Computer Science & Engineering 2nd Sem
Computer Science & Engineering 2nd Sem
COURSE STRUCTURE
AND
DETAILED SYLLABUS
For
COMPUTER SCIENCE ENGINEERING
BRANCH
COMPUTER SCIENCE & ENGINEERING
19
Computer Science & Engineering
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
Specialization:COMPUTER SCIENCE
&
4
4
G 4
4
3
3
3
3
IGN
4
2
20
SYLLABUS
36
2013-14
I II
L
4
P
-
Credits
3
INFORMATION SECURITY
UNIT- I
Introduction: Security Attacks (Interruption, Interception,
Modification and Fabrication), Security Services (Confidentiality,
Authentication, Integrity, Non-repudiation, access Control and
Availability) and Mechanisms, A model for Internetwork security,
Internet Standards and RFCs, Buffer overflow & format string
vulnerabilities, TCP session hijacking, ARP attacks, route table
modification, UDP hijacking, and man-in-the-middle attacks.
UNIT- II
Conventional Encryption:
Conventional Encryption Principles, Conventional encryption
algorithms, cipher block modes of operation, location of
encryption devices, key distribution Approaches of Message
Authentication, Secure Hash Functions and HMAC,
UNIT- III
Public key: Public key cryptography principles, public key
cryptography algorithms, digital signatures, digital Certificates,
Certificate Authority and key management Kerberos, X.509
Directory Authentication Service
UNIT- IV
IP Security: IP Security Overview, IP Security Architecture,
Authentication
Header,
Encapsulating
Security
Payload,
Combining Security Associations and Key Management
2.
REFERENCE BOOKS:
1.
Network Security & Cryptography, Bernard Menezes,
Cengage,2010
2.
3.
4.
5.
6.
7.
38
2013-14
I II
L
4
P
-
Credits
3
COMPUTER NETWORKS
UNIT- I
Network Hardware reference model: Transmission media,
Narrowband ISDN, Broad band ISDN, ATM.
The data Link layer : Design Issues, Error detection and
correction, Elementary Data Link Protocols, Sliding window
protocols : Data link layer in HDLC, Internet and ATM.
UNIT- II
Channel allocation methods: TDM, FDM, ALOHA, Carrier sense
Multiple access protocols, Collision Free protocols IEEE standard
BO2 for LANS Ethernet, Token Bus, Token ring, Bridges.
Network layer Routing Algorithms: Shortest path, Flooding,
Flow based Distance vector, Link state, Hierarchical, Broadcast
routing, Congestion Control algorithms-General principles of
congestion control, Congestion prevention polices, Choke packets
and Load shedding.
UNIT- III
Internet Working : Tunneling, internetworking, Fragmentation,
network layer in the internet IP protocols, IP address, Subnets,
Internet control protocols, DSPF, BOP, Internet multicasting, Mobile
IP. Network layer in the ATM Networks cell formats, connection
setup, routing and switching, service categories, and quality of
service, ATM LANs.
UNIT- IV
The Transport Layer: Elements of transport protocols
addressing, establishing a connection, releasing connection, flow
control and buffering and crash recovery, end to end protocols :
UDP, reliable Byte Stream (TCP) end to end format, segment
format, connection establishment and termination, sliding
39
2.
REFERENCE BOOKS
1.
2.
3.
4.
5.
6.
7.
8.
40
2013-14
I II
L
4
P
-
Credits
3
41
1.
2.
REFERENCE BOOKS:
1.
2.
3.
Data Mining Theory and Practice, Soman, Diwakar, Ajay, PHI,
2006.
4.
42
2013-14
46
2013-14
I II
L
4
P
-
Credits
3
2.
REFERENCE BOOKS :
1.
2.
3.
4.
52
2013-14
I II
L
4
P
-
Credits
3
2.
53
REFERENCE BOOKS:
1.
2.
3.
4.
5.
6.
7.
8.
58
2013-14
I II
L
4
P
-
Credits
3
CLOUD COMPUTING
UNITI
Introduction to virtualization and virtual machine, Virtualization
in Cluster /grid context Virtual network, Information model & data
model for virtual machine, Software as a Service (SaaS), SOA, On
Demand Computing.
UNITII
Cloud computing: Introduction, What it is and What it isnt, from
Collaborations to Cloud, Cloud application architectures, Value of
cloud computing, Cloud Infrastructure models, Scaling a Cloud
Infrastructure, Capacity Planning, Cloud Scale.
UNITIII
Data Center to Cloud: Move into the Cloud, Know Your
Software Licenses, The Shift to a Cloud Cost Model, Service Levels
for Cloud Applications
UNITIV
Defining Clouds for the Enterprise- Storage-as-a-Service,
Database-as-a-Service, Information-as-a-Service, Process-asa-Service,
Application-as-a-Service,
Platform-as-a-Service,
Integration-as-a-Service,
Security-as-a-Service,
Management/Governance-as-a-Service,
Testing-as-a-Service
Infrastructure-as-a-Service
UNITV
Security: Disaster Recovery, Web Application Design, Machine
Image Design, Privacy Design, Database Management, Data
Security, Network Security, Host Security, Compromise Response
Disaster Recovery, Disaster Recovery, Planning, Cloud Disaster
Management
2.
REFERENCE BOOK:
1.
59
60
2013-14
I II
L
-
P
-
CSE LAB2
Covering experiments from CN, DWDM and IS
Credits
2