0% found this document useful (0 votes)
37 views8 pages

Syllabus VI Sem

Uploaded by

Kunal Jaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views8 pages

Syllabus VI Sem

Uploaded by

Kunal Jaiswal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Course Code Course Name Load Distribution

(L T P C)
TCS 602 Mobile Application Development 2 1 0 3

Learning Outcome:
After Completing this course students will be able to learn:
1. Setup and install environment for development of android based mobile applications
2. Develop native apps for android based devices.
3. Implement user interaction logic using android application components
4. Create advanced UI for android applications and implement event handling
5. Build android based applications that generate and use persistent data using a client side
database like SQLite.

Detailed Syllabus:

UNIT – I 10Hours
Mobile technology : Overview of Mobile operating systems and platforms, Android- Installation
and setting up of Android application development environment using Android Studio and SDK
tools, debugging tools, Android Project components.
Android Architecture: Linux Kernel, Libraries, Android Runtime, Application Framework,
Android Startup and Zygote, Android Permission model, Android Manifest File.

UNIT – II 12 Hours
Android Application Components : Android application components:- Activity- Life cycle,
Creating activities, Broadcast Receivers- Generating broadcasts and handling types of
broadcasts, Services- Life cycle and using Started services, Local bounded services, Messenger
based services, Intent Services and Asyn Tasks, Intents and pending Intents, System Services.

UNIT – III 11 Hours


UI Design And Navigation: UI Layouts and Layout properties( linear, relative, constraint etc),
Fundamental Android UI Design, Drawable Resources, Images, Graphics, Audio, Video, Styles,
Thems, Views( texts, buttons, spinners etc), view groups( Adapter, Grid, Recycler etc), Material
design, animation and Transitions.

Unit – IV 11Hours
Event based Programming: Event handling, Threads in Android using Executor framework,
Swipes, Menus, Dialogs, Toasts, Notifications in Android, Lists& Adapters, Fragments. Sending
requests and receiving responses from remote server( Rest api) using high end libraries.

Unit - V 10 Hours
Working with Database: Android Persistent data: preference files, working with internal and
external files and directories, using Content providers to access and share data across
applications ,database connectivity using SQLite.

Text Books:
1. Professional Android fourth edition, Reto Meier, Ian Lake Wiley India Pvt Ltd.
2. Android Programming: The Big Nerd Ranch Guide (3rd Edition) by Bill Phillips.
Reference Books:
1. Android Studio Development Essentials by Neil Smyth
2. Android Application Development Cookbook: 93 Recipes for Building Winning Apps
by Wei-Meng Lee.
Course Code Course Name Load Distribution
(LT P C)
TCS-603 Cloud Computing 3003

Learning Outcome:
After Completing this course students will be able to learn:
1. Understand Cloud Computing, Cloud Service Model, etc.
2. Designing of Virtual Servers, Private Cloud.
3. Apply various techniques for the development of Public Cloud.
4. Development of various Security models for the cloud.
5. Implementation of various techniques and tools for development of enterprise application
for business.

Detailed Syllabus:

Unit I 7 Hours
Overview of Cloud Computing: Brief history and evolution – History of Cloud Computing,
Evolution of Cloud Computing, Traditional vs. Cloud Computing. Why Cloud Computing, Cloud
service models (IaaS, PaaS & SaaS). Cloud deployment models (Public, Private, Hybrid and
Community Cloud), Benefits and Challenges of Cloud Computing.

Unit II 8 Hours
Working with Private Cloud: Basics of virtualization, Virtualization technologies, cServer
virtualization, VM migration techniques, Role of virtualization in Cloud Computing. Business
cases for the need of Cloud computing environment, Private Cloud Definition, Characteristics
of Private Cloud, Private Cloud deployment models, Private Cloud Vendors, Private Cloud
Building blocks namely Physical Layer, Virtualization Layer, Cloud Management Layer,
Challenges to private Cloud, Virtual Private Cloud. Implementing private cloud (one out of
CloudStack, OpenStack, Eucalyptus, IBM or Microsoft)

Unit III 8 Hours


Working with Public Clouds: What is Public Cloud, Why Public Cloud, When to opt for Public
Cloud, Public Cloud Service Models, and Public Cloud Players. Infrastructure as a Service
Offerings, IaaS Vendors, PaaS offerings, PaaS vendors, Software as a Service. Implementing
public cloud (one out of AWS, Windows Azure, IBM or Rackspace)

Unit IV 9 Hours
Overview of Cloud Security and Multi-Cloud Management Systems: Explain the security
concerns in Traditional IT, Introduce challenges in Cloud Computing in terms of Application
Security, Server Security, and Network Security. Security reference model, Abuse and
Nefarious Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared
Technology Issues, Data Loss or Leakage, Account or Service Hijacking, Unknown Risk Profile,
Introduce the different vendors offering Cloud Security for public and private clouds.
Explain concept of multi-cloud management, Challenges in managing heterogeneous clouds,
benefits and advantages of multi-cloud management systems. Implementing Multi-Cloud
Management System (e.g. RightScale Cloud Management System)
Unit V 9 Hours
Business Clouds and Future directions in Cloud Computing: Cloud Computing in Business,
Various Biz Clouds focused on industry domains (Retail, Banking and Financial sector, Life
Sciences, Social networking, Telecom, Education). Cloud Enablers (Business Intelligence on
cloud, Big Data Analytics on Cloud)
Future technology trends in Cloud Computing with a focus on Cloud service models,
deployment models, cloud applications, and cloud security. Migration paths for cloud,
Selection criteria for cloud deployment. Current issues in cloud computing leading to future
research directions.

Text Books:
1.Cloud Computing: Principles and paradigms By Raj Kumar Buyya, James Broberg,
AndrezeiM.Goscinski, 2011
2.Cloud Computing for dummies, By Judith Hurwitz, Robin Bllor, Marcia Kaufman, Fern
Halper, 2009.
3.Cloud Computing: A Practical Approach, By Anthony T. Velte, Toby J. Velte, and Robert
Elsenpeter, McGraw Hill, 2010.
4.Handbook of Cloud Computing, By BorkoFurht, Armando Escalante (Editors), Springer,
2010.
Reference Books:
1. Cloud computing: Implementation, management and security By Rittinghouse, John, W.
Cloud Computing Bible, By Barrie Sosinsky, Wiley, 2011.
2. Cloud Computing Architected: Solution Design Handbook by Rhoton, John.
3. Cloud Security, A comprehensive Guide to Secure Cloud Computing by Krutz, Ronald L.;
Vines, Russell Dean
Course Code Course Name Load Distribution
(L T P C)
TCS 604 Network and Cyber Security 3003

Learning Outcome:
After Completing this course students will be able to learn:
1. Classify several techniques to encrypt and decrypt data. DES for encrypting electronic data
and use of ciphers to make data more authenticated and authorized.
2. Extend the encryption algorithms from security perspective. Principles using keys for
encryption will be covered by using several key based algorithms.
3. Determine the techniques for mapping the data of arbitrary size to the fixed size. User
authentication, authentication-via-secret and session management techniques are also
applied.
4. Classify security mechanism, security policies, security components (such as firewalls),
port security and protection to secure networks based on type of network used.
5. Develop relevant mechanism to prevent from several attacks, ethical considerations, and
understanding of security issues applied while designing.

UNIT – I 9 Hours
Information Security: Introduction To Security: Attacks, Services & Mechanisms, Security
Requirements, Classical Encryption Techniques: Substitution & Transposition techniques,
Cryptanalysis, Steganography. Data Encryptions Standard: Simplified-DES, DES, Double
DES, Meet-in-the-Middle attack, Triples DES, Cryptanalysis, Block Ciphers, Block Cipher
Modes Of Operations, Stream Ciphers. Introduction to AES.

UNIT – II 8 Hours
Encryption Algorithm: Diffie-Hallman Algorithm. Public Key Encryption: Principal Of
Public-Key Crypto-systems, RSA Algorithm, RSA Cryptosystem, Key Management, Fermat’s &
Euler’s Theorem. Overview of IPSec – Modes of IPSec, IP and IPv6-Authentication Header-
Encapsulation Security Payload (ESP)- Internet Key Exchange (Phases of IKE, ISAKMP/IKE
Encoding).

UNIT – III 7 Hours


Message Authentication & Hash Functions: Authentication Requirements, Message
Authentication Codes, Hash Functions, Message Digest Algorithm, Secure Hash Algorithm,
Digital Signatures, Authentication Protocol, Digital Signature Standard.

UNIT – IV 8 Hours
Network, Web & System Security: Directory Authentication Service, Electronic Mail Security,
Pretty Good Privacy (PGP), S / MIME. Web Security: Secure Socket Layer & Transport Layer
Security, Secure Electronic Transaction. System Security: IDS, Firewall: Definitions,
Construction and WorkingPrinciples.

UNIT – V 8 Hours
Cyber Security and Cyber Law: E-Governance and IT Act 2000,Legal recognition of electronic
records, Legal recognition of digital signature. Different kinds of buffer overflow attacks:
Stack overflows, string overflows, Heap and Integer overflows. Internal Attacks: Emails,
Mobile Phones, Instant Messengers, FTP Uploads, Dumpster Diving, Shoulder Surfing. DOS
Attacks :Ping of Death, Teardrop, SYN flooding , Land Attacks, Smurf Attacks, UDP flooding,
Hybrid DOS Attacks, Application Specific, Distributed Dos Attacks.

Text Books:
1. Behrouz A Forouzan, Debdeep Mukhopadhyay “Cryptography and Network Security”
3rd Ed. McGrow Hill, New Delhi
2. William Stallings, “Cryptography and Network Security: Principles and Practice”,
4thEd.,Prentice Hall, New Jersey.
Reference Books:
1. Johannes A. Buchmann, “Introduction to Cryptography”, Springer- Verlag.
2. Bruce Schneier, “Practical Cryptography”, Wiley DreamTech India
Course Code Course Name Load Distribution
(L T P C)
TCS 605 Advance Java Programming 3003

Learning Outcome: After Completing this course students will be able to learn:

1. Illustrate the concepts of Object Oriented Programming approach using Java.


2. Designing dynamic web based application .
3. Development of application and web site that involves storage and retrieval of data
using different databases.
4. Generate enterprise web based application.
5. Creation of Real time projects

Detailed Syllabus:

UNIT – I 6 Hours
Java Networking: Exploring java.net package, Networking basics: Socket, Client server,
reserved Sockets, Internet addressing, TCP sockets, UDP sockets, creating a server that sends
data, Creating a client that receives data, two way communication between server and client.

UNIT – II 8 Hours
Java Database Connectivity (JDBC): JDBC-ODBC Bridge; The connectivity model; the driver
manager; navigating the result set Object contents; java.sql Package; The JDBC exception
classes, accessing a database from a JSP page, Application-specific Database Action,
Developing Java Beans in a JSP page, introduction to Struts framework. Connecting to Remote
database.

UNIT - III 10 Hours


JSP: Introduction to JSP, JSP processing, JSP Application Design, Tomcat Server, Implicit JSP
objects, Conditional Processing, Declaring variables and methods, Error Handling and
Debugging, Sharing data between JSP pages-Sharing Session and Application Data.

UNIT – IV 10 Hours
Servlet: Introduction to Servlets, Lifecycle, JSDK, Servlet API, Brief origin and advantages over
CGI, J2EE Servlet 2.x Specification, Writing small Servlet Programs, Servlet Packages: HTTP
package, Working with Http request and response, Security Issues., Deployment Descriptor,
Inter Servlet Collaboration, Session: Definition, State on web, Different ways to track sessions.

UNIT – V
Enterprise Java Beans EJB, benefits, EJB Architecture, EJB Roles, Types of EJB, Building
small session bean application, Home Interface, Remote Interface, Session bean: stateless,
stateful session beans Struts 2: MVC, Struts Architecture, Benefits of struts, control flow,
struts.xml, Filter Dispatcher, Action Support, Building a small Struts 2 application.

Text Books:
1. Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers, 2000
2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc., 1999.
3. Hortsmann& Cornell, “Core Java 2 Advanced Features, Vol II”, Pearson Education, 2002.
References:
1. Web reference: http://java.sun.com.
2. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-Hill, 2003

You might also like