Niesyll
Niesyll
Text Books:
1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff: “UNIX Network Programming”. Volume 1,
Third Edition, Pearson 2004.
Reference Books:
1. Barry Nance: “Network Programming in C”, PHI 2002 3.Bob Quinn, Dave Shute: “Windows
Socket Network Programming”, Pearson 2003.
2. Richard Stevens: “UNIX Network Programming”. Volume 2, Second Edition.
CLOUD COMPUTING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – I
Subject Code 16SCS12/16SCE12
16SIT22/16SSE254 IA Marks 20
16SCN22/16LNI151
Number of Lecture Hours/Week 03 Exam Marks 80
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 03
Course objectives: This course will enable students to
Define and Cloud, models and Services.
Compare and contrast programming for cloud and their applications
Explain virtuaization, Task Scheduling algorithms.
Apply ZooKeeper, Map-Reduce concept to applications.
Module 1 Teaching
Hours
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery 8 Hours
models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon,
Cloud computing the Google perspective, Microsoft Windows Azure and online services,
Open-source software platforms for private clouds, Cloud storage diversity and vendor
lock-in, Energy use and ecological impact, Service level agreements, User experience
and software licensing. Exercises and problems.
Module 2
Cloud Computing: Application Paradigms.: Challenges of cloud computing, 8 Hours
Architectural styles of cloud computing, Workflows: Coordination of multiple activities,
Coordination based on a state machine model: The Zookeeper, The Map Reduce
programming model, A case study: The Gre The Web application, Cloud for science and
engineering, High-performance computing on a cloud, Cloud computing for Biology
research, Social computing, digital content and cloud computing.
Module 3
Cloud Resource Virtualization: Virtualization, Layering and virtualization, Virtual 8 Hours
machine monitors, Virtual Machines, Performance and Security Isolation, Full
virtualization and paravirtualization, Hardware support for virtualization, Case Study:
Xen a VMM based paravirtualization, Optimization of network virtualization, vBlades,
Performance comparison of virtual machines, The dark side of virtualization, Exercises
and problems
Module 4
Cloud Resource Management and Scheduling: Policies and mechanisms for resource 8 Hours
management, Application of control theory to task scheduling on a cloud, Stability of a
two-level resource allocation architecture, Feedback control based on dynamic
thresholds, Coordination of specialized autonomic performance managers, A utility-
based model for cloud-based Web services, Resourcing bundling: Combinatorial
auctions for cloud resources, Scheduling algorithms for computing clouds, Fair queuing,
Start-time fair queuing, Borrowed virtual time, Cloud scheduling subject to deadlines,
Scheduling MapReduce applications subject to deadlines, Resource management and
dynamic scaling, Exercises and problems.
Module 5
Cloud Security, Cloud Application Development: Cloud security risks, Security: The 8 Hours
top concern for cloud users, Privacy and privacy impact assessment, Trust, Operating
system security, Virtual machine Security, Security of virtualization, Security risks posed
by shared images, Security risks posed by a management OS, A trusted virtual machine
monitor, Amazon web services: EC2 instances, Connecting clients to cloud instances
through firewalls, Security rules for application and transport layer protocols in EC2,
How to launch an EC2 Linux instance and connect to it, How to use S3 in java, Cloud-
based simulation of a distributed trust algorithm, A trust management service, A cloud
service for adaptive data streaming, Cloud based optimal FPGA synthesis .Exercises and
problems.
Course Outcomes
The students should be able to:
Compare the strengths and limitations of cloud computing
Identify the architecture, infrastructure and delivery models of cloud computing
Apply suitable virtualization concept.
Choose the appropriate cloud player
Address the core issues of cloud computing such as security, privacy and interoperability
Design Cloud Services
Set a private cloud
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Dan C Marinescu: Cloud Computing Theory and Practice. Elsevier(MK) 2013.
Reference Books:
1. Rajkumar Buyya , James Broberg, Andrzej Goscinski: Cloud Computing Principles and
Paradigms, Willey 2014.
2. John W Rittinghouse, James F Ransome:Cloud Computing Implementation, Management
and Security, CRC Press 2013.
MULTIMEDIA COMMUNICATIONS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – I
Subject Code 16SCN21/16LNI152 IA Marks 20
Number of Lecture Hours/Week 03 Exam Marks 80
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 03
Course objectives: This course will enable students to
Define the Multimedia Communication Models
Explain Multimedia Transport in Wireless Networks
Solve the Security issues in multimedia networks
Illustrate real-time multimedia network applications.
Explain different network layer based application.
Module 1 Teachin
g Hours
Introduction, multimedia information representation, multimedia networks, multimedia 8 Hours
applications, Application and networking terminology, network QoS and application
QoS, Digitization principles,. Text, images, audio and video.
Module 2
Text and image compression,, compression principles, text compression- Runlength, 8 Hours
Huffman, LZW, Document Image compression using T2 and T3 coding, image
compression- GIF, TIFF and JPEG
Module 3
Audio and video compression, audio compression – principles, DPCM, ADPCM, 8 Hours
Adaptive and Linear predictive coding, Code-Excited LPC, Perceptual coding, MPEG
and Dolby coders video compression, video compression principles.
Module 4
Video compression standards: H.261, H.263, MPEG, MPEG 1, MPEG 2, MPEG-4 and 8 Hours
Reversible VLCs, MPEG 7 standardization process of multimedia content description,
MPEG 21 multimedia framework.
Module 5
Notion of synchronization, presentation requirements, reference model for 8 Hours
synchronization, Introduction to SMIL, Multimedia operating systems, Resource
management, process management techniques.
Course Outcomes
The students should be able to:
Deploy the right multimedia communication models.
Apply QoS to multimedia network applications with efficient routing techniques.
Solve the security threats in the multimedia networks.
Develop the real-time multimedia network applications
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Fred Halsall, “Multimedia Communications”, Pearson education, 2001.
2. Raif Steinmetz, Klara Nahrstedt, “Multimedia: Computing, Communications and Applications”,
Pearson education, 2002.
Reference Books:
1. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, “Multimedia Communication
Systems”, Pearson education, 2004.
2. John Billamil, Louis Molina, “Multimedia : An Introduction”, PHI, 2002.
ETHERNET TECHNOLOGY
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – I
Subject Code 16LNI153 IA Marks 20
Number of Lecture Hours/Week 03 Exam Marks 80
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 03
Course objectives: This course will enable students to
Define with the basics of Ethernet
Explain concepts of different types of Ethernet
Analyze building an Ethernet system
Acquire knowledge of hubs and repeaters
Module 1 Teaching
Hours
Introduction: Introduction to Ethernet, The Evolution of Ethernet, The Ethernet 8 Hours
System, The Media Access Control Protocol The media Access Control Protocol Full
Duplex Ethernet Auto-Negotiation
Module 2
Ethernet Media Systems: Ethernet Media Fundamentals Twisted-Pair Media 8 Hours
System(10Base-T) Fiber Optic Media System(10Base-F) Fast Ethernet Twisted-Pair
Media System(100Base-TX)
Module 3
Fast Ethernet Fiber Optic Media System(100Base-FX) Gigabit Ethernet Twisted-Pair 8 Hours
Media System(1000Base-T) Gigabit Ethernet Fiber Optic Media System (1000Base-X)
Module 4
Multi-Segment Configuration Guidelines Building Your Ethernet System: s tructured 8 Hours
Cabling Twisted-Pair Cables and Connectors Fiber Optic Cables and Connectors
Module 5
Ethernet Repeater Hubs Ethernet Switching Hubs Performance and troubleshooting: 8 Hours
Ethernet Performance Troubleshooting.
Course Outcomes
The students should be able to:
Classify different types of Ethernet systems
Contrast Ethernet Media systems
Evaluate a complete Ethernet system
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Charles E. Spurgeon: “Ethernet – The Definitive Guide”, O’Reilly 2004.
Reference Books:
1. Rich Seifert: “Gigabit Ethernet”, Addison-Wesley 1998.
NETWORK MANAGEMENT
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – I
Subject Code 16LNI154 / 16SCN23 IA Marks 20
Number of Lecture Hours/Week 03 Exam Marks 80
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 03
Course objectives: This course will enable students to
Evaluate need for interoperable network management.
Explain the concepts and architecture behind standards based network management.
Illustrate the concepts and terminology associated with SNMP and TMN
Demonstrate network management as a typical distributed application
Module 1 Teaching
Hours
Introduction: Analogy of Telephone Network Management, Data and 8 Hours
Telecommunication Network Distributed computing Environments, TCP/IP-Based
Networks: The Internet and Intranets, Communications Protocols and Standards-
Communication Architectures, Protocol Layers and Services; Case Histories of
Networking and Management – The Importance of topology , Filtering Does Not
Reduce Load on Node, Some Common Network Problems; Challenges of Information
Technology Managers, Network Management: Goals, Organization, and Functions-
Goal of Network Management, Network Provisioning, Network Operations and the
NOC, Network Installation and Maintenance; Network and System Management,
Network Management System platform, Current Status and Future of Network
Management.
Module 2
Basic Foundations: Standards, Models, and Language: Network Management Standards, 8 Hours
Network Management Model, Organization Model, Information Model – Management
Information Trees, Managed Object Perspectives, Communication Model; ASN.1-
Terminology, Symbols, and Conventions, Objects and Data Types, Object Names, An
Example of ASN.1 from ISO 8824; Encoding Structure; Macros, Functional Model.
Module 3
SNMPv1 Network Management: Managed Network: The History of SNMP 8 Hours
Management, Internet Organizations and standards, Internet Documents, The SNMP
Model, The Organization Model, System Overview. The Information Model –
Introduction, The Structure of Management Information, Managed Objects,
Management Information Base. The SNMP Communication Model – The SNMP
Architecture, Administrative Model, SNMP Specifications, SNMP Operations, SNMP
MIB Group, Functional Model SNMP Management – RMON: Remote Monitoring,
RMON SMI and MIB, RMONI1- RMON1 Textual Conventions, RMON1 Groups and
Functions, Relationship Between Control and Data Tables, RMON1 Common and
Ethernet Groups, RMON Token Ring Extension Groups, RMON2 – The RMON2
Management Information Base, RMON2 Conformance Specifications.
Module 4
Broadband Network Management: Broadband Access Networks and Technologies: 8 Hours
Broadband Access Networks, Broadband Access Technology; HFCT Technology: The
Broadband LAN, The Cable Modem, The Cable Modem Termination System, The HFC
Plant, The RF Spectrum for Cable Modem; Data Over Cable, Reference Architecture;
HFC Management – Cable Modem and CMTS Management, HFC Link Management,
RF Spectrum Management, DSL Technology; Asymmetric Digital Subscriber Line
Technology – Role of the ADSL Access Network in an Overall Network, ADSL
Architecture, ADSL Channeling Schemes, ADSL Encoding Schemes; ADSL
Management – ADSL Network Management Elements, ADSL Configuration
Management, ADSL Fault Management, ADSL Performance Management, SNMP -
Based ADSL Line MIB, MIB Integration with Interfaces Groups in MIB-2, ADSL
Configuration Profiles
Module 5
Network Management Applications: Configuration Management- Network 8 Hours
Provisioning, Inventory Management, Network Topology, Fault Management- Fault
Detection, Fault Location and Isolation 24 Techniques, Performance Management –
Performance Metrics, Data Monitoring, Problem Isolation, Performance Statistics; Event
Correlation Techniques – Rule-Based Reasoning, Model-Based Reasoning, Case Based
Reasoning, Codebook correlation Model, State Transition Graph Model, Finite State
Machine Model, Security Management – Policies and Procedures, Security Breaches
and the Resources Needed to Prevent Them, Firewalls, Cryptography, Authentication
and Authorization, Client/Server Authentication Systems, Messages Transfer Security,
Protection of Networks from Virus Attacks, Accounting Management, Report
Management, Policy- Based Management, Service Level Management.
Course Outcomes
The students should be able to:
Analyze the issues and challenges pertaining to management of emerging network technologies
such as wired/wireless networks and high-speed internets.
Apply network management standards to manage practical networks
Formulate possible approaches for managing OSI network model.
Use on SNMP for managing the network
Use RMON for monitoring the behavior of the network
Identify the various components of network and formulate the scheme for the managing them
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Mani Subramanian: Network Management- Principles and Practice, 2nd Pearson Education, 2010.
Reference Books:
1. J. Richard Burke: Network management Concepts and Practices: a Hands-On Approach, PHI,
2008.
SEMINAR
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – I
Subject Code 16SCE17 / 16SCN17 /
16LNI17 / 16SIT17 /
IA Marks 100
16SSE17 / 16SCS17 /
16SFC17
Number of Lecture Hours/Week ---- Exam Marks -
Total Number of Lecture Hours ---- Exam Hours -
CREDITS – 01
Course objectives: This course will enable students to
Motivate the students to read technical article
Discover recent technology developments
Descriptions
The students should read a recent technical article (try to narrow down the topic as much as possible)
from any of the leading reputed and refereed journals like:
IEEE Transactions, journals, magazines, etc.
ACM Transactions, journals, magazines, SIG series, etc.
Springer
Elsevier publications etc
In the area of (to name few and not limited to)
Web Technology
Cloud Computing
Artificial Intelligent
Networking
Security
Data mining
Course Outcomes
The students should be able to:
Conduct survey on recent technologies
Infer and interpret the information from the survey conducted
Motivated towards research
Conduction:
The students have to present at least ONE technical seminar on the selected topic and submit a report
for internal evaluation.
Marks Distribution: Literature Survey + Presentation (PPT) + Report + Question & Answer
+ Paper: 20 + 30 + 30 + 20 (100).