5th Sem Syllabus Full 1
5th Sem Syllabus Full 1
SEMESTER V
3. Semester: V
3. Contact Hours: L: 3 T: 0 P: 0
0
4. Examination Duration (Hrs): Theory 3 Practical
6. Credits: 3
7. Semester: 4
8. Category of Course: DC
CO3. Explain the basics of memory management and the use of virtual memory in
modern operating systems.
CO6: Analyze the data structures and algorithms used for developing an operating
system.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Introduction to Operating Systems, UNIX: What operating systems do; Operating
System structure; Operating System Services; User - Operating System interface; System
1 8
calls; Types of system calls; Operating System structure; Unix command: Command
Structure, Internal and External commands, filters; vi editor.
Process Management: Process concept; Operations on processes; Multithreading
models; Threading issues. Process Scheduling: Basic concepts; Scheduling criteria;
Scheduling algorithms; Multiple-Processor scheduling; Thread scheduling.
2 10
Process Synchronization: Inter-process communication; Synchronization: The Critical
section problem; Peterson’s solution; Synchronization hardware; Semaphores; Classical
problems of synchronization.
Reference Books
1. Andrew S Tanenbaum: Operating Systems: Design and 3rd 2006
Implementation, 3rd edition, Prentice Hall, 2006
2. Stuart E. Madnick, John Donovan: Operating Systems, 2008
Tata McGraw Hill, 2008
10.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
Name of Department: - Computer Science and Engineering
Database Management
1. Subject Code: TCS-503 Course Title: System
2. Contact Hours: L: 3 T: P:
0 0
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the different issues involved in the design and implementation of a
database system.
CO2: Study the physical and logical database designs, database modeling, relational,
hierarchical, and network models.
CO3: Understand and use data manipulation language to query, update, and manage a
database.
CO4: Develop an understanding of essential DBMS concepts such as: database security,
integrity, concurrency.
CO5: Design and build a simple database system and demonstrate competence with the
fundamental tasks involved with modeling, designing, and implementing a DBMS.
CO6: Evaluate a business situation and designing & building a database application
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
10. Details of the Course:
Sl.
Contents Contact Hours
No.
Unit 1:
Introduction: An overview of DBMS; Advantages of using DBMS
approach; Database systems vs File Systems, Database system concepts
and architecture
1 Data models, schemas, and instances; Three-schema architecture and data 9
independence; Database languages and interfaces; The database system
environment; Centralized and client-server architectures; Classification of
Database Management systems.
Unit 2:
Entity-Relationship Model: Using High-Level Conceptual Data Models
2 9
for Database Design; An Example Database Application; Entity Types,
Entity Sets, Attributes and Keys; Relationship types, Relationship Sets,
Roles and Structural Constraints; Weak Entity Types; Refining the ER
Design; ER Diagrams, Naming Conventions and Design Issues;
Relationship types of degree higher than two.
Unit 5:
Transaction Management: The ACID Properties; Transactions and
Schedules; Concurrent Execution of Transactions; Lock- Based
Concurrency Control; Performance of locking; Transaction support in SQL;
5 Introduction to crash recovery; 2PL, Serializability and Recoverability; 10
Lock
9Management; Log Files; Checkpointing; Recovering from a System Crash;
Media Recovery
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. McGraw-Hill. Date K., Swamynathan S. An Introduction to
2nd 2012
Database Systems. Eight Edition. Pearson.
2. Elmasri R. and Navathe S.B., Fundamentals of Database
2nd 2012
Systems.
3. Fifth Edition.Pearson. Singh S.K., Database Systems-
2nd 2011
Concepts, Designs and Application. 2nd Edition. Pearson
4. Date, C.J. Introduction to Database Systems (Vol I & II) 8th
8th 2004
Edition. Addison- Wesley.
Reference Books
1. Silberschatz A. Korth H. F. Sudarshan S., Database System
1st 2014
Concepts. Sixth Edition
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome* CO1: Develop the notation of errors, finding of errors, roots and apply them in problem
*: solving in concern subject.
CO2: Understand the methods of interpolation techniques and apply them.
CO3: Elaborate the basics of numerical differentiation and integration and implement
them.
CO4: Explain the concepts of differential equation.
CO5: Elaborate the basics of correlation and regression, curve fitting and be able to
apply the methods from these subjects in problem solving.
CO6: Examine statistical techniques and able to relate these to real problems.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Sl. Contact
Contents
No. Hours
Unit 1: Introduction to Numbers and their accuracy, Computer Arithmetic,
Mathematical preliminaries, Errors and their Computation, General error formula,
Order of Approximation.
Solution of Algebraic and Transcendental Equation: Bisection Method,
1 Iteration method, Secant Method, Newton Raphson method, Rate of convergence 10
and their algorithms.
Solution of system of linear equations: Gauss Elimination method, Gauss Jordan
method and Gauss Seidel method and their algorithms.
Total 45
11. Suggested Books:
SL Name of Authors/Books/Publishers/Place of Edition Year of
. Publication Publication /
N Reprint
o.
Textbooks
1. Gupta C. B. Singh S. R. and Kumar Mukesh First 2016
“Engineering Mathematics for Semesters III and IV” edition
McGraw Hill Education,
2. Rajaraman V, “Computer Oriented Numerical First 2020
Methods”, Pearson Education. edition
Reference Books
1. Sastry, S. S, “Introductory Methods of Numerical Second 2009
Analysis”, Pearson Education.
2. Jain, Iyengar and Jain, “Numerical Methods for Fourth 2003
Scientific and Engineering Computations”, New Age
Int.
12 Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
. Course Outcome: After completion of the course the students will be able to:
Problem Statement 3:
3 3
Demonstration of WAIT() System Call
Problem Statement 4:
4 Implementation of ORPHAN PROCESS & ZOMBIE PROCESS 3
Problem Statement 5:
5 Implementation of PIPE 3
Problem Statement 6:
6 3
Implementation of FIFO
7 Problem Statement 7: 3
Implementation of MESSAGE QUEUE
Problem Statement 8:
8 3
Implementation of SHARED MEMORY
Problem Statement 9:
9 Implementation of FIRST COME FIRST SERVED SCHEDULING 3
ALGO
Total 45
Text Books:
7 Problem Statement 7:
WAP to interpolate numerically using Lagrange’s method.
Problem Statement 8:
8
WAP to Integrate numerically using Trapezoidal rule.
Problem Statement 9:
9
WAP to Integrate numerically using Simpson’s 1/3 rules.
Problem Statement 10:
10
WAP to Integrate numerically using Simpson’s 3/8 rules.
Problem Statement 11:
11 WAP to find numerical solution of ordinary differential equations by
Euler’smethod.
Problem Statement 12:
12 WAP to find numerical solution of ordinary differential equations
by Runge-Kutta(fourth order) method.
Problem Statement 13:
13
WAP to linear Curve fitting by least – square approximations.
Total
Text Books:
Authors Name Title Edition Publisher, Country Year
Gupta C. B. Singh Engineering 1st Edition McGraw Hill Education, 2016
S. R. and Kumar Mathematics for
Mukesh Semesters III and
IV
Rajaraman V, Computer 1st Edition Pearson Education. 2020
Oriented
Numerical
Methods”
Reference Books:
Authors Name Title Edition Publisher, Country Year
Sastry, S. S, Introductory 2nd Edition Pearson Education 2009
Methods of
Numerical
Analysis”
Jain, Iyengar and Jain Numerical 4th Edition New Age Int. 2003
Methods for
Scientific and
Engineering
Computations”,
Steven C Chapra Applied 2nd Edition McGraw Hill 2007
Numerical
Methods with
Matlab”.
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
2. Contact Hours: L: 0 T: 1 P: 2
6. Semester: 5th
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Students get practical knowledge on designing and analysis of conceptual model
and mapping of conceptual model to relational database systems.
CO2: Design and implement SQL queries using DDL and DML concepts for updation
and managing a database.
CO3: Design and implement advance SQL queries such as relational constraints,
joins, set operations, aggregate functions, and views.
CO4: Design and implement queries using optimization techniques.
CO5: Application of transaction control language (TCL), data control language
(DCL) in SQL to evaluate practical implications of DBA such as transaction,
recovery, and security.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Sl. List of problems for which student should develop program and execute Contact
No. in the Laboratory Hours
Week 1: (Store all your data in a file named `db.sql` and email it to
yourself for future reference and use in subsequent labs.)
1. Create a Scenario based ER-Models with the entities. (Hospital
Details like: Wards, Patients, Doctor, Bills etc)
Convert this ER-model into table with all the entities. (Minimum
five Entities).
Insert random data in each column of all the tables.
Update the table by applying some conditions.(For example:
using alter command)
Apply the `DELETE` and `DROP` command, and then review the
results.
Week 2:
Create a user and provide the GRANT privileges to the user on
the database then REVOKE the given privileges.
Insert any five records in the previous schema and apply the
2. rollback. Also check the results.
Add default, check, unique and not null constraints to the schema.
Insert NULL values and check the results.
Add duplicate value and try to make a column as primary key,
check what happen to the table.
Week 3: (If the Employee table is not present in the `db.sql` file,
please create it.)
Create an Employee table with the following attributes and
constraints:
Employee Table - (Employee Id. (Primary key), Name,
Department, Age (check >18), Salary, City).
Display the total number of employees.
Retrieve all information of employees whose age is 22.
3. Fetch the employee id, name, and department, whose salary >=
50000.
Print the name of the employees and label the column as "Full
Name" for those employees whose department name is 'Finance'
and age is 22.
Print the department names from the employee table without
having the duplicates.
Perform similar queries until the end of the lab session.
Week 4:
Find out the maximum and minimum salary from the employee
table.
Show the total salary and average salary of all the employees.
Show all the details of the employees who have the same salary.
4.
Display the employees name from lowest salary to the highest
salary.
Display the employee name and salary (department-wise) for
employees, whose salary is greater than or equal to 10,000 and
age is greater than 25.
Week 5:
Fetch the information of employees who belong to the city "Delhi"
or "Pune."
Print the name and department of employees whose ID is in the
range from 2001 to 2005.
Show the names of employees who belong to the same city (use
5. the IN operator).
Check whether the all employee is belongs to the same city or not.
(use ALL operator)
Check whether the all employee is belongs to the same city or not.
(use ANY operator)
Check whether the all employee is belongs to the same city or not.
(use Exists operator)
Week 6:
Show the record of employees who are working in the 'CSE'
department.
Fetch the names of employees whose names start with the letters
'ay'.
Fetch the information of employees, including their names and
departments, whose names end with the letters 'sh'.
Display the employee names and their departments of employees,
6.
whose city name starts with 'D' or ends with 'h'.
Print all records of employees whose salary is greater than 15,000
and whose name starts with 'h'.
Print the names of employees whose names consist of exactly
three letters.
Print the names of employees along with their city for those whose
names have at least five letters.
Week 7:
Create two tables named as employee and department with the
given constraints and attributes:
Employee table - (Employee Id.(Primary key), Department ID,
Name, Age (check >18), Salary, City)
Department table - (Department Id, and Department name)
7. Display the details of employees along with their corresponding
department names.
Print the names of employees who are not assigned to any
department.
Print the employee names and department names for employees
whose salary is greater than 25,000. (Using left join).
Display the names of employees along with their department
names for those who are not assigned to any department.
Print the employee names and their corresponding department
names for employees with a salary greater than 25,000. (Using
right join).
Display the names of departments along with the names of
employees who are older than 30 years.
Week 8:
Create the table to keep track of customer records and their order.
Customer table - (Name as Not null, Customer_id as primary key,
Age, Address)
Order table - (Customer_id, order_id, date).
Apply the full join and the full outer join to the schema and review
8. the results.
Display the name of the city as "destination" for customers who
have placed orders.
Apply the cross join and check the results.
Display the customer names and order IDs for customers who
have placed orders from the same city.
Week 9:
Create the Student table, Register table and Program table.
Student table - ( Roll no. as primary key, Name as not null, city)
Program table - ( Program ID as primary key, Program Name as
not null, Program Fee not less than 10000, Department)
Register table - ( Program ID and Roll no. as primary composite
key)
Display the details of students who are registered in the "MCA"
program.
Display the list of all students, who are registered in at least one
program.
9. Display the details of programs that have fees greater than the
average fee.
Display the names of students who are registered in a program
having fees less than 30000.
Display the details of students who have not registered in any
course.
Week 10:
10.
Find out the second minimum salary of an employee.
Find out the second minimum salary of an employee without using
limit, dense range, and order by clause.
Display the names and salaries of employees who earn more than
the average salary of their department.
Week 11:
Create a row level trigger for the customers table that would fire
for INSERT or UPDATE or DELETE operations performed on the
EMPLOYEE table. This trigger will display the salary difference
between the old values and new values.
Add a new employee with the salary value inserted and check the
11. result.
Try to update the existing employee salary and see what happens.
Week 12:
Case study 1: (General Hospital)
A hospital relies on a database to manage its operations effectively. This
database helps keep track of various aspects, including different wards
like the General Ward, Emergency Ward, and Specific Ward. Each ward
contains patients who are admitted based on their General Practitioner's
12. (GP) recommendation and the approval of a consultant from the hospital.
When a patient is admitted, the hospital records essential personal details
such as their name, age, gender, address, and contact information. This
information is crucial for medical and administrative purposes. Additionally,
the hospital maintains a separate register to record all medical tests and
treatments for each patient, ensuring that their medical history is
thoroughly documented. Patients may undergo multiple tests during their
stay, and the database is designed to link each patient with these test
records. Each patient is assigned a leading consultant who oversees their
treatment, but they may also be examined by other doctors if needed.
a. Specify all attributes and keys for each entity. Clearly define
relationships, such as patients being associated with wards, consultants,
and doctors, and include connections between patients and their medical
tests.
b. Define all relationships and constraints, including primary keys,
cardinality, and participation constraints. Show how a patient can undergo
multiple tests and be treated by various doctors.
Note: Model most constraints from the description. If some constraints
can't be represented, provide comments explaining the limitations.
Week 13:
Case Study 2: (Tracking the Employee Record)
An organization has implemented a detailed database system to manage
and track its employees and departmental activities. The organization is
divided into various departments, each with a unique identification number
and name. Each department is managed by a designated manager, who
is responsible for overseeing the operations within that department.
a. Specify all attributes and primary keys for each entity. Clearly define
relationships between entities, such as employees being assigned to
departments, departments managing projects, and supervisory
relationships among employees.
b. Define the relationships and constraints, including primary keys,
cardinality, and participation constraints. For example, a department can
manage multiple projects, and employees can work on multiple projects
while reporting to one or more supervisors.
Note: Include comments to address any constraints from the case study
that cannot be fully represented in the ER diagram. Ensure the diagram
accurately reflects the management of employee information,
departmental structures, and project assignments as described.
Week 14:
Case Study 2: (Trainee Record in a Institution)
Text Books
Reference Books
1. Mary Beth Roeser: [1Oracle® Database] SQL 2nd 2017
Language Reference 12c Release 1 (12.1) E41329-
25
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 5
7. Category of Course: DE
8. Prerequisite: TCS-451
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Recognize the cloud based application development platforms and
economic benefits.
CO2: Analyze the use case of various cloud service provider’s applications and
platforms.
CO3: Apply the advanced cloud computing application’s concepts.
CO4: Analyze the use case of cloud-based application deployment and
management concepts.
CO5: Explore the use case of various cloud platforms, offered services and
security aspects.
CO6: Develop and deploy the cloud based server-side application using Node.js
and the front-end using React.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
SL. Contact
Contents
NO. Hours
Unit 1:
Fundamental of Cloud Based Applications
Cloud Data centers, Software stack, Virtualization, software defined networks
1 and storage, cloud storage, and programming models, Clouds Based Application 9
development motivating factors, benefits, challenges, service models, SLAs and
security. Concepts behind data center design and management, Economic and
technological benefits of the cloud paradigm.
2 Unit 2:
Cloud Platforms in Industry 9
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: V
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Understand the common network communication primitives as part of
programming tasks in various languages.
CO3: Analyze more complex protocol engineering and network management tasks
CO5: Describe and analyze the Data Encoding and Transmission techniques.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Unit 3:
Data Encoding and Transmission: Data encoding and transmission concepts,
Digital data transmission over digital signal: NRZ encoding, Multilevel binary
encodings, Biphase encodings, Scrambling techniques, Digital data transmission
over analog signal: Public telephone system, Amplitude Shift Keying (ASK),
3 Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Performance of digital 10
to analog modulation schemes, Quadrature Amplitude Modulation (QAM), Analog
data transmission over digital signal: Digitization, Pulse Code Modulation, Non-
linear encoding, Delta modulation, Analog data transmission over analog signal:
Asynchronous transmission, Synchronous transmission, Ethernet link layer frame
example.
Unit 4:
4 Data Link Control: Introduction and services, Error detection and correction, 8
Multiple access protocols, LANs, Addressing & ARP, Ethernet, Switches, VLANs,
PPP, Link virtualization, MPLS, Data center networking, Web request processing.
Unit 5: Wireless and Mobile Networks
Reference Books
1. Seymour Lipschutz, Data Structures Schaum's Outlines, 1st 2014
McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
Name of Department: - Computer Science and Engineering
Computer System Security
1. Subject Code: Course Title:
TCS 591
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course, the students will be able to:
Outcome**: CO1: Explain different security threats and attacks.
Sl. Contact
Contents
No. Hours
Unit 1:
Introduction to System security:
Control hijacking attacks buffer overflow, integer overflow, bypassing browser
1 memory protection, Sandboxing and Isolation, Tools and techniques for writing 10
robust application software, Security vulnerability detection tools, and techniques
program analysis (static, concolic and dynamic analysis), Privileges, access
control, and Operating System Security, Exploitation techniques, and Fuzzing
Unit 2:
Software security:
2 Vulnerabilities, Attacks, and Countermeasures: Privileged programs (Set-UID 10
programs) and vulnerabilities & Privilege Separation, Buffer Overflow
vulnerability and defences, Return-to-libc attack, Race, Condition vulnerability
and attack, Dirty COW attack, Format String vulnerability and attack, Shellshock
attack, Heartbleed attack Interactivity, Annotation, and Arrangement;
Unit 3:
Web Security:
Same origin Policy, Cross site scripting attack, Cross site request forgery attack,
3 10
Sql Injection attack, Clickjacking attack, Content Security Policies (CSP) in
web, Web Tracking, Session Management and User Authentication, Session
Integrity, Https, SSL/TLS, Threat Modelling
Unit 4:
Smartphone Security:
Android vs. ioS security model, threat models, information tracking, rootkits,
4 9
Access control in Android operating system, Rooting android devices,
Repackaging attacks, Attacks on apps, Whole- disk encryption, hardware
protection, Viruses, spywares, and keyloggers and malware detection
Unit 5:
Hardware and system security:
Meltdown Attack, spectre attack, Authentication and password, Access control
5 6
concept, Access control list, Capability, Sandboxing, Threats of Hardware
Trojans and Supply Chain Security, Side Channel Analysis based Threats, and
attacks. Issues in Critical Infrastructure and SCADA Security.
Total 45
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
4. Credits: 3
5. Semester: 5
6. Category of Course: DC
7. Pre-requisite: Python
Programming
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the concepts of Artificial Intelligence and Machine
Learning with their related terminologies.
CO2: Analyze and Apply various programming skills and libraries for
understanding Data nature and its requirements.
CO3: Analyze and apply various modelling techniques for basic data
Analytics.
CO4: Demonstrate Problem Solving using ML algorithms.
CO5: Understand, Apply and Demonstrate different techniques and tools
for Analysis.
CO6: Analyze Real World Case Studies on Applications of Artificial
Intelligence and Machine Learning
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Unit 02:
2 Knowledge representation and reasoning: Agents that Reason 10
Logically, Propositional Logic and Inference,
First-Order Logic, Inference in First-Order Logic
Planning and Learning: Introduction to Planning, Types, Learning
from observations, Forms of Learning,
Inductive Learning, Reinforcement Learning
Unit 3:
Introduction to Machine Learning: What is Machine Learning,
Introduction to ML's three approaches: Supervised, Unsupervised
3 and Reinforcement Learning, Important Statistical Concepts used 10
in Machine Learning, Current Status of Machine Learning
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Deepak Khemani, A First Course in Artificial 6th 2018
Intelligence, McGraw Hill Education
2. N. P. Padhy, Artificial Intelligence and 1st 2005
Intelligent Systems, Oxford
3 B.Uma Maheshwari, R.Sujatha, Introduction to Data 1st 2021
Science, Wiley
4 Jake VanderPlas, Python Data Science Handbook, 1st 2022
O’Reilly
Reference Books
1. Stuart J. Russell and Peter Norvig, Artificial Intelligence 3rd 2009
a Modern Approach, McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
S.No. Topic
2. Contact Hours: L: 3 T: 0 P: 0
8. Pre-requisite: NIL
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Apply and Characterize computer networks from the view point of
components and from the view point of services.
CO2: Display good understanding of the flow of a protocol in general and a
network protocol in particular
CO3: Evaluate and Select the most suitable Application Layer protocol (such as
HTTP, FTP, SMTP, DNS, BitTorrent) as per the requirements of the network
application and work with available tools to demonstrate the working of these
protocols.
CO4: Design a Reliable Data Transfer Protocol and incrementally develop
solutions for the requirements of Transport Layer
CO5: Describe the essential principles of Network Layers and use IP addressing to
create subnets for any specific requirements
CO6: Evaluate and select the appropriate technology to meet Data Link Layer
requirements and design a framework to implementing TCP/IP protocol suite.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 5: Link Layer and Local Area Networks: Introduction to Link Layer and
its services, Where Link Layer is implemented? Error detection and correction
techniques: Parity checks, Checksum, CRC; Multiple Access protocols:
5 Channel Partitioning, Random Access (Slotted Aloha, Aloha, CSMA), Taking 10
Turns; Link Layer Addressing: MAC addresses, ARP, Ethernet, CSMA/CD,
Ethernet Technologies, Link Layer Switches, Switches vs Routers
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publicati
on /
Reprint
Textbooks
1. Computer Networking: “A Top Down Approach (5th edition)”, 7th 2017
Ross and Kurose, Pearson/Addison-Wesley
Reference Books
1. Andrew Tanenbaum and David Wetherhall, “Computer Networks”, 5th 2010
Prentice Hall
2. Peterson and Davie, “Computer Networks: A System Approach”, 4th 2007
Elsevier
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA HILL UNIVERSITY, DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P:
5. Credits:
6. Semester:
6th
7. Category of Course:
DE
Unit 5:
APPLICATIONS OF IMAGE PROCESSING AND COMPUTER VISION: Video
5 Surveillance Systems, Medical Diagnosis, Facial recognition system, Automatic activity 10
recognition system, Fire detection System, traffic sign detection and recognition
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Digital Image Processing, by R. C. Gonzalez, R. E. Woods 4th 2017
and S. L. Eddins , Publisher: Pearson. Edition
2. Digital Image Processing using Matlab, by R. C. Gonzalez, 2nd 2017
R. E. Woods and S. L. Eddins , Publisher: Pearson.
3. Deep Learning for Computer Vision, by Rajalingappaa 1st 2018
Shanmugamani, Publisher: O Reilly
Reference Books
1. Deep Learning with Keras by Antonio Gulli, Sujit Pal, 1st 2017
Publisher: O Reilly
2. Programming Computer Vision with Python", Jan Salem, 1st 2012
Publisher: O Reilly
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam