Sunteți pe pagina 1din 7

CE-601: THEORY OF COMPUTATION Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs

70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

Review Of Mathematical Background: Sets, Functions, Logical statements, Proofs, Relations, Languages, The Principal of Mathematical induction, the strong principle of Mathematical induction, Recursive definitions, Structural Induction. Regular languages And Finite Automata: Regular expressions, Regular languages, Memory required to recognize a language , Finite automata, Distinguishable strings, Union, intersection and complement of regular languages. Nondeterminism And Kleens Theorem: Non-deterministic finite automata, Non deterministic finite automata with ^ transitions, Kleen's theorem. Regular And Non regular language: Minimization of Finite automata, Non-regular and regular languages, Pumping Lemma, Decision problems and decision algorithms, Regular languages in relation to programming languages. Context-Free Languages And Push-Down Automata: Context-free languages, Regular Grammars , Derivation tree and ambiguity, An Unambiguous CFG , Simplified and Normal forms, Chomsky normal form. Pushdown Automata And CFL: Push-Down Automata, Definition and examples, Deterministic PDA, Types of acceptances and their equivalence, Equivalence of CFG and PDA, Introduction to parsing, Top-down and bottomup parsing, Non-CFL and CFL, Pumping Lemma for CFL, Intersection and Complement of CFL. Turing Machine: Models of computation, TM definition, Combining TMs, Computing a function with TMs. Variations on Turing Machines, Doubly infinite and more than one Tapes, Non-deterministic and Universal TM Reference Books: 1. Introduction to Languages and Theory of Computation By John C. Martin , McGraw-Hill. 2. Computation : Finite and Infinite By Marvin L. Minsky, Prentice-Hall 3. Introduction to formal languages By G. E. Reevsz, Mc-graw hill. 4. Formal language theory By M. H. Harrison

CE 602: NETWORK PROTOCOLS & PROGRAMMING Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Int Sem Total Ass End 100 25 25

Total 50

Grand Total 150

Introduction: The OSI Model and the TCP/IP Protocol Suite, Underlying Technologies. IP Addresses: Classful Addressing , Classless Addressing , Delivery, Forwarding, and Routing of IP Packets, ARP and RARP , Internet Protocol (IP) , Internet Control Message Protocol (ICMP) , Internet Group Management Protocol (IGMP) , User Datagram Protocol (UDP) ,Transmission Control Protocol (TCP) , Stream Control Transmission Protocol (SCTP) , Unicast Routing Protocols: RIP, OSPF, and BGP Multicasting and Multicast Routing Protocols: Host Configuration: BOOTP and DHCP Domain Name System (DNS) Remote Login: TELNET , File Transfer: FTP and TFTP Electronic Mail: SMTP, POP, and IMAP Network Management: SNMP , World Wide Web: HTTP Reference Book: 1. TCP/IP Protocol Suite : Third Edition BY Behrouz Forouzan, Tata-mc-graw hill. 2. TCP/IP Illustrated, Volume 1 By W. Richard Stevens

CE-603: INFORMATION SYSTEM SECURITY Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Int Sem Total Ass End 100 25 25

Total 50

Grand Total 150

Physical Protection Methods And Damage Avoidance Plans: Protection from natural disasters like fire, flood, heat, power loss, electrostatic discharge, electromagnetic, lightening etc. Detection and recovery/protection methods. Various backup methods for data. Protection From Intruders: Theft prevention by fences, multiple barriers, walls, mechanical and electronic locks, guards, lights etc. Various intruder detection methods. Hardware Access Control: Passwords, Magnetic Stripe Cards, Smart Cards, Biometric Access Controls. Attacks On Software And Access Controls: Threats like Trojan horse, Time Bombs, Logic Bombs, Viruses, Worms, Trapdoors, Salami Attack, and Software Anomalies etc. Software Access Control through passwords and other security products. Antivirus software and hardware products. File and database security. Personal Computer Security: Protection from data exposure, data destruction, and data copying. Secure Operating System: Design of secure operating system. Examples of security in general purpose operating system. Examples of operating systems designed for security. Data Base Security: Security of conventional database. Multilevel database security by partitioning, encryption, integrity locking. Computer Network Security: Introduction to encryption and its use in network security, Port protection, Node authentication. Traffic and routing control. Data integrity. Data Disposal Methods: Shredders, Overwriting Magnetic Data, Degausses, Emanation, Protection-Tempest. Reference Books: 1 Security in Computing By Charles P. Fleeger, Prentice Hall 2 Computer and Communications Security Strategies for the 1990s By J. Ranade, Consulting Edit or McGraw Hill 3 The Anti-virus Book By Saumil U. Shah, Tata McGraw Hill 4 Information Security Handbook By William Caelli, Dennis Longley and others, Macmillan Press Ltd. 5 Network Security By Richard H. Baker, McGraw Hill 6 Cryptography and Secure Communication By Man Young Rhee , McGraw Hill

CE-604: WEB TECHNOLOGY Teaching Scheme Lect 3 Prac 2 Theory Total Sem End Int Ass Marks Hrs 5 30 70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

HTML Basic: Introduction of HTML, HTML Elements, HTML Basic Tags, HTML Formatting, HTML Entities, HTML Links, HTML Frames, HTML Tables, HTML Lists, HTML Forms, HTML Images, HTML Background, HTML Colors, HTML Color-values, HTML Color-names, Meta-tags and search engine, HTML URL-encode, Publishing HTML on web. Cascaded Style Sheet: CSS Introduction, Syntax, Setting Background, Text, Font, Border, Margin, Padding, List, Dimension, Classification, Positioning, Pseudo-class, Pseudo-element, CSS Media Types, External, Internal and Inline style sheet. Java Scripts: Variables declaration, If...Else statement, Switch statement, Operators statement, Popup Boxes, Functions, For Loop, While Loop, Break Loops, For...In, Events, Try...Catch, Throw, on error, Java Script Objects String, Date, Array, Boolean, Math, JS Browser, JS Cookies, Validation, Animation, Image Maps, Timing, Create Object Introduction to Server Programming: Basic of ASP, JSP and servlets. Introduction to web server and application server. Web client and web server architecture. Web protocols and web security (Overview): TCP, IP and HTTP , Introduction of SSL Basic of .Net Framework: Net architecture, managed code, assemblies, CLR execution of assemblys code, Intermediate Language, Just in Time Compiler, Common Language Specification, Interoperability with unmanaged code. Reference Books: 1. Teach yourself HTML in 24 hours By Techmedia 2. HTML4 BIBLE By Brayn Omdex 3. ABC of Javascript By Purcell lee BPB publication 4. Pure java Script By Gilliam Johnson Techmedia 5. professional VB.NET 2003 Wrox Publications

CE-605: DISTRIBUTED SYSTEMS Teaching Scheme Lect 3 Prac 2 Total 5 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Sem Total Int Ass End 100 25 25

Total 50

Grand Total 150

Fundamentals: What is a Distributed Computing System (DCS)? Evolution of DCS, Distributed Computing System Models, Why are DCS Gaining Popularity?, What is a Distributed Operating System? Issues in Designing A DOS ? Introduction to Distributed Computing Environment(DCE). Message Passing: Introduction, Desirable Features of a Good Message Passing System, Issues in IPC by Good Message Passing, Synchronization, Buffering, Multidatagram Messages, Encoding and Decoding of Message Data, Process Addressing, Failure Handling, Group Communication. Remote Procedure Calls (RPC): Introduction, RPC Model, Transparency of RPC, Implementing RPC Mechanism, Stub Generation, RPC Messages, Marshaling Arguments and Results, Server Management, Parameter Passing Semantics, Call Semantics, Communication Protocols for RPC, Complicated RPCs, Client Server Binding, Exception Handling, Security, Some Special Types of RPCs, RPC in Heterogeneous Environments. Lightweight RPC, Optimization for Better Performance. Distributed Shared Memory (DSM): Introduction, General Architecture of DSM Systems, Design and Implementation Issues of DSM, Granuality, Structure of Shared Memory Space, Consistency models, Replacement strategy, Thrashing, Other approaches to DSM, Heterogeneous DSM, Advantages of DSM. Synchronization: Introduction , Clock Synchronization, Event ordering, Mutual Exclusion, Deadlock, Election Algorithms. Resource management: Introduction, Desirable features of a good global scheduling algorithm, Task Assignment approach, Load balancing approach, Load sharing approach. Process management: Introduction, process migration, threads. Distributed file systems: Introduction, desirable features of a good distributed file system, file models, file accessing models, file sharing semantics, file caching schemes, file replication, fault tolerance. Naming: Introduction , desirable features of good naming system, fundamental terminologies and concepts, system oriented names. Security: Potential attacks to computer systems. Reference Books: 1. Distributed Operating Systems Concept By Pradip K. Sinha

CE-606: SOFTWARE ENGINEERING Teaching Scheme Lect 4 Prac 2 Total 6 Int Ass 30 Theory Sem End Marks Hrs 70 3 Examination Scheme Practical Int Sem Total Ass End 100 25 25

Total 50

Grand Total 150

The Product The evolving role of the software, Software Characteristics, Software Application, Software: A crises on horizon, Software Myths The Process Software Engineering: A Layered Technology, Process, Methods and Tools , A generic view of Software Engineering, Software Life Cycle Models, Why uses a life cycle models?, Classical Waterfall Model, Iterative Waterfall Model, Prototyping Model, Evolutionary Model, RAD Model, Spiral Model, WIN-Win Spiral Model, Concurrent Development Model, Comparisons of Different Life Cycle Models, Software Project Management The Management Spectrum, People, The Product, Responsibilities of a Software Project Manager, Project Planning, Metrics for Project Size Estimation, Line of Code, Function Point Metrics, Project Estimation Techniques, Empirical Estimation Techniques, COCOMO: A Heuristic Estimation Technique, Halsteads Software Science: An Analytical Technique, Scheduling, Organization and Team Structure Staffing, Risk Management, Software Configuration Management Requirement Analysis And Specification Requirements gathering and analysis, SRS, Algebraic specification Software Architecture Role of a Software Architecture, Architectural View, Component and Connection View, Architecture Styles for C & C View, Evaluating Architectures Software Design What is a good software Design?, Cohesion and Coupling, Neat Arrangement, Software Design Approaches Function Oriented Software Design, Overview of SA/SD methodology, Structured Analysis, Data Flow Diagrams, Primitive symbols used for constructing DFD, Some important concepts associated with designing DFDs, Developing the DFD model of a system, Short coming of the DFD model, Structured design, Flowchart Vs Structured chart, Transformation of a DFD model into structured chart, Detailed Design, Design review Object Modeling using UML Overview of object oriented concepts, Basic mechanisms, Key concepts, related technical terms, Advantage of OOD, Unified modeling language (UML), UML diagrams, Use Case Model, Representation of Use Cases, Why develop the Use Case Diagram?, How to Identify the Use Cases of a System?, Essential Vs Real Use Case, Factoring of commonality among use case, Use Case Packing, Class Diagrams, Interaction Diagrams, Activity Diagrams, State chart Diagrams

Coding And Testing, Coding, coding standards and guidelines, Code review, Code walk-through, Code inspection, Clean room testing, Software documentation, Testing, What is testing?, Verification Vs Validation, Design of test cases, Testing in large Vs testing in small, Unit testing, Driver and stub Modules, Black-Box testing, Equivalence class partitioning, Boundary value analysis, Summary of the

Black-Box test suite design, White-Box testing, Statement coverage, Branch coverage, Condition coverage, Path coverage, McCabes Cyclomatic Complexity Metric, Dataflow based testing, Mutation testing, Debugging, Debugging approaches, Debugging guidelines, Program analysis tools, Static analysis tool, Dynamic analysis tool, Integration testing, phased Vs Incremental integration testing, System Testing, Performance testing,Error seeding Software Maintenance Characteristic of Software Maintenance, Types of Software Maintenance, Characteristics of Software Evolution, Special problems associated with Software Maintenance, Software reverse Engineering, Software maintenance process model, Estimation of maintenance course Reference Books: 1. Fundamentals of Software Engineering By Rajib Mall 2. An Integrated Approach to Software Engineering By Pankaj Jalote 3. Software Engineering : A Practitioner's Approach By R. S . Pressman 4. Fundamentals of Software Engineering By Ghezzi 5. Software Engineering By K. K. Aggarwal & Yogesh Singh 6. Software Engineering : Principles, Tools and Techniques By Sangeeta Sabharwal

S-ar putea să vă placă și