S8 Syllabus
S8 Syllabus
DISTRIBUTED COMPUTING
Module – 1 (Distributed systems basics and Computation model)
Distributed System – Definition, Relation to computer system components, Motivation,
Primitives for distributed communication, Design issues, Challenges and applications. A
model of distributed computations – Distributed program, Model of distributed executions,
Models of communication networks, Global state of a distributed system, Cuts of a
distributed computation, Past and future cones of an event, Models of process
communications.
Module – 2 (Election algorithm, Global state and Termination detection)
Logical time – A framework for a system of logical clocks, Scalar time, Vector time. Leader
election algorithm – Bully algorithm, Ring algorithm. Global state and snapshot recording
algorithms – System model and definitions, Snapshot algorithm for FIFO channels – Chandy
Lamport algorithm. Termination detection – System model of a distributed computation,
Termination detection using distributed snapshots, Termination detection by weight
throwing,Spanning-tree-based algorithm.
Module – 3 (Mutual exclusion and Deadlock detection)
Distributed mutual exclusion algorithms – System model, Requirements of mutual exclusion
algorithm. Lamport’s algorithm, Ricart–Agrawala algorithm, Quorum-based mutual
exclusion algorithms – Maekawa’s algorithm. Token-based algorithm – Suzuki–Kasami’s
broadcast algorithm. Deadlock detection in distributed systems – System model, Deadlock
handling strategies, Issues in deadlock detection, Models of deadlocks.
Module – 4 (Distributed shared memory and Failure recovery)
Distributed shared memory – Abstraction and advantages. Shared memory mutual exclusion
– Lamport’s bakery algorithm. Check pointing and rollback recovery – System model,
consistent and inconsistent states, different types of messages, Issues in failure recovery,
checkpoint based recovery, log based roll back recovery.
Module – 5 (Consensus and Distributed file system)
Consensus and agreement algorithms – Assumptions, The Byzantine agreement and other
problems, Agreement in (message-passing) synchronous systems with failures – Consensus
algorithm for crash failures. Distributed file system – File service architecture, Case studies:
Sun Network File System, Andrew File System, Google File System.
NETWORK SECURITY PROTOCOLS
Module-1 (Authentication Protocols)
Authentication Protocols – Mutual authentication, One way authentication. Kerberos –
Kerberos Version 4, Kerberos Version 5. X.509 Authentication service. Public Key
Infrastructure (PKI) – Trust models, Revocation.
Module-2 (E-mail Security)
Pretty Good Privacy (PGP) – Operational Description, Cryptographic keys and key rings,
Message format, PGP message generation, PGP message reception, Public key management.
S/MIME – Functionality, Messages, Certificate processing, Enhanced security services.
Module-3 (Network Layer Security and Web Security)
Internet Protocol Security (IPSec) – Overview, IP security architecture, Authentication
Header (AH), Encapsulating Security Payload (ESP), Combining Security Associations, Key
management. Internet Key Exchange (IKE) - Phases. Web Security – Web security
considerations. Secure Socket Layer and Transport Layer Security (SSL/TLS) – SSL
Architecture, SSL protocols, Cryptographic computations, Transport layer security.
Module-4 (Real-time Security and Application Layer Security)
Real-time communication security – Perfect Forward Secrecy (PFS), Denial-of-Service
protection, Endpoint identifier hiding, Live partner reassurance. Hypertext Transfer Protocol
Secure (HTTPS) – Connection initiation, Closure. Secure Shell (SSH) – Transport layer
protocol, User authentication protocol, Connection protocol. Secure Electronic Transaction
(SET) – Overview, Features, Participants, Dual signature, Payment processing.
Module-5 (System Security and Wireless Security)
Firewalls – Firewall characteristics, Types of Firewalls, Firewall configurations, Encrypted
Tunnels, Trusted systems – Data access control, The concept of Trusted Systems, Trojan
horse defense. IEEE 802.11i wireless LAN security - Services, Phases of operation, Wired
Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2.
DATA MINING
Module – 1 (Introduction to Data Mining and Data Warehousing)
Data warehouse-Differences between Operational Database Systems and Data Warehouses,
Multidimensional data model- Warehouse schema, OLAP Operations, Data Warehouse
Architecture, Data Warehousing to Data Mining, Data Mining Concepts and Applications,
Knowledge Discovery in Database Vs Data mining, Architecture of typical data mining
system, Data Mining Functionalities, Data Mining Issues.
Module - 2 (Data Preprocessing)
Data Preprocessing-Need of data preprocessing, Data Cleaning- Missing values, Noisy data,
Data Integration and Transformation, Data Reduction-Data cube aggregation, Attribute
subset selection, Dimensionality reduction, Numerosity reduction, Discretization and
concept hierarchy generation.
Module - 3 (Advanced classification and Cluster analysis)
Classification- Introduction, Decision tree construction principle, Splitting indices -
Information Gain, Gini indexDecision tree construction algorithms-ID3, Decision tree
construction with presorting-SLIQ, Classification Accuracy-Precision, Recall. Introduction
to clustering-Clustering Paradigms, Partitioning Algorithm- PAM, Hierarchical Clustering-
DBSCAN, Categorical Clustering-ROCK
Module 4: (Association Rule Analysis)
Association Rules-Introduction, Methods to discover Association rules, Apriori(Level-wise
algorithm), Partition Algorithm, Pincer Search Algorithm, Dynamic Itemset Counting
Algorithm, FP-tree Growth Algorithm.
Module 5 (Advanced Data Mining Techniques)
Web Mining - Web Content Mining, Web Structure Mining- Page Rank, Clever, Web Usage
Mining- Preprocessing, Data structures, Pattern Discovery, Pattern Analysis. Text Mining-
Text Data Analysis and information Retrieval, Basic measures for Text retrieval, Text
Retrieval methods, Text Indexing Techniques, Query Processing Techniques.
BLOCK CHAIN TECHNOLOGIES
Module – 1 (Fundamentals of Cryptography)
Introduction to Cryptography, Symmetric cryptography – AES. Asymmetric cryptography –
RSA. Elliptic curve cryptography, Digital signatures – RSA digital signature algorithms.
Secure Hash Algorithms – SHA-256. Applications of cryptographic hash functions – Merkle
trees, Distributed hash tables.
Module – 2 (Fundamentals of Blockchain Technology)
Blockchain – Definition, architecture, elements of blockchain, benefits and limitations, types
of blockchain. Consensus – definition, types, consensus in blockchain.
Decentralization – Decentralization using blockchain, Methods of decentralization, Routes to
decentralization, Blockchain and full ecosystem decentralization.
Module - 3 (Consensus Algorithms and Bitcoin)
Consensus Algorithms, Crash fault-tolerance (CFT) algorithms – Paxos, Raft. Byzantine
fault- tolerance (BFT) algorithms – Practical Byzantine Fault Tolerance (PBFT), Proof of
work (PoW), Proof of stake (PoS), Types of PoS.
Bitcoin – Definition, Cryptographic keys – Private keys, public keys, addresses. Transactions
– Lifecycle, coinbase transactions, transaction validation. Blockchain – The genesis block.
Mining – Tasks of miners, mining algorithm, hash rate. Wallets – Types of wallets.
Module - 4 (Smart Contracts and Use cases)
Smart Contracts – Definition, Smart contract templates, Oracles, Types of oracles,
Deploying smart contracts. Decentralization terminology – Decentralized applications,
Decentralized Autonomous Organizations.
Use cases of Blockchain technology – Government, Health care, Finance, Supply chain
management.
Blockchain and allied technologies – Blockchain and Cloud Computing, Blockchain and
Artificial Intelligence.
Module - 5 (Ethereum and Solidity)
Ethereum – The Ethereum network. Components of the Ethereum ecosystem – Keys and
addresses, Accounts, Transactions and messages. The Ethereum Virtual Machine, Blocks
and blockchain.
The Solidity language – The layout of a Solidity source code, Structure of a smart contract,
variables, data types, control structures, events, inheritance, libraries, functions, error
handling. Smart contracts Case study: Voting, Auction.