B.TECH.(Information Technology) (IT-452) Information Technology Applications
|
|
- Hollie Beasley
- 5 years ago
- Views:
Transcription
1
2 B.TECH.(Information Technology) (IT-452) Information Technology Applications L T Exam Sess. Duration Hrs. Unit- 1 History of IT, Basic Information Technology Concepts. Human- Computer Interface, Social Implication of IT, privacy and Security. Unit- 2 Integrated management information, Definition of Engineering, Principles of Business Engineering, Business Engineering with Information Technology, Building the Business Model ERP Implementation- An overview, Role of Consultant, Vendors and Users, Customization, Precautions, ERP post Implementation options, ERP Implementation Technology, Guidelines for ERP Implementation. ERP Domain MPG/PRO, IFS/Avalon-Industrial and Financial System, BAN-IV, SAPMarketing of ERP- Market Dynamics and Dynamic strategy. Unit-3 SAP, SAP past present and future, The integrated R/3 repository, Enterprise and modeling with R/3, Object of R/3 data dictionary, Customizing R/3: Concepts and techniques. Unit- 4 Multi Client Server Solution- Open Technology-User interface-application Integration Basic architectural Concept, The System Control Interface, Services-Presentation Interface- Database Interface. Books Recommended: Jost Antonio Fernandz- The SAP R/3 Hand Book TMH New Delhi V.K. Garg and N.K. Venkita Krishna, Enterprise Resource planning Concepts and Practice Note: These will be 8 questions in all. Two questions will be set from each unit. Students are required to attempt five questions selecting at least one question from each unit.
3 TECHNOLOGY EDUCATION & RESEARCH INTEGRATED INSTITUTIONS, KKR Instruction Plan (TLP 1) Session: Semester: Even / Name of Faculty: Department: CSE Subject Name and Code: Batch Name/Discipline: CSE L ( 4) T ( 2) P ( 3) UNIT 1 1. What do you mean by Human Computer Interface with History of IT? 2. Discuss Basic information Technology Concepts in detail. 3. What are the privacy issues in information technology? 4. Explain Security of Information Technology. UNIT 2 1. What is ERP Implementation? Discuss guidelines of ERP implementation and roles of vendors, users and consultant in ERP. 2. Explain Business Engineering and building a business model. 3. Discuss IFS/Avalon-Industrial and Financial System. 4. Explain Marketing of ERP-Market Dynamics and Dynamic strategy. 5. What is ERP Domain MPG/PRO? UNIT 4 1. What is SAP? Explain Past, Present and Future of SAP. 2. What do you mean by integrated R/3 repository? 3. Discuss Enterprise and modeling of R/3. 4. What are the objects of data dictionary?
4 SEMESTER B.TECH.(Information Technology) (IT-454) MOBILE COMMNICATION L T Exam Sess Duration Hrs. Unit-1 Introduction: Introduction cell mobile system, tuning efficiency, mobile radio environment, frequency reuse, co Channel interface reduction, and handoff mechanism cell cite and mobile antennas, noncochannel interface. Frequency spectrum utility and management channel management, type of handoff and Dropped call rat, cell splitting. Analog and digital modulation techniques, performance of various modulations, spectra Efficiency, and error rate, GMSK, GFSK, DQPSK modulation technique in wireless system Comparison of various modulation techniques. Unit-2 Point to point model propagation over terrains, Losses, Power requirements, Smart Antennas, Antennas at cite, gain and pattern relationship mobile antennas, tilting effect, parasitic elements Usage, diversity techniques. Unit-3 Digital technology, digital speech, digital mobile telephony, GSM, Multiples access techniques, north TDMA, American TDMA (ISI36), Japauer cellular TDMA (DDC), CDMA, ISFS North American CDMA standards, PCS, PHS, Advanced system, GPRS, UMTS, IMT, WAP. Unit-4 Satellite system architectue, satellite orbit and constellations, LEO and MEO system, GPS Information, Iridium, MSAT, VSAT, BBT, Orbcomm satellite service, use of mobile Communication networks, concepts, advanced mobile communication system using satellite. Book Recommended Rapp apart T.S, Wireless communication, Prentice Hall, NJ GSM, CDMA & 3G System- steel Lee and Gluis, JW. K.FEHER- Wireless Digital engineering Mobile Satellite communication Engineering-Rechards Addison Wesley. Lee, WCY, Mobile Communication Engineering, TMIH, New Delhi. Note: These will be 8 questions in all. Two questions will be set from each unit. Students are required to attempt five questions selecting at least one question from each unit.
5 TECHNOLOGY EDUCATION & RESEARCH INTEGRATED INSTITUTIONS, KKR Instruction Plan (TLP 1) Session: Semester: Even Name of Faculty: Department: CSE Subject Name and Code: Batch Name/Discipline: CSE L ( 4) T ( 2) P ( 3) UNIT 1 Q1 Give Brief introducation cell mobile system? Q2 What is tunning efficiency? Q3 What is Frequency Reuse?Brifly Describe Co-channel interference? Q4 What is handoff mechanism? What is soft and hard handoff? Q5 Briefly Describe Frequency spectrum utility? UNIT 2 Q6 What are analog and digital modulation techniques?give performance of various modulation techniques? Q7 What is spectra efficiency & error rate? Q8 Compare various modulation techniques? Q9What is point to point model propagation? Q10What are Smart Antennas?What is antenna at site? UNIT 3 Q11 What is gain and pattern relationship mobile antennas? Q12 What are losses &powewr requirements over terrains? Q13 What are different Multiple Access Techniques?
6 Q14 Compare different multiple access techniques? Q15 Briefly Explain- (a) American TDMA (b) Japauer Cellular TDMA (c) ISFS North American CDMA Standards (d) PCS &PHS (e) GPRS,UMTS,IMT,WAP UNIT 4 Q16 Brifly explain Satellite System Architecture? Q17 Explain Satellite orbit & constellation? Q18 Explain LEO &MEO satellite system? Q19Brifly explain-iridium,msat,vsat Q20 Explain advanced mobile system using satellite?
7 VIII SEMESTER B.TECH.(Information Technology) (IT-456) Advance Computer Network & Applications L T Exam Sess Duration Hrs. UNIT 1 Introduction: Overview of computer networks, seven-layer architecture, TCP/IP suite of protocols etc. MAC protocols for high-speed LANs, MANs and wireless LANs.(For example, FDDI, DQDB, HIPPI, Gigabit Ethernet, Wireless Ethernet etc.) UNIT-2 Fast access technologies (For example: ADSL, Cable Modem etc.) IPv6: Why IPv6, basic protocol, extension and option, support for QoS, security, etc., neighbor discovery, auto configuration, routing. Chang to other protocols. Applications Programming Interface for IPv6.6 bone. UNIT-3 Mobility in network Mobile IP. Security related issues. IP Multicasting. Multicast Protocols, address assignments, session discovery etc. TCP extensions for high-speed networks, transaction-oriented applications. Other new options in TCP. Network security at various layers. Secure-HTTP, SSL, ESP, Authentication header, Keys, distribution protocols. Digital signatures, digital certificates. UNIT-4 The Wireless Applications Protocols, applications environment, wireless application protocol client software, wireless application protocol gateways, implementing enterprise wireless application protocol strategy and security issues in Wireless LAN. Wireless network management, GPRS, and VOIP services. Network Management: Introduction, LAN, SNMP, and CMIP. Issues in the management of large networks. Multicast: IGMP,PIM,DVMRP Books and References: W. R Steven. TCP/IP Illustrated volume-1: The Protocols, Addison Wesley, G. R Wright.. TCP/IP Illustrated volume-2: The Implementation, Addison Wesley, W. R Steven. TCP/IP Illustrated volume-3: TCP for Transaction, HTTP, NNTP and The UNIX Domain Protocols, Addiso Wesley, R. Handel, M.N Huber and S. Schroeder. ATM Networks. Concept, Protocols, Applications, Addiso Wesley, 1998 William Stalling, wireless Communications and Networks. Prentice Hall 2002
8 TECHNOLOGY EDUCATION & RESEARCH INTEGRATED INSTITUTIONS, KKR Instruction Plan (TLP 1) Session: Semester: Even Name of Faculty: Department: CSE Subject Name and Code: Batch Name/Discipline: CSE L ( 4) T ( 2) P ( 3) UNIT 1 1. Overview of computer networks, seven-layer architecture. 2. MAC protocols for high-speed LANs, MANs. 3. Wireless LANs.(For example, FDDI, DQDB, HIPPI, Gigabit Ethernet, Wireless Ethernet etc.) UNIT-2 1. Fast access technologies (For example: ADSL, Cable Modem etc.) 2. IPv6 Why IPv6neighbor discovery, auto configuration 3. Routing. Chang to other protocols. Applications 4. Programming Interface for IPv6.6 bone. UNIT-3 1. Mobility in network Mobile IP. Security related issues. 2. IP Multicasting. Multicast Protocols, address assignments, session discovery etc. 3. TCP extensions for high-speed networks, 4. Network security at various layers. Secure-HTTP, SSL, ESP, Authentication header, Keys, distribution protocols. Digital signatures, digital certificates. UNIT-4 1. The Wireless Applications Protocols, applications environment, 2. Wireless application protocol client software, wireless application protocol gateways, 3. Wireless application protocol strategy and security issues in Wireless LAN. 4. Network Management: Introduction, LAN, SNMP, and CMIP. Issues in the management of large networks. Multicast: IGMP,PIM,DVMRP
9 VIII SEMESTER B. Tech. (Information Technology) (IT-468) Cryptography and Security System L T Exam Sess Duration Hrs. UNIT-1 Introduction, Essentials of crypto, essentials of network mgmt and the internet, setting realistic security objectives, appropriate communication security, legal restrictions encryption basic building blocks, how crypto system fail, choosing between strong and weak crypto. Security objectives, example in line encryptor, deployment example, point-to-point encryption, IP routed configuration, key recovery and escrowed encryption,basic issues in secret key management, random key generation, automatic rekeying, and manual key distribution centers, maintaining keys and system security. Unit-2 Security at IP Layer and VPN: Basic issues with using IPSEC. Cryptographic checksums,ip security protocol, IPSEC key management, other TCP/IP network security protocols,virtual private networks (VAN), basic issues IPSEC proxy cryptography, IPSEC encrypting roater, and site-to-site encryption. IPSEC and Public key crypto, basic issues with IPSEC clients. Unit-3 IPSEC client to server site remote access, Internet firewalls, IPSEC firewall, a VAN with a firewall, public key cryptography, secret key exchange with RSA crypto, Secure socket layer (SSL). Internet security and public key certificates: Basic issues in internet transaction security, transaction world wise Web, security alternatives for web form, web browser with SSI. Unit-4 Web server with server with SSL, vending with exportable encryption, basic issue with security, technology- offline message keying digital signatures, secure client distribution public keys, Public key certificates, certificates distribution centralized distribution, centralized certification authority hierarchical certification authority. Book Recommended: 1. Richard E-Smith, Internet Cryptography, Addision Wesley, 2nd Ed. 2. Cryptography and network security Principles and Practice by William Stallings- Pearson education Revise: Examiner will set 8 questions in all, at least two questions from each unit. Students are required to attempt five questions selecting at least one question from each unit.
10 TECHNOLOGY EDUCATION & RESEARCH INTEGRATED INSTITUTIONS, KKR Instruction Plan (TLP 1) Session: Semester: Even Name of Faculty: Department: CSE Subject Name and Code: Batch Name/Discipline: CSE L ( 4) T ( 2) P ( 3) ASSIGNMENT UNIT 1 Q1.What is cryptography? Q2 How you can choose between strong and weak crypto? Q3.What are basic isssues in key management? Q4 What are basic objectives of cryptography system? UNIT 2 Q1.How SSL works? Explain in detail. Q2 How web browser with SSL works. Q3What is VPN?How its works? UNIT 3 Q1 How IPSEC works? Q2 How can we manage keys in IPSEC? Q3 Describe cryptographic checksum and its function. UNIT 4 Q1 What are digital signatures? Q2 How many types of certification authorities and explain? Q3 What are public key certificates? Explain their function.
11 VIII SENESTER B. Tech (Information Technology) (IT-472) Data Warehousing and Data Mining L T Exam Sess Duration Hrs UNIT-1 Introduction of Data Warehousing: the evolution of Data Warehousing (The Historical Context). The data warehousing a brief history, today s development environment. Principals of Data Warehousing (Architecture and Design Techniques): types of data and their users, conceptual data architecture, design techniques, introduction to the logical architecture. Creating the Data Asset: Business Data Warehousing Design, Populating the Data Warehouse. UNIT-2 Unlocking the Data Asset for end users (the use of Business Information): Designing business information warehouse, populating business information warehouse, user access to information, information data in context. Implementing the Warehouse (Managing the project and environment): Obstacles to implementing, planning your implementation, justifying the warehouse, organizational implications of data Warehousing, the data warehouse in your organization, data warehouse management, looking to the future. UNIT-3 Introduction of Data Mining: Motivation, importance, data mining, king of data, functionalities, interesting patterns, classification of data mining system, major issues. Data warehouse and OLAP technology for data mining: data warehouse, operational database systems and data warehouse architecture, implementation, development of data cube technology, data warehousing to data mining, data warehouse usage. UNIT-4 Data preparation: Preprocess, data cleaning, data integration and transformation, data reduction, discrimination and concept hierarchy generation. Data Mining primitives, languages and system architectures, graphical user interfaces. Concept Description: Characterization, and analysis of attribute relevance, mining class comparison, and mining descriptive statistical measures in large databases. Mining association rules in large databases, mining single dimension Boolean association rules from transactional, databases, mining multi-dimensional association rules from relational databases and data warehouses, from association to correlation analysis, constraint based association. Books and Reference: a) J. Han & M. Kanber, Data Mining: Concepts and Techniques, Morgan Kaufmann/ Elsevier, India, 2001 b) D. Hand, H. Mannila, & P. Smyth. Principles of data mining, MIT Press, 2001
12 TECHNOLOGY EDUCATION & RESEARCH INTEGRATED INSTITUTIONS, KKR Instruction Plan (TLP 1) Session: Semester: Even Name of Faculty: Department: CSE Subject Name and Code: Batch Name/Discipline: CSE L ( 4) T ( 2) P ( 3) UNIT-1 1. Introduction of Data Warehousing: the evolution of Data Warehousing 2. Principals of Data Warehousing (Architecture and Design Techniques) 3. Design techniques, introduction to the logical architecture. 4. Creating the Data Asset: Business Data Warehousing Design, UNIT-2 1. Designing business information warehouse 2. populating business information warehouse 3. User access to information, information data in context. 4. Implementing the Warehouse Obstacles to implementing, planning your implementation UNIT Introduction of Data Mining: Motivation, importance, data mining 2. Classification of data mining system, major issues. 3. Data warehouse and OLAP technology for data mining 4. operational database systems and data warehouse architecture UNIT-4 1. Data preparation: Preprocess data cleaning, data integration and transformation, 2. Data reduction, discrimination and concept hierarchy generation. 3. Data Mining primitives, 4. Description: Characterization, and analysis of attribute relevance,
(IT-452) Information Technology Applications L T Exam Sessional Duration Hrs. Unit-1 History of IT, Basic Information Technology
(IT-452) Information Technology Applications 4 1 100 25 3Hrs. Unit-1 History of IT, Basic Information Technology Concepts. Human-Computer Interface, Social Implication of IT, privacy and Security Unit-2
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN A B C D
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN Course Code: CS402 Course Title: Mobile & Wireless Communication Semester: VIII Course Time:
More informationUniversity of San Francisco Course Syllabus and Outline
College of Professional Studies BSIS 340 Business Data Networks and Telecommunications University of San Francisco Fall Semester 2008 Robert C. Hughes, M.S. Email: rchughes3@usfca.edu Enrolled Student
More informationIT Department. Programme Outcomes (PO) Vision of the Department
IT Department Vision of the Department To produce a blend of creativity & ethical engineering graduates and making them capable of facing the real life challenges. Mission of the Department The mission
More informationWireless Communication Course Instructor: Dr. Safdar Ali
Wireless Communication Course Instructor: Dr. Safdar Ali INTRODUCTION BOOKS Text Book: William Stallings, Wireless Communications and Networks, Pearson Hall, 2002. BOOKS Reference Books: Sumit Kasera,
More informationM. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)
BHARATHIDASAN UNIVERSITY TIRUCHIRAPPALLI 620 024 M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year 2007-2008 onwards) SEMESTER I COURSE TITLE MARKS
More informationTable of Contents. Computer Networks and the Internet
Table of Contents Chapter 1 Computer Networks and the Internet 1.1 What Is the Internet? 1.1.1 A Nuts-and-Bolts Description 1.1.2 A Services Description 1.1.3 What Is a Protocol? 1.2 The Network Edge 1.2.1
More informationComputer Networks. Andrew S. Tanenbaum
Computer Networks Third Edition Andrew S. Tanenbaum 1 ; l Vrije Universiteit Amsterdam, The Netherlands For book and bookstore information Prentice Hall PTR Upper Saddle River, New Jersey 07458 CONTENTS
More informationVEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE
Vt VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (An ISO 9001: 2008 Certified Institution) (Owned by VEL Shree R. Rangarajan Dr. Sakunthala Rangarajan Educational Academy) (Approved
More informationVEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE
Vt VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (An ISO 9001: 2008 Certified Institution) (Owned by VEL Shree R. Rangarajan Dr. Sakunthala Rangarajan Educational Academy) (Approved
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 1 Instructor: Mohammad Hossein Manshaei Teaching Assistants Mr. Adili & Mr. Nourbakhsh Course web page available at IVUT webcourse: http://ivut.iut.ac.ir/bounce.php?course=1012
More informationProgram: B.E. (Electronics and Telecommunication Engineering)
Electronics and Telecommunication Engineering Mobile Communication Systems 2013-2014 Program: B.E. (Electronics and Telecommunication Engineering) Semester VII Course ET- 71: Mobile Communication Systems
More informationNETWORKING KEITH W. ROSS. Polytechnic Institute of NYU. Addison-Wesley
COMPUTER FIFTH EDITION NETWORKING JAMES F. KUROSE University of Massachusetts, Amherst KEITH W. ROSS Polytechnic Institute of NYU Addison-Wesley New York Boston San Francisco London Toronto Sydney Tokyo
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT OF ECE COURSE PLAN
1 SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF ELECTRICAL AND ELECTRONICS ENGINEERING DEPARTMENT OF ECE COURSE PLAN Course Code : EC0018 Course Title : Communication Protocol Semester
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN
Appendix - C GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering Academic Year: 2016-17 Semester: EVEN COURSE PLAN Semester: VI Subject Code& Name: 10CS64 & Computer
More informationAcademic Course Description
BEC601 - COMPUTER COMMUNICATION AND NETWORKS Course (catalog) description Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationPESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore
Data Warehousing Data Mining (17MCA442) 1. GENERAL INFORMATION: PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore 560 100 Department of MCA COURSE INFORMATION SHEET Academic
More informationGOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department
Appendix - F GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Academic Year: 2016-17 Semester: EVEN 6. COURSE PLAN Semester: VI Subject Code: 10EC81 Name of Subject:
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS LESSON PLAN (207-208) Course / Branch : M.Sc CS Total Hours : 45 Subject Name : Computer Networks
More informationCOLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS
KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SUBJECT CODE& NAME: IT1403 MOBILE COMPUTING YEAR / SEM : IV / VIII UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS PART A (2MARKS)
More informationDEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN. Hour Timing Hour Timing
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN Course Code: CS0322 Course Title: Advanced Networks Semester:VI Course Time:Jan-May 2010 Day Section A,B B,C,D Hour Timing Hour Timing Monday
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationChapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010
Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationCHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III.
CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f. 2015-16 Scheme for B.Sc.-III Semester-V Sr. No. Paper Internal Assessment External Marks Exam Duration 1 Paper-I
More informationOn successful completion of this course students should:
CIT306 Computer Networks Course Name Computer Networks Course Code CIT 306 Course Type Area Elective Course Level Undergraduate AKTS Credit 5 ECTS Course hours per week 3 (Institutional) Practice hours
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Tech park ( 7 th floor)
Course Code : CS0303 Course Title : Computer Networks Semester : V Course Time : July Dec 2011 SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN DAY
More informationSIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN
SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN SUBJECT: CSE 3.1.1 COMPUTER NETWORKS CLASS: 3/4 B.Tech., I SEMESTER, A.Y.2017-18 INSTRUCTOR: V.GOPINATH Sir
More informationMORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS
MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS Instructor: Dr. Farzad Moazzami Office: SEB 334 Telephone No. 443-885-4204
More informationPolytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering
Polytechnic University of Puerto Rico Department of Electrical & Computer Engineering and Computer Science (ECECS) Master in Electrical Engineering Course Syllabus Note : This is a major revision, the
More informationand Networks Data Communications Second Edition Tata McGraw Hill Education Private Limited Managing Director SoftExcel Services Limited, Mumbai
Data Communications and Networks Second Edition ACHYUT S GODBOLE Managing Director SoftExcel Services Limited, Mumbai ATUL KAHATE Senior Consultant Oracle Financial Services Software Limited, Pune Tata
More informationGUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV
GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV Subject Name: Elective I Data Warehousing & Data Mining (DWDM) Subject Code: 2640005 Learning Objectives: To understand
More informationDepartment of Computer & Information Sciences. CSCI-342: Introduction to Information Security Syllabus
Department of Computer & Information Sciences CSCI-342: Introduction to Information Security Syllabus Course Description This course provides an introduction to the various basic technical and administrative
More informationChapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads
Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationDATA AND COMPUTER COMMUNICATIONS
DATA AND COMPUTER COMMUNICATIONS Ninth Edition William Stallings Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal
More informationNavpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager
More informationChapter 8 Network Security
Chapter 8 Network Security A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and
More information2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.
3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 1 Introduction to IP Mobility Session 3001_05_2001_c1 2001, Cisco Systems, Inc. All rights reserved. 3 Agenda IP Mobility Overview Terminology
More informationAcademic Course Description
BET008 WIRELESS NETWORKS Academic Course Description Course (catalog) description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BET008
More informationMORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR410 Introduction to Networks. Credits: 3 COURSE SYLLABUS
Instructor: Office: Telephone No. Email Address: Office Hours: References MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING EEGR410 Introduction to Networks Credits: 3 COURSE SYLLABUS
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationCODE COURSE NAME DESCRIPTION SEM CS401 Communication Engineering & Coding Theory Knowledge of communication engineering & coding theory IV
Course: CS602 Computer Networks PROGRAMME: COMPUTER SCIENCE & ENGINEERING DEGREE:B. TECH COURSE: Computer Networks SEMESTER: VI CREDITS: 3 COURSECODE: CS602 COURSE TYPE: Theory COURSE AREA/DOMAIN: Communication
More informationMEDC 201 System Programming
MEDC 201 System Programming Fundamental of programming, steps in problem solving with digital computer algorithm, flow chart and textual representation, primitive actions, control construct like conditional,
More informationWireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)
Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Handouts Class information Schedule (check online frequently) 2 1 Goals Principles on Wireless
More informationSAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12
SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12 Copyright School Curriculum and Standards Authority, 2015 This document apart from any third party copyright material contained in it may
More informationComputers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources
Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationStudent ID: CS457: Computer Networking Date: 5/8/2007 Name:
CS457: Computer Networking Date: 5/8/2007 Name: Instructions: 1. Be sure that you have 10 questions 2. Write your Student ID (email) at the top of every page 3. Be sure to complete the honor statement
More informationComputer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING
i SYLLABUS UNIT - 1 CHAPTER - 1 : INTRODUCTION Uses of Computer Networks, Network Hardware, Network Software, Reference Models (ISO-OSI, TCP/IP). CHAPTER - 2 : NETWORK LAYER Network Layer Design Issues,
More informationVEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE
Vt VEL TECH MULTI TECH Dr RANGARAJAN Dr.SAKUNTHALA ENGINEERING COLLEGE (An ISO 9001: 2008 Certified Institution) (Owned by Vel Trust) (Approved by Govt. of Tamil Nadu and affiliated to Anna University
More informationEE6364 Advanced Data Networks
EE 6364 Advanced Data Networks Fall, 2014 Instructor: Dr. David C. Wang Office: Office-Hour: by appointment Mailbox: NH Room 549 E-mail: dwang@exchange.uta.edu Course web site: http://www-ee.uta.edu/online/wang
More informationIssues. Separation of. Distributed system security. Security services. Security policies. Security mechanism
Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK 2017-18 Course / Branch : M.Sc.(CST) Semester / Year : VIII / IV Subject Name :
More informationMSc Computer Networking
School of Business Informatics and Software Engineering MSc Computer Networking PROGRAMME DOCUMENT VERSION 2.0 MCN v2.0 July 2008 University of Technology, Mauritius La Tour Koenig, Pointe aux Sables,
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationGlossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access
Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Introduction to Network Technologies & Layered Architecture BUPT/QMUL 2015-3-5 Review What is the Internet? How does it work? When & how did it come about? Who controls it? Where is it going? 2 Agenda
More information8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 -
- 1-1 - 2-2 - 3 - DR. BABASAHEB AMBEDKAR MARATHWADA UNIVERSITY, AURAIMGABAD 4 Revised SYLLABUS B.Sc. Computer Maintenance (OPTIONAL) {Effective from 2016-2017 } B.Sc. Computer Maintenance (Optional) Course
More informationCisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.
Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p. 6 Networking Basics p. 14 Wireless LANs p. 22 Cisco Hardware
More informationSession 4 Networks II
15.561 Information Technology Essentials Session 4 Networks II Copyright 2005 Thomas Malone, Chris Dellarocas Acknowledgments: Slides marked CD are adapted from Chris Dellarocas, U. Md.. Outline Network
More informationVPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist
VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet
More informationLesson Plan. Discipline : Computer Sc. & Engineering
Lesson Plan Name of the Faculty : Ms. Hemlata Discipline : Computer Sc. & Engineering Semester : 8 th Subject : Distributed Operating Systems CSE-440 Lesson plan : 15 Weeks( From January, 2018 to April,
More informationOver Cellular. Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track
Accessing EtherNet/IP Networks Over Cellular www.odva.org Jim Weikert Strategic Marketing Manager ProSoft Technology Technical Track Introduction Pervasiveness of Cellular 100% annual increase in iphone
More informationwireless networks and mobile computing (COMMON TO CSE AND CS) CONTENTS Classification of Wireless Networks
i wireless networks and mobile computing FOR m.tech (jntu - hyderabad) i year Ii semester (COMMON TO CSE AND CS) CONTENTS UNIT - I [CH. H. - 1] ] [WIRELESS NETWORKS]... 1.1-1.24 1.1 WIRELESS NETWORK...
More informationAcademic Course Description
BEC002 WIRELESS NETWORKS Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC002 WIRELESS NETWORKS Sixth Semester,
More informationWashtenaw Community College Comprehensive Report. CST 225 PC Networking Effective Term: Spring/Summer 2014
Washtenaw Community College Comprehensive Report CST 225 PC Networking Effective Term: Spring/Summer 2014 Course Cover Division: Business and Computer Technologies Department: Computer Instruction Discipline:
More informationApplication of Cryptographic Systems. Securing Networks. Chapter 3 Part 4 of 4 CA M S Mehta, FCA
Application of Cryptographic Systems Securing Networks Chapter 3 Part 4 of 4 CA M S Mehta, FCA 1 Application of Cryptographic Systems Learning Objectives Task Statements 1.3 Recognise function of Telecommunications
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationINTE-C5O44 - Internet
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2018 340 - EPSEVG - Vilanova i la Geltrú School of Engineering 744 - ENTEL - Department of Network Engineering BACHELOR'S DEGREE IN
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationMOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)
Code No: R41054 R10 Set No. 1 1 a) Explain functional architecture of GSM. [8] b) Write and explain novel applications of Mobile Computing. [7] 2 a) Explain in detail about IEEE 802.11 MAC Data frames.
More informationFaculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)
Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track) Plan Number Serial # Degree First: General Rules Conditions:.
More informationUNIVERSITY OF NEBRASKA AT OMAHA Computer Science 3550 Communication Networks
UNIVERSITY OF NEBRASKA AT OMAHA Computer Science 3550 Communication Networks 1 Course Description Information 1.1 Catalog description This course is designed to bring students up to the state of the art
More informationModule 2 Overview of Computer Networks
Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:
More informationModule 2 Overview of. Computer Networks
Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How
More informationMobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE
Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE COURSE TITLE ROUTING AND SWITCHING FUNDAMENTALS COURSE DURATION 16 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the
More informationSub Code & Name : EC2352 COMPUTER NETWORKS Unit: I Branch: EC Semester :VI. Unit syllabus: PHYSICAL LAYER 9
Unit: I Branch: EC Semester :VI Date:02/12/14 Page 01 of 06 Unit syllabus: PHYSICAL LAYER 9 Data Communications Networks - Networks models OSI model Layers in OSI model TCP / IP protocol suite Addressing
More informationTelecom Learning. Technology
Telecom Learning Technology LTE Modules S. No. LTE Module Course Content LTE Overview LTE /EPS Network Architecture 1 LTE Basics LTE/EPS Mobility & Session Mgmt LTE Air Interface LTE Air Interface LTE-RF
More informationThis course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N
CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT
More informationDepartment of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)
Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan) Semester: II [ISE] Academic Year: 2017-18 Credits: (3-0-2) 4 Theory
More informationProtocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationSIR C R REDDY COLLEGE OF ENGINEERING
SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN Course Code : CS0333 Course Title : TCP/IP PRINCIPLES AND ARCHITECTURE ( Elective I) Semester : V
More informationComputer Networking Background
Computer Networking Background Yanmin Zhu Department of Computer Science and Engineering Shanghai Jiao Tong University Computer Networking: A Top Down Approach, 4 th edition. Jim Kurose, Keith Ross Addison-Wesley
More informationProf. Iwao Sasase, Keio University page1
Research Activities on Broadband Mobile and Wireless Communications in the Center of Excellence Program at Keio University Iwao Sasase, Keio University http://www.sasase.ics.keio.ac.jp Email sasase@ics.keio.ac.jp
More informationFRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES
More informationVPN Auto Provisioning
VPN Auto Provisioning You can configure various types of IPsec VPN policies, such as site-to-site policies, including GroupVPN, and route-based policies. For specific details on the setting for these kinds
More informationReady Theatre Systems RTS POS
Ready Theatre Systems RTS POS PCI PA-DSS Implementation Guide Revision: 2.0 September, 2010 Ready Theatre Systems, LLC - www.rts-solutions.com Table of Contents: Introduction to PCI PA DSS Compliance 2
More informationLESSON PLAN. Sub Code & Name : CS2363 COMPUTER NETWORKS Unit: I Branch: EEE Semester :VI
Unit: I Branch: EEE Semester :VI Page 1 of 6 Introduction to networks network architecture network performance Direct link networks encoding framing error detection transmission Ethernet Rings FDDI - Wireless
More informationISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo
ISC2 Exam Questions CISSP Certified Information Systems Security Professional (CISSP) Version:Demo 1. How can a forensic specialist exclude from examination a large percentage of operating system files
More information3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)
Principles of Information and Technology Systems IT 201 T Prereq: CS 110T This course aims to develop an understanding of the components of computing and their relationships, significant impacts of IT
More informationCisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
More informationWIRELESS ACCESS PRINCIPLES OF AND LOCALIZATION. Wiley. Kaveh Pahlavan. Prashant Krishnamurthy. University of Pittsburgh, Pittsburgh, Pennsylvania, USA
PRINCIPLES OF WIRELESS ACCESS AND LOCALIZATION Kaveh Pahlavan Worcester Polytechnic Institute, Worcester, Massachusetts, USA Prashant Krishnamurthy University of Pittsburgh, Pittsburgh, Pennsylvania, USA
More informationRedes de Computadores. Introduction
Redes de Computadores Introduction Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 Introduction to the Course 2 RCOM Professors, Information, Language Prof. Manuel Ricardo mricardo@fe.up.pt
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationOverview of Mobile Networking Initiatives at WINLAB
Overview of Mobile Networking Initiatives at WINLAB Introduction: The Next Generation MSC Custom Mobile Infrastructure (e.g. GSM, 3G) BTS Public Switched Network (PSTN) BSC GGSN, etc. WLAN Access Point
More information