Elective-2 (select any one from Elective II group) Web Designing and Network Lab

Similar documents
M. PHIL. COMPUTER SCIENCE (FT / PT) PROGRAMME (For the candidates to be admitted from the academic year onwards)

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN A B C D

10EC832: NETWORK SECURITY

MLR Institute of Technology

SRI VENKATESWARA COLLEGE OF ENGINEERING

OPERATING SYSTEMS INTERNALS AND DESIGN PRINCIPLES. William Stallings SIXTH EDITION. Pearson Education International. Prentice Hall

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Academic Course Description

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CRYPTOGRAPHY AND NETWORK SECURITY

COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT-1 WIRELESS COMMUNICATION FUNDAMENTALS

MSc Computer Networking

Department of Computer Science and Technology 2014

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN

Faculty of Science & Information Technology

SCHEME OF COURSE WORK. Data Warehousing and Data mining

JBIET. Dept of IT. Operating Systems III B.Tech -I Sem. Department of Information Technology

PESIT- Bangalore South Campus Hosur Road (1km Before Electronic city) Bangalore

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

Name of chapter & details.

Sistemas Operacionais I. Valeria Menezes Bastos

CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III.

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR510 Communications Networks Credits: 3 COURSE SYLLABUS

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

UNIVERSITY OF NEBRASKA AT OMAHA COURSE SYLLABUS/DESCRIPTION

MORGANSTATEUNIVERSITY DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING. EEGR410 Introduction to Networks. Credits: 3 COURSE SYLLABUS

DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK UNIT I PART A (2MARKS)

DEPARTMENT OF COMPUTER APPLICATIONS CO 2009 REGULATION

Client Server and Parallel Programming

Computer Science and Engineering Technology Course Descriptions

Faculty of King Abdullah II School for Information Technology Department of Computer Science Study Plan Master's In Computer Science (Thesis Track)

GUJARAT TECHNOLOGICAL UNIVERSITY

National Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)

Syllabus CSCI 405 Operating Systems Fall 2018

Program: B.E. (Electronics and Telecommunication Engineering)

Operating System Design

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Tech park ( 7 th floor)

FIT5044 Network security. Unit Guide. Semester 1, 2010

Understanding Cisco Cybersecurity Fundamentals

Nepal Telecom Nepal Doorsanchar Company Ltd.

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Ajloun National University

INSTITUTE OF TECHNOLOGY AND ADVANCED LEARNING SCHOOL OF APPLIED TECHNOLOGY COURSE OUTLINE ACADEMIC YEAR 2012/2013

AD - Distributed Applications

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Networks and Communications MS216 - Course Outline -

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Name of chapter & details

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Course Description: This course includes the basic concepts of operating system

CSC 280 Operating System Principles

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

Mohammad Hossein Manshaei 1393

Teaching and Examination Scheme: PAPER HRS TH TU PR TH PR OR TW TOTAL

Introduction and Overview. Why CSCI 454/554?

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Computer Networks SYLLABUS CHAPTER - 2 : NETWORK LAYER CHAPTER - 3 : INTERNETWORKING

The University of Jordan. Accreditation & Quality Assurance Center. Curriculum for Doctorate Degree

Course File Leaf (Theory) For the Academic Year (Odd/Even Semester)

University of San Francisco Course Syllabus and Outline

COURSE PLAN Regulation: R11 FACULTY DETAILS: Department::

INFORMATION TECHNOLOGY (INFO)

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) Semester: IV

THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY

Table of Contents. Computer Networks and the Internet

CTP203 Operating Systems Syllabus

Cryptography and Network Security

Academic Course Description

DATA AND COMPUTER COMMUNICATIONS

COURSE OUTLINE. School of Engineering Technology and Applied Science. Computer Systems & Network Technology/ Technician

Information Security: Principles and Practice Second Edition. Mark Stamp

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

Academic Course Description

hrs. Designing Fundamentals 2 Paper-II: Data base hrs. management Systems Semester IV 3 Paper-I: Web

For Tricia: never dull, never boring, the smartest and bravest person I know

Bachelor of Science in Business Administration - Information Systems and Technology Major

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER APPLICATIONS COURSE PLAN

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

KALASALINGAM UNIVERSITY

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

SIR C.R.REDDY COLLEGE OF ENGINEERING, ELURU DEPARTMENT OF INFORMATION TECHNOLOGY LESSON PLAN

COURSE OUTLINE. School of Engineering Technology and Applied Science. Electronics Engineering Technology/ Technician. Wireless Networks & Applications

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Mobile Communications Chapter 11 : Outlook

SIR C R REDDY COLLEGE OF ENGINEERING

B.TECH.(Information Technology) (IT-452) Information Technology Applications

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

1 PCA151C Data Structures Using C PCA152C Operating Systems PCA153C Introduction to Web Technologies

Transcription:

Semester MANONMANIAM SUNDARANAR UNIVERSITY TIRUNELVELI PG - COURSES AFFILIATED COLLEGES Course Structure for M.Sc Networking and Information Technology ( Choice Based Credit System) ( with effect from the academic year 2017-2018 onwards ) Title of the Subject Status Contact Hrs./ Week Credits III Web Designing Core-10 4 4 Operating Systems Core-11 4 4 Network security and Cryptography Core-12 4 4 Research Methodology Core-13 4 4 Elective-2 (select any one from Elective II group) Web Designing and Network Lab Mini Project Elective - 2 Core Practical-5 Core Project-1 IV Main Project Lab Core Project-2 4 3 4 2 6+6* 6 30+2* 16 *Extra hours for Project For the Project, flexible credits are b/w 5 8 & Hours per week are b/w 10-16. Total number of credits 90 : 90 Total number of Core Courses : 20 ( 13 T + 5 P + 2 Prj. ) Total number of Elective Courses : 2 Total hours : 120 List of Electives offered: Elective I Group (A) Management Information System (B) Big Data analytics Elective II Group (A) Data Warehousing and Mining (B) Mobile Computing Page 1 of 18

REGULATIONS (Effective from the academic year 2017-2018 onwards) 1. Eligibility for Admission: Candidates for admission to the first year of two year M.Sc. Networking and Information Technology shall be required to have passed any degree from a recognized University accepted by the Syndicate of this University. 2. Duration of the Course: The course shall be extended for a period of two academic years consisting of four semesters with two semesters per year. 3. Passing Requirement: The candidate will be declared to have passed in any subject (including practical and project viva voce) of study if he/she secures not less than 50 marks in the University end semesters examinations of their subjects. Page 2 of 18

III / Ppr.no.15 / Core-14 WEB DESIGNING L-T-P-C 4-0- 0-4 Preamble : Understanding the concepts of PHP and MySQL Prerequisite : Basic knowledge of programming and internet Unit-1 Web programming Basics and Installations: Web Publishing: A Quick look-html 4.0: the web Publishing Foundation- HTML basics- Putting your Server to work-server side programming- XML Basics. Unit-II Installation and Configuration: Getting up and running: Installation Quick Start Guide- Installing and configuring MySql- Installing and configuring Apache-Installing and configuring PHP. (10L) Unit-III PHP Language Structure: The Building blocks of PHP- Flow Control Functions in PHP- Working with Functions- Working with Arrays- Working with Objects- Working with Strings, Dates and Time- Working with Forms- Working with Cookies and User Sessions- Working with Files and Directories Working with Images (14L) Unit-IV PHP and MySQL Integration: Understanding the Database Design- Process Learning Basic SQL Commands Using Transactions and Stored Procedures in MySQL- Interacting with MySQL Using PHP. Unit-V Basic Projects: Managing a Simple Mailing List- Creating an Online Address Book- Creating a Simple Discussion Forum- Creating an Online Storefront and shopping Cart Mechanism- Creating a Simple Calendar- Restricting Access to Your Applications- Logging and Monitoring Web Page 3 of 18

III / Ppr.no.15 / Core-14 Server Activity- Application Localization- Working with XML- Connecting to Web Services Apache Performance Tuning and Virtual Hosting- Setting Up a Secure Web Server- Optimizing and Tuning MySQL. REFERENCE BOOKS: 1. Sam Teach Yourself PHP, MySQL and Apache All in One, 5 th Edition, Julie Meloni 2. Dynamic Web Publishing, Second Edition, Shelley Powers, Techmedia 3. Steve Suehring, Tim Converse and Joyce Park, PHP 6 and MySQL 6 Bible, Wiley India reprint, 2009. 4. Robert Sheldon, Geoff Moes, Beginning MySQL, Wrox, 2005. 5. BEN FORTA, MySQL Crash course SAMS, 2006. OUTCOMES: Upon Completion of the course, the students should be able to: Design and implementation of web forms and client side validation. XML authoring, Parsing, and related technologies. Create a basic website using HTML and Cascading Style Sheets. Design and implement dynamic web page with validation using JavaScript objects and by applying different event handling mechanisms. Design and implement simple web page in PHP, and to present data in XML format. Page 4 of 18

III / Ppr.no.16 / Core-15 OPERATING SYSTEMS L-T-P-C 4-0- 0-4 Preamble : Understanding the process, Memory and I/O management concepts of operating system Prerequisite : Basic knowledge of operating system Unit-I Operating System Overview: Objectives and Functions - Processes: Process Description and Control UNIX SVR4 Process Management Threads and Multithreading Symmetric Multiprocesing - Windows Thread Management - Solaris Thread and SMP Management - Linux Thread Management - Android Thread Management (13L) Unit-II Mutual Exclusion and Synchronization: Semaphores Monitors - Message Passing producer-consumer problem readers writers problem - Principles of Deadlock Deadlock prevention Avoidance Detection Unit-III Virtual Memory Management: Paging segmentation - Operating System Software policies - Windows Memory Management - Android Memory Management - Uniprocessor Scheduling: Types of Scheduling - Scheduling Algorithms - Real-Time Scheduling (10L) Unit-IV I/O Management and Disk Scheduling: I/O Buffering - Disk Scheduling RAID - File Management : File Organization and Access - Secondary Storage Management File Allocation Methods Free Space Management - Windows File System - Android File Management - Embedded Operating Systems: Characteristics Ecos (13L) Unit-V Operating System Security: Basic concepts - Intruders and Malicious Software - viruses - Distributed Processing, Client/Server, and Clusters: Client/Server Computing - Distributed Message Passing - Remote Procedure Calls Clusters - Windows Cluster Server Sun Cluster Page 5 of 18

III / Ppr.no.16 / Core-15 REFERENCE BOOKS: 1. Operating Systems-Internals and Design Principles, Williams Stallings, Pearson, 8th Edition, 2014. 2. Modern Operating Systems, Andrew S. Tanenbaum, Pearson,, 4th Edition, 2014. 3. Operating System Concepts, Abraham Silberschatz, Peter B. Galvin, Greg Gagne, John Wiley & Sons, 8th Edition, 2008. OUTCOMES: On successful completion of the course the students should have: Able to understand the operating system components and its services Implement the algorithms in process management and solving the issues of IPC Able to demonstrate the mapping between the physical memory and virtual memory Able to understand file handling concepts in OS perspective Able to understand the operating system components and services with the recent OS Page 6 of 18

MSU / 2017-18 / PG Colleges / M.Sc.( Networking and Information Technology) / Semester III / Ppr.no.17 / Core-16 NETWORK SECURITY AND CRYPTOGRAPHY L-T-P-C 4-0- 0-4 Preamble : Understanding the concepts of security in internet Prerequisite : Basic knowledge of computer networking and security Unit-I Introduction: Attacks, services and Mechanisms - security attacks - security services - A model for internetwork security - Internet standards and RFCS. Classical Encryption Techniques: symmetric cipher Model - Substitution Techniques -Transportation Techniques Rotor Mechanism Steganography. Unit-II Block ciphers and the data encryption standard simplified DES Block Cipher Principles -The Data encryption standard -The strength of DES - Differentials and Linear Cryptanalysis -Block Cipher design principles -Block Cipher modes of operations. Public Key Cryptography and RSA: Principles of Public - Key Cryptosystems The RSA Algorithm. (13L) Unit-III Key Management: Other Public-Key Cryptosystems: Key Managements- Diffie Hellman Key Exchange-Elliptic curve Arithmetic - Elliptic curve Cryptography Message Authentication & Hash functions: Authentication Requirements-Authentication functions-message Authentication Codes- Hash functions- Security of Hash functions & MACS. Digital Signatures -Authentication Protocols - Digital Signature Standard. (13L) Unit-IV Authentication applications: Kerberos X 509 Authentication service. Electronic Mail security: Pretty good Privacy - S/MIME 445 IP Security: IP Security overview - IP Security Architecture -Authentication Header - Encapsulation security Payload. (10L) Page 7 of 18

III / Ppr.no.17 / Core-16 Unit-V Web Security: Web Security Considerations - Secure Sockets Layer and Transport Layer Security - Secure Electronic Transactions System Security: Intruders - Intrusion detection -Password Management. Firewalls: Firewalls Design Principles - Trusted Systems REFERENCE BOOKS: 1. William Stallings, CRYPTOGRAPHY AND NETWORK SECURITY - PRINCIPLES AND PRACTICES, Pearson Education, Third Edition, 2003. 2. William Stallings, NETWORK SECURITY ESSENTIAL - APPLICATIONS AND STANDARDS, Pearson Education, 2003. 3. Atul kahate, CRYPTOGRAPHY AND NETWORK SECURITY, TMCH, 2003 4. Charlie Kanfman, Radio Pearlman, Mike Speciner, NETWORK SECURITY, Second Edition, Pearson Education Asia. OUTCOMES: At the end of this course, the students should be able to: Analyze the vulnerabilities in any computing system and hence be able to design a security solution. Identify the security issues in the network and resolve it. Evaluate security mechanisms using rigorous approaches, including theoretical Compare and Contrast different IEEE standards and electronic mail security Page 8 of 18

III / Ppr.no.18 / Core-17 RESEARCH METHODOLOGY L-T-P-C 4-0- 0-4 Preamble : Understanding how to do effective research and its measurement facilities Prerequisite : Basic knowledge of research Unit-I Research Methodology: An Introduction - Meaning of Research - Objectives of Research - Types of Research, Motivation in Research - Research Approaches, Significance of Research - Research Methods Verses Methodology - Research and Scientific Method - Research Process - Criteria of Good Research - Problems Encountered by Researchers in India. Defining the Research Problem: What is a Research Problem? - Selecting the Problem - Technique Involved in Defining a Problem - Research Design: Meaning - Need for research Design - Features of a Good Design - Important Concept relating to Research Design - Different Research Designs - Basic Principles of Experimental Designs. Unit-II Sampling Design: Census and sample survey - Implications of a sample design - Steps in sample design - Criteria of selecting a sampling procedure - Characteristics of a good sample design - Different types of sample designs - How to select a random sample? - Random sample from an infinite Universe - Complex random sampling designs - Measurement and scaling Techniques: measurement in research - Measurement scales - Sources of error in measurement - Tests of sound measurements - Technique of developing measurement tools - Scaling, meaning of scaling - Scale classification bases - Important scaling techniques - Scale construction techniques. Unit-III Methods of Data Collection: Collection of Primary Data - Observation Method - Interview method - Collection of Data through Questionnaires - Collection of Data through Schedules - Some Other Methods of Data Collection - Collection of Secondary Data - Selection of Appropriate Method for Data Collection - Interpretation and Report writing - Meaning of Interpretation, Why Interpretation? - Technique of Interpretation, Precaution in Interpretation - Significance of Report Writing Page 9 of 18

III / Ppr.no.18 / Core-17 Different Steps in Writing Report - Layout of the Research Report - Types of Reports - Mechanics of Writing a Research Report - Precautions for Writing Research Reports. Unit-IV Data Analysis Tools: Chi-Square Test for large samples Definition of Chi-Square Limitations of Chi-Square test - Chi-Square test as a test of goodness of fit and as a test of independence Yate s correction and its applications Analysis of variance(anova) : Concept One way ANOVA ANOVA in test in Latin Square Design Unit - V Algorithmic Research: Introduction - Algorithmic Research Problems - Types of Solution procedure/algorithm - Steps of Development of Algorithm - Steps of algorithmic Research - Design of Experiments and Comparison of Algorithms - Meta Heuristics for Combinatorial Problems - The Computer: Its Role in research - The computer and Computer Technology - The Computer System - Important Characteristics - Computer Applications- Computers and Researchers. REFERENCE BOOKS 1. C.R.Kothari, Research Methodology Methods and Techniques, (Second Revised Edition), New Age International Publishers, New Delhi, 2010. 2. R.Panneerselvam, Research Methodology, PHI Learning Private Limited, New Delhi, 2009. OUTCOMES: At the end of this course, the students should be able to: understand some basic concepts of research and its methodologies identify appropriate research topics select and define appropriate research problem and parameters prepare a project proposal (to undertake a project) organize and conduct research (advanced project) in a more appropriate manner Page 10 of 18

III / Ppr.no.19 / Elective -2 (a) DATA WAREHOUSING AND MINING L-T-P-C 4-0- 0-3 Preamble : Understanding data mining and warehousing concepts Prerequisite : Basic knowledge of DBMS Unit-I Introduction: Data Mining tasks Data Mining versus Knowledge Discovery in Data bases Relational databases Data warehouses Transactional databases Object oriented databases Spatial databases Temporal databases Text and Multimedia databases Heterogeneous databases - Mining Issues Metrics Social implications of Data mining Unit-II Data Preprocessing: Why Preprocess the data Data cleaning Data Integration Data Transformation Data Reduction Data Discretization. (11L) Unit-III Data Mining Techniques: Association Rule Mining The Apriori Algorithm Multilevel Association Rules Multidimensional Association Rules Constraint Based Association Mining (11L) Unit-IV Classification and Prediction: Issues regarding Classification and Prediction Decision Tree induction Bayesian Classification Back Propagation Classification Methods Prediction Classifiers accuracy (13L) Unit-V Clustering Techniques: cluster Analysis Clustering Methods Hierarchical Methods Density Based Methods Outlier Analysis Introduction to Advanced Topics: Web Mining, Spatial Mining and Temporal Mining (13L) Page 11 of 18

III / Ppr.no.19 / Elective -2 (a) REFERENCE BOOKS 1. J. Han and M. Kamber, 2001, Data Mining: Concepts and Techniques, Morgan Kaufmann,.New Delhi-27 2. M. H.Dunham, 2003, Data Mining : Introductory and Advanced Topics, Pearson Education, Delhi. 3. Paulraj Ponnaiah, 2001, Data Warehousing Fundamentals, Wiley Publishers. 4. S.N. Sivananda and S. Sumathi, 2006, Data Mining, Thomsan Learning, Chennai. OUTCOMES Upon Completion of the course, the students will be able to Preprocess the data for mining applications. Apply the association rules for mining the data. Design and deploy appropriate classification techniques. Cluster the high dimensional data for better organization of the data. Evolve Multidimensional Intelligent model from typical system Discover the knowledge imbibed in the high dimensional system Evaluate various mining techniques on complex data objects Page 12 of 18

III / Ppr.no.19 / Elective -2 (B) MOBILE COMPUTING L-T-P-C 4-0- 0-3 Preamble : Understanding concepts of mobile communication Prerequisite : Basic knowledge of communication and Network Unit-I Introduction: Wireless transmission, Frequencies for radio transmission, Signals, Antennas, Signal Propagation, Multiplexing, Modulations, Spread spectrum, MAC, SDMA, FDMA, TDMA, CDMA, Cellular Wireless Network. Unit-II Telecommunication systems: GSM, GPRS, DECT, UMTS, IMT-2000, Satellite Networks, Basics, Parameters and Configurations, Capacity Allocation, FAMA and DAMA, Broadcast Systems, DAB, DVB. Unit-III Wireless LAN: IEEE 802.11, Architecture, Services, MAC, Physical layer, IEEE802.11a-802.11b standards, HIPERLAN, BlueTooth. Unit-IV Mobile Communication Protocols: Mobile IP, Dynamic Host Configuration Protocol, Routing, DSDV, DSR, Alternative Metrics Unit-V WAP and WML: Traditional TCP, Classical TCP improvements, WAP, WAP 2.0, WML Basics, WML Cards. Page 13 of 18

III / Ppr.no.19 / Elective -2 (B) REFERENCE BOOKS Jochen Schiller, Mobile Communications, 2/e, PHI/Pearson Education, 2003. 1. William Stallings, Wireless Communication and Networks, PHI/Pearson Education, 2002 2. Kaveh Pahlaven, Prasanth Krishnamoorthy, Principles of Wireless Networks, PHI/Pearson Education, 2003. 3. Hazysztof Wesolowshi, Mobile Communication Systems, John Wiley and Sons Ltd, 2002. OUTCOMES: Upon Completion of the course, the students will be able to: Gain the knowledge about various types of Wireless Data Networks and Voice Networks. Understand the architectures, the challenges and the Solutions of Wireless Communication Realize the role of Wireless Protocols in shaping the future Internet. Able to develop simple Mobile Application using WML Page 14 of 18

III / Ppr.no.20 / Practical -5 WEB DESIGNING AND NETWORK LAB L-T-P-C 0-0- 4-2 Web Designing Practical Lists 1. Write a HTML code to display information about your college use 1)Bold Tag 2)Centre Tag 3)Heading & Font tags. Add background colour and picture 2. Create a HTML document to display a list of four flowers and link each one to another document displaying brief description of the flower. Add pictures wherever possible. 3. Create a table to display the marks obtained in the exam. 4. Write an HTML code to display a list of 5 cars in a frame. Link each one to a brief description in second frame The left frame should display the list and the right frame should display the paragraph about the frame. 5. Page hit counter 6. Input/output operations 7. Reading/writing files and Directories 8. Calendar application using PHP 9. MySQL Connectivity and Database manipulations 10. Session maintenance in PHP. OUTCOMES: Upon Completion of the course, the students should be able to: Design a system according to customer needs using the available Internet technologies Design and implementation of web forms with HTML Design and development of PHP pages with MySQL database connectivity. Page 15 of 18

MSU / 2017-18 / PG Colleges / M.Sc.( Networking and Information Technology) / Semester III / Ppr.no.20 / Practical -5 Network- Practical Lists 1. Write a socket program for Echo commands 2. Write a socket program for Ping commands 3. Write a socket program for Talk commands 4. Create a socket (TCP) between two computers and enable file transfer between them. 5. Write a socket for HTTP for Web page upload & download 6. Create a Socket (UDP) 7. Write a program for TCP Module implementation 8. Perform a case study for the shortest path routing algorithms to select the network and to select the network path. OUTCOMES: Upon Completion of the course, the students should be able to: Understand the architecture and underlying technologies of TCP/IP. Understand Socket Programming. Explain routing mechanism within an autonomous system Page 16 of 18

III / Ppr.no.21 / Mini Project Mini Project L-T-P- C O-O-6+6* 6 Page 17 of 18

IV / Ppr.no.22 / Project Project L-T-P- C O-O-30+2* 16 Page 18 of 18