Puter Science Engg
Puter Science Engg
in
ACADEMIC REGULATIONS
COURSE STRUCTURE AND SYLLABI
FOR
and any other course as approved by the authorities of the University from time to
time.
Bio-technology Bio-Technology
Civil Engg. Highway Engineering
Chemical Engg. Chemical Engineering
4.0 ATTENDANCE:
The programs are offered on a unit basis with each subject being considered a unit.
4.1 A candidate shall be deemed to have eligibility to write end semester examinations
in a subject if he has put in at least 75% of attendance in that subject.
4.2 Shortage of attendance up to 10% in any subject (i.e. 65% and above and below
75%) may be condoned by the College Academic Committee on genuine and valid
reasons on representation by the candidate with supporting evidence.
4.3 A candidate shall get minimum required attendance at least in three (3) theory
subjects in the present semester to get promoted to the next semester. In order to
qualify for the award of the M.Tech. Degree, the candidate shall complete all the
academic requirements of the subjects, as per the course structure.
4.4 Shortage of attendance below 65% shall in no case be condoned.
4.5 A stipulated fee shall be payable towards condonation of shortage of attendance.
5.0 EVALUATION:
The performance of the candidate in each semester shall be evaluated subject-wise, with a
maximum of 100 marks for theory and 100 marks for practicals, on the basis of Internal
Evaluation and End Semester Examination.
5.1 For the theory subjects 60 marks shall be awarded based on the performance in
the End Semester Examination, 40 marks shall be awarded based on the Internal
Evaluation. The internal evaluation shall be made based on the better of the
marks secured in the two Mid Term-Examinations conducted one in the middle
of the Semester and the other immediately after the completion of instruction.
Each mid term examination shall be conducted for a duration of 120 minutes
with 4 questions to be answered out of 6 questions.
5.2 For practical subjects, 60 marks shall be awarded based on the performance in
the End Semester Examinations, 40 marks shall be awarded based on the day-
to-day performance as Internal Marks.
5.3 There shall be two seminar presentations during I year I semester and II
Semesters. For seminar, a student under the supervision of a faculty member,
shall collect the literature on a topic and critically review the literature and
submit it to the Department in a report form and shall make an oral presentation
before the Departmental Committee. The Departmental Committee consists of
Head of the Department, supervisor and two other senior faculty members of the
department. For each Seminar there will be only internal evaluation of 50
marks. A candidate has to secure a minimum of 50% to be declared successful.
5.4 There shall be a Comprehensive Viva-Voce in II year I Semester. The
Comprehensive Viva-Voce will be conducted by a Committee consisting of
Head of the Department and two Senior Faculty members of the Department.
The Comprehensive Viva-Voce is aimed to assess the students’ understanding
in various subjects he/she studies during the M.Tech course of study. The
Comprehensive Viva-Voce is valued for 100 marks by the Committee. There
are no internal marks for the Comprehensive viva-Voce
5.5 A candidate shall be deemed to have secured the minimum academic
requirement in a subject if he secures a minimum of 40% of marks in the End
Examination and a minimum aggregate of 50% of the total marks in the End
Semester Examination and Internal Evaluation taken together.
5.6 In case the candidate does not secure the minimum academic requirement in any
subject (as specified in 5.4) he has to reappear for the End Examination in that
subject. A candidate shall be given one chance to re-register for each subject
provided the internal marks secured by a candidate are less than 50% and he has
failed in the end examination. In such case candidate must re-register for the
6.9 If the report of the examiner is not favourable, the candidate shall revise and
resubmit the Thesis, in the time frame as described by PRC. If the report of the
examiner is unfavourable again, the thesis shall be summarily rejected.
6.10 If the report of the examiner is favourable, viva-voce examination shall be
conducted by a board consisting of the supervisor, Head of the Department and the
examiner who adjudicated the Thesis. The Board shall jointly report candidates
work as:
A. Excellent
B. Good
C. Satisfactory
D. Unsatisfactory
Head of the Department shall coordinate and make arrangements for the
conduct of viva-voce examination.
If the report of the viva-voce is unsatisfactory, the candidate will retake the
viva-voce examination after three months. If he fails to get a satisfactory report
at the second viva-voce examination, he will not be eligible for the award of the
degree.
(The marks in internal evaluation and end examination shall be shown separately in the
marks memorandum)
10.0 GENERAL:
10.1 The academic regulations should be read as a whole for purpose of any
interpretation.
10.2 In case of any doubt or ambiguity in the interpretation of the above rules, the
decision of the Vice-Chancellor is final.
10.3 The University may change or amend the academic regulations and syllabus at
any time and the changes and amendments made shall be applicable to all the
students with effect from the date notified by the University.
10.4 Wherever the word he, him or his occur, it will also include she, her and hers.
10.5 There shall be no transfers within the constituent colleges of Jawaharlal Nehru
Technological University.
MALPRACTICES RULES
If the candidate:
1. (a) Possesses or keeps accessible in examination hall, Expulsion from the examination hall and
any paper, note book, programmable calculators, cancellation of the performance in that subject
Cell phones, pager, palm computers or any other only.
form of material concerned with or related to the
subject of the examination (theory or practical) in
which he is appearing but has not made use of
(material shall include any marks on the body of
the candidate which can be used as an aid in the
subject of the examination)
(b) Gives assistance or guidance or receives it from any Expulsion from the examination hall and
other candidate orally or by any other body cancellation of the performance in that subject
language methods or communicates through cell only of all the candidates involved. In case of an
phones with any candidate or persons in or outside outsider, he will be handed over to the police and
the exam hall in respect of any matter. a case is registered against him.
2. Has copied in the examination hall from any paper, Expulsion from the examination hall and
book, programmable calculators, palm computers cancellation of the performance in that subject and
or any other form of material relevant to the subject all other subjects the candidate has already
of the examination (theory or practical) in which appeared including practical examinations and
the candidate is appearing. project work and shall not be permitted to appear
for the remaining examinations of the subjects of
that Semester/year.
The Hall Ticket of the candidate is to be
cancelled and sent to the University.
3. Impersonates any other candidate in connection The candidate who has impersonated shall be
with the examination. expelled from examination hall. The candidate is
also debarred and forfeits the seat. The
performance of the original candidate who has
been impersonated, shall be cancelled in all the
subjects of the examination (including practicals
and project work) already appeared and shall not
be allowed to appear for examinations of the
remaining subjects of that semester/year. The
candidate is also debarred for two consecutive
semesters from class work and all University
examinations. The continuation of the course by
the candidate is subject to the academic
regulations in connection with forfeiture of seat.
If the imposter is an outsider, he will be handed
over to the police and a case is registered against
him.
4. Smuggles in the Answer book or additional Expulsion from the examination hall and
sheet or takes out or arranges to send out the cancellation of performance in that subject
question paper during the examination or and all the other subjects the candidate has
answer book or additional sheet, during or already appeared including practical
after the examination. examinations and project work and shall not
be permitted for the remaining examinations
of the subjects of that semester/year. The
candidate is also debarred for two consecutive
semesters from classwork and all University
examinations. The continuation of the course
by the candidate is subject to the academic
regulations in connection with forfeiture of
seat.
5. Uses objectionable, abusive or offensive Cancellation of the performance in that
language in the answer paper or in letters to subject.
the examiners or writes to the examiner
requesting him to award pass marks.
6. Refuses to obey the orders of the Chief In case of students of the college, they shall
Superintendent/Assistant – Superintendent / be expelled from examination halls and
10. Comes in a drunken condition to the Expulsion from the examination hall and
examination hall. cancellation of the performance in that
subject and all other subjects the candidate
has already appeared including practical
examinations and projectwork and shall not
be permitted for the remaining examinations
of the subjects of that semester/year.
11. Copying detected on the basis of internal Cancellation of the performance in that
evidence, such as, during valuation or during subject and all other subjects the candidate
special scrutiny. has appeared including practical examinations
and project work of that semester/year
examinations.
12. If any malpractice is detected which is not
covered in the above clauses 1 to 11 shall be
reported to the University for further action to
award suitable punishment.
I YEAR I SEMESTER
Code Group Subject L P Credits
Advanced Problem Solving 3 0 3
Computer System Design 3 0 3
Embedded Systems 3 0 3
Java and Web Technologies 3 0 3
Elective -I Object Oriented Modeling 3 0 3
Software Quality Assurance and Testing
Software Architecture and Design Patterns
Elective -II Software Design and Engineering 3 0 3
Advanced Compiler Design
Image Processing and Pattern Recognition
Lab Java and Web Technologies Lab 0 3 2
Seminar - - 2
Total Credits (6 Theory + 1 Lab.) 22
I YEAR II SEMESTER
Code Group Subject L P Credits
Distributed Computing 3 0 3
Distributed Databases 3 0 3
Advanced Computer Architecture 3 0 3
Advanced Computer Networks 3 0 3
Elective -III Web Services 3 0 3
Information Retrieval Systems
Semantic Web and Social Networks
Elective -IV Wireless Networks and Mobile Computing 3 0 3
Information Security
Storage Area Networks
Lab Databases and Compiler Lab 0 3 2
Seminar - - 2
Total Credits (6 Theory + 1 Lab.) 22
II YEAR - I Semester
Code Group Subject L P Credits
Comprehensive Viva - - 2
Project Seminar 0 3 2
Project work - - 18
Total Credits 22
II YEAR - II Semester
Code Group Subject L P Credits
Project work and Seminar - - 22
Total Credits 22
Unit II
Linear data structures- The List ADT, Array and Linked Implementations,Singly Linked Lists-
Operations-Insertion,Deletion,Traversals,DoublyLinkedLists-Operations-Insertion,Deletion,SkipLists-
implementation, StackADT,definitions,operations, Array and Linked implementations,applications-
infix to postfix conversion, recursion implementation,tail recursion,nontail recursion,indirect recursion,
QueueADT, definitions and operations ,Array and Linked Implementations,Priority Queue ADT,Deque
ADT,Implementation using doubly linked lists,Stacks and Queues in java.util.
Unit III
Non Linear data structures-Trees-Basic Terminology, Binary tree ADT,array and linked
representations,iterative traversals,threaded binary trees,Applications-Disjoint-Sets,Union and Find
algorithms,Huffman coding,General tree to binary tree conversion, Realizing a Priority Queue using
Heap.
Search Trees- Binary Search Tree ADT, Implementation, Operations- Searching, Insertion and
Deletion, Balanced Search trees-AVL Trees, Operations – Insertion and Searching,B-Trees, B-Tree of
order m,Operations- Insertion,Deletion and Searching,Introduction to Red-BlackTrees, Splay Trees,B*-
Trees,B+-Trees(Elementary treatement), Comparison of Search Trees,Trees in java.util.
Unit IV
Searching- Linear Search,Binary Search, Hashing-Hash functions,Collision-Handling schemes,Hashing
in java.util,Dictionary ADT,Linear list representation,Skip list representation,Hash table
representation,Comparison of Searching methods.
Sorting- Bubble Sort,Insertion Sort,Shell sort,Heap Sort,Radix Sort,Quick sort,Merge sort, Comparison
of Sorting methods,Sorting in java.util.
Unit V
Graphs–Basic Terminology, Graph Representations- Adjacency matrix,Adjacency lists,Adjacency
multilists,Graph traversals- DFS and BFS, Spanning trees-Minimum cost spanning trees,Kruskal’s
Algorithm for Minimum cost Spanning trees, Shortest paths- Single Source Shortest Path Problem,All
Pairs Shortest Path Problem.
Text Processing - Pattern matching algorithms- The Knuth-Morris-Pratt algorithm,The Boyer-Moore
algorithm,Tries- Standard Tries, Compressed Tries, Suffix tries.
TEXT BOOKS :
1. Data structures and Algorithms in Java,Adam Drozdek,Cengage Learning.
2. Data structures and Algorithms in Java,Michael T.Goodrich and R.Tomassia , Wiley
India edition.
3. Data structures , Algorithms and Applications in Java,S.Sahani, Universities Press.
REFERENCE BOOKS :
1. Data structures and algorithms in Java,Robert Lafore,Pearson Education.
2. Data structures with Java,W.H.Ford and W.R.Topp,Pearson Education.
3. Classic Data structures in Java,T.Budd,Pearson Education.
4. Data Structures using Java,D.S. Malik and P.S.Nair, Cengage Learning,
5.An Introduction to Data structures and Algorithms,J.A.Storer,Springer.
6.Data structures and Java Collections Frame Work,W.J.Collins,Mc Graw Hill.
7.Data structures with Java,J.R.Hubbard and A.Huray,PHI.
8.Data Structures using Java,Y.Langsam,M.Augenstein,A.Tanenbaum,Pearson Education.
9.Data structures with Java,J.R.Hubbard,Schaum’s Outlines,TMH.
UNIT I
Computer structure – hardware, software, system software, Von-neumann architecture – case
study. IA -32 Pentium: registers and addressing, instructions, assembly language, program flow
control, logic and shift/rotate instructions, multiply, divide MMX,SIMD instructions, I/O
operations, subroutines.
Input/Output organizaton, interrupts, DMA, Buses, Interface circuits, I/O interfaces, device
drivers in windows, interrupt handlers
UNIT II
Processing Unit: Execution of a complete instruction, multiple bus organization, hardwired
control, micro programmed control.
Pipelining: data hazards, instruction hazards, influence on instruction sets, data path & control
consideration,RISC architecture introduction.
UNIT – III
Memory: types and hierarchy, model level organization, cache memory, performance
considerations, mapping, virtual memory, swapping, paging, segmentation, replacement
policies.
UNIT – IV
Processes and Threads: processes, threads, inter process communication, classical IPC
problems, Deadlocks.
UNIT – V
File system: Files, directories, Implementation, Unix file system
Security: Threats, intruders, accident data loss, basics of cryptography, user authentication.
TEXT BOOKS:
1. Computer Organization – Car Hamacher, Zvonks Vranesic, SafeaZaky, Vth Edition,
McGraw Hill.
2. Modern Operating Systems, Andrew S Tanenbaum 2nd edition Pearson/PHI
REFERENCE BOOKS:
1. Computer Organization and Architecture – William Stallings Sixth Edition,
pearson/PHI
2. Morris Mano -Computer System Architecture –3 rd Edition-Pearson Education .
3. Operating System Principles- Abraham Silberchatz, Peter B. Galvin, Greg Gagne 7th
Edition, John Wiley
4. Operating Systems – Internals and Design Principles Stallings, Fifth Edition–2005,
Pearson Education/PHI
UNIT I
Introduction to Embedded Systems: Embedded Systems, Processor Embedded into a System,
Embedded Hardware Units and Devices in a System, Embedded Software, Complex System Design,
Design Process in Embedded System, Formalization of System Design, Classification of Embedded
Systems
UNIT II
8051 and Advanced Processor Architecture: 8051 Architecture, 8051 Micro controller Hardware,
Input/Output Ports and Circuits, External Memory, Counter and Timers, Serial data Input/Output,
Interrupts, Introduction to Advanced Architectures, Real World Interfacing, Processor and Memory
organization - Devices and Communication Buses for Devices Network: Serial and parallel Devices
& ports, Wireless Devices, Timer and Counting Devices, Watchdog Timer, Real Time Clock,
Networked Embedded Systems, Internet Enabled Systems, Wireless and Mobile System protocols
UNIT III
Embedded Programming Concepts: Software programming in Assembly language and High Level
Language, Data types, Structures, Modifiers, Loops and Pointers, Macros and Functions, object
oriented Programming, Embedded Programming in C++ & JAVA
UNIT IV
Real – Time Operating Systems: OS Services, Process and Memory Management, Real –
Time Operating Systems, Basic Design Using an RTOS, Task Scheduling Models, Interrupt
Latency, Response of Task as Performance Metrics - RTOS Programming: Basic functions and
Types of RTOSES, RTOS VxWorks, Windows CE
UNIT V
Embedded Software Development Process and Tools: Introduction to Embedded Software
Development Process and Tools, Host and Target Machines, Linking and Locating Software,
Getting Embedded Software into the Target System, Issues in Hardware-Software Design and
Co-Design - Testing, Simulation and Debugging Techniques and Tools: Testing on Host Machine,
Simulators, Laboratory Tools
TEXT BOOKS:
1. Embedded Systems, Raj Kamal, Second Edition TMH.
REFERENCE BOOKS :
1. Embedded/Real-Time Systems, Dr.K.V.K.K.Prasad, dreamTech press
2. The 8051 Microcontroller and Embedded Systems, Muhammad Ali Mazidi, Pearson.
3. The 8051 Microcontroller, Third Edition, Kenneth J.Ayala, Thomson.
4. An Embedded Software Primer, David E. Simon, Pearson Education.
5. Micro Controllers, Ajay V Deshmukhi, TMH.
6. Microcontrollers, Raj kamal, Pearson Education.
7. Introduction to Embedded Systems,Shibu K.V,TMH.
Unit II:
XML: Document type definition, XML Schemas, Document Object model, Presenting XML,
Using XML Processors: DOM and SAX
Review of Applets, Class, Event Handling, AWT Programming.
Introduction to Swing: JApplet, Handling Swing Controls like Icons – Labels – Buttons – Text
Boxes – Combo – Boxes – Tabbed Pains – Scroll Pains – Trees – Tables Differences between
AWT Controls & Swing Controls Developing a Home page using Applet & Swing.
Unit III:
Java Beans: Introduction to Java Beans, Advantages of Java Beans, BDK Introspection, Using
Bound properties, Bean Info Interface, Constrained properties Persistence, Customizes, Java
Beans API.
Web servers: Tomcat Server installation & Testing.
Introduction to Servelets: Lifecycle of a Serverlet, JSDK The Servelet API, The javax.servelet
Package, Reading Servelet parameters, Reading Initialization parameters.
Unit IV:
More on Servlets: The javax.servelet HTTP package, Handling Http Request & Responses,
Using Cookies-Session Tracking, Security Issues.
Introduction to JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing.
JSP Application Design with MVC architecture. AJAX.
Unit V:
JSP Application Development: Generating Dynamic Content, Using Scripting Elements
Implicit JSP Objects, Conditional Processing – Displaying Values Using an Expression to Set
an Attribute, Declaring Variables and Methods Error Handling and Debugging Sharing Data
Between JSP pages, Requests, and Users Passing Control and Date between Pages – Sharing
Session and Application Data – Memory Usage Considerations
Database Access Database Programming using JDBC Studying Javax.sql.* package Accessing
a Database from a JSP Page Application – Specific Database Actions Deploying JAVA Beans
in a JSP Page
TEXT BOOKS:
1. Web Programming, building internet applications, Chris Bates 2nd edition,
WILEY Dreamtech (UNIT 1,2)
2. The complete Reference Java 2 Fifth Edition ,Patrick Naughton and Herbert Schildt., TMH
(Chapters: 25) (UNIT 2,3)
3. Java Server Pages –Hans Bergsten, SPD O’Reilly (UNITs 3,4,5)
REFERENCE BOOKS:
1. Programming world wide web-Sebesta,Pearson
2. Core SERVLETS ANDJAVASERVER PAGES VOLUME 1: CORE
TECHNOLOGIES , Marty Hall and Larry Brown Pearson
3. Internet and World Wide Web – How to program , Dietel and Nieto PHI/Pearson.
4. Jakarta Struts Cookbook , Bill Siggelkow, S P D O’Reilly for chap 8.
5. Murach’s beginning JAVA JDK 5, Murach, SPD
6. An Introduction to web Design and Programming –Wang-Thomson
7. Professional Java Server Programming,S.Allamaraju and othersApress(dreamtech).
8. Java Server Programming ,Ivan Bayross and others,The X Team,SPD
9. Web Warrior Guide to Web Programmming-Bai/Ekedaw-Thomas
10. Beginning Web Programming-Jon Duckett WROX.
11. Java Server Pages, Pekowsky, Pearson.
12. Java Script,D.Flanagan,O’Reilly,SPD.
TEXT BOOKS :
1 The Unified Modeling Language User Guide By Grady Booch, James Rumbaugh, Ivar Jacobson 2 nd
Edition, Pearson Education.
2. UML 2 Toolkit By Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado WILEY-
Dreamtech India Pvt. Ltd.
3. The Unified Software Development Process By Ivar Jacobson, Grady Booch, James Rumbaugh,
Pearson Education
REFERENCE BOOKS :
1. Fundamentals of Object Oriented Design in UML By Meilir Page-Jones, Pearson Education
2. Object Oriented Analysis & Design By Atul Kahate, The McGraw-Hill.
3. Practical Object-Oriented Design with UML By Mark Priestley, TATA McGrawHill
4. Object Oriented Analysis & Design By Brett D McLaughlin, Gary Pollice and David West,
O’REILY .
5. Object-Oriented Analysis and Design using UML By Simon Bennet, Steve McRobb and Ray
Farmer, 2nd Edition, TATA McGrawHill.
6. Object-Oriented Analysis and Design with the Unified Process By John W. Satzinger, Robert B
Jackson and Stephen D Burd, THOMSON Course Technology.
7. UML and C++,R.C.Lee, and W.M.Tepfenhart,PHI.
UNIT I
Software Quality Assurance Framework and Standards SQA Framework: What is
Quality? Software Quality Assurance, Components of Software Quality Assurance – Software
Quality Assurance Plan: Steps to develop and implement a Software Quality Assurance Plan
– Quality Standards: ISO 9000 and Companion ISO Standards, CMM, CMMI, PCMM,
Malcom Balridge, 3 Sigma, 6 Sigma
UNIT II
Software Quality Assurance Metrics and Measurement Software Quality Metrics: Product
Quality metrics, In-Process Quality Metrics, Metrics for Software Maintenance, Examples of
Metric Programs – Software Quality metrics methodology: Establish quality requirements,
Identify Software quality metrics, Implement the software quality metrics, analyze software
metrics results, validate the software quality metrics – Software quality indicators –
Fundamentals in Measurement theory
UNIT III
Software Testing Strategy and Environment: Establishing testing policy, structured
approach to testing, test factors, Economics of System Development Life Cycle (SDLC)
Testing
Software Testing Methodology
Defects hard to find, verification and validation, functional and structural testing, workbench
concept, eight considerations in developing testing methodologies, testing tactics checklist
UNIT IV
Software Testing Techniques
Black-Box, Boundary value, Bottom-up, Branch coverage, Cause-Effect graphing, CRUD,
Database, Exception, Gray-Box, Histograms, Inspections, JADs, Pareto Analysis, Prototyping,
Random Testing, Risk-based Testing, Regression Testing, Structured Walkthroughs, Thread
Testing, Performance Testing, White-Box Testing
Software Testing Tools
Taxonomy of Testing tools, Methodology to evaluate automated testing tools, Load Runner,
Win runner and Rational Testing Tools, Silk test, Java Testing Tools, JMetra, JUNIT and
Cactus.
UNIT V
Testing Process
Eleven Step Testing Process: Assess Project Management Development Estimate and Status,
Develop Test Plan, Requirements Phase Testing, Design Phase Testing, Program Phase
Testing, Execute Test and Record Results, Acceptance Test, Report test results, testing
software installation, Test software changes, Evaluate Test Effectiveness.
Testing Specialized Systems and Applications
Testing Client/Server – Web applications, Testing off the Shelf Components, Testing Security,
Testing a Data Warehouse
TEXT BOOKS:
1. Effective Methods for Software Testing, 2nd Edition, William E. Perry , Second Edition,
Wiley India, 2006.
2. Software Quality, Mordechai Ben-Menachem/Garry S. Marliss,Thomson Learning
publication,1997.
REFERENCE BOOKS:
1. Testing and Quality Assurance for Component-based Software, by Gao, Tsao and Wu, Artech
House Publishers
2. Software Testing Techniques, by Bories Beizer, Second Edition, Dreamtech Press
3. Managing the Testing Process, by Rex Black, Wiley
4. Handbook of Software Quality Assurance, by G. Gordon Schulmeyer, James I.McManus,
Second Edition, International Thomson Computer Press
5. Software Testing and continuous Quality Improvement, by William E.Lewis, Gunasekaran
Veerapillai, Second Edition, Auerbach Publications
6. Metrics and Models for Software Quality Engineering, by Stephen H. Kan, by Pearson
Education Publication
7. Software Testing Tools, K.V.K.K. Prasad, Dream tech press, 2008.
8. Practical Software Testing, Ilene Burnstein, Springer, 2003.
9 Software Testing, Srinivasan Desikan & Gopalaswamy Ramesh, Pearson Education,2006.
10. Software testing techniques, Scott Loveland & Geoffrey Miller, Shroff Publishers, 2005.
11. Software Quality, Martin Wieczorek & Dirk Meyerhoff, Springer, 2001.
UNIT II
Analyzing Architectures
Architecture Evaluation, Architecture design decision making, ATAM, CBAM.
UNIT III
Moving from one system to many
Software Product Lines, Building systems from off the shelf components, Software
architecture in future.
UNIT IV
Patterns
Pattern Description, Organizing catalogs, role in solving design problems ,Selection and usage.
Creational and Structural patterns
Abstract factory, builder, factory method, prototype, singleton, adapter, bridge, composite,
façade, flyweight, Proxy.
UNIT V
Behavioral patterns
Chain of responsibility, command, Interpreter, iterator, mediator, memento, observer, state,
strategy, template method, visitor.
Case Studies
A-7E – A case study in utilizing architectural structures, The World Wide Web - a case study
in interoperability, Air Traffic Control – a case study in designing for high availability, Celsius
Tech – a case study in product line development
TEXT BOOKS:
1. Software Architecture in Practice, second edition, Len Bass,Paul Clements&Rick Kazman, Pearson
Education,2003.
2. Design Patterns, Erich Gamma, Pearson Education,1995.
REFERENCE BOOKS:
1. Beyond Software architecture, Luke Hohmann, Addison wesley, 2003.
2. Software architecture, David M. Dikel, David Kane and James R. Wilson, Prentice Hall
PTR,2001
3. Pattern Oriented Software Architecture,F.Buschmann&others,John Wiley&Sons.
4. Head First Design patterns, Eric Freeman & Elisabeth Freeman, O’REILLY, 2007.
5. Design Patterns in Java, Steven John Metsker & William C. Wake, Pearson education, 2006
6. J2EE Patterns, Deepak Alur, John Crupi & Dan Malks, Pearson education, 2003.
7. Design Patterns in C#, Steven John metsker, Pearson education, 2004.
8. Software Design, David Budgen, second edition, Pearson education,2003
UNIT I
Introduction to Software Engineering: The evolving role of software, Changing Nature of Software,
legacy software, Software myths.A Generic view of process: Software engineering- A layered
technology, a process framework, The Capability Maturity Model Integration (CMMI), Process
patterns, process assessment, personal and team process models.Process models: The waterfall model,
Incremental process models, Evolutionary process models, Specialized process models, The Unified
process.
Software Requirements: Functional and non-functional requirements, User requirements, System
requirements, Interface specification, the software requirements document.Requirements engineering
process: Feasibility studies, Requirements elicitation and analysis, Requirements validation,
Requirements management.
UNIT II
Role of Software Design
The nature of the design process, transferring design knowledge, constraints upon the design process
and product, recording design decisions, designing with others, context for design, economic factors,
assessing design qualities, quality attributes of the design product, assessing the design process.
Transferring Design Knowledge-Representing abstract ideas, design viewpoints, the architecture
concept, design methods, design patterns, Design representations, rationale for design methods.
Design Processes and Strategies: The role of strategy in design methods, describing the design
process – The D – Matrix, design by top-down decomposition, design by composition, organizational
influences upon design.
UNIT III
Designing with objects and components
Designing with objects: design practices for object-oriented paradigm, Object- oriented frame works,
Hierarchial object oriented design process and heuristics, the fusion method, the unified process.
Component – based design: The component concept, designing with components, designing
components, COTS.Performing User interface design-The Golden rules, Interface analysis and design
models, user and task analysis, analysis of display content and work environment, applying interface
design steps, user interface design issues, design evaluation.
UNIT IV
Project Management and Metrics
Project Management : The management spectrum: people, product, process and project, W5HH
principle, critical practices.
Metrics for Process and Projects: Process metrics, project metrics, size-oriented metrics, function-
oriented metrics, Object-oriented and use-case metrics, metrics for software quality, integrating metrics
with in the software process.
UNIT V
Project Scheduling and Risk Management
Project Scheduling: Basic concepts, project scheduling, defining a task set and task network, timeline
charts, tracking the schedule, tracking the progress for an OO project, Earned value analysis.
Risk Management: Reactive Vs. Proactive risk strategies, software risks, risk identification, risk
projection, risk refinement, risk mitigation and monitoring, the RMMM plan.
TEXT BOOKS :
1. Software design, David Budgen, second edition, Pearson education, 2003.
2. Software Engineering :A practitioner’s Approach, Roger S Pressman, seventh edition.
McGrawHill International Edition, 2009.
REFERENCE BOOKS :
1. Applying domain – driven design and patterns, Jimmy Nilsson, Pearson education,2006
2. Software Engineering, Ian Sommerville, seventh edition, Pearson education,2004.
3. Software Project Management, Bob Hughes & Mike Cotterell, fourth edition,Tata Mc-Graw
Hill,2006
4. The art of Project management, Scott Berkun, O’Reilly, 2005.
5. Software Engineering Project Management, Richard H. Thayer & Edward Yourdon, second
edition, Wiley India, 2004.
6. Software Engineering Foundations, Yingxu Wang, Auerbach Publications, 2008
7. Applied Software Project Management, Andrew Stellman & Jennifer Greene,O’Reilly, 2006.
8. Software Design,Eric Braude,John Wiley&Sons.
UNIT II : Parsing: Context free grammars, Top down parsing – Backtracking, LL (1), recursive
descent parsing, Predictive parsing, Preprocessing steps required for predictive parsing.
Bottom up parsing: - Shift Reduce parsing, LR and LALR parsing, Error recovery in parsing ,
handling ambiguous grammar, YACC – automatic parser generator.
UNIT III : Semantic analysis: Intermediate forms of source Programs – abstract syntax tree,
Attributed grammars, Syntax directed translation, Conversion of popular Programming languages
language Constructs into Intermediate code forms, Type checker.
Symbol Tables: Symbol table format, organization for block structured languages, hashing, tree
structures representation of scope information. Block structures and non block structure storage
allocation: static, Runtime stack and heap storage allocation, storage allocation for arrays, strings and
records.
UNIT IV : Code Generation- Processing the intermediate Code- Interpretation, Code generation,
Simple code generation, code generation for basic blocks, BURS Code generation and dynamic
programming, Register allocation by graph coloring, Evaluation of code generation techniques
Preprocessing the intermediate code, post processing the target code, machine code generation.
Code optimization: Consideration for Optimization, Machine dependent and machine independent
code optimization, Scope of Optimization, local optimization, loop optimization, frequency reduction,
folding, DAG representation.
UNIT V : Data flow analysis: Dataflow Analysis, Intermediate representation for flow analysis ,
Various dataflow analyses , Transformations using dataflow analysis Speeding up dataflow analysis ,
Alias analysis.
Loop Optimizations – Dominators, Loop-invariant computations, Induction variables, Array bounds
checks, Loop unrolling
TEXT BOOKS :
1. Principles of compiler design -A.V. Aho . J.D.Ullman; Pearson Education
2. Modern Compiler Design- Dick Grune, Henry E. Bal, Cariel T. H. Jacobs, Wiley dreamtech.
REFERENCE BOOKS :
1. Advanced Compiler Design Implementation,S.S.Muchnick,Elsevier.
2. Compilers principles ,techniques and tools A.V.Aho,Ravi Sethi& J.D. Ullman; Pearson ed.,
3. lex &yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
4. Modern Compiler Implementation in C- Andrew N. Appel, Cambridge University Press.
5. Engineering a Compiler-Cooper & Linda, Elsevier.
6. Compiler Construction, Louden, Thomson..
TEXT BOOKS :
1. Digital Image Processing Third edition, Pearson Education,Rafael C. Gonzalez, Richard E. Woods
2. Pattern recognition Principles: Julus T. Tou, and Rafel C. Gonzalez, Addision-Wesly Publishing
Company
REFERENCE BOOKS :
1. Image Processing, Analysis and Machine Vision, Second Edition, Milan Sonka, Vaclav Hlavac
and Roger Boyle. Thomson learning.
2. Digital Image Processing – Williamk. Pratl –John wiley edition
3. Fundamentals of digital image processing – by A.K. Jain. PH
4. Pattern classification, Richard Duda, Hart and David strok John Weily publishers.
5. Digital Image Processing,S.Jayaraman,S.Esakkirajan,T.Veerakumar,TMH.
6. Pattern Recognition,R.Shinghal,Oxford University Press.
TEXT BOOKS:
1. Java Server Programming for Professionals, 2nd Edition, Bayross and others, O’reilly,SPD,
2007.
2. JDBC, Servlets, and JSP ,Black Book, K. Santosh Kumar, dreamtech.
3. Core Web Programming, 2nd Edition, Volume 1, M.Hall and L.Brown, PHPTR.
4. Core Web Programming, 2nd Edition, Volume 2, M.Hall and L.Brown, PHPTR.
5. Core Java, Volume 1, Horstman and Cornell, 8th Edition, Pearson Education, 2008.
6. Core Java, Volume 2, Horstman and Cornell, 8th Edition, Pearson Education, 2008.
7. Java Programming: Advanced Topics, 3rd Edition, J.Wiggles worth and
P.McMillan,Thomson, 2007.
DISTRIBUTED COMPUTING
UNIT I
Introduction
The different forms of computing – Monolithic, Distributed, Parallel and cooperative computing, the
meaning of Distributed computing, Examples of Distributed systems, the strengths and weaknesses of
Distributed computing, operating system concepts relevant to distributed computing, the architecture of
distributed applications.
UNIT II
Distributed Computing Paradigms
Paradigms for Distributed Applications – Message Passing Paradigm, The Client-Server Paradigm
(Java Socket API), The peer-to-peer Paradigm, Message system (or MOM) Paradigm – the point-to-
point message model and the publish/subscribe message model, RPC model, The Distributed Objects
Paradigms – RMI, ORB, the object space Paradigm, The Mobile Agent Paradigm, the Network
Services Paradigm, The collaborative application ( Groupware Paradigm) ,choosing a Paradigm for an
application.
UNIT III
Distributed Objects Paradigm (RMI)
Message passing versus Distributed Objects, An Archetypal Distributed Object Architecture,
Distributed Object Systems, RPC, RMI, The Java RMI Architecture, Java RMI API, A sample RMI
Application, steps for building an RMI application, testing and debugging, comparison of RMI and
socket API
Distributed Object Paradigm(CORBA)
The basic Architecture, The CORBA object interface, Inter-ORB protocols, object servers and object
clients, CORBA object references, CORBA Naming Service and the Interoperable Naming Service,
CORBA object services, object Adapters, Java IDL, An example CORBA application.
UNIT IV
Distributed Document-based Systems
WWW, Lotus Notes, comparison of WWW and Lotus Notes, Distributed Coordination-based
systems – Introduction to coordination models, TIB, JINI, comparison of TIB and JINI
Software Agents, Agent Technology, Mobile Agents.
Distributed Multimedia Systems – characteristics of multimedia data, QOS of service management,
Resource Management, Stream Adaptation
UNIT V
Grid Computing
Definition of grid, grid types – computational grid, data grid, grid benefits and applications, drawbacks
of grid computing, grid components, grid architecture and its relation to various Distributed
Technologies.
Cluster Computing
Parallel computing overview, cluster computing – Introduction, Cluster Architecture, parallel
programming models and Paradigms, Applications of Clusters.
TEXT BOOKS:
1. Distributed Computing, Principles and Applications, M.L.Liu, Pearson Education.
2. Distributed Systems, Principles and Paradigms, A.S.Tanenbaum and M.V.Steen , Pearson
Education.
3. Client/Server Programming with Java and CORBA, second edition, R.Orfali & Dan Harkey,
John Wiley & sons.
4. Grid Computing, J.Joseph & C.Fellenstein, Pearson education.
5. High Performance Cluster Computing, Rajkumar Buyya, Pearson education.
REFERENCE BOOKS:
1. A Networking Approach to Grid Computing, D.Minoli, Wiley & sons.
2. Grid Computing: A Practical Guide to Technology and Applications, A.Abbas, Firewall Media.
3. Java Network Programming, E.R.Harold, 2 nd edition, O’Reilly, SPD.
4. Distributed Systems, Concepts and Design, 3rd edition, G.Coulouris, J.Dollimore and Tim
Kindbirg, Pearson Education.
5. Java Programming with CORBA, 3 rd edition, Brose, Vogel, Duddy, Wiley Dreamtech.
DISTRIBUTED DATABASES
UNIT I
Features of Distributed versus Centralized Databases, Principles of Distributed Databases, Levels Of
Distribution Transparency, Reference Architecture for Distributed Databases, Types of Data
Fragmentation, Integrity Constraints in Distributed Databases, Distributed Database Design
UNIT II
Translation of Global Queries to Fragment Queries, Equivalence transformations for Queries,
Transforming Global Queries into Fragment Queries, Distributed Grouping and Aggregate Function
Evaluation, Parametric Queries.
Optimization of Access Strategies, A Framework for Query Optimization, Join Queries, General
Queries
UNIT III
The Management of Distributed Transactions, A Framework for Transaction Management, Supporting
Atomicity of Distributed Transactions, Concurrency Control for Distributed Transactions, Architectural
Aspects of Distributed Transactions
Concurrency Control, Foundation of Distributed Concurrency Control, Distributed Deadlocks,
Concurrency Control based on Timestamps, Optimistic Methods for Distributed Concurrency Control.
UNIT IV
Reliability, Basic Concepts, Nonblocking Commitment Protocols, Reliability and concurrency Control,
Determining a Consistent View of the Network, Detection and Resolution of Inconsistency,
Checkpoints and Cold Restart, Distributed Database Administration, Catalog Management in
Distributed Databases, Authorization and Protection
UNIT V
Architectural Issues, Alternative Client/Server Architectures, Cache Consistency, Object Management,
Object Identifier Management, Pointer Swizzling, Object Migration, Distributed Object Storage, Object
Query Processing, Object Query Processor Architectures, Query Processing Issues, Query Execution,
Transaction Management, Transaction Management in Object DBMSs, Transactions as Objects
Database Integration, Scheme Translation, Scheme Integration, Query Processing Query Processing
Layers in Distributed Multi-DBMSs, Query Optimization Issues Transaction Management Transaction
and Computation Model, Multidatabase Concurrency Control, Multidatabase Recovery, Object
Orientation and Interoperability, Object Management Architecture CORBA and Database
interoperability, Distributed Component Object Model, COM/OLE and Database Interoperability,
PUSH-Based Technologies
TEXT BOOKS:
1. Distributed Databases Principles & Systems, Stefano Ceri, Giuseppe Pelagatti,TMH.
2. Principles of Distributed Database Systems, M. Tamer Ozsu, Patrick Valduriez ,
Pearson Education, 2nd Edition.
Instruction set principles and examples- Introduction, classifying instruction set- memory
addressing- type and size of operands, operations in the instruction set.
UNIT II
Pipelines : Introduction ,basic RISC instruction set ,Simple implementation of RISC
instruction set, Classic five stage pipe line for RISC processor, Basic performance issues in
pipelining , Pipeline hazards, Reducing pipeline branch penalties.
Memory hierarchy design : Introduction, review of ABC of cache, Cache performance ,
Reducing cache miss penalty, Virtual memory.
UNIT III
Instruction level parallelism the hardware approach - Instruction-level parallelism,
Dynamic scheduling, Dynamic scheduling using Tomasulo’s approach, Branch prediction,
high performance instruction delivery- hardware based speculation.
ILP software approach- Basic compiler level techniques, static branch predection, VLIW
approach, Exploiting ILP, Parallelism at compile time, Cross cutting issues -Hardware verses
Software.
UNIT IV
Multi Processors and Thread level Parallelism- Introduction, Charctersitics of application
domain, Systematic shared memory architecture, Distributed shared – memory architecture,
Synchronization.
UNIT V
Inter connection and networks – Introduction, Interconnection network media, Practical
issues in interconnecting networks, Examples of inter connection, Cluster , Designing of
clusters.
FSIntel Architecture: intel IA- 64 ILP in embedded and mobile markets Fallacies and pit falls
Text Books:
1. John L. Hennessy, David A. Patterson, Computer Architecture: A Quantitative Approach,
3rd Edition, An Imprint of Elsevier.
Reference Books :
1. John P. Shen and Miikko H. Lipasti, Modern Processor Design : Fundamentals of Super
Scalar Processors
2. Computer Architecture and Parallel Processing, Kai Hwang, Faye A.Brigs., MC Graw Hill.,
3. Advanced Computer Architecture - A Design Space Approach, Dezso Sima, Terence
Fountain, Peter Kacsuk, Pearson ed.
UNIT I Review
Computer Networks and the Internet: What is the Internet, The Network edge, The Network core,
Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-
Switched Networks, History of Computer Networking and the Internet - Foundation of Networking
Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized
Packets Model: ATM - Networking Devices: Multiplexers, Modems and Internet Access Devices,
Switching and Routing Devices, Router Structure.
UNIT II
The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error-Detection
and Error-Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet,
Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing
and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-Least-Cost-Path
algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols, Congestion Control at
Network Layer
UNIT III
Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4,
IPv6, Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and
Techniques, Intradomain Multicast Protocols, Interdomain Multicast Protocols, Node-Level Multicast
algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol
(TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control –
Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP,
Electronic Mail in the Internet, Domain Name System (DNS), P2P File Sharing, Socket Programming
with TCP and UDP, Building a Simple Web Server
UNIT IV
Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies,
IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) -
Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking
Devices, Large-Scale Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case
Study: An All-Optical Switch
UNIT V
VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol
Label Switching (MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP
Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia
Networking, Stream Control Transmission Protocol - Mobile A-Hoc Networks: Overview of Wireless
Ad-Hoc Networks, Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless
Sensor Networks: Sensor Networks and Protocol Structures, Communication Energy Model,
Clustering Protocols, Routing Protocols
TEXT BOOKS:
1. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith
W.Ross, Third Edition, Pearson Education, 2007
2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
REFERENCE BOOKS :
1. Data Communications and Networking, Behrouz A. Forouzan, Fourth Edition, Tata
McGraw Hill, 2007
2. Guide to Networking Essentials, Greg Tomsho,Ed Tittel, David Johnson,Fifth Edition,
Thomson.
3. An Engineering Approach to Computer Networking , S.Keshav, Pearson Education.
4. Campus Network Design Fundamentals, Diane Teare, Catherine Paquet, Pearson
Education (CISCO Press)
5. Computer Networks, Andrew S. Tanenbaum, Fourth Edition, Prentice Hall.
6. The Internet and Its Protocols,A.Farrel,Elsevier.
WEB SERVICES
ELECTIVE III
UNIT I
Evolution and Emergence of Web Services - Evolution of distributed computing, Core distributed
computing technologies – client/server, CORBA, JAVA RMI, Micro Soft DCOM, MOM, Challenges
in Distributed Computing, role of J2EE and XML in distributed computing, emergence of Web Services
and Service Oriented Architecture (SOA).
UNIT II
Introduction to Web Services – The definition of web services, basic operational model of web
services, tools and technologies enabling web services, benefits and challenges of using web services -
Web Services Architecture – Web services Architecture and its characteristics, core building blocks of
web services, standards and technologies available for implementing web services, web services
communication, basic steps of implementing web services, developing web services enabled
applications.
UNIT III
Core fundamentals of SOAP – SOAP Message Structure, SOAP encoding , SOAP message exchange
models, SOAP communication and messaging, SOAP security - Developing Web Services using
SOAP – Building SOAP Web Services, developing SOAP Web Services using Java, limitations of
SOAP.
UNIT IV
Describing Web Services – WSDL – WSDL in the world of Web Services, Web Services life cycle,
anatomy of WSDL definition document, WSDL bindings, WSDL Tools, limitations of WSDL -
Discovering Web Services – Service discovery, role of service discovery in a SOA, service discovery
mechanisms, UDDI – UDDI Registries, uses of UDDI Registry, Programming with UDDI, UDDI data
structures, support for categorization in UDDI Registries, Publishing API, Publishing information to a
UDDI Registry, searching information in a UDDI Registry, deleting information in a UDDI Registry,
limitations of UDDI.
UNIT V
Web Services Interoperability – Means of ensuring Interoperability, Overview of .NET and J2EE.
Web Services Security – XML security frame work, XML encryption, XML digital signature, XKMS
structure, guidelines for signing XML documents.
TEXT BOOKS:
1. Developing Java Web Services, R. Nagappan, R. Skoczylas, R.P. Sriganesh, Wiley India, rp –
2008.
2. Developing Enterprise Web Services, S. Chatterjee, J. Webber, Pearson Education, 2008.
3. XML, Web Services, and the Data Revolution, F.P.Coyle, Pearson Education.
REFERENCE BOOKS:
1. Building Web Services with Java, 2 nd Edition, S. Graham and others, Pearson Edn., 2008.
2. Java Web Services, D.A. Chappell & T. Jewell, O’Reilly,SPD.
3. McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann
Publishers,2005.
4. J2EE Web Services, Richard Monson-Haefel, Pearson Education.
5. Web Services, G. Alonso, F. Casati and others, Springer, 2005.
TEXT BOOKS:
1. Thinking on the Web - Berners Lee,Godel and Turing,Wiley interscience,2008.
2. Social Networks and the Semantic Web ,Peter Mika,Springer,2007.
REFERENCE BOOKS:
1. Semantic Web Technologies ,Trends and Research in Ontology Based Systems,
J.Davies,R.Studer,P.Warren, John Wiley & Sons.
2. Semantic Web and Semantic Web Services -Liyang Lu
Chapman and Hall/CRC Publishers,(Taylor & Francis Group)
3. Information Sharing on the semantic Web - Heiner Stuckenschmidt;
Frank Van Harmelen, Springer Publications.
4. Programming the Semantic Web,T.Segaran,C.Evans,J.Taylor,O’Reilly,SPD.
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition, 2008.
2. Martyn Mallick, “Mobile and Wireless Design Essentials”, Wiley, 2008.
3. Asoke K Talukder, et al, “Mobile Computing”, Tata McGraw Hill, 2008.
REFERENCE BOOKS:
1.Mobile Computing,Raj Kamal,Oxford University Press.
2.William Stallings, “ Wireless Communications & Networks”, Person, Second Edition, 2007.
3.Frank Adelstein et al, “Fundamentals of Mobile and Pervasive Computing”, TMH, 2005.
4.Jim Geier, “Wireless Networks first-step”, Pearson, 2005.
5.Sumit Kasera et al, “2.5G Mobile Networks: GPRS and EDGE”, TMH, 2008.
6.Matthew S.Gast, “802.11 Wireless Networks”, O’Reilly, Second Edition, 2006.
7.Ivan Stojmenovic , “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2007.
TEXT BOOKS :
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson
Education, 2008.
2.Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
REFERENCE BOOKS :
1. Information Security by Mark Stamp, Wiley – India, 2006.
2. Information Systems Security,Godbole,Wiley Student Edition.
3. Cryptography and Network Security by William Stallings, Fourth Edition,Pearson Education
2007.
4. Fundamentals of Computer Security , Springer.
5. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
6. Computer Security Basics by Rick Lehtinen, Deborah Russell & G.T.Gangemi Sr., SPD
O’REILLY 2006.
7. Modern Cryptography by Wenbo Mao, Pearson Education 2007.
8. Principles of Information Security, Whitman, Thomson.
Case Studies
The technologies described in the course are reinforced with EMC examples of actual solutions.
Realistic case studies enable the participant to design the most appropriate solution for given sets of
criteria.
TEXT BOOKS :
1. EMC Corporation, Information Storage and Management, Wiley.
2. Robert Spalding, “Storage Networks: The Complete Reference“, Tata McGraw Hill , Osborne,
2003.
3. Marc Farley, “Building Storage Networks”, Tata McGraw Hill ,Osborne, 2001.
4. Meeta Gupta, Storage Area Network Fundamentals, Pearson Education Limited, 2002.
DATABASES
Objective: This lab enables the students to practice the concepts learnt in the subject DBMS by
developing a database for an example company named “Roadway Travels” whose description is as
follows. The student is expected to practice the designing, developing and querying a database in the
context of example database “Roadway travel”. Students are expected to use “Mysql” database.
Roadway Travels
"Roadway Travels" is in business since 1997 with several buses connecting different places in India.
Its main office is located in Hyderabad.
Reservations:
Reservations are directly handled by booking office. Reservations can be made 60 days in
advance in either cash or credit. In case the ticket is not available, a wait listed ticket is issued to the
customer. This ticket is confirmed against the cancellation.
Apart from the above mentioned entities you can identify more. The above mentioned are few.
Bus NO Source
BUS Destination
Departu
re Time
Example: The passenger tables look as below. This is an example. You can add more attributes based
on your E-R model.
Passenger
Name Age Sex Address Passport ID
Week4: Normalization
Database normalization is a technique for designing relational database tables to minimize duplication
of information and, in so doing, to safeguard the database against certain types of logical or structural
problems, namely data anomalies. For example, when multiple instances of a given piece of
information occur in a table, the possibility exists that these instances will not be kept consistent when
the data within the table is updated, leading to a loss of data integrity. A table that is sufficiently
normalized is less vulnerable to problems of this kind, because its structure reflects the basic
assumptions for when
multiple instances of the same information should be represented by a single instance only.
DELETE - deletes all records from a table, the space for the records remain
Week7: Querying
In this week you are going to practice queries (along with sub queries) using ANY, ALL, IN, Exists,
NOT EXISTS, UNION, INTERSECT, Constraints etc.
Write a Query to display the Information present in the Passenger and cancellation tables. Hint: Use
UNION Operator.
Write a Query to display different travelling options available in British Airways.
Display the number of days in a week on which the 9W01 bus is available.
Find number of tickets booked for each PNR_no using GROUP BY CLAUSE. Hint: Use GROUP
BY on PNR_No.
Find the distinct PNR numbers that are present.
Find the number of tickets booked in each class where the number of seats is greater than 1. Hint:
Use GROUP BY, WHERE and HAVING CLAUSES.
Find the total number of cancelled seats.
Write a Query to count the number of tickets for the buses, which travelled after the date '14/3/2009'.
Hint: Use HAVING CLAUSES.
Week10: Triggers
In this week you are going to work on Triggers. Creation of insert trigger, delete trigger, update trigger.
Practice triggers using the above database.
Week11: Procedures
In this session you are going to learn Creation of stored procedure, Execution of procedure and
modification of procedure. Practice procedures using the above database.
Eg:CREATE PROCEDURE myProc()
BEGIN
SELECT COUNT(Tickets) FROM Ticket WHERE age>=40;
End;
Week12: Cursors
In this week you need to do the following: Declare a cursor that defines a result set.
Open the cursor to establish the result set. Fetch the data into local variables as needed from the cursor,
one row at a time. Close the cursor when done
Tables
BUS
Bus No: Varchar: Pk
Source : Varchar
Destination : Varchar
Passenger
PNR_No : Numeric(9) : PK
Ticket_No: Numeric (9)
Name: Varchar(15)
Age : int (4)
Sex:Char(10) : Male / Female
PPNO: Varchar(15)
Reservation
PNR_No: Numeric(9) : FK
Journey_date : datetime(8)
No_of_seats : int (8)
Address : Varchar (50)
Contact_No: Numeric (9) --> Should not be less than 9 and Should not accept any other character other
than Integer
Status: Char (2) : Yes / No
Cancellation
PNR_No: Numeric(9) : FK
Journey_date : datetime(8)
No_of_seats : int (8)
Address : Varchar (50)
Contact_No: Numeric (9) --> Should not be less than 9 and Should not accept any other character other
than Integer
Status: Char (2) : Yes / No
Ticket
Ticket_No: Numeric (9): PK
Journey_date : datetime(8)
Age : int (4)
Sex:Char(10) : Male / Female
Source : Varchar
Destination : Varchar
Dep_time : Varchar
ii)COMPILER
Consider the following mini Language, a simple procedural high-level language, only operating on
integer
data, with a syntax looking vaguely like a simple C crossed with Pascal. The syntax of the language is
defined by the following BNF grammar:
<program> ::= <block>
<block> ::= { <variabledefinition> <slist> }
| { <slist> }
<variabledefinition> ::= int <vardeflist> ;
<vardeflist> ::= <vardec> | <vardec> , <vardeflist>
<vardec> ::= <identifier> | <identifier> [ <constant> ]
<slist> ::= <statement> | <statement> ; <slist>
<statement> ::= <assignment> | <ifstatement> | <whilestatement>
| <block> | <printstatement> | <empty>
<assignment> ::= <identifier> = <expression>
| <identifier> [ <expression> ] = <expression>
<ifstatement> ::= if <bexpression> then <slist> else <slist> endif
| if <bexpression> then <slist> endif
<whilestatement> ::= while <bexpression> do <slist> enddo
<printstatement> ::= print ( <expression> )
<expression> ::= <expression> <addingop> <term> | <term> | <addingop> <term>
<bexpression> ::= <expression> <relop> <expression>
<relop> ::= < | <= | == | >= | > | !=
<addingop> ::= + | -
<term> ::= <term> <multop> <factor> | <factor>
<multop> ::= * | /
<factor> ::= <constant> | <identifier> | <identifier> [ <expression>]
| ( <expression> )
<constant> ::= <digit> | <digit> <constant>
<identifier> ::= <identifier> <letterordigit> | <letter>
<letterordigit> ::= <letter> | <digit>
<letter> ::= a|b|c|d|e|f|g|h|i|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z
<digit> ::= 0|1|2|3|4|5|6|7|8|9
<empty> has the obvious meaning
Comments (zero or more characters enclosed between the standard C/Java-style comment brackets /
*...*/) can be inserted. The language has rudimentary support for 1-dimensional arrays. The declaration
int a[3] declares an array of three elements, referenced as a[0], a[1] and a[2]. Note also that you should
worry about the scoping of names.
A simple program written in this language is:
{ int a[3],t1,t2;
t1=2;
a[0]=1; a[1]=2; a[t1]=3;
t2=-(a[2]+t1*6)/(a[2]-t1);
if t2>5 then
print(t2);
else {
int t3;
t3=99;
t2=-25;
print(-t1+t2*t3); /* this is a comment
on 2 lines */
} endif }
1. Design a Lexical analyzer for the above language. The lexical analyzer should ignore redundant
spaces, tabs and newlines. It should also ignore comments. Although the syntax specification
states that identifiers can be arbitrarily long, you may restrict the length to some reasonable value.
2. Implement the lexical analyzer using JLex, flex or lex or other lexical analyzer generating tools.