0% found this document useful (0 votes)
811 views23 pages

Computer Science & Engineering 2nd Sem

This document provides the course structure and syllabus for Computer Science Engineering at Jawaharlal Nehru Technology University in Kakinada, Andhra Pradesh, India. It outlines the various courses offered in the second semester, including Information Security, Computer Networks, Data Warehousing and Data Mining, and electives in areas such as Mobile Computing, Compiler Design, and Human Computer Interaction. For each course, it lists the number of lecture hours, practical hours and credits. It then provides detailed syllabus outlines for each course covering topics, learning objectives and recommended textbooks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
811 views23 pages

Computer Science & Engineering 2nd Sem

This document provides the course structure and syllabus for Computer Science Engineering at Jawaharlal Nehru Technology University in Kakinada, Andhra Pradesh, India. It outlines the various courses offered in the second semester, including Information Security, Computer Networks, Data Warehousing and Data Mining, and electives in areas such as Mobile Computing, Compiler Design, and Human Computer Interaction. For each course, it lists the number of lecture hours, practical hours and credits. It then provides detailed syllabus outlines for each course covering topics, learning objectives and recommended textbooks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

ACADEMIC REGULATIONS

COURSE STRUCTURE
AND
DETAILED SYLLABUS
For
COMPUTER SCIENCE ENGINEERING
BRANCH
COMPUTER SCIENCE & ENGINEERING

JAWAHARLAL NEHRU TECHNOLOGY UNIVERSITY


KAKINADA KAKINADA - 533 003, Andhra
Pradesh, India

19
Computer Science & Engineering
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
Specialization:COMPUTER SCIENCE

&

ENGINEERING COURSE STRUCTURE


II SEMESTER
1
INFORMATION SECURITY
2
COMPUTER NETWORKS
3
DATA WAREHOUSING AND
DATA
MININ1
4
ELECTIVE
MOBILE COMPUTING
COMPILER DESIGN
HUMAN COMPUTER INTERACTION
5
ELECTIVE 2
IMAGE PROCESSING
SOFT COMPUTING
OBJECT ORIENTED ANALYSIS AND
DES
6
ELECTIVE 3
ADVANCED UNIX PROGRAMMING
BIO INFORMATICS
CLOUD COMPUTING
7
CSE LAB2
TOTAL

4
4
G 4
4

3
3
3
3

IGN
4

2
20

SYLLABUS
36

2013-14
I II

L
4

P
-

Credits
3

INFORMATION SECURITY
UNIT- I
Introduction: Security Attacks (Interruption, Interception,
Modification and Fabrication), Security Services (Confidentiality,
Authentication, Integrity, Non-repudiation, access Control and
Availability) and Mechanisms, A model for Internetwork security,
Internet Standards and RFCs, Buffer overflow & format string
vulnerabilities, TCP session hijacking, ARP attacks, route table
modification, UDP hijacking, and man-in-the-middle attacks.
UNIT- II
Conventional Encryption:
Conventional Encryption Principles, Conventional encryption
algorithms, cipher block modes of operation, location of
encryption devices, key distribution Approaches of Message
Authentication, Secure Hash Functions and HMAC,
UNIT- III
Public key: Public key cryptography principles, public key
cryptography algorithms, digital signatures, digital Certificates,
Certificate Authority and key management Kerberos, X.509
Directory Authentication Service
UNIT- IV
IP Security: IP Security Overview, IP Security Architecture,
Authentication
Header,
Encapsulating
Security
Payload,
Combining Security Associations and Key Management

Web Security: Web Security Requirements, Secure Socket Layer


(SSL) and Transport Layer Security (TLS), Secure Electronic
Transaction (SET)
Email Privacy: Pretty Good Privacy (PGP) and S/MIME.
UNIT- V
SNMP: Basic concepts of SNMP, SNMPv1 Community facility
and SNMPv3, Intruders, Viruses and related threats
Fire walls: Firewall Design principles, Trusted Systems, Intrusion
Detection Systems
TEXT BOOKS:
1.

Network Security Essentials: Applications and Standards, William


Stallings, PEA.

2.

Hack Proofing your Network, Russell, Kaminsky, Forest Puppy,


Wiley Dreamtech

REFERENCE BOOKS:
1.
Network Security & Cryptography, Bernard Menezes,
Cengage,2010
2.

Fundamentals of Network Security, Eric Maiwald, Dream Tech

3.

Network Security: Private Communication in a Public World,


Kaufman, Perlman, PEA/PHI.

4.

Principles of Information Security, Whitman, Thomson.

5.

Cryptography and Network Security, 3/e, Stallings, PHI/PEA

6.

Network Security: The complete reference, Robert Bragg, Mark


Rhodes, TMH

7.

Introduction to Cryptography, Buchmann, Springer

38

2013-14
I II

L
4

P
-

Credits
3

COMPUTER NETWORKS
UNIT- I
Network Hardware reference model: Transmission media,
Narrowband ISDN, Broad band ISDN, ATM.
The data Link layer : Design Issues, Error detection and
correction, Elementary Data Link Protocols, Sliding window
protocols : Data link layer in HDLC, Internet and ATM.
UNIT- II
Channel allocation methods: TDM, FDM, ALOHA, Carrier sense
Multiple access protocols, Collision Free protocols IEEE standard
BO2 for LANS Ethernet, Token Bus, Token ring, Bridges.
Network layer Routing Algorithms: Shortest path, Flooding,
Flow based Distance vector, Link state, Hierarchical, Broadcast
routing, Congestion Control algorithms-General principles of
congestion control, Congestion prevention polices, Choke packets
and Load shedding.
UNIT- III
Internet Working : Tunneling, internetworking, Fragmentation,
network layer in the internet IP protocols, IP address, Subnets,
Internet control protocols, DSPF, BOP, Internet multicasting, Mobile
IP. Network layer in the ATM Networks cell formats, connection
setup, routing and switching, service categories, and quality of
service, ATM LANs.
UNIT- IV
The Transport Layer: Elements of transport protocols
addressing, establishing a connection, releasing connection, flow
control and buffering and crash recovery, end to end protocols :
UDP, reliable Byte Stream (TCP) end to end format, segment
format, connection establishment and termination, sliding

window revisited, adaptive retransmission, TCP extension, Remote


Procedure Call BLAST, CHAN, SELECT, DCE.

Computer Science & Engineering


UNIT- V

39

Application Layer: Network Security, Cryptographic Algorithms:


DES, RSA. Security Mechanisms : Authentication Protocols,
Firewalls. Name service (DNS) Domains Hierarchy, Name
servers. Traditional Applications : SMTP, MIME, World Wide
Web : HTTP, Network Management : SNMP.
TEXT BOOKS :
1.

Computer Networks and rew, Tanenbaum, 4/e, Pearson

2.

Data and computer communications, stallings, 8/e, PHI

REFERENCE BOOKS
1.

Data communications and networking Forouzan, 4/e, TMH

2.

Computer Networks A System Approach , Peterson ,Bruce


Davie,2/ e,Harcourt Asia

3.

Compute communications and networking technologies, Gallo,


Hancock, Cengage

4.

An Engineering approach to compute networking, Kesha ,Pearson

5.

Communication networks, 2/e , Leon-Garcia, TMH

6.

Computer networks , Anuranjan Misra, ACME Learning

7.

Computer networks, C R Sarma, Jaico,

8.

Understanding data communications, Held, 7/e , Pearson

40

2013-14
I II

L
4

P
-

Credits
3

DATAWAREHOUSING AND DATA MINING


UNIT- I
Introduction to Data mining, types of Data, Data Quality, Data
Processing, Measures of Similarity and Dissimilarity, Exploring
Data: Data Set, Summary Statistics, Visualization, OLAP and multi
dimensional data analysis.
UNIT-II
Classification: Basic Concepts, Decision Trees and model
evaluation: General approach for solving a classification problem,
Decision Tree induction, Model over fitting: due to presence of
noise, due to lack of representation samples, Evaluating the
performance of classifier. Nearest Neighborhood classifier,
Bayesian Classfier, Support vector Machines: Linear SVM,
Separable and Non Separable case.
UNIT-III
Association Analysis: Problem Definition, Frequent Item-set
generation, rule generation, compact representation of frequent
item sets, FP-Growth Algorithms. Handling Categorical ,
Continuous attributes, Concept hierarchy, Sequential , Sub graph
patterns
UNIT-IV
Clustering: Overview, K-means, Agglomerative Hierarchical
clustering,
DBSCAN,
Cluster
evaluation:
overview,
Unsupervised Cluster Evaluation using cohesion and separation,
using proximity matrix, Scalable Clustering algorithm
UNIT-V
Web data mining: Introduction, Web terminology and
characteristics, Web content mining, Web usage mining, web

structure mining, Search Engines :Characteristics, Functionality,


Architecture, Ranking of WebPages, Enterprise search

Computer Science & Engineering


TEXT BOOKS:

41

1.

Introduction to Data Mining: Pang-Ning tan, Michael Steinbach,


Vipin kumar, Addision- Wesley.

2.

Introduction to Data Mining with Case Studies: GK Gupta; Prentice


Hall.

REFERENCE BOOKS:
1.

Data Mining: Introductory and Advanced Topics, Margaret H


Dunham, Pearson, 2008.

2.

Fundamentals of data warehouses, 2/e , Jarke, Lenzerini,


Vassiliou, Vassiliadis, Springer.

3.
Data Mining Theory and Practice, Soman, Diwakar, Ajay, PHI,
2006.
4.

Data Mining , Concepts and Techniques, 2/e, Jiawei Han,


Micheline Kamber, Elsevier, 2006.

42

2013-14

46

2013-14
I II

L
4

P
-

Credits
3

HUMAN COMPUTER INTERACTION


UNIT- I
Introduction: Importance of user Interface, definition, importance of
good design. Benefits of good design. A brief history of Screen
design
The graphical user interface: Popularity of graphics, the concept
of direct manipulation, graphical system, Characteristics, Web
user interface popularity, characteristics- Principles of user
interface.
UNIT- II
Design process: Human interaction with computers, importance of
human characteristics human consideration, Human interaction
speeds, understanding business junctions.
UNIT-III
Screen Designing : Design goals, Screen planning and purpose,
organizing screen elements, ordering of screen data and content,
screen navigation and flow, Visually pleasing composition,
amount of information, focus and emphasis, presentation
information simply and meaningfully, information retrieval on
web, statistical graphics, Technological consideration in interface
design.
UNIT- IV
Windows: Windows new and Navigation schemes selection of
window, selection of devices based and screen based controls.

Components : Components text and messages, Icons and increases,


Multimedia, colors, uses problems, choosing colors.
UNIT V
Software tools : Specification methods, interface, Building Tools.
Interaction Devices: Keyboard and function keys, pointing
devices, speech recognition digitization and generation, image
and video displays, drivers.
47
Computer Science & Engineering
TEXT BOOKS :
1.

Human Computer Interaction. 3/e, Alan Dix, Janet Finlay, Goryd,


Abowd, Russell Beal, PEA,2004.

2.

The Essential guide to user interface design,2/e, Wilbert O Galitz,


Wiley DreamaTech.

REFERENCE BOOKS :
1.

Designing the user interface. 4/e, Ben Shneidermann , PEA.

2.

User Interface Design, Soren Lauesen , PEA.

3.

Interaction Design PRECE, ROGERS, SHARPS, Wiley .

4.

Human Computer, Interaction Dan R.Olsan, Cengage ,2010.

52

2013-14
I II

L
4

P
-

Credits
3

OBJECT ORIENTED ANALYSIS AND DESIGN


UNIT- I
Introduction to UML: The meaning of Object-Orientation, object
identity, encapsulation, information hiding, polymorphism,
genericity, importance of modeling, principles of modeling,
object oriented modeling, conceptual model of the UML,
Architecture.
UNIT II
Basic structural Modelig: Classes, relationships, common
mechanisms,
diagrams,
Advanced
structural
modeling:
advanced relationships, interfaces, types & roles, packages,
instances.
Class & object diagrams: Terms, concepts, examples, modeling
techniques, class & Object diagrams.
UNIT III
Collaboration diagrams: Terms, Concepts, depicting a message,
polymorphism in collaboration diagrams, iterated messages, use of
self in messages.
Sequence diagrams: Terms, concepts, differences between
collaboration and sequence diagrams, depicting synchronous
messages with/without priority call back mechanism broadcast
message.
UNIT IV
Behavioral Modeling: Interactions, use cases, use case diagrams,
activity diagrams.

Advanced Behavioral Modeling: Events and signals, state


machines, processes & threads, time and space, state chart
diagrams.
UNIT V
Architectural Modeling: Terms, concepts, examples, modeling
techniques for component diagrams and deployment diagrams.

Computer Science & Engineering


TEXT BOOKS:
1.

The Unified Modeling Language User Guide, Grady Booch,


Rambaugh, Ivar Jacobson, PEA

2.

Fundamentals of Object Oriented Design in UML, Meilir PageJones, Addison Wesley

53

REFERENCE BOOKS:
1.

Head First Object Oriented Analysis & Design,


Mclaughlin,SPD OReilly,2006

2.

Object oriented Analysis& Design Using UML, Mahesh ,PHI

3.

The Unified Modeling Language Reference Manual, 2/e, Rambaugh,


Grady Booch,etc., PEA

4.

Object Oriented Analysis & Design, Satzinger, Jackson, Thomson

5.

Object Oriented Analysis Design & implementation,


Dathan.,Ramnath, University Press

6.

Object Oriented Analysis & Design, John Deacon, PEA

7.

Fundamentals of Object Oriented Analysis and Design in UML,


M Pages-Jones, PEA

8.

Object-Oriented Design with UML, Barclay, Savage, Elsevier, 2008

58

2013-14
I II

L
4

P
-

Credits
3

CLOUD COMPUTING
UNITI
Introduction to virtualization and virtual machine, Virtualization
in Cluster /grid context Virtual network, Information model & data
model for virtual machine, Software as a Service (SaaS), SOA, On
Demand Computing.
UNITII
Cloud computing: Introduction, What it is and What it isnt, from
Collaborations to Cloud, Cloud application architectures, Value of
cloud computing, Cloud Infrastructure models, Scaling a Cloud
Infrastructure, Capacity Planning, Cloud Scale.
UNITIII
Data Center to Cloud: Move into the Cloud, Know Your
Software Licenses, The Shift to a Cloud Cost Model, Service Levels
for Cloud Applications
UNITIV
Defining Clouds for the Enterprise- Storage-as-a-Service,
Database-as-a-Service, Information-as-a-Service, Process-asa-Service,
Application-as-a-Service,
Platform-as-a-Service,
Integration-as-a-Service,
Security-as-a-Service,
Management/Governance-as-a-Service,
Testing-as-a-Service
Infrastructure-as-a-Service
UNITV
Security: Disaster Recovery, Web Application Design, Machine
Image Design, Privacy Design, Database Management, Data
Security, Network Security, Host Security, Compromise Response
Disaster Recovery, Disaster Recovery, Planning, Cloud Disaster
Management

Case study: Types of Clouds, Cloudcentres in detail, Comparing


approaches, Xen OpenNEbula , Eucalyptus, Amazon, Nimbus

Computer Science & Engineering


TEXT BOOKS:
1.

2.

Cloud Computing Web Based Applications That Change the


way you Work and Collaborate Online Michael Miller, Pearson
Education.

Cloud Application Architectures, 1st Edition by George Reese


OReilly Media.

REFERENCE BOOK:
1.

59

Cloud Computing and SOA Convergence in Your Enterprise: A


Step-by-Step Guide David S. Linthicum Addison-Wesley
Professional

60

2013-14
I II

L
-

P
-

CSE LAB2
Covering experiments from CN, DWDM and IS

Credits
2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy