Environment
2. Network Practice with Packet Tracer
3. System Administration: User/Group management, File System Management ….
4. Network Configuration: Start/Stop network Service, network interface configuration
5. Firewall Configuration
6. DNS and DHCP Configuration and Troubleshooting
7. Web and Proxy Server Configuration and Troubleshooting
8. Basic Mail Server Configuration and Troubleshooting
References:
1. The Practice of System and Network Administration, Second Edition Thomas A. Limoncelli,
Christina J. Hogan , Strata R. Chalup
2. Advanced Linux Networking, Roderick W. Smith, Addison-Wesley Professional (Pearson
Education), 2002.
3. Linux Network Administrator's Guide, Tony Bautts, Terry Dawson, Gregor N. Purdy, O'Reilly,
Third Edition, 2005
102
E-Governance
Course Description:
This course familiarizes students with different concepts of E-Government and E-Governance,
different E-Governance models and infrastructure development, E-government security.
Course Objectives:
To develop knowledge of e-governance and e-government, to know different e-governance models
and infrastructure development, to study the security issues and solving strategies of e-governance
Course Contents:
103
Monitoring System, Computerization in Andra Pradesh, Ekal Sewa Kendra, Sachivalaya Vahini,
Bhoomi, IT in Judiciary
Laboratory Works:
The laboratory works should implementing e-governance models and systems using suitable platform
References:
1. Richard Heeks, Implementing and managing e-Government
2. C.S.R Prabhu, e-Governance: Concepts and Case studies, prentice hall of India Pvt. Ltd.
3. J. Satyanarayana, e-Government, , prentice hall of India Pvt. Ltd.
4. Backus, Michiel, e-Governance in Developing Countries, IICD Research Brief, No. 1, March
2001
104
Internship
Course Description:
This course covers the real world practice in industry. It includes using theoretical and practical
knowledge while working in industry together with the understanding of industry culture.
Course Objectives:
The objective of this course is to allow students into market industry and gain real world experience.
The course is expected to make students more pragmatic and professional.
Course Contents:
Nature of Internship:
The internship work should be relevant to the field of information technology. The nature internship
may include design, development, and application of software, hardware, network services, database
systems and other IT infrastructures. The internship duration should be minimum of 180 hours or ten
weeks. The internship should be started tentatively by the 3rd week of start of eighth semester. The
internship host organizations can be software/hardware development companies, telecommunications
companies, network and internet service providers, financial organizations, health organizations etc.
The internship is an individual activity. The student should be responsible for the timely completion
of all the activities and projects assigned, maintaining the professional quality. Each student should be
facilitated with a mentor at the intern organization and a supervisor at the campus. Student should
inform the status of all assignments to the mentor and supervisor. The student is expected to
communicate frequently with the advisors on the progress and status of intern project(s)/activities.
Each student must prepare and submit individual internship report on the basis of his/her work done
during the internship period. Students working in group at the same organization should be able to
distinguish their nature of work.
Phases of Internship:
2. Mid-Term Submission: Students must submit progress report and defend midterm progress
of their internship work in the 11th week of the eight semester.
3. Final Submission: Students must submit and defend the internship work during last week of
the eight semester but before final board examination. The final defense will be followed a viva
voice conducted by an evaluation committee. Students must have to submit the
105
internship final report to their respective department of college/campus before at least 10 days
of final defense date. The report should be submitted in standard format as prescribed. The
hard/soft copy of report should be made available to the external before a week of presentation
date.
Provision of Supervision:
There should be a regular faculty member of the college assigned as a supervisor. The role of
supervisor is to supervise the students throughout the internship period. A supervisor can supervise at
most four internship students in a section.
Provision of Mentorship:
There should be a regular employee of the intern providing organization assigned as a mentor. The
role of mentor is to guide the students throughout the internship period at the organization.
Evaluation Scheme:
a. Evaluation committee
- HOD/Coordinator
- Project Supervisor
- Mentor
- External Examiner
b. Marks Distribution:
- Head / Program Coordinator – 10
- Supervisor – 50
- Mentor – 100
- External Examiner – 40
- Total – 200 (Out of which 160 is considered as internal marks and 40 marks is considered as
final external marks. Student have to pass in both separately scoring 64 and 16 marks
respectively)
106
HOD/Coordinator is responsible for arranging the proposal defense, midterm and final defense.
The HOD/Coordinator should maintain rigorous contact with students, supervisors, mentors
and company/industry. The HOD/Coordinator should participate and evaluate proposal
defense, midterm, and final defense.
- Project Supervisor: The role of project supervisor is to supervise students’ internship project
throughout the semester. The supervisor should rigorously feedback and guide the students so
as to transform their industry work into academic. The supervisor should monitor the progress
of projects under supervision. Supervisor should participate and evaluate proposal defense,
midterm and final defense.
- Mentor: The role of mentor is to guide students and their project during their intern period at
the host institution. The mentor should nurture student with industry culture. The mentor
should rigorously feedback and guide the students as well as communicate with their
campus/college administration. By the end of internship work, the mentor should evaluate the
student work done during intern period under his/her mentorship.
- External Examiner: The role of external examiner is to evaluate the students’ internship work
during final defense evaluation. The examiner should participate and evaluate viva voce and
presentation session during the final defense.
- Student: The role and responsibilities of student include pursuing internship in relevant field,
preparing project report, and defending the internship work throughout each evaluation phases.
Internship is an individual work. Student should be able to demonstrate his/her contribution in
the project work done during the internship period individually. Students should maintain a log
visits with their supervisors as well as mentors at different dates during their work. The log
should include technical details with appropriate feedbacks.
Report Contents:
1. Prescribed content flow for the internship proposal
1. Introduction
2. Problem Statement
3. Objectives
4. Description of Internship Work/Project
5. Internship Plan
6. Expected Outcome of Internship Activities
7. References
107
7. Main Report
8. References
9. Bibliography (if any)
10. Appendix
1. Chapter 1: Introduction
1.1. Introduction (Introduce the project(s)/activities done during internship)
1.2. Problem Statement (Problems associated with the project(s)/activities done during
internship)
1.3. Objectives
1.4. Scope and Limitation
1.5. Report Organization
Students should be able to relate and contextualize the above mentioned concepts with their project
work/activities done during internship at the host organization.
The listing of references should be listed in the references section. The references contain the list of
articles, books, URLs that are cited in the document. The books, articles, and others that are studied
during the study but are not cited in the document can be listed in the bibliography section. The citation
and referencing standard should be APA referencing standard. The text inside the document should be
cited accordingly. The APA referencing standard can be found in the web at https://apastyle.apa.org/
108
The pages from certificate page to the list of tables/figures/abbreviations/approvals should be
numbered in roman starting from i. The pages from chapter 1 onwards should be numbered in
numeric starting from 1. The page number should be inserted at bottom, aligned center.
B. Page Size and Margin
The paper size must be a page size corresponding to A4. The margins must be set as
Top = 1; Bottom = 1; Right = 1; Left 1.25
C. Paragraph Style
All paragraphs must be justified and have spacing of 1.5.
E. Section Headings
Font size for the headings should be 16 for chapter headings, 14 for section headings, 12 for sub-
section headings. All the headings should be bold faced.
F. Figures and Tables
Position of figures and tables should be aligned center. The figure caption should be centred
below the figure and table captions should be centred above the table. All the captions should be
of bold face with 12 font size.
A final approved signed copy of the report should be submitted to the Dean Office, Exam Section,
Institute of Science and Technology, Tribhuvan University
References:
None
109
Data Warehousing and Data Mining
Course Description:
This course introduces advanced aspects of data warehousing and data mining, encompassing the
principles, research results and commercial application of the current technologies
Course Objectives:
The main objective of this course is to provide knowledge of different data mining techniques and data
warehousing
Course Contents:
110
Unit 7: Cluster Analysis (8 Hrs.)
Types of Data in Cluster Analysis, Similarity and Dissimilarity between Objects, Clustering
Techniques: - Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid-Based
Methods, Model-Based Clustering Methods, Clustering High-Dimensional Data, Constraint-Based
Cluster Analysis, Outlier Analysis
Laboratory Works:
The laboratory should contain all the features mentioned in a course, which should include data
preprocessing and cleaning, implementing classification, clustering, association algorithms in any
programming language, and data visualization through data mining tools.
References:
1. Data Mining: Concepts and Techniques, 3rd ed. Jiawei Han, Micheline Kamber, and Jian Pei.
Morgan Kaufmann Series in Data Management Systems Morgan Kaufmann Publishers, July
2011
2. Introduction to Data Mining, 2nd ed. Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin
Kumar. Pearson Publisher, 2019
3. Mining of Massive Datasets by Jure Leskovec, Anand Rajaraman, Jeffrey D. Ullman, 2014
111
Knowledge Management
Course Description:
This course introduces fundamental concept of knowledge and different issues in managing the
knowledge
Course Objectives:
This course enables to learn about the Evolution of Knowledge management, be familiar with tools,
be exposed to applications, and be familiar with some case studies
Course Contents:
Laboratory Works:
Upon completion of the course, the student should be able to:
112
Use the knowledge management tools.
Develop knowledge management Applications (Social network analysis, document
management).
Design and develop enterprise applications (Aggregation, E-Learning).
References:
1. Srikantaiah. T. K., Koenig, M., “Knowledge Management for the Information Professional”
Information Today, Inc., 2000
2. Dalkir, K. (2011). Knowledge Management in Theory and Practice (2nd edition) Cambridge,
Massachusetts: The MIT Press
3. Nonaka, I., Takeuchi, H., “The Knowledge-Creating Company: How Japanese Companies
Create the Dynamics of Innovation”, Oxford University Press, 1995
4. Knowledge Management in Theory and Practice, Kimiz Dalkir, 2005
113
Image Processing
Course Description:
This course covers the investigation, creation and manipulation of digitalimages by computer. The
course consists of theoretical material introducing the mathematics of images and imaging. Topics
include representation of two-dimensional data, time and frequency domain representations, filtering
and enhancement, the Fourier transform, convolution, interpolation. The student will become
familiar with Image Enhancement, ImageRestoration, Image Compression, Morphological Image
Processing, Image Segmentation, Representation and Description, and Object Recognition.
Course Objectives:
To enhance a theoretical foundation of Digital Image Processing concepts, To provide mathematical
foundations for digital manipulation of images; image acquisition; preprocessing; segmentation;
Fourier domain processing; and compression, To make able to gain experience and practical techniques
to write programs for digital manipulation ofimages; image acquisition; pre-processing; segmentation;
Fourier domain processing; and compression.
Course Contents:
114
Unit 4: Image Restoration & Reconstruction (8 Hrs.)
A Model of Image Degradation/Restoration Process , Noise Sources , Range Imaging, Noise Models,
Mean Filters: Arithmetic, Geometric, Harmonicand Contraharmonic Mean Filters, Order Statistics
Filters: Median, Min and Max,Midpoint and Alpha trimmed mean filters, Band pass and Band
Reject filters: Ideal, Butterworth and Gaussian Band pass and BandReject filters, Introduction,
Definition of Compression Ratio, Relative Data Redundancy, Average Length ofCode, Redundancies
in Image: Coding Redundancy(Huffman Coding), Interpixel Redundancy (Run Length Coding) and
Psychovisual Redundancy (4-bit Improved Gray Scale Coding: IGS Coding Scheme)
Laboratory Works:
Students are required to develop programs in related topics using suitable programminglanguages
such as Python or other similar programming languages.
References:
1. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing”, Pearson Edition,Latest
Edition.
2. I. Pitas, "Digital Image Processing Algorithms", Prentice Hall, Latest Edition.
3. A. K. Jain, “Fundamental of Digital Image processing”, Prentice Hall of India Pvt. Ltd.,Latest
Edition.
4. K. Castlemann, “Digital image processing”, Prentice Hall of India Pvt. Ltd., Latest Edition.
5. P. Monique and M. Dekker, “Fundamentals of Pattern recognition”, Latest Edition.
115
Network Security
Course Description:
This course covers the fundamental concepts of network security protocols, wireless security
concepts, basics of security in cloud and IoT.
Course Objectives:
The main objective of this course is to provide knowledge of network security so that students will
be able to implement a secure network architecture using different security protocols and
technologies.
Course Contents:
116
Unit 8: Cloud and Internet of Things (IOT) Security (7Hrs.)
Cloud Computing, Cloud Security Concepts, Cloud Security Risks and Countermeasures, Cloud
Security as a Service,Open-source Cloud Security Module,Internet of Things (IoT),IoT Security
Concepts and Objectives, Open-source IoT Security Module
Laboratory Works:
The laboratory work includes implementation and simulation of Network Security Protocols,
Intrusion Detection Systems, DDoS Attacks, Cloud Security and IoT Security Systems.
References:
1. William Stallings, Cryptography and Network Security: Principles and Practice, 8 th Edition,
Pearson, 2020
2. Joseph MiggaKizza, Computer Network Security Fundamentals, 5thEdition, Springer, 2020
3. William Stallings, Network Security Essentials: Applications and Standards, 6th Edition,
Pearson, 2017
4. Sarhan M. Musa, Network Security and Cryptography: A Self-Teaching Introduction,
Mercury Learning and Information LLC, 2018
117
Introduction to Telecommunications
Course Description:
This course covers the basic concepts of Telecommunication System including History of
telecommunications, Basic communication system elements, Optical fiber communication,
Wireless Communication systems, Status of Telecommunication services in Nepal, Convergence
of technologies and services and role of Telecommunications in national development.
Course Objectives:
The main objective of this course is to provide students, knowledge on Telecommunications
systems and its role in digital economy.
Course Contents:
Laboratory works:
118
The laboratory works should include all the features mentioned in the course
References:
1. John C. Bellamy “Digital Telephony“John Wiley & Sons, Inc.
2. Roger L. Freeman “Telecommunication System Engg. “ John Wiley & Sons, Inc.
3. A. S. Tanenbaum, “Computer Networks”, Prentice Hall.
4. Telecommunication Switching Systems and Networks, by Thiagarajan Vishwanathan
119