Sem 4 Syllabus
Sem 4 Syllabus
Course Objectives
The objectives of this course are as follows:
1) Understand the basic components and functions of computer networks, including
network topologies, protocols, and networking devices.
2) Understand need of layered architecture and differentiate OSI and TCP/IP
3) Gain an understanding of error and flow control techniques on communication
channels.
4) Explore routing algorithms and its application.
5) Get a brief idea about network analysis tools (Wireshark, NMAP).
Course Outcomes
The outcomes of this course are as follows:
CO1: Evaluate network devices functionality and network command significance.
CO2: Evaluate and address problems of error control, flow control, and channel
access.
CO3: Analyze and adopt fundamental workings of routing algorithms.
CO4: Create solutions for recent challenges in large-scale networks.
CO5: Apply knowledge of network traffic analysis tool to investigate network activities.
CO-PO Mapping
Program
Outcomes
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
Outcomes
CO 1 2 2 2 3 - - - - 2 - - 3 - - -
CO 2 - 2 3 2 - - - - - - - 3 2 - -
CO 3 2 3 3 3 2 2 - - 2 - - 3 3 2 -
CO4 3 3 3 3 2 - - 2 2 - 2 3 2 3 -
CONFIDENTIAL | 161
CO5 2 3 3 3 3 3 - 2 2 2 3 3 3 3 -
Average 1.8 2.6 2.8 2.8 1.4 1 - 0.8 1.6 0.4 1 3 2 1.6 -
Syllabus
Logical Link Control (LLC) sub-layer: Framing, Data Communication Character Codes,
Error Control: Error Detection (Redundancy Checking: VRC, Checksum, LRC, CRC);
Retransmission, Error Correction: Forward Error Correction (Hamming Code),
Character Synchronization, Reliable transmission and Automatic Repeat Request
(ARQ) protocols including Stop-and-Wait, Go-back-N, Selective Repeat; Performance
analysis of ARQ protocols; Example protocols such as HDLC and PPP.
CONFIDENTIAL | 162
Network Layer Design Issues, Network Address Translation, Internet Protocol (IP):
IPv4 and IPv6 addressing; IP Addressing Techniques: Classful Addressing, Classless
Addressing, Network and Host Identification, Loopback Address, Broadcast Address,
Address Masking; Networks and Subnetworks: Subnetting, Subnet Mask,
Supernetting; Network-Layer Protocols: ARP, RARP, IP datagram; Internetworking:
Routing and Routing protocols (distance-vector and link-state); Interior and Exterior
Gateway Protocol concepts; Routing Algorithms including Dijkstra's algorithm and
distributed Bellman-Ford algorithm; Example protocols: OSPF, RIP, BGP,
Encapsulation and Tunneling, Congestion Control, Quality of Service, Introduction of
Wireshark Tool.
Reference Books
1. Walter Goralski, "The illustrated network: how TCP/IP works in a modern network",
2nd Edition, Morgan Kaufmann, 2017.
CONFIDENTIAL | 163
2. Andrew S. Tanenbaum, "Computer Networks", 5th Edition, Pearson Education,
2023.
CONFIDENTIAL | 164
Course Code Course name L T P C
CSEG2165 Data communication and Networks Lab 0 0 2 1
Total Units to be Covered: 12 Total Contact Hours: 30
Prerequisite(s): Syllabus version: 1.0
Course Objectives
The objectives of this course are as follows:
1. Understand the basic components and functions of computer networks, including
network topologies, protocols, and networking devices.
2. Gain an understanding of error and flow control techniques on communication
channels.
3. Explore IP addressing, subnetting, routing algorithms and their application.
4. Get a brief idea about network analysis tools (Wireshark, NMAP).
Course Outcomes
The outcomes of this course are as follows:
CO1: Evaluate network devices functionality and network command significance.
CO2: Implement error control algorithm.
CO3: Analyze and implement routing algorithms.
CO4: Implement and evaluate various network topologies.
CO5: Familiarize with network simulator and network traffic analysis tools.
CO-PO Mapping
Program
Outcomes
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
Outcomes
CO 1 - - - - 2 - - - - - - - 2 - -
CO 2 - - - - 2 - - - - - - - 2 - -
CO 3 - - - - 2 - - - - - - - 2 - -
CO 4 - - - - 2 - - - - - - - 2 - -
CO 5 - - - - 2 - - - - - - - 2 - -
- - - - 2 - - - - - - - 2 - -
Average
CONFIDENTIAL | 165
3 – Strongly Mapped (High) “_” means there is no correlation
List of Experiments
Reference Books
1. W. Tomasi, "Introduction to data communications and networking", 5th edition,
Prentice-Hall, Inc., 2008.
CONFIDENTIAL | 166
Examination Scheme: Continuous Assessment
CONFIDENTIAL | 167
Course Code Course name L T P C
CSEG2020 Object Oriented Programming 3 0 0 3
Total Units to be Covered: 6 Total Contact Hours: 45
Prerequisite(s): Programming in C Syllabus version: 1.0
Course Objectives
1. Understand the need for OOPs and develop Java programs with object-oriented
features.
2. Learn the concepts of JDBC and develop standalone application with GUI Panel.
3. Design & implement Java applications for real world scenarios.
Course Outcomes
CO-PO Mapping
Program
Outcomes
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
Outcomes
CO 1 1 - - - - - - - - - - - 2 3 -
CO 2 - 3 3 - - - - - - - - - 2 3 -
CO 3 - 3 3 - - - - - - - - - 2 3 -
CO 4 - - - 2 - - 1 - 2 2 - - 2 3 -
- - - - - -
Average .25 1.5 1.5 .5 .25 .5 1 2 3
Syllabus
CONFIDENTIAL | 168
Unit I: Introduction to OOPs 5 Lecture Hours
Unit IV: Generics, Lambdas, GUI Swing & Database Connectivity 8 Lecture
Hours
CONFIDENTIAL | 169
Collections, Iteration, Collection Interface, Set and SortedSet, List, Map and
SortedMap, Wrapped Collections and Collections Class, Wrapper classes and loading
classes.
Create Standalone Java Project, Designing of UML and database diagrams, GUI
Panel development using swing, Establish connection with Database and Panel.
Source Code Management and Collaboration using Git/GitHub. Unit Testing using
JUnit, Integration Testing, Build and Artifactory Management.
2. Allen B. Downey and Chris Mayeld, "Think Java: How to Think Like a Computer
Scientist", 2nd Edition, O'Reilly Media Publishers, 2020.
Reference Books
1. Herbert Schildt, "Java: The Complete Reference", 12th Edition, McGraw Hill
Publisher, 2022.
CONFIDENTIAL | 170
Course Code Course name L T P C
CSEG2120 Object Oriented Programming Lab 0 0 2 1
Total Units to be Covered:11 Total Contact Hours: 30
Prerequisite(s): Programming in C Lab Syllabus version: 1.0
Course Objectives
1. Design and code the programs using java concepts.
2. Utilize the flexibility and modularity provided by OOPs using Java.
3. Implement Exception handling and Multithreading in Java
4. Develop server side applications using design patterns and data base
connectivity
Course Outcomes
CO-PO Mapping
Program
Outcomes
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
Outcomes
CO 1 1 2 2 - 2 - - - - - - - 1 3 -
CO 2 1 2 2 2 2 - - - - - - - 1 3 -
CO 3 1 2 2 1 2 - - - - - - - 1 3 -
CO 4 1 2 2 - 2 - - - - - - - 1 3 -
1 2 2 .75 2 - - - - - - - 1 3 -
Average
CONFIDENTIAL | 171
List of Experiments
Experiment 4 Inheritance
Experiment 5 Interface
Experiment 6 Package
Experiment 7 Exceptions
Experiment 10 JDBC
Experiment 11 Servlets
Textbooks
1. Ken Arnold, and James Gosling, "The Java Programming Language", 3rd Edition,
Pearson, 2018.
Reference Books
CONFIDENTIAL | 172
Examination Scheme
CONFIDENTIAL | 173
Course Code Course name L T P C
CSEG2064 Software Engineering 3 0 0 3
Total Units to be Covered: 5 Total Contact Hours: 45
Prerequisite(s): Basic Knowledge of Programming Syllabus version: 1.0
Course Objectives
1. To explore software development methodologies (waterfall, agile, DevOps) and
their integration of testing, quality assurance, reliability, and risk management.
2. To comprehend software requirements engineering and develop skills in
creating well-structured Software Requirements Specifications (SRS).
3. To acquire understanding of planning a software project, its cost estimation
models and to understand the software quality models.
Course Outcomes
CO-PO Mapping
Program
Outcomes
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
Outcomes
CO 1 2 3 2 2 1 - - - 2 - 3 - 1 2 -
CO 2 2 3 2 2 1 - - - 2 - 3 - 1 2 -
CO 3 2 3 2 3 1 - - - 2 - 3 - 1 2 -
CO 4 2 3 2 3 1 - - - 2 - 3 - 1 2 -
- - - - - -
Average
2 3 2 2.5 1 2 3 1 2
CONFIDENTIAL | 174
1 – Weakly Mapped (Low) 2 – Moderately Mapped (Medium)
Syllabus
CONFIDENTIAL | 175
techniques; Dynamic analysis methods; Software Fault Tolerance; Software
Maintenance and Reliability; Reliability Assessment and Evaluation; Methods for
assessing and quantifying software reliability; Case Studies and Real-world
Applications.
Unit IV: Software Testing, metrics and Quality Assurance 10 Lecture Hours
Testing types and techniques such as black box, white box, and gray box testing,
functional and structural testing; Test-driven development, code coverage, and quality
metrics; Testing process, design of Test cases, testing techniques - boundary value
analysis - equivalence class testing - decision table testing, cause-effect graphing,
path testing, data flow testing, and mutation testing. Unit, integration, system, alpha,
and beta testing, debugging techniques; verification and validation techniques, levels
of testing, regression testing, quality management activities, product and process
quality standards (ISO9000, CMM), metrics understanding (process, product, project
metrics), size metrics (LOC, Function Count, Albrecht FPA), product metrics, metrics
for software maintenance, cost estimation techniques (static, single variable,
multivariable models), cost-benefit evaluation techniques, Testing tools and standards
such as Jira and Selenium, test automation frameworks and tools (Selenium, Appium,
JUnit), performance testing and load testing, and defect management and root cause
analysis.
McCall quality factors, ISO and CMM Model, Tools and Techniques for Quality Control,
Pareto Analysis, Statistical Sampling, Quality Control Charts and the seven Run Rule.
Modern Quality Management, Risk Management – importance, types, process and
phases, qualitative and quantitative risk analysis, Risk Analysis and Assessment, Risk
Strategies, Risk Monitoring and Control, Risk Response and Evaluation. Software
Reliability: Reliability Metrics, Reliability Growth Modeling. Use Case: Defect Tracking
and Management. Test Automation Tools: Jira, Selenium:, Appium; JUnit.
CONFIDENTIAL | 176
1. Roger S. Pressman, "Software Engineering: A practitioner's approach", 7th
Edition, McGraw Hill, 2009.
Reference Books
1. James F. Peters, and Witold Pedrycz, "Software Engineering: an Engineering
approach", John Wiley, 2007.
CONFIDENTIAL | 177
Course Code Course name L T P C
Exploratory-2 3 0 0 3
Total Units to be Covered: Total Contact Hours:
Prerequisite(s): Syllabus version: 1.0
Exploratory courses offered by different schools , student has a choice to opt desired
course from the available tracks .
CONFIDENTIAL | 178
Course Code Course name L T P C
MATH2059 Linear Algebra 3 0 0 3
Total Units to be Covered: 6 Total Contact Hours: 45
Discrete Mathematics, Advanced Engineering
Prerequisite(s): Syllabus version: 1.0
Mathematics 1 & 2
Course Objectives
The course aims to
3. Empower the students to learn and formulate problems using linear Algebra in
science, engineering including emerging areas like data analytics and deep
learning.
Course Outcomes
CO-PO Mapping
Program
Outcomes PS
Course PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
O3
Outcomes
CONFIDENTIAL | 179
CO 1 2 2 2 3 - - - - 2 - - 3 - - -
CO 2 1 2 3 2 - - - - - - 3 2 - -
CO 3 2 3 3 3 2 2 - - 2 - - 3 3 2 -
CO 4 3 3 3 3 2 - - 2 2 - 2 3 2 2 -
2 2.5 2.75 2.75 1 .5 - .5 1.5 - .5 3 1.75 1 -
Average
Syllabus
CONFIDENTIAL | 180
Applications of linear transformation: Data Smoothing, Image scaling, Recap of Unit
III.
Computational Approach
CONFIDENTIAL | 181
2. G. Williams, "Linear Algebra with Applications", 8th Edition, Jones and Bartlett
Learnings, 2012.
Reference Books
1. I. Goodfellow, Y. Bengio, and A. Courville, "Deep Learning", The MIT Press, 2016.
3. D. C. Lay, Steven R. Lay, and Judi J. McDonald, "Linear Algebra and its
Applications", 5th Edition, Pearson Education India, 2023.
CONFIDENTIAL | 182