23 Msc-Cyber Security
23 Msc-Cyber Security
Programme Structure
and
Curriculum & Scheme of Examination
2021-23
(Choice Based Credit System)
AMITY UNIVERSITY
RAJASTHAN
1
PREAMBLE
This booklet contains the Programme Structure, the Detailed Curriculum and the Scheme of
Examination. The Programme Structure includes the courses (Core and Elective), arranged semester
wise. The importance of each course is defined in terms of credits attached to it. The credit units
attached to each course has been further defined in terms of contact hours i.e. Lecture Hours (L),
Tutorial Hours (T), Practical Hours (P). Towards earning credits in terms of contact hours, 1
Lecture and 1 Tutorial per week are rated as 1 credit each and 2 Practical hours per week are rated
as 1 credit. Thus, for example, an L-T-P structure of 3-0-0 will have 3 credits, 3-1-0 will have 4
credits, and 3-1-2 will have 5 credits.
The Curriculum and Scheme of Examination of each course includes the course objectives, course
contents, scheme of examination and the list of text and references. The scheme of examination
defines the various components of evaluation and the weightage attached to each component. The
different codes used for the components of evaluation and the weightage attached to them are:
It is hoped that it will help the students study in a planned and a structured manner and promote
effective learning. Wishing you an intellectually stimulating stay at Amity University.
July, 2020
2
PROGRAMME LEARNING OUTCOMES (PLO)
PLO- 1 Demonstrating advanced knowledge in the field of cyber and information security in
general and the following particular topics: computer and network security, security
management, incident response, computational and digital forensics, biometrics,
privacy, and security of critical infrastructure. The candidate possesses special insight
and can demonstrate expertise in information security technology, digital forensics, or
security management, depending on the chosen program track.
PLO- 2 Apply advanced knowledge of the current state-of-the-art in the field of cyber and
information security.
PLO- 3 To apply knowledge in new areas within cyber and information security, in particular
cloud computer security, security on the Internet of Things (IoT) and Cyber Forensic
applications.
PLO- 4 Utilize knowledge of scientific methodology needed to plan and carry out research in
the field of cyber and information security under supervision.
Sr. Skill
Sem Credit Employability Credit Entrepreneurship Credit Total Total
No. Development Nos. Credit
1 I 4 8 2 4 1 3 7 15
2 II 3 7 4 8 1 3 8 18
3 III 5 13 2 4 7 17
4 IV 1 25 1 25
Total 12 28 9 41 2 6 23 75
3
SKILL DEVELOPMENT SUBJECTS IN M.Sc.(C.S.) PROGRAMME
sem Course code Course Name
I MCS102 Network Security and Cryptography
I MCS122 Network Security and Cryptography Lab
I MCS135 Secure Protocol Design
I MCS145 Secure Protocol Design lab
II MCS201 Cyber Forensic
II MCS235 Wireless Networks
II MCS245 Wireless Networks Lab
III MCS301 Database and Application Security
III MCS302 Secure Software Engineering
III MCS333 Design and Analysis of Algorithms
III MCS335 Python
III MCS345 Python Lab
IV
Employability
sem Course code Course Name
I MCS103 Cyber Security -I
I MCS123 Cyber Security - I Lab
II MCS202 Cyber Security - II
II MCS203 Intrusion Detection Systems
II MCS222 Cyber Security - II Lab
II MCS223 Intrusion Detection Systems Lab
III MCS303 Ethical hacking and Digital Forensic Tools
III MCS323 Ethical hacking and Digital Forensic Tools Lab
IV MCS460 Internship
Entrepreneurship
sem Course code Course Name
I MCS131 Information Security Risk Assessment and Assurance
II MCS231 Cyber Laws & Security Policies
4
PROGRAMME STRUCTURE CREDITS SUMMARY
Master of Science (Cyber Security) 2021
Core Courses CC
Domain Electives DE
Value Added Course VA
Open Electives OE
Environmental Science EVS
Project Work (Non NTCC
Teaching Credit Course)
Anandam Project ANDP
Core Courses CC
Domain Electives DE
Value Added Course VA
Open Electives OE
Environmental Science EVS
Project Work (Non NTCC
Teaching Credit Course)
Anandam Project ANDP
5
PROGRAMME STRUCTURE
2021-23
FIRST SEMESTER
S. No. Course Title Category Lecture Tutorial Practical Total
(L) (T) (P) Credits
CORE COURSE (CC)
MCS101 Mathematical Foundation to 2 1 - 3
CC
Computer Science
MCS102 Network Security and 2 1 - 3
CC
Cryptography
MCS103 Cyber Security -I CC 2 1 - 3
MCS122 Network Security and - - 2 1
CC
Cryptography Lab
MCS123 Cyber Security - I Lab CC - - 2 1
DOMAIN ELECTIVES (DE)
Elective-I Select any ONE
(Without Lab)
MCS131 Information Security Risk DE
Assessment and Assurance
2 1 - 3
MCS132 Internet Technology DE
MCS133 Digital Hardware Modeling DE
Elective-II Select any ONE
(WithLab)
MCS134 Internet of Things DE
MCS135 Secure Protocol Design DE
MCS136 Probability and Statistical DE 2 1 - 3
Structure
MCS144 Internet of Things LAB DE
MCS145 Secure Protocol Design lab DE
MCS146 Probability and Statistical DE - - 2 1
Structure Lab
Non Teaching Credit Course (NTCC)
MCS151 Report on Workshop / Social NTCC - - - 1
Work
AND001 Anandam-I ANDP - - - 2
VALUE ADDED COURSES (VAC)
BCS111 Communication Skills-I VA 1 - - 1
BSS111 Behavioural Science-I (Self VA 1 - - 1
Development and Interpersonal
Skills)
Foreign Language VA 2 - - 2
FLT111 French VA
FLG111 German VA
FLS111 Spanish VA
FLC111 Chinese VA
TOTAL 25
6
SECOND SEMESTER
S. No. Course Title Category Lecture Tutorial Practical Total
(L) (T) (P) Credits
CORE COURSE (CC)
MCS201 Cyber Forensic CC 2 1 - 3
MCS202 Cyber Security - II CC 2 1 - 3
MCS203 Intrusion Detection Systems CC 2 1 - 3
MCS222 Cyber Security - II Lab CC - - 2 1
MCS223 Intrusion Detection Systems Lab CC - - 2 1
DOMAIN ELECTIVES (DE)
Elective-I Select any ONE
(Without Lab)
MCS231 Cyber Laws & Security Policies DE
MCS232 Social Media Security DE 2 1 - 3
MCS233 Biometric Security DE
Elective-II Select any ONE
(With Lab)
MCS234 MATLAB DE
2 1 - 3
MCS235 Wireless Networks DE
MCS244 MATLAB Lab DE
- - 2 1
MCS245 Wireless Networks Lab DE
OPEN ELECTIVES (OE)
Open Elective OE 2 1 - 3
Non Teaching Credit Course (NTCC)
MCS250 Minor Project NTCC - - - 6
AND002 Anandam-II ANDP - - - 2
VALUE ADDED COURSES (VAC)
BCS211 Communication Skills-II VA 1 - - 1
BSS211 Behavioural Science-II VA 1 - - 1
(Behavioural Communication and
Relationship Management)
Foreign Language VA 2 - - 2
FLT211 French VA
FLG211 German VA
FLS211 Spanish VA
FLC211 Chinese VA
TOTAL 33
7
THIRD SEMESTER
S. No. Course Title Category Lecture Tutorial Practical Total
(L) (T) (P) Credits
CORE COURSE (CC)
MCS301 Database and Application Security CC 2 1 - 3
MCS302 Secure Software Engineering CC 2 1 - 3
MCS303 Ethical hacking and Digital CC 2 1 - 3
Forensic Tools
MCS323 Ethical hacking and Digital CC - - 2 1
Forensic Tools Lab
DOMAIN ELECTIVES (DE)
Elective-I Select any ONE
(Without Lab)
MCS331 Artificial Intelligence and Neural DE
Network
MCS332 Human Computer Interaction DE 2 1 - 3
MCS333 Design and Analysis of DE
Algorithms
Elective-II Select any ONE
(With Lab)
MCS334 Principles of Virtualization DE
2 1 - 3
MCS335 Python DE
MCS344 Principles of Virtualization Lab DE
- - 2 1
MCS345 Python Lab DE
OPEN ELECTIVES (OE)
Open Elective OE 2 1 - 3
Non Teaching Credit Course (NTCC)
MCS350 Minor Project NTCC - - - 6
MCS351 Report on Paper Presentation in NTCC - - - 1
Conference
MCS352 Summer Internship Project NTCC - - - 3
AND003 Anandam-III ANDP - - - 2
VALUE ADDED COURSES (VAC)
BCS311 Communication Skills-III VA 1 - - 1
BSS311 Behavioural Science-III (Leading VA 1 - - 1
Through Teams)
Foreign Language
FLT311 French VA
FLG311 German VA 2 - - 2
FLS311 Spanish VA
FLC311 Chinese VA
TOTAL 36
FOURTH SEMESTER
S. No. Course Title Category Lecture Tutorial Practical Total
(L) (T) (P) Credits
Non Teaching Credit Course (NTCC)
Elective Select any ONE
MCS460 Internship NTCC
MCS461 Project Work NTCC - - - 25
MCS462 Dissertation NTCC
TOTAL 25
8
MATHEMATICAL FOUNDATION TO COMPUTER SCIENCE
10
NETWORK SECURITY AND CRYPTOGRAPHY
Course Objective:
The goal of this course is to introduce the fundamental networking concepts, technologies as well as
the understanding of encryption and decryption algorithm.. This course will assist you in
developing the skills necessary to plan implement and secure the small networks across a range of
applications.
Physical Layer : The Physical Layer-Communication Signals, Physical Signaling and Encoding,
Representing Bits, Physical Media-Connecting Communication. Data Link Layer : Introduction,
Data Link Layer-Accessing the media .Media Access Control Techniques, Media Access Control
Addressing and Framing Data.
Network Layer Networks-dividing host into groups, Routing –How our data packets are handled,
Routing process. LANs, WANs and Internetworks Network Addressing. Transport Layer : The
TCP protocol –communicating with reliability, Managing TCP sessions, The UDP protocol
communicating with low overheads
Application Layer Functionality and Protocols : Provision for applications and services,
Application layer protocols and services. Overview of Ethernet, Ethernet –Communication through
the LAN, The Ethernet Frame ,Ethernet Media Access Control, Ethernet Physical Layer, Hubs and
Switches, Address Resolution Protocol(ARP)
Introduction: Attacks, Services and Mechanisms, Security attacks, Security services, A Model for
Internetwork security. Classical Techniques: Conventional Encryption model, Steganography,
Classical Encryption Techniques.
Modern Techniques: Simplified DES, Block Cipher Principles, Data Encryption standard, Strength
of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
operations. Algorithms: Triple DES,
11
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text:
Cisco Networking Academy Programme CCNA 1 & 2 Companion Guide, 3 rd Edn by Pearson
Education
Cisco Networking Academy Programme CCNA 1 & 2 Lab Companion, 3 rd Edn by Pearson
Education
William Stallings, Cryptography and Network Security Principles and Practices, 5th Edition,
PHI/Pearson, 2011.
William Stallings, Network Security Essentials Applications and Standards, 4thEdition, Pearson
Education, 2011.
Christof Paar and Jan Pelzl , Understanding Cryptography – A Textbook for Students and
Practitioners Christof Paar and Jan Pelzl, Springer, 2010
References:
12
CYBER SECURITY - I
COURSE CODE L T P/FW CREDIT UNITS
MCS103 2 1 - 3
Module I: Introduction to Operating System and Linux: Basic Elements of OS, OS Functions,
Types of OS, OS Terminologies, Linux Command Line, Linux Features, Basic Navigation, Files
and Directories, Manual Pages, File Manipulation, Wildcards, Permissions, File Hierarchy, Filters,
Grep and Regular Expressions, Piping and Redirection, Process Management, User Management,
File Security, Shell Scripting, Security in Operating Systems.
Types of Security, Information Classification and their levels, Process for managing classified
information, Access Control, Types of Access Control - Preventative access control, Deterrent
access control, Detective access control, Corrective access control, Recovery access control,
Compensation access control, Directive access control, Administrative access controls,
Logical/technical access controls, Physical access controls.
Cyber Security Goals, Tools for Confidentiality - Encryption, Access control, Authentication,
Authorization, Physical Security, Tools for Integrity - Backups, Checksums, Data Correcting
Codes, Tools for Availability - Physical Protections, Computational redundancies.
Types of Cyber Security Attacks, Web-based Attacks (Injection Attack, DNS Spoofing, Session
Hijacking, Phishing, Brute Force, Denial of Service, Distributed Denial of Service, Dictionary
Attack, URL Interpretation, File Inclusion Attack, Man in the Middle Attack), System-based Attack
(Virus, Worm, Trojan Horse, Backdoors, Bots), Types of Cyber Attackers.
Data, Information, and Knowledge, Database (DB), Database Management System (DBMS), DB
Characteristics, DB Users, DBMS Architecture, DBMS Models, DB Relationships, SQL Overview,
DML, DDL, and DCL commands, Security in Database and its Design Consideration.
Examination Scheme:
Text Books:
Abraham Silberschatz, Peter B. Galvin, Greg Gagne, "Operating System Concepts Essentials", 2
Edition, Wiley, 2014.
William E. Shotts, Jr., "The Linux Command Line: A Complete Introduction", No Starch Press,
2012.
13
Charles J. Brooks, ,Christopher GrowPhilip Craig, "Cybersecurity Essentials", John Wiley and
.Sons, 2018
References:
William Stallings, "Operating Systems: Internals and Design Principles", Prentice Hall, 2009.
John Purcell, Robert Kiesling, "Linux: The Complete Reference", Linux System Labs, 1998.
14
NETWORK SECURITY AND CRYPTOGRAPHYLAB
The Lab Manual is designed for the implementation of protocols in lab. The exercises in the Lab
Manual correspond to course and are for use in a classroom setting supervised by an instructor. The
Lab Manual presents a rich, hands-on learning experience that encourages practical solutions and
strengthens critical problem-solving skills:
List of Experiments
15
8.0 IPv4 Address Subnetting Scenario
When given an IP address, network mask, and subnetwork mask, you will be able to determine
other information about the IP address such as:
Caesar cipher
Shift cipher
Affine cipher
Substitution with symbols
Vigen`ere cipher
Hill cipher
One-way functions
The Diffie-Hellman key exchange protocol
The RSA procedure
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V – Viva.
16
CYBER SECURITY - I LAB
Experiments
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V – Viva.
17
INFORMATION SECURITY RISK ASSESSMENT AND ASSURANCE
Module I: Introduction
History, What is Information Security?, Critical Characteristics of Information, NSTISSC Security
Model, Components of an Information System, Securing the Components, Balancing Security and
Access.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
1. Donn Parkers, “Fighting Computer Crime: “A New Framework for Protecting Information”,
John Wiley & Sons, 2003.
2. Micki Krause, Harold F.Tripton, “Information Security Management Handbook”, Auerbach
Publications, 2012.
3. Mark Talabis, “Information Security Risk Assessment Toolkit: Practical Assessments through
Data Collection and Data Analysis”, Kindle Edition. ISBN: 978-1-59749-735-0.
4. David L. Cannon, “CISA Certified Information Systems Auditor Study Guide”, SYBEX
Publication. ISBN: 978-0-470-23152-4.
18
INTERNET TECHNOLOGY
COURSE CODE L T P/FW CREDIT UNITS
MCS132 2 1 - 3
MODULE I
INTRODUCTION: What the Internet is; History and Timeline; Technologies and Services; Basic
Operating System Utilties; ping and traceroute; RFCs; Brief overview of computer networking
concepts: architecture, layers, packets, data transmission.
BASIC NETWORK PROGRAMMING: Comer's simple networking API; Java's java.net package;
examples using each API.
MODULE II
INTERNETWORKING WITH ETHERNET, IP, ARP, ICMP: Ethernet details (addressing, frame
format, twisted pair, hubs, switches); Routers, Gateways. IP Addresses, Subnets, ARP. IP Headers,
IP Routing (fragmentation and reassembly), ICMP.
UDP, TCP, AND SOCKETS: Network service types, ports and sockets; UDP: header format, etc.;
TCP: header format, window, connection setup, etc. Socket API, Java Socket Programming.
APPLICATION-LEVEL PROTOCOLS DNS, SMTP, POP, FTP, HTTP: Headers, Formats,
Operations of each. Mailing Gateways, Mailing Lists, URIs.
MODULE III
XML: Markup, Elements, Attributes, Tags, Entity References, etc. Formal specifications.
Examples. DTDs, Namespaces, All about XHTML, XSLT, XPath, XLinks, XPointers, CSS,
Schemas, SAX and DOM.
WEB BROWSER AND WEB SERVER ARCHITECTURES: Browser architectures and client-side
extensions such as plug-ins, Java applets, and JavaScript. Server architectures, operation,
performance issues, caching, server-side extensions such as CGI, Servlets, JSP, PHP, Apache
modules, etc. Proxies.
MODULE IV
INTERNET SECURITY: Basic Security Concepts, Strategies for securing assets, Computer
Security vs. Network Security; Kinds of attacks; Firewalls: architecture, implementation and
configuration, DMZ and external routers; Packet sniffing, packet filtering, etc; Cryptography and
Cryptographic Protocols: Public-Key encryption, authentication schemes, SSL, IPSEC, VPNs; Java
Security and Cryptography APIs.
SCALING AND AVAILABILITY: Availability, Fault-Tolerance, Load Balancing, Points of
Failure; Clusters; Disaster Recovery.
MODULE V
ARCHITECTURE AND IMPLEMENTATION OF ENTERPRISE SYSTEMS: Tiered architecture
for the enterprise: 2-tier vs. 3-tier. J2EE Technologies emphasizing JDBC, Transactions, XML and
Enterprise Java Beans. EJB details: session vs. entity beans; persistence mechanisms.
Implementation of complete system from servlets through EJBs through a database.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
1. Douglas E. Comer ,”Internetworking with TCP/IP, Principles, Protocols, and Architecture”,
Addison-Wesley, 5th edition, Vol 1, 2005,ISBN-10: 0131876716 | ISBN-13: 978-0131876712 .
2. Douglas E. Comer, David L. Stevens ,”Internetworking with TCP/IP Vol. III, Client-Server
Programming and Applications”, Addison-Wesley, 2nd edition, 2000 , ISBN-10: 013260969X,
19
ISBN-13: 978-0132609692. 3. Wendell Odom,” CCNP Route 642-902, CCIE”, Official
Certification Guide, Pearson.
3. Behrouz A. Forouzan, “Data Communications and Networking”, McGraw-Hill, 5th edition,
2012, ISBN- 10: 0073376221, ISBN-13: 978-0073376226
20
DIGITAL HARDWARE MODELING
MODULE I
Introduction to digital circuit design flow, Design Representation, VLSI Design Styles, Verilog
variables, operators and language constructs, verilog modeling examples.
MODULE II
Modeling combinational circuits using Verilog, verilog description styles, Modeling sequential
circuits using Verilog, procedural assignment, user defined primitives.
MODULE III
Verilog test benches and design simulation, modeling finite state machines, Behavioral versus
structural design modeling, datapath and controller design, synthesizable verilog.
MODULE IV
Modeling memory, modeling register banks, modeling issues: pipelining, memory, switch level
modeling
MODULE V:
Processor design using verilog, pipeline implementation of a processor, verilog modeling of the
processor
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
1. J. Bhasker, “Verilog HDL Synthesis: A Practical Primer”, B. S. Publications, 1998.
2. M. D. Ciletti, “Advanced VLSI Design with the Verilog HDL”, Prentice-Hall of India, 2005.
21
INTERNET OF THINGS
MODULE I
Introduction to IoT- Internet of Things & their characteristics, Design- Physical & Logical design,
IoT Reference Model- Domain Model, Information Mode, Functional Model, and Communication
Model. M2M and IoT technology fundamentals.
MODULE II
Sensor Technology- Introduction to wireless sensor networks, Sensor nodes- Sensing and sensors,
Challenges and Constraints, Communication Interfaces- Protocols, Application of Wireless sensors.
MODULE III
Embedded System- Introduction to embedded systems, Application Areas, Categories of embedded
systems, Overview of embedded system, Architecture of embedded systems, Hardware architecture,
Software architecture, Application Software, Communication Software.
MODULE IV
Domain Specific Application Categories- Big Data Analytics for IoT, Privacy and Security in IoT,
Smart City, Cloud Storage & Computing.
MODULE V
Programming & Interfacing- Open Source Platforms: PIC, Arduino, Sketch and Raspberry Pi.
Getting used to Arduino, Sensor Characterization- Safety, Basic Electronics (circuit theory,
measurements, parts identification). Sensors and Software- Understanding Processing Code
Structure, variables and flow control, interfacing to the Real World.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
1. Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”, ISBN 978-
3-642-19156-5 e-ISBN 978-3-642-19157-2, Springer
2. WaltenegusDargie, Christian Poellabauer , “Fundamentals of Wireless Sensor Networks,
Theory and Practice”, Wiley Series on wireless Communication and Mobile Computing,
2011
3. Arnold. S. Berger, “Embedded Systems Design - An introduction to Processes, Tools and
Techniques”, Easwer Press, 2001
4. Programming Interactivity, Second Edition By Josha Noble, 2012
22
SECURE PROTOCOL DESIGN
MODULE I
OSI: ISO Layer Protocols:-Application Layer Protocols-TCP/IP, HTTP, SHTTP, LDAP, MIME,-
POP& POP3-RMON-SNTP-SNMP. Presentation Layer Protocols-Light Weight Presentation
Protocol Session layer protocols.
MODULE II
RPC protocols-transport layer protocols-ITOT, RDP, RUDP, TALI, TCP/UDP, compressed TCP.
Network layer Protocols – routing protocols-border gateway protocol-exterior gateway protocol-
internet protocol IPv4- IPv6- Internet Message Control Protocol- IRDPTransport Layer Security-
TSL-SSL-DTLS.
MODULE III
Data Link layer Protocol – ARP – In ARP – IPCP – IPv6CP – RARP – SLIP .Wide Area and
Network Protocols- ATM protocols – Broadband Protocols – Point to Point Protocols – Other
WAN Protocols- security issues.
MODULE IV
Local Area Network and LAN Protocols – ETHERNET Protocols – VLAN protocols – Wireless
LAN Protocols – Metropolitan Area Network Protocol – Storage Area Network and SAN
MODULE V
Protocols -FDMA, WIFI and WIMAX Protocols- security issues. Mobile IP – Mobile Support
Protocol for IPv4 and IPv6 – Resource Reservation Protocol. Multicasting Protocol – VGMP –
IGMP – MSDP .Network Security and Technologies and Protocols – AAA Protocols – Tunneling
Protocols – Secured Routing Protocols – GRE- Generic Routing Encapsulation – IPSEC – Security.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
1. Jawin: “Networks Protocols Handbook”, 3rd Edition, Jawin Technologies Inc., 2005.
2. Bruce Potter and Bob Fleck : “802.11 Security”, 1st Edition, O‟Reilly Publications, 2002.
References:
1. Ralph Oppliger :“SSL and TSL: Theory and Practice”, 1st Edition, Arttech House, 2009.
2. Lawrence Harte: “Introduction to CDMA- Network services Technologies and Operations”, 1st
Edition, Althos Publishing, 2004.
3. Lawrence Harte: “Introduction to WIMAX”, 1st Edition, Althos Publishing, 2005.
23
PROBABILITY AND STATISTICAL STRUCTURE
Course Objective:
The aim of the course is to introduce the probability and statistical of theoretical computer science
and the theory of statistical analysis. Fundamental concepts in statistical analysis with emphasis on
their applications to computer science will be taught.
Course Contents:
Module -I:
Probability: Sample space and events – Probability – The axioms of probability - Some elementary
theorems - Conditional probability – Baye's theorem.
Module -II:
Random variables – Discrete and continuous – Distribution – Distribution function.Distribution -
Binomial, poisson and normal distribution – related properties.
Module -III:
Sampling distribution: Populations and samples - Sampling distributions of mean (known and
unknown) proportions, sums and differences.
Module-IV:
Test of Hypothesis – Means and proportions – Hypothesis concerning one and two means – Type I
and Type II errors. One tail, two-tail tests. Tests of significance – Student's t-test, F-test, chi-square
test, ANOVA test.
Curve fitting: The method of least squares – Inferences based on the least squares estimations -
Curvilinear regression – multiple regressions – correlation for univariate and bivariate distributions.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXT BOOKS:
1. Probability and statistics for engineers:Erwin Miller And John E.Freund. Prentice-Hall of India /
Pearson , Sixth edition.
2. Text book of Probability and Statistics by Dr.ShahnazBathul, V.G.S.Publishers 2003.
REFERENCE BOOKS:
1. Probability, Statistics and Random Processes Dr.K.Murugesan&P.Gurusamy by Anuradha
Agencies, Deepti Publications.
2. Advanced Engineering Mathematics (Eighth edition), Erwin Kreyszig, John Wiley and Sons
(ASIA) Pvt. Ltd., 2001.
3. Probability and Statistics for Engineers: G.S.S.BhishmaRao,sitech., Second edition 2005.
24
INTERNET OF THINGS LAB
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V – Viva.
25
SECURE PROTOCOL DESIGN LAB
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V – Viva.
26
PROBABILITY AND STATISTICAL STRUCTURE LAB
1. Frequenciesanalysis
2. Descriptiveanalysis
3. Crosstabsanalysis
4. One Sample t – Testanalysis
5. Independent Sample t – Test
6. Paired Sample t – Testanalysis
7. One-Way ANOVAanalysis
8. Chi – Square Testanalysis
9. correlation analysis
10. Multiple Regressionanalysis
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V – Viva.
27
REPORT ON WORKSHOP/ SOCIAL WORK
Objective: Conferences / Seminars / Workshop are good and efficient way to get to know other
researchers through their work and also personally. The educational aspect can expose the students
to new ways of conducting the business and help them to discover how to be more productive. They
provide a great opportunity to network. Collaboration is the way to approach networking.
Rules and Regulations
2nd Year / 3rd Year Students for which the students and the faculty members can start
preparations well in advance prior to the scheduled conference / seminar / workshop.
The number of students going for any conference / seminar / workshop should be manageable.
A proposal for the proposed conference / seminar / workshop should be drafted and presented to
the HoI reflecting the following key points:
o Entire activity plan
o Route Map
o What are the objectives for the students?
o What they need to learn, do, and prepare before the conference / seminar /
workshop?
o List of prospective students with Contact Details
o List of Faculty Coordinators with Contact Details
After getting approval from the HoI, a note sheet should be prepared and all necessary
permission and approval from the competent authorities should be obtained.
The attention and co-operation of all students and parents are requested to attend the conference /
seminar / workshop most effectively. Signing of the letter of Indemnity Bond
(Consent-cum-Undertaking) is mandatory for all the parents of students going for conference /
seminar / workshop in or outside Jaipur. Duly executed Indemnity Bond should be submitted to
HoI Office at least 2 days prior to the visit, without which the accompanying Staff coordinator
shall not permit the student to participate in the industrial visit
The list of students participating in conference / seminar / workshop shall be handed over to the
concerned HODs, Staff coordinators.
Students should be present in formals.
Students should carry the College Identity Cards during their journey.
Discipline should be maintained during the conference / seminar / workshop. Any violation will
be viewed very seriously.
A report of the conference / seminar / workshop is to be submitted in 5 days time by students /
faculty coordinators once the students are back.
The report to be prepared should reflect the following:-
What happened at the conference / seminar / workshop the students attend and how does it
relate in the best way to the preparations and the learning objectives.
How do the students will use the outcome of conference / seminar / workshop after it is over?
What will they gain from it and how can they set up activities that transfer the experience
into learning?
Evaluation parameters for the success of the experience of conference / seminar / workshop.
The layout guidelines for the Report:
28
1. File should be in the following specification:
A4 size paper
Font: Arial (10 points) or Times New Roman (12 points)
Line spacing: 1.5
Top & bottom margins: 1 inch/ 2.5 cm
Left & right margins: 1.25 inches/ 3 cm
The student will be provided with the Student Assessment Record (SAR) to be placed in front of
the Report File. Each item in the SAR is ticked off when it is completed successfully. The faculty
will also assess each item as it is completed. The SAR will be signed by the student and by the
faculty to indicate that the File is the student’s own work. It will also ensure regularity and meeting
the delaines.
Examination Scheme:
Components V S R FP
Weightage (%) 20 20 20 40
29
COMMUNICATION SKILLS-I
CODE L T P/FW CREDITS
BCS 111 1 - - 1
Course Objective:
The Course is designed to give an overview of the four broad categories of English Communication
thereby enhance the learners’ communicative competence.
Course Contents:
Module I: Listening Skills
Effective Listening: Principles and Barriers
Listening Comprehension on International Standards
Module II: Speaking Skills
Pronunciation and Accent
Reading excerpts from news dailies & magazines
Narrating Incident; Story telling.
Extempore & Role Plays
Module III: Reading Skills
Vocabulary: Synonyms, antonyms, diminutives, homonyms, homophones
Idioms & phrases
Foreign words in English
Module IV: Writing Skills
Writing Paragraphs
Précis Writing
Letter writing
Coherence and structure
Essay writing
Module V: Activities
News reading
Picture reading
Movie magic
Announcements
Examination Scheme:
Components CT1 CT2 CAF V GD GP A
Weightage (%) 20 20 25 10 10 10 5
CAF – Communication Assessment File
GD – Group Discussion
GP – Group Presentation
30
BEHAVIOURAL SCIENCE-I
Course Objective:
This course aims at imparting an understanding of:
Self and the process of self exploration
Learning strategies for development of a healthy self esteem
Importance of attitudes and their effect on work behaviour
Effective management of emotions and building interpersonal competence.
Course Contents:
31
Building Positive Attitude
Examination Scheme:
Components SAP A Mid Term VIVA Journal for
Test (CT) Success (JOS)
Weightage (%) 20 05 20 30 25
32
FRENCH
Course Objective:
To familiarize the students with the French language
with the phonetic system
with the syntax
with the manners
with the cultural aspects
Course Contents:
33
GERMAN
Course Objective:
To enable the students to converse, read and write in the language with the help of the basic
rules of grammar, which will later help them to strengthen their language.
To give the students an insight into the culture, geography, political situation and economic
opportunities available in Germany
Course Contents:
Module I: Introduction
Self introduction: heissen, kommen, wohnwn, lernen, arbeiten, trinken, etc.
All personal pronouns in relation to the verbs taught so far.
Greetings: Guten Morgen!, Guten Tag!, Guten Abend!, Gute Nacht!, Danke sehr!, Danke!,
Vielen Dank!, (es tut mir Leid!),
Hallo, wie geht’s?: Danke gut!, sehr gut!, prima!, ausgezeichnet!,
Es geht!, nicht so gut!, so la la!, miserabel!
Module V: Articles
The definite and indefinite articles in masculine, feminine and neuter gender. All Vegetables,
Fruits, Animals, Furniture, Eatables, modes of Transport
34
The counting, plural structures and simple calculation like addition, subtraction,
multiplication and division to test the knowledge of numbers.
“Wie viel kostet das?”
Examination Scheme:
C – Project + Presentation
I – Interaction/Conversation Practice
35
SPANISH
Course Objective:
To enable students acquire the relevance of the Spanish language in today’s global context,
how to greet each other, how to present / introduce each other using basic verbs and
vocabulary
Course Contents:
Module I
A brief history of Spain, Latin America, the language, the culture…and the relevance of
Spanish language in today’s global context.
Introduction to alphabets
Module II
Introduction to ‘Saludos’ (How to greet each other. How to present / introduce each other).
Goodbyes (despedidas)
The verb llamarse and practice of it.
Module III
Concept of Gender and Number
Months of the years, days of the week, seasons. Introduction to numbers 1-100, Colors,
Revision of numbers and introduction to ordinal numbers.
Module IV
Introduction to SER and ESTAR (both of which mean To Be).Revision of ‘Saludos’ and
‘Llamarse’. Some adjectives, nationalities, professions, physical/geographical location, the
fact that spanish adjectives have to agree with gender and number of their nouns. Exercises
highlighting usage of Ser and Estar.
Module V
Time, demonstrative pronoun (Este/esta, Aquel/aquella etc)
Module VI
Introduction to some key AR /ER/IR ending regular verbs.
Examination Scheme:
Components CT1 CT2 C I V A
Weightage (%) 20 20 20 20 15 5
C – Project + Presentation
I – Interaction/Conversation Practice
Text & References:
Español, En Directo I A
Español Sin Fronteras
36
CHINESE
Course Objective:
There are many dialects spoken in China, but the language which will help you through
wherever you go is Mandarin, or Putonghua, as it is called in Chinese. The most widely
spoken forms of Chinese are Mandarin, Cantonese, Gan, Hakka, Min, Wu and Xiang. The
course aims at familiarizing the student with the basic aspects of speaking ability of
Mandarin, the language of Mainland China. The course aims at training students in practical
skills and nurturing them to interact with a Chinese person.
Course Contents:
Module I
Show pictures, dialogue and retell.
Getting to know each other.
Practicing chart with Initials and Finals. (CHART – The Chinese Phonetic Alphabet Called
“Hanyu Pinyin” in Mandarin Chinese.)
Practicing of Tones as it is a tonal language.
Changes in 3rd tone and Neutral Tone.
Module II
Greetings
Let me Introduce
The modal particle “ne”.
Use of Please ‘qing” – sit, have tea ………….. etc.
A brief self introduction – Ni hao ma? Zaijian!
Use of “bu” negative.
Module III
Attributives showing possession
How is your Health? Thank you
Where are you from?
A few Professions like – Engineer, Businessman, Doctor, Teacher, Worker.
Are you busy with your work?
May I know your name?
Module IV
Use of “How many” – People in your family?
Use of “zhe” and “na”.
Use of interrogative particle “shenme”, “shui”, “ma” and “nar”.
How to make interrogative sentences ending with “ma”.
Structural particle “de”.
Use of “Nin” when and where to use and with whom. Use of guixing.
Use of verb “zuo” and how to make sentences with it.
37
Module V
Family structure and Relations.
Use of “you” – “mei you”.
Measure words
Days and Weekdays.
Numbers.
Maps, different languages and Countries.
Examination Scheme:
38
CYBER FORENSICS
Course Contents:
Module I: Computer Forensics Fundamentals
Introduction to Computer Forensics, Use of Computer Forensics in Law Enforcement, Stages
of forensic investigation: Types of Computer Forensic Technology, Military, Law
Enforcement, Business, Specialized Forensic Techniques; Types of Computer Forensics
Systems: Internet Security, Intrusion Detection, Firewall Security , Public Key Infrastructure,
Net Privacy, Identity Theft, Biometric Security Systems; .Data Recovery :Data Backup,-
Recovery and Solution, Hiding and Recovering Hidden Data, Evidence Collection and Data
Seizure, Types of Evidence: General Procedure, Collection and Archiving,
Module II: Mobile Forensics
Crime and mobile phones, evidences, forensic procedures, files present in SIM card, device
data, external memory dump and evidences in memory card, operators systems Android
forensics: Procedures for handling an android device, imaging android USB mass storage
devices, logical and physical techniques.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
39
CYBER SECURITY - II
COURSE CODE L T P/FW CREDIT UNITS
MCS202 2 1 - 3
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text Books:
Charles J. Brooks, ,Christopher GrowPhilip Craig, "Cybersecurity Essentials", John Wiley
.and Sons, 2018
MayankBhusan, Rajkumar Singh Rathore, AatifJamshed, Fundamental of Cyber Security:
Principles, Theory and Practices, BPB Publications.
References:
Paul A. Watters, Cyber Security: Concepts and Cases, CreateSpace Independent Publishing
Platform, 2012.
Peter W. Singer, Allan Friedman, Cybersecurity: What Everyone Needs to Know, Oxford
University Press.
David Sutton, Cyber Security: A Practitioner's Guide, BCS Learning & Development
Limited, 2017.
40
INTRUSION DETECTION SYSTEMS
MODULE-I
History of Intrusion detection, Audit, Concept and definition , Internaland external threats to
data, attacks, Need and types of IDS, Informationsources Host based information sources,
Network based informationsources.
MODULE-II
Intrusion Prevention Systems, Network IDs protocol based IDs ,HybridIDs, Analysis
schemes,
thinking about intrusion. A model for intrusion analysis , techniquesResponses requirement
of responses, types of responses mappingresponses to policy Vulnerability analysis,
credential analysis noncredential analysis
MODULE-III
Introduction to Snort, Snort Installation Scenarios, Installing Snort,Running Snort on
MultipleNetwork Interfaces, Snort Command Line Options. Step-By-StepProcedure to
Compile andInstall Snort Location of Snort Files, Snort Modes Snort Alert Modes
MODULE-IV
Working with Snort Rules, Rule Headers, Rule Options, The SnortConfiguration File etc.
Plugins, Preprocessors and Output Modules,Using Snort with MySQL
MODULE-V
Using ACID and Snort Snarf with Snort, Agent development forintrusion detection,
Architecture models of IDs and IPs.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXT BOOKS:
1. RafeeqRehman : “ Intrusion Detection with SNORT, Apache,MySQL, PHP and ACID,”
1st Edition, Prentice Hall , 2003.
REFERENCES:
1. Christopher Kruegel,FredrikValeur, Giovanni Vigna: “IntrusionDetection and Correlation
Challenges and Solutions”, 1st Edition,Springer, 2005.
2. Carl Endorf, Eugene Schultz and Jim Mellander “ IntrusionDetection & Prevention”, 1st
Edition, Tata McGraw-Hill, 2004.
3. Stephen Northcutt, Judy Novak : “Network Intrusion Detection”, 3rdEdition, New Riders
Publishing, 2002.
4. T. Fahringer, R. Prodan, “A Text book on Grid ApplicationDevelopment and Computing
Environment”. 6th Edition,KhannaPublihsers, 2012.
41
CYBER SECURITY- II LAB
Experiments
4. Implementation of Intrusion Detection and Presentation System using any tool in Windows
/ Linux Operating System
8. Evaluate Risk using Qualitative Risk Analysis tool through Kali Linux
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V –
Viva.
42
INTRUSION DETECTION SYSTEMS LAB
1. Working with Trojans, Backdoors and sniffer for monitoring network communication
2. Denial of Service and Session Hijacking using Tear Drop, DDOS attack.
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V –
Viva.
43
CYBER LAWS & SECURITY POLICIES
COURSE CODE L T P/FW CREDIT UNITS
MCS231 2 1 - 3
Module I: Information Technology Law
The Information Technology Legal Framework in India, Cyber Crime, Digital Evidence,
Technological Standards under the Information Technology Law, Liability of companies under
the Information Technology Act, Recent amendments by the IT (Amendment Act) 2008,
ActSection66(A, B, C, D, E, F),ITActSection67 (A, B, C).
Security Investigation-Legal, Ethical and Professional Issues.
Module II
Overview of IT Act, 2000, Amendments and Limitations of IT Act, Digital Signatures,
Cryptographic Algorithm, Public Cryptography, Private Cryptography, Electronic
Governance,Legal Recognition of Electronic Records, Legal Recognition of Digital Signature
Certifying Authorities, Cyber Crime and Offences, Network Service Providers Liability,
Cyber Regulations Appellate Tribunal, Penalties and Adjudication.
Module III Cyber law and related Legislation :
Patent Law, Trademark Law, Copyright, Software – Copyright or Patented, Domain Names
and Copyright disputes, Electronic Data Base and its Protection, IT Act and Civil Procedure
Code, IT Act and Criminal Procedural Code, Relevant Sections of Indian Evidence Act,
Relevant Sections of Bankers Book Evidence Act, Relevant Sections of Indian Penal Code,
Relevant Sections of Reserve Bank of India Act, Law Relating To Employees And Internet,
Alternative Dispute Resolution , Online Dispute Resolution (ODR).
Module IV Electronic Business and legal issues:
Evolution and development in Ecommerce, paper vs paper less contracts E-Commerce
models- B2B, B2C,E security. Application area: Business, taxation, electronic payments,
supplychain, EDI, E-markets, Emerging Trends.
Module V Case Study On Cyber Crimes:
Harassment Via E-Mails, Email Spoofing (Online A Method Of Sending E-Mail Using A
False Name Or E-Mail Address To Make It Appear That The E-Mail Comes From Somebody
Other Than The True Sender, Cyber Pornography (Exm.MMS),Cyber-Stalking.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXT BOOKS :
1 .K.Kumar,” Cyber Laws: Intellectual property & E Commerce, Security”,1 st Edition,
Dominant Publisher,2011.
2. Rodney D. Ryder, “ Guide To Cyber Laws”, Second Edition, Wadhwa And Company,
New Delhi, 2007.
3. Information Security policy &implementation Issues, NIIT, PHI.
REFERENCES :
1. Vakul Sharma, "Handbook Of Cyber Laws" Macmillan India Ltd, 2 nd
Edition,PHI,2003.
2. Justice Yatindra Singh, " Cyber Laws", Universal Law Publishing,1stEdition,New
Delhi, 2003.
3. Sharma, S.R., “Dimensions Of Cyber Crime”, Annual PublicationsPvt. Ltd., 1st
Edition, 2004.
4. Augastine, Paul T.,” Cyber Crimes And Legal Issues”, CrecentPublishing Corporation,
2007.
44
SOCIAL MEDIA SECURITY
Module I
Introduction to Online Social Networks, data collection from social networks, challenges,
opportunities, and pitfalls in online social networks, APIs.
Module II
Collecting data from Online Social Media, Trust, and credibility.
Module III
Reputations in social systems, Online social Media and Policing.
Module IV
Information privacy disclosure, revelation and its effects in OSM and online social networks.
Module V
Phishing in OSM & Identifying fraudulent entities in online social networks.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
45
BIOMETRIC SECURITY
MODULE-I
Biometrics- Introduction- benefits of biometrics over traditionalauthentication systems –
benefitsof biometrics in identification systems-selecting a biometric for a system–
Applications – Keybiometric terms and processes - biometric matching methods –Accuracyin
biometric systems.
MODULE-II
Physiological Biometric Technologies: Fingerprints – Technicaldescription –characteristics -
Competing technologies - strengths –weaknesses – deployment - Facial scan - Technical
description -characteristics - weaknesses-deployment - Iris scan – Technicaldescription –
characteristics - strengths – weaknesses – deployment- Retina vascular pattern
MODULE-III
Technical description – characteristics - strengths – weaknesses –deployment - Hand scan -
Technical description-characteristics -strengths – weaknesses deployment – DNA
biometrics.Behavioral Biometric Technologies: Handprint Biometrics – DNABiometrics.
MODULE-IV
signature and handwriting technology - Technical description –classification – keyboard /
keystroke dynamics- Voice – dataacquisition - feature extraction - characteristics - strengths –
weaknesses-deployment.
MODULE-V
Multi biometrics and multi factor biometrics - two-factor authenticationwith passwords -
tickets and tokens – executive decision -implementation plan.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXT BOOKS:
1. Samir Nanavathi, Michel Thieme, and Raj Nanavathi : “Biometrics-Identity verification
in a network”, 1st Edition, Wiley Eastern, 2002.
2. John Chirillo and Scott Blaul : “Implementing BiometricSecurity”, 1st Edition, Wiley
Eastern Publication, 2005.
REFERENCES:
1. John Berger: “Biometrics for Network Security”, 1st Edition,Prentice Hall, 2004.
46
MATLAB
Course Objective:
The availability of technical computing environment such as MATLAB is now reshaping the
role and applications of computer laboratory projects to involve students in more intense
problem-solving experience. This availability also provides an opportunity to easily conduct
numerical experiments and to tackle realistic and more complicated problems.
Course Contents:
Module I: Introduction
Basic Features, Starting MAT Lab, Using MAT Lab, Quitting Mat lab, Creating MATLAB
variables, Overwriting variable, Error messages, Making corrections, Managing the
workspace, Keeping track of your work session, Entering multiple statements per line.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
47
WIRELESS NETWORKS
Module I:
Module II:
Wireless LAN: Infrared Vs radio transmission, Infrastructure and Ad-hoc Network, IEEE
802.11:System Architecture, Protocol Architecture, 802.11b, 802.11a, Bluetooth: User
Scenarios, Architecture.
Module III:
Global System for Mobile Communications (GSM): Mobile Services, System Architecture,
Protocols, Localization & Calling, Handover, Security. GPRS: GPRS System, Architecture,
UMTS: UMTS System Architecture. LTE: Long Term Evolution.
Module IV
Module V
Implementation of wireless network through cisco packet tracer, create network topologies
,IP addressing type and subnet mask, address management , routing and switching
configuration, wired and wireless network configuration, VLAN configuration, wireless
router and AP configuration, Security implementation.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXT BOOKS:
1. Schiller, J. 2008. Mobile Communications. 2nd ed. India: Pearson Education.
2. Kumar,S. and Kakkasageri, M. S. “Wireless and Mobile Networks: Concepts and
Protocols”, Wiley India.
3. Kamal R. 2011. “Mobile Computing”, 2nd Ed.Oxford University Press.
REFERENCES:
1. Talukder, A. K., Ahmed, H. andYavagal,R. R. 2010.Mobile Computing: Technology,
Applications and Service Creation, 2 nd Ed. Tata McGraw Hill.
2. Gast, M. S. “802.11 Wireless Networks: The Definitive Guide”, O'Reilly Media.
48
MATLAB LAB
Learning outcomes :
After completion of the course the student will be able to :
Course Contents:
1. Characteristics of MATLAB
2. Introduction to MATLAB
3. Understand the graphical interface to the MATLAB workspace.
4. Gettingstartedwith MATLAB by creating variables, Arithmeticoperations etc.,
5. Executing the Mathematical expressions.
6. Creating simple plots.
7. Matrix Generation.
8. Array Operations and linearequationwith MATLAB
9. Basic Programmingwith MATLAB
10. Debugging M- Files
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V –
Viva.
49
WIRELESS NETWORKS LAB
List of Experiments
Subnet A
Specification Value
IP mask (decimal) 255.255.255.0
IP address 172.16.30.0
First IP host address 172.16.30.1
Last IP host address 172.16.30.254
Subnet B
Specification Value
IP mask (decimal) 255.255.255.128
IP address 172.16.31.0
First IP host address 172.16.31.1
Last IP host address 172.16.31.126
Examine each of the values in the tables above and verify that this topology meets all
requirements and specifications. Are any of the given values incorrect? ___________
If yes, correct the values in the table above and write the corrected values below:
__________________________________________________________________________
___________________________________________________________________________
Create a configuration table similar to the one below using your corrected values:
Addressing Table
Addressing Table
Default
Device Hostname Interface IP Address Subnet Mask Gateway
PC1 Host-A NIC 172.17.99.21 255.255.255.0 172.17.99.1
S1 ALSwitch VLAN99 172.17.99.11 255.255.255.0 172.17.99.1
Learning Objectives
Create and save a basic switch configuration
Set up a TFTP server on the network
Back up the switch Cisco IOS software to a TFTP server and then restore it
Back up the switch configuration to a TFTP server
Configure a switch to load a configuration from a TFTP server
Upgrade the Cisco IOS software from a TFTP server
Lab V: Basic VLAN Configuration
Topology Diagram
Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 99 172.17.99.11 255.255.255.0 N/A
S2 VLAN 99 172.17.99.12 255.255.255.0 N/A
S3 VLAN 99 172.17.99.13 255.255.255.0 N/A
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.1
52
PC2 NIC 172.17.20.22 255.255.255.0 172.17.20.1
PC3 NIC 172.17.30.23 255.255.255.0 172.17.30.1
PC4 NIC 172.17.10.24 255.255.255.0 172.17.10.1
PC5 NIC 172.17.20.25 255.255.255.0 172.17.20.1
PC6 NIC 172.17.30.26 255.255.255.0 172.17.30.1
Learning Objectives
Cable a network according to the topology diagram
Erase the startup configuration and reload a switch to the default state
Perform basic configuration tasks on a switch
Create VLANs
Assign switch ports to a VLAN
Add, move, and change ports
Verify VLAN configuration
Enable trunking on inter-switch connections
Verify trunk configuration
Save the VLAN configuration
Addressing Table
Device
Interface IP Address Default Gateway
(Hostname) Subnet Mask
S1 VLAN 56 192.168.56.11 255.255.255.0 N/A
53
S2 VLAN 56 192.168.56.12 255.255.255.0 N/A
S3 VLAN 56 192.168.56.13 255.255.255.0 N/A
PC1 NIC 192.168.10.21 255.255.255.0 192.168.10.1
PC2 NIC 192.168.20.22 255.255.255.0 192.168.20.1
PC3 NIC 192.168.30.23 255.255.255.0 192.168.30.1
PC4 NIC 192.168.10.24 255.255.255.0 192.168.10.1
PC5 NIC 192.168.20.25 255.255.255.0 192.168.20.1
PC6 NIC 192.168.30.26 255.255.255.0 192.168.30.1
In this lab, you will practice troubleshooting a misconfigured VLAN environment. Load or
have your instructor load the configurations below into your lab gear. Your objective is to
locate and correct any and all errors in the configurations and establish end-to-end
connectivity. Your final configuration should match the topology diagram and addressing
table. All passwords are set to cisco, except the enable secret password, which is set to class.
Task 1: Prepare the Network
Step 1: Cable a network that is similar to the one in the topology diagram.
Step 2: Clear any existing configurations on the switches, and initialize all ports in the
shutdown state.
Step 3: Import the configurations below.
Switch 1
hostname S1
no ip domain-lookup
enable secret class
!
!
interface range FastEthernet0/1-5
switchport mode trunk
!
interface range FastEthernet0/6-24
shutdown
!
interface Vlan1
no ip address
no ip route-cache
!
interface Vlan56
ip address 192.168.56.11 255.255.255.0
no ip route-cache
!
line con 0
54
logging synchronous
line vty 0 4
no login
line vty 5 15
password cisco
login
!
end
Switch 2
hostname S2
no ip domain-lookup
enable secret class
!
vlan 10,20,30,56
!
interface range FastEthernet0/1-5
switchport trunk native vlan 56
switchport mode access
!
interface range FastEthernet0/6-10
switchport access vlan 30
switchport mode access
!
interface range FastEthernet0/11-17
switchport access vlan 10
switchport mode access
!
interface range FastEthernet0/18-24
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
ip address 192.168.56.12 255.255.255.0
no ip route-cache
shutdown
!
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
password cisco
55
login
!
end
Switch 3
hostname S3
no ip domain-lookup
enable secret class
!
vlan 10,20,30
!
interface range FastEthernet0/1-5
switchport trunk native vlan 56
switchport mode trunk
!
interface range FastEthernet0/6-10
switchport mode access
!
interface range FastEthernet0/11-17
switchport mode access
!
interface range FastEthernet0/18-24
switchport mode access
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
interface Vlan56
no ip route-cache
!
line con 0
password cisco
login
line vty 0 4
password cisco
login
line vty 5 15
password cisco
login
!
End
56
Task 2: Troubleshoot and Repair the VLAN Configuration
Task 4: Clean Up
Erase the configurations and reload the switches. Disconnect and store the cabling. For PC
hosts that are normally connected to other networks (such as the school LAN or to the
Internet), reconnect the appropriate cabling and restore the TCP/IP settings.
Addressing Table
Learning Objectives
Cable a network according to the topology diagram
Erase the startup configuration and reload a switch to the default state
Perform basic configuration tasks on a switch
Configure VLAN Trunking Protocol (VTP) on all switches
Enable trunking on inter-switch connections
Verify trunk configuration
Modify VTP modes and observe the impact
Create VLANs on the VTP server, and distribute this VLAN information to switches in
the network
Explain the differences in operation between VTP transparent mode, server mode, and
client mode
Assign switch ports to the VLANs
Save the VLAN configuration
Enable VTP pruning on the network
Explain how pruning reduces unnecessary broadcast traffic on the LAN
Addressing Table
Device
Interface IP Address Subnet Mask
(Hostname)
S1 VLAN 99 172.17.99.11 255.255.255.0
S2 VLAN 99 172.17.99.12 255.255.255.0
S3 VLAN 99 172.17.99.13 255.255.255.0
PC1 NIC 172.17.10.21 255.255.255.0
PC2 NIC 172.17.20.22 255.255.255.0
58
PC3 NIC 172.17.30.23 255.255.255.0
PC4 NIC 172.17.10.24 255.255.255.0
PC5 NIC 172.17.20.25 255.255.255.0
PC6 NIC 172.17.30.26 255.255.255.0
Objectives
Upon completion of this lab, you will be able to:
Cable a network according to the topology diagram
Erase the startup configuration and vlan.dat files and reload switches to the default state
Load the switches with supplied scripts
Find and correct all configuration errors
Document the corrected network
Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 1 172.17.10.1 255.255.255.0 N/A
S2 VLAN 1 172.17.10.2 255.255.255.0 N/A
S3 VLAN 1 172.17.10.3 255.255.255.0 N/A
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.254
PC2 NIC 172.17.10.22 255.255.255.0 172.17.10.254
PC3 NIC 172.17.10.23 255.255.255.0 172.17.10.254
PC4 NIC 172.17.10.27 255.255.255.0 172.17.10.254
59
Learning Objectives
Cable a network according to the topology diagram
Erase the startup configuration and reload the default configuration, setting a switch to the
default state
Perform basic configuration tasks on a switch
Observe and explain the default behavior of Spanning Tree Protocol (STP, 802.1D)
Observe the response to a change in the spanning tree topology
Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 99 172.17.99.11 255.255.255.0 N/A
S2 VLAN 99 172.17.99.12 255.255.255.0 N/A
S3 VLAN 99 172.17.99.13 255.255.255.0 N/A
PC1 NIC 172.17.10.21 255.255.255.0 172.17.10.1
PC2 NIC 172.17.20.22 255.255.255.0 172.17.20.1
PC3 NIC 172.17.30.23 255.255.255.0 172.17.30.1
Learning Objectives
Analyze a congestion problem in a redundant, switched LAN network.
Recognize the capabilities for per-VLAN load balancing with PVST.
Modify the default STP configuration to optimize available bandwidth.
Verify that modifications have had the intended effect.
60
You are responsible for the operation of the redundant switched LAN shown in the topology
diagram. You and your users have been observing increased latency during peak usage times,
and your analysis points to congested trunks. You recognize that of the six trunks configured,
only two are forwarding packets in the default STP configuration currently running. The
solution to this problem requires more effective use of the available trunks. The PVST+
feature of Cisco switches provides the required flexibility to distribute the inter-switch traffic
using all six trunks.
This lab is complete when all wired trunks are carrying traffic, and all three switches are
participating in per-VLAN load balancing for the three user VLANs.
61
Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1
S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
S3 VLAN 99 192.168.99.13 255.255.255.0 192.168.99.1
R1 Fa 0/0 192.168.50.1 255.255.255.0 N/A
R1 Fa 0/1 See Subinterface Configuration Table N/A
PC1 NIC 192.168.10.21 255.255.255.0 192.168.10.1
PC2 NIC 192.168.20.22 255.255.255.0 192.168.20.1
PC3 NIC 192.168.30.23 255.255.255.0 192.168.30.1
Server NIC 192.168.50.254 255.255.255.0 192.168.50.1
Learning Objectives
Upon completion of this lab, you will be able to to:
Cable a network according to the topology diagram
Clear configurations and reload a switch and a router to the default state
Perform basic configuration tasks on a switched LAN and a router
Configure VLANs and VLAN Trunking Protocol (VTP) on all switches
Configure a router to support 802.1q trunking on a Fast Ethernet interface
Configure a router with subinterfaces corresponding to the configured VLANs
Demonstrate inter-VLAN routing
62
Lab XII: Troubleshooting Inter-VLAN Routing
Topology Diagram
Addressing Table
Device
Interface IP Address Subnet Mask Default Gateway
(Hostname)
S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1
S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1
S3 VLAN 99 192.168.99.13 255.255.255.0 192.168.99.1
R1 Fa 0/0 192.168.50.1 255.255.255.0 N/A
R1 Fa 0/1 See Subinterface Configuration Table N/A
PC1 NIC 192.168.10.21 255.255.255.0 192.168.10.1
PC2 NIC 192.168.20.22 255.255.255.0 192.168.20.1
PC3 NIC 192.168.30.23 255.255.255.0 192.168.30.1
Server NIC 192.168.50.254 255.255.255.0 192.168.50.1
63
Fa0/1.99 VLAN 99 192.168.99.1
Learning Objectives
Learning Objectives
Configure options in the Linksys Setup tab.
Configure options in the Linksys Wireless tab.
Configure options in the Linksys Administration tab.
Configure options in the Linksys Security tab.
Add wireless connectivity to a PC.
Test connectivity.
Lab XIV: Troubleshooting Wireless Configuration
Topology Diagram
64
Addressing Table
Default
Device Interface IP Address Subnet Mask
Gateway
Fa0/0.5 5.5.5.10 255.255.255.0 N/A
Fa0/0.10 192.168.10.1 255.255.255.0 N/A
R1 Fa0/0.11 11.11.11.1 255.255.255.0 N/A
Fa0/0.18 18.18.18.1 255.255.255.0 N/A
Lo0 10.1.1.1 255.255.255.252 N/A
WAN 192.168.10.2 255.255.255.0 192.168.10.1
WRS2
LAN/Wireless 192.168.20.1 255.255.255.0 N/A
WAN 192.168.10.3 255.255.255.0 192.168.10.1
WRS3
LAN/Wireless 192.168.30.1 255.255.255.0 N/A
PC1 NIC 11.11.11.10 255.255.255.0 11.11.11.1
PC4 NIC 18.18.18.10 255.255.255.0 18.18.18.1
S1 VLAN 5 5.5.5.1 255.255.255.0 N/A
S2 VLAN 5 5.5.5.2 255.255.255.0 N/A
S3 VLAN 5 5.5.5.3 255.255.255.0 N/A
Scenario
In this lab, a basic network and wireless network have been configured improperly. You must
find and correct the misconfigurations based on the minimum network specifications
provided by your company.
Here are the configurations to load into your router and switches.
R1 Configuration
hostname R1
!
interface Loopback0
ip address 10.1.1.1 255.255.255.0
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
no shutdown
!
65
interface FastEthernet0/0.5
encapsulation dot1Q 5
ip address 5.5.5.10 255.255.255.0
!
interface FastEthernet0/0.10
encapsulation dot1Q 10
ip address 192.168.11.1 255.255.255.0
!
!
interface FastEthernet0/0.18
encapsulation dot1Q 18
ip address 18.18.18.1 255.255.255.0
!
ip route 192.168.20.0 255.255.255.0 192.168.10.2
ip route 192.168.30.0 255.255.255.0 192.168.10.3
!
line con 0
exec-timeout 0 0
logging synchronous
!
end
Switch 1 Configuration
hostname S1
!
vtp mode transparent
!
vlan 5,10-11
!
interface FastEthernet0/1
switchport trunk allowed vlan 5,10,11
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/2
switchport trunk allowed vlan 5,10,11
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/3
switchport trunk allowed vlan 5,10,11
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/4
switchport trunk allowed vlan 5,10,11
switchport mode trunk
switchport trunk native vlan 5
66
!
interface FastEthernet0/5
switchport mode trunk
switchport trunk native vlan 5
!
interface Vlan5
ip address 5.5.5.1 255.255.255.0
no shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
!
End
Switch 2 Configuration
hostname S2
!
vtp mode transparent
ip subnet-zero
!
vlan 5,10-11,18
!
interface FastEthernet0/1
switchport trunk allowed vlan 5,10,11,18
switchport mode access
!
interface FastEthernet0/2
switchport trunk allowed vlan 5,10,11,18
switchport mode access
!
interface FastEthernet0/3
switchport trunk allowed vlan 5,10,11,18
switchport mode access
!
interface FastEthernet0/4
switchport trunk allowed vlan 5,10,11,18
switchport mode access
!
interface FastEthernet0/7
switchport access vlan 10
!
interface FastEthernet0/11
switchport access vlan 11
switchport mode access
switchport port-security mac-address sticky
switchport port-security mac-address sticky 0336.5b1e.33fa
!
67
interface FastEthernet0/18
switchport access vlan 18
switchport mode access
switchport port-security
switchport port-security mac-address sticky
switchport port-security mac-address sticky 022c.ab13.22fb
!
interface Vlan1
no ip address
shutdown
!
interface Vlan5
ip address 5.5.5.2 255.255.255.0
no shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
!
End
Switch 3 Configuration
hostname S3
!
vtp mode transparent
!
vlan 5,10-11,18
!
interface FastEthernet0/1
switchport trunk allowed vlan 5,10,11,18
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/2
switchport trunk allowed vlan 5,10,11,18
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/3
switchport trunk allowed vlan 5,10,11,18
switchport mode trunk
switchport trunk native vlan 5
!
interface FastEthernet0/4
switchport trunk allowed vlan 5,10,11,18
switchport mode trunk
switchport trunk native vlan 5
!
68
interface FastEthernet0/7
!
interface Vlan1
no ip address
no ip route-cache
!
interface Vlan5
ip address 6.6.6.3 255.255.255.0
no shutdown
!
line con 0
exec-timeout 0 0
logging synchronous
!
end
Wireless Router Network Requirements
While troubleshooting WRS2 and WRS3, ensure that at least the following capabilities exist:
1. Connections via the IP addresses shown in the topology diagram.
2. More than 30 clients can get an IP address through DHCP at a single time.
3. A client can have a DHCP address for at least 2 hours.
4. Clients using both B and G wireless network modes can connect, but N clients
cannot.
5. Wireless clients must be authenticated using WEP with a key of 5655545251.
6. Traffic between PC2 and PC3 must take the most efficient route possible.
7. Ping requests coming from outside WAN ports of the Linksys routers to their
inside LAN/wireless IP addresses (192.168.30.1) must be successful.
8. DHCP must not give out IP addresses in a range that includes the addresses for
PC2 and PC3.
9. The two wireless networks must not interfere with each other.
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V –
Viva.
69
MINOR PROJECT
Report Layout
The report should contain the following components
70
Title or Cover Page or Front Page
The title page should contain the following information: Project Title; Student’s Name;
Course; Year; Supervisor’s Name.
Table of Contents
Titles and subtitles are to correspond exactly with those in the text.
Acknowledgement
Acknowledgment to any advisory or financial assistance received in the course of work may
be given.
Student Certificate
Given by the Institute.
Introduction
Here a brief introduction to the problem that is central to the project and an outline of the
structure of the rest of the report should be provided. The introduction should aim to catch the
imagination of the reader, so excessive details should be avoided.
Chapters
All chapters and sections must be appropriately numbered, titled and should neither be too
long nor too short in length.
The first chapter should be introductory in nature and should outline the background of the
project, the problem being solved, the importance, other related works and literature survey.
The other chapters would form the body of the report. The last chapter should be concluding
in nature and should also discuss the future prospect of the project.
Appendices
The Appendix contains material which is of interest to the reader but not an integral part of
the thesis and any problem that have arisen that may be useful to document for future
reference.
References / Bibliography
This should include papers and books referred to in the body of the report. These should be
ordered alphabetically on the author's surname. The titles of journals preferably should not
be abbreviated; if they are, abbreviations must comply with an internationally recognised
system.
71
Essentially, marking will be based on the following criteria: the quality of the report, the
technical merit of the project and the project execution. Technical merit attempts to assess
the quality and depth of the intellectual efforts put into the project. Project execution is
concerned with assessing how much work has been put in.
The File should fulfill the following assessment objectives:
5. Bibliography
This refer to the books, Journals and other documents consulting while
working on the project
Examination Scheme:
Components MRP V S FP R
Weightage (%) 20 20 20 20 20
72
COMMUNICATION SKILLS-II
Course Objective:
To enrich the understanding of English language and communication, structure, style, usage,
and vocabulary for global business purposes.
Course Contents:
Examination Scheme:
73
BEHAVIOURAL SCIENCE-II
(Behavioural Communication and Relationship Management)
1 L T P/FW CREDITS
BSS 211 1 - - 1
Course Objective:
This course aims at imparting an understanding of:
Process of Behavioural communication
Aspects of interpersonal communication and relationship
Management of individual differences as important dimension of IPR
Course Contents:
Module I: Behavioural Communication
Scope of Behavioural Communication
Process – Personal, Impersonal and Interpersonal Communication
Guidelines for developing Human Communication skills
Relevance of Behavioural Communication in relationship management
Module II: Managing Individual Differences in Relationships
Principles
Types of issues
Approaches
Understanding and importance of self disclosure
Guidelines for effective communication during conflicts
Module III: Communication Climate: Foundation of Interpersonal Relationships
Elements of satisfying relationships
Conforming and Disconforming Communication
Culturally Relevant Communication
Guideline for Creating and Sustaining Healthy Climate
Module IV: Interpersonal Communication
Imperatives for Interpersonal Communication
Models – Linear, Interaction and Transaction
Patterns – Complementary, Symmetrical and Parallel
Types – Self and Other Oriented
Steps to improve Interpersonal Communication
Module V: Interpersonal Relationship Development
Relationship circle – Peer/ Colleague, Superior and Subordinate
Initiating and establishing IPR
Escalating, maintaining and terminating IPR
Direct and indirect strategies of terminating relationship
Model of ending relationship
Module VI: End-of-Semester Appraisal
Viva based on personal journal
Assessment of Behavioural change as a result of training
Exit Level Rating by Self and Observer
Examination Scheme:
Components SAP A Mid Term Test (CT) VIVA Journal for Success (JOS)
Weightage (%) 20 05 20 30 25
Text & References:
Vangelist L. Anita, Mark N. Knapp, Inter Personal Communication and Human Relationships: Third
Edition, Allyn and Bacon
Julia T. Wood. Interpersonal Communication everyday encounter
Simons, Christine,Naylor,Belinda: Effective Communication for Managers,1997 1st Edition Cassell
Harvard Business School, Effective Communication: United States of America
74
Beebe, Beebe and Redmond; Interpersonal Communication, 1996; Allyn and Bacon Publishers.
FRENCH
Course Objective:
To enable the students to overcome the fear of speaking a foreign language and take
position as a foreigner speaking French.
To make them learn the basic rules of French Grammar.
Course Contents:
Module A: pp.38 – 47: Unité 3: Objectif 3, 4, 5. 6
75
GERMAN
CODE L T P/FW CREDITS
FLG 211 2 - - 2
Course Objective:
To enable the students to converse, read and write in the language with the help of the basic
rules of grammar, which will later help them to strengthen their language.
To give the students an insight into the culture, geography, political situation and economic
opportunities available in Germany
Introduction to Grammar to consolidate the language base learnt in Semester I
Course Contents:
Module I: Everything about Time and Time periods
Time and times of the day.
Weekdays, months, seasons.
Adverbs of time and time related prepositions
Module II: Irregular verbs
Introduction to irregular verbs like to be, and others, to learn the conjugations of the same,
(fahren, essen, lessen, schlafen, sprechen und ähnliche).
Module III: Separable verbs
To comprehend the change in meaning that the verbs undergo when used as such
Treatment of such verbs with separable prefixes
Module IV: Reading and comprehension
Reading and deciphering railway schedules/school time table
Usage of separable verbs in the above context
Module V: Accusative case
Accusative case with the relevant articles
Introduction to 2 different kinds of sentences – Nominative and Accusative
Module VI: Accusative personal pronouns
Nominative and accusative in comparison
Emphasizing on the universal applicability of the pronouns to both persons and objects
Module VII: Accusative prepositions
Accusative propositions with their use
Both theoretical and figurative use
Module VIII: Dialogues
Dialogue reading: ‘In the market place’
‘At the Hotel’
Examination Scheme:
Components CT1 CT2 C I V A
Weightage (%) 20 20 20 20 15 5
C – Project + Presentation
I – Interaction/Conversation Practice
Text & References:
Wolfgang Hieber, Lernziel Deutsch
Hans-Heinrich Wangler, Sprachkurs Deutsch
Schulz Griesbach, Deutsche Sprachlehre für Ausländer
P.L Aneja, Deutsch Interessant- 1, 2 & 3
Rosa-Maria Dallapiazza et al, Tangram Aktuell A1/1,2
Braun, Nieder, Schmöe, Deutsch als Fremdsprache 1A, Grundkurs
76
SPANISH
Course Objective:
To enable students acquire more vocabulary, grammar, verbal phrases to understand simple
texts and start describing any person or object in Simple Present Tense.
Course Contents:
Module I
Revision of earlier modules.
Module II
Some more AR/ER/IR verbs. Introduction to root changing and irregular AR/ER/IR ending
verbs
Module III
More verbal phrases (eg, Dios Mio, Que lastima etc), adverbs (bueno/malo, muy, mucho,
bastante, poco).
Simple texts based on grammar and vocabulary done in earlier modules.
Module IV
Possessive pronouns
Module V
Writing/speaking essays like my friend, my house, my school/institution,
myself….descriptions of people, objects etc, computer/internet related vocabulary
Examination Scheme:
C – Project + Presentation
I – Interaction/Conversation Practice
Español, En Directo I A
Español Sin Fronteras
77
CHINESE
Course Objective:
Chinese is a tonal language where each syllable in isolation has its definite tone (flat, falling,
rising and rising/falling), and same syllables with different tones mean different things. When
you say, “ma” with a third tone, it mean horse and “ma” with the first tone is Mother. The
course aims at familiarizing the student with the basic aspects of speaking ability of
Mandarin, the language of Mainland China. The course aims at training students in practical
skills and nurturing them to interact with a Chinese person.
Course Contents:
Module I
Drills
Practice reading aloud
Observe Picture and answer the question.
Tone practice.
Practice using the language both by speaking and by taking notes.
Introduction of basic sentence patterns.
Measure words.
Glad to meet you.
Module II
Where do you live?
Learning different colors.
Tones of “bu”
Buying things and how muchit costs?
Dialogue on change of Money.
More sentence patterns on Days and Weekdays.
How to tell time. Saying the units of time in Chinese. Learning to say useful phrases like –
8:00, 11:25, 10:30 P.M. everyday, afternoon, evening, night, morning 3:58, one hour, to
begin, to end ….. etc.
Morning, Afternoon, Evening, Night.
Module III
Use of words of location like-li, wais hang, xia
Furniture – table, chair, bed, bookshelf,.. etc.
Description of room, house or hostel room.. eg what is placed where and how many things
are there in it?
Review Lessons – Preview Lessons.
Expression ‘yao”, “xiang” and “yaoshi” (if).
Days of week, months in a year etc.
I am learning Chinese. Is Chinese difficult?
Module IV
78
Counting from 1-1000
Use of “chang-chang”.
Making an Inquiry – What time is it now? Where is the Post Office?
Days of the week. Months in a year.
Use of Preposition – “zai”, “gen”.
Use of interrogative pronoun – “duoshao” and “ji”.
“Whose”??? Sweater etc is it?
Different Games and going out for exercise in the morning.
Module V
The verb “qu”
Going to the library issuing a book from the library
Going to the cinema hall, buying tickets
Going to the post office, buying stamps
Going to the market to buy things.. etc
Going to the buy clothes …. Etc.
Hobby. I also like swimming.
Comprehension and answer questions based on it.
Examination Scheme:
C – Project + Presentation
I – Interaction/Conversation Practice
79
DATABASE AND APPLICATION SECURITY
Module- I:
Database security – Introduction includes threats, vulnerabilities and breaches,Basics of
database design,DB security – concepts, approaches and challenges, types of access controls,
Oracle VPD,Discretionary and Mandatory access control – Principles, applications and
polyinstantiation
Module- II:
Database inference problem, types of inference attacks, distributed database, security levels,
SQL-injection: types and advanced concepts.Security in relational data model, concurrency
controls and locking,SQL extensions to security (oracle as an example), System R concepts,
Context and control based access control, Hippocraticdatabases, Databasewatermarking,
Databaseintrusion, Secure data outsourcing
Module- III:
Web application security,Basic principles and concepts,Authentication,Authorization,
Browser security principles; XSS and CSRF, same origin policies,File security
principles,Secure development and deployment methodologies,Web DB principles, OWASP
– Top 10 - Detailed treatment,IoT security – OWASP Top 10 – Detailed treatment,Mobile
device security – Introduction, attack vector and models, hardware centric security aspects,
SMS / MMS vulnerabilities, software centric security aspects
Module- IV:
Mobile web browser security,Application security – Concepts, CIA Triad, Hexad, types of
cyber attacks,Introduction to software development vulnerabilities, code analyzers – Static
and dynamic analyzers,Security testing / Penetration testing – Principles and concepts, PT
work flows and examples, blind tests, ethical hacking techniques, synthetic transactions,
interface testing and fuzzing,SDLC phases and security mandates
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
TEXTBOOKS/ REFERENCES:
1.Michael Gertz and SushilJajodia, “Handbook of Database Security— Applications and
Trends”, Springer, 2008.
2. Bryan and Vincent, “Web Application Security, A Beginners Guide ”,McGraw-Hill, 2011
3. BhavaniThuraisingham, “Database and Applications Security”, Integrating Information
Security and Data Management, Auerbach Publications, 2005.
4. Alfred Basta, Melissa Zgola, “Database Security”, Course Technology, 2012
80
SECURE SOFTWARE ENGINEERING
Course Objective:
Evaluate secure software engineering problems, including the specification,design,
implementation, and testing of software systems. Elicit, analyze and specify security
requirements through SRS. Design and Plan software solutions to security problems using
variousparadigms.Model the secure software systems using Unified Modeling
LanguageSec(UMLSec). Develop and apply testing strategies for Secure software
applications
Course Contents:
81
ETHICAL HACKING AND DIGITAL FORENSIC TOOLS
COURSE CODE L T P/FW CREDIT UNITS
MCS303 2 1 0 3
Module- I:
Hacking windows – Network hacking – Web hacking – Password hacking. A study on
various attacks – Input validation attacks – SQL injection attacks – Buffer overflow attacks -
Privacy attacks.
Module- II:
TCP / IP – Checksums – IP Spoofing port scanning, DNS Spoofing. Dos attacks – SYN
attacks, Smurf attacks, UDP flooding, DDOS – Models. Firewalls – Packet filter firewalls,
Packet Inspection firewalls – Application Proxy Firewalls. Batch File Programming.
Module- III:
Fundamentals of Computer Fraud – Threat concepts – Framework for predicting inside
attacks – Managing the threat – Strategic Planning Process. Architecture strategies for
computer fraud prevention – Protection of Web sites – Intrusion detection system – NIDS,
HIDS – Penetrating testing process – Web Services – Reducing transaction risks.
Module- IV:
Key Fraud Indicator selection process customized taxonomies – Key fraud signature selection
process –Accounting Forensics – Computer Forensics – Journaling and it requirements –
Standardized logging criteria – Journal risk and control matrix – Neural networks – Misuse
detection and Novelty detection.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
References:
1. Kenneth C.Brancik “Insider Computer Fraud” Auerbach Publications Taylor & Francis
Group, 2008. 2. 2. AnkitFadia“ Ethical Hacking” 2nd Edition Macmillan India Ltd, 2006
82
ETHICAL HACKING AND DIGITAL FORENSIC TOOLS LAB
List of Experiments
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
83
ARTIFICIAL INTELLIGENCE AND NEURAL NETWORK
Course Objective:
The primary objective of this course is to provide an introduction to the basic principles,
techniques, and applications of Artificial Intelligence. The emphasis of the course is on
teaching the fundamentals and not on providing a mastery of specific commercially available
software tools or programming environments. Upon successful completion of the course, you
will have an understanding of the basic areas of artificial intelligence search, knowledge
representation, learning and their applications in design and implementation of intelligent
agents for a variety of tasks in analysis, design, and problem-solving. You will also be able to
design and implement key components of intelligent agents of moderate complexity in Java
and/or Lisp or Prolog and evaluate their performance. Graduate students are expected to
develop some familiarity with current research problems and research methods in AI by
working on a research or design project.
Course Contents:
Module I: Introduction
AI and its importance, AI Problem, Application area.
Module II: Problem Representations
State space representation, problem-reduction representation, production system, production
system characteristics, and types of production system.
Module III: Heuristic Search Techniques
AI and search process, brute force search, depth-first search, breadth-first search, time and
space complexities, heuristics search, hill climbing, best first search, A*, AO* algorithm,
constraint satisfaction, and beam search.
Module IV: Knowledge Representation issues using predicate logic
Representation and mapping, knowledge representation mechanism, inheritable knowledge,
Prepositional logic: syntax and semantics, First Order Predicate Logic (FOPL).
Module V: Expert System
Basic understanding of Fuzzy Logic, Artificial Neural Network, Perceptron, Natural
Language Processing, Pattern Recognition, Robotics, LISP and Prolog.The role of Artificial
intelligence in Biotechnology.Introduction to Bio-inspired computing.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
84
HUMAN COMPUTER INTERACTION
COURSE CODE L T P/FW CREDIT UNITS
MCS332 2 1 - 3
Course Objective:
Human-computer interaction is the study of how people interact with computers and to what
extent computers are or are not developed for successful interaction with human beings. The
goals of HCI are to produce usable and safe systems, as well as functional systems. This
course provides the concepts of HCI and user interfaces, focusing on user interface design,
evaluation, and technologies.
Course Contents:
Module: I: Introduction
Importance of user Interface-definition, importance of 8good design. Benefits of good design.
A brief history of Screen design.The graphical user interface-popularity of graphics, the
concept of direct manipulation, graphical system, Characteristics, Web user-Interface
popularity, characteristics-Principles of user interface
Module II: Design process
Human interaction with computers, importance of 8 human characteristics human
consideration, Human interaction speeds, understanding business junctions
Module III: Screen Designing
Design goals-Screen planning and purpose, 8 organizing screen elements, ordering of screen
data and content-screen navigation and flow-Visually pleasing composition-amount of
information-focus and emphasis-presentation information simply and meaningfully-
information retrieval on web-statistical graphics-
Technological consideration in interface design
ModuleIV:Windows
New and Navigation schemes selection of window, 8 selection of devices based and screen
based controls. Components-text and messages, Icons and increases-Multimedia, colors, uses
problems, choosing colors.
Module V:Software tools
Specification methods, interface-Building Tools. 8 Interaction Devices-Keyboard and
function keys-pointing devices-speech recognition digitization and generation-image and
video displays-drivers.
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
85
DESIGN AND ANALYSIS OF ALGORITHM
COURSE CODE L T P/FW CREDIT UNITS
MCS333 2 1 - 3
Course Objective:
The primary objective of this course is to provide the fundamentals concepts of Design &
analysis of Algorithms. To provides knowledge of Time and space complexity of algorithms.
This course is to including Mathematical foundations, Sorting & searching Order Statistics,
Data Structures, Advanced Design & Analysis techniques such as Divide & Conquer, greedy
method, graph theory & Dynamic Programming approaches.
Course Contents:
Module V : NP-completeness
Informal concepts of deterministic and nondeterministic algorithms, P and NP,NP-
completeness, statement of Cook’s theorem, some standard NP-complete problems,
approximation algorithms.
86
Examination Scheme:
Text Books:
T. H. Cormen, C. E. Leiserson and R. L. Rivest: Introduction to Algorithms, Prentice
Hall of India, New Delhi, 1998.
E. Horowitz and S. Sahani: Fundamental of Computer Algorithms, Galgotia Pub.
/Pitman, New Delhi/London, 1987/1978.
References Books:
87
PRINCIPLES OF VIRTUALIZATION
Course Objective:
Virtualization is the single most effective way to reduce IT expenses while boosting efficiency
and agility in organizations.
This unit explores the implementation and usage of VMWare Virtualization, its installation
process and the working of Windows Server hyper V.
Course Contents:
Module I: Basics of Virtualization
Introduction to Unit, Need of Virtualization and Virtualization Technologies: Server
Virtualization, Storage Virtualization, I/O Virtualization, Network Virtualization, Client
Virtualization, Application virtualization, Desktop virtualization , Understanding Virtualization
Uses: Studying Server Consolidation, Development and Test Environments , Helping with
Disaster Recovery , Conclusion of the Unit
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
88
PYTHON
Module-II
Strings and text files; manipulating files and directories; text files: reading/writing text and
numbers from/to a file; creating and reading a formatted file.
String manipulations: subscript operator, indexing, slicing a string; strings and number
system: converting strings to numbers and vice versa. Binary, octal, hexadecimal numbers
Module-III
Lists, tuples, and dictionaries; basic list operators, replacing, inserting, removing an element;
searching and sorting lists; dictionary literals, adding and removing keys, accessing and
replacing values; traversing dictionaries. Design with functions: hiding redundancy,
complexity; arguments and return values; formal vs actual arguments, named arguments.
Recursive functions.
Module-IV
Simple graphics and image processing: “turtle” module; simple 2d drawing - colors, shapes;
digital images, image file formats, image processing; Simple image manipulations with
'image' module - convert to bw, greyscale, blur, etc.
Module-V
Classes and OOP: classes, objects, attributes and methods; defining classes; design with
classes, data modeling; persistent storage of objects; inheritance, polymorphism, operator
overloading; abstract classes; exception handling, try block
Examination Scheme:
Components CT Assignment P/V Quiz Attd EE
Weightage (%) 15 10 10 10 5 50
Text & References:
Textbook: Fundamentals of Python: First Programs , Author: Kenneth Lambert , Publisher:
Course Technology, Cengage Learning, 2012
89
PRINCIPLES OF VIRTUALIZATION LAB
List of experiments
10. Clone a VM – I
11. Clone a VM - II
Examination Scheme:
IA EE
A PR LR V PR V
5 15 15 15 25 25
Note: IA –Internal Assessment, EE- External Exam, PR- Performance, LR – Lab Record, V –
Viva.
90
PYTHON LAB
91
MINOR PROJECT
Report Layout
The report should contain the following components
92
Title or Cover Page or Front Page
The title page should contain the following information: Project Title; Student’s Name;
Course; Year; Supervisor’s Name.
Table of Contents
Titles and subtitles are to correspond exactly with those in the text.
Acknowledgement
Acknowledgment to any advisory or financial assistance received in the course of work may
be given.
Student Certificate
Given by the Institute.
Introduction
Here a brief introduction to the problem that is central to the project and an outline of the
structure of the rest of the report should be provided. The introduction should aim to catch the
imagination of the reader, so excessive details should be avoided.
Chapters
All chapters and sections must be appropriately numbered, titled and should neither be too
long nor too short in length.
The first chapter should be introductory in nature and should outline the background of the
project, the problem being solved, the importance, other related works and literature survey.
The other chapters would form the body of the report. The last chapter should be concluding
in nature and should also discuss the future prospect of the project.
Appendices
The Appendix contains material which is of interest to the reader but not an integral part of
the thesis and any problem that have arisen that may be useful to document for future
reference.
References / Bibliography
This should include papers and books referred to in the body of the report. These should be
ordered alphabetically on the author's surname. The titles of journals preferably should not
be abbreviated; if they are, abbreviations must comply with an internationally recognised
system.
93
Essentially, marking will be based on the following criteria: the quality of the report, the
technical merit of the project and the project execution. Technical merit attempts to assess
the quality and depth of the intellectual efforts put into the project. Project execution is
concerned with assessing how much work has been put in.
The File should fulfill the following assessment objectives:
5. Bibliography
This refer to the books, Journals and other documents consulting while
working on the project
Examination Scheme:
Components MRP V S FP R
Weightage (%) 20 20 20 20 20
94
REPORT ON PAPER PRESENTATION IN CONFERENCE
Objective: Conferences / Seminars / Workshop are good and efficient way to get to know
other researchers through their work and also personally. The educational aspect can expose
the students to new ways of conducting the business and help them to discover how to be
more productive. They provide a great opportunity to network. Collaboration is the way to
approach networking.
Rules and Regulations
2nd Year / 3rd Year Students for which the students and the faculty members can start
preparations well in advance prior to the scheduled conference / seminar / workshop.
The number of students going for any conference / seminar / workshop should be
manageable.
A proposal for the proposed conference / seminar / workshop should be drafted and
presented to the HoI reflecting the following key points:
o Entire activity plan
o Route Map
o What are the objectives for the students?
o What they need to learn, do, and prepare before the conference / seminar /
workshop?
o List of prospective students with Contact Details
o List of Faculty Coordinators with Contact Details
After getting approval from the HoI, a note sheet should be prepared and all necessary
permission and approval from the competent authorities should be obtained.
The attention and co-operation of all students and parents are requested to attend the
conference / seminar / workshop most effectively. Signing of the letter of Indemnity Bond
(Consent-cum-Undertaking) is mandatory for all the parents of students going for
conference / seminar / workshop in or outside Jaipur. Duly executed Indemnity Bond
should be submitted to HoI Office at least 2 days prior to the visit, without which the
accompanying Staff coordinator shall not permit the student to participate in the industrial
visit
The list of students participating in conference / seminar / workshop shall be handed over
to the concerned HODs, Staff coordinators.
Students should be present in formals.
Students should carry the College Identity Cards during their journey.
Discipline should be maintained during the conference / seminar / workshop. Any
violation will be viewed very seriously.
A report of the conference / seminar / workshop is to be submitted in 5 days time by
students / faculty coordinators once the students are back.
The report to be prepared should reflect the following:-
What happened at the conference / seminar / workshop the students attend and how
does it relate in the best way to the preparations and the learning objectives.
How do the students will use the outcome of conference / seminar / workshop after it is
over?
95
What will they gain from it and how can they set up activities that transfer the
experience into learning?
Evaluation parameters for the success of the experience of conference / seminar /
workshop.
The student will be provided with the Student Assessment Record (SAR) to be placed in front
of the Report File. Each item in the SAR is ticked off when it is completed successfully. The
faculty will also assess each item as it is completed. The SAR will be signed by the student
and by the faculty to indicate that the File is the student’s own work. It will also ensure
regularity and meeting the delaines.
Examination Scheme:
Components V S R FP
Weightage (%) 20 20 20 40
96
SUMMER INTERNSHIP PROJECT
GUIDELINES:
There are certain phases of every Intern’s professional development that cannot be effectively
taught in the academic environment. These facets can only be learned through direct, on-the-
job experience working with successful professionals and experts in the field. The internship
program can best be described as an attempt to institutionalize efforts to bridge the gap
between the professional world and the academic institutions. Entire effort in internship is in
terms of extending the program of education and evaluation beyond the classroom of a
university or institution. The educational process in the internship course seeks out and
focuses attention on many latent attributes, which do not surface in the normal classroom
situations. These attributes are intellectual ability, professional judgment and decision-
making ability, inter-disciplinary approach, skills for data handling, ability in written and oral
presentation, sense of responsibility etc.
In order to achieve these objectives, each student will maintain a file (Internship File). The
Internship File aims to encourage students to keep a personal record of their learning and
achievement throughout the Programme. It can be used as the basis for lifelong learning and
for job applications. Items can be drawn from activities completed in the course modules and
from the workplace to demonstrate learning and personal development.
The File will assess the student’s analytical skills and ability to present supportive evidence,
whilst demonstrating understanding of their organization, its needs and their own personal
contribution to the organization.
97
The File will include five sections in the order described below. The content and
comprehensiveness of the main body and appendices of the report should include the
following:
1. The Title Page--Title - An Internship Experience Report For (Your Name), name of
internship organization, name of the Supervisor/Guide and his/her designation, date
started and completed, and number of credits for which the report is submitted.
2. Table of Content--an outline of the contents by topics and subtopics with the page number
and location of each section.
3. Introduction--short, but should include how and why you obtained the internship
experience position and the relationship it has to your professional and career goals.
4. Main Body--should include but not be limited to daily tasks performed. Major projects
contributed to, dates, hours on task, observations and feelings, meetings attended and
their purposes, listing of tools and materials and their suppliers, and photographs if
possible of projects, buildings and co-workers.
5. References / Bibliography --This should include papers and books referred to in the body
of the report. These should be ordered alphabetically on the author's surname. The titles
of journals preferably should not be abbreviated; if they are, abbreviations must comply
with an internationally recognised system
The student will be provided with the Student Assessment Record (SAR) to be placed in front
of the Internship File. Each item in the SAR is ticked off when it is completed successfully.
The faculty will also assess each item as it is completed. The SAR will be signed by the
student and by the faculty to indicate that the File is the student’s own work. It will also
ensure regularity and meeting the delaines.
2. Execution of Research
3. Data Analysis
Analyse Quantitative/ Qualitative information
Control Quality
4. Draw Conclusions
Examination Scheme:
Components V S R FP
Weightage (%) 20 20 20 40
98
COMMUNICATION SKILLS-III
Course Objective:
To initiate the learners with the basic mechanics of writing skills and facilitate them with the
core skills required for communication in the professional world.
Course Contents:
Examination Scheme:
99
BEHAVIOURAL SCIENCE-III (Leading Through Teams)
CODE L T P/FW CREDITS
BSS311 1 - - 1
Course Objective:
This course aims to enable students to:
Understand the concept and building of teams
Manage conflict and stress within team
Facilitate better team management and organizational effectiveness through universal human
values.
Course Contents:
Module I: Teams: An Overview
Team Design Features: team vs. group
Effective Team Mission and Vision
Life Cycle of a Project Team
Rationale of a Team, Goal Analysis and Team Roles
Module II: Team & Sociometry
Patterns of Interaction in a Team
Sociometry: Method of studying attractions and repulsions in groups
Construction of sociogram for studying interpersonal relations in a Team
Module III: Team Building
Types and Development of Team Building
Stages of team growth
Team performance curve
Profiling your Team: Internal & External Dynamics
Team Strategies for organizational vision
Team communication
Module IV: Team Leadership & Conflict Management
Leadership styles in organizations
Self Authorized team leadership
Causes of team conflict
Conflict management strategies
Stress and Coping in teams
Module V: Global Teams and Universal Values
Management by values
Pragmatic spirituality in life and organization
Building global teams through universal human values
Learning based on project work on Scriptures like Ramayana, Mahabharata, Gita etc.
Module VI: End-of-Semester Appraisal
Viva based on personal journal
Assessment of Behavioural change as a result of training
Exit Level Rating by Self and Observer
Examination Scheme:
Components SAP A Mid Term Test (CT) VIVA Journal for Success (JOS)
Weightage (%) 20 05 20 30 25
Text & References:
Organizational Behaviour, Davis, K.
Hoover, Judhith D. Effective Small Group and Team Communication, 2002,Harcourt College
Publishers
LaFasto and Larson: When Teams Work Best, 2001, Response Books (Sage), New Delhi
Dick, Mc Cann & Margerison, Charles: Team Management, 1992 Edition, viva books
J William Pfeiffer (ed.) Theories and Models in Applied Behavioural Science, Vol 2, Group
(1996); Pfeiffer & Company
Smither Robert D.; The Psychology of Work and Human Performance, 1994, Harper Collins
College Publishers
100
FRENCH
Course Objective:
To provide the students with the know-how
To master the current social communication skills in oral and in written.
To enrich the formulations, the linguistic tools and vary the sentence construction
without repetition.
Course Contents:
Module B: pp. 76 – 88 Unité 6
101
GERMAN
CODE L T P/FW CREDITS
FLG 311 2 - - 2
Course Objective:
To enable the students to converse, read and write in the language with the help of the basic
rules of grammar, which will later help them to strengthen their language.
To give the students an insight into the culture, geography, political situation and economic
opportunities available in Germany
Course Contents:
Module I: Modal verbs
Modal verbs with conjugations and usage
Imparting the finer nuances of the language
Module II: Information about Germany (ongoing)
Information about Germany in the form of presentations or “Referat”– neighbors, states and
capitals, important cities and towns and characteristic features of the same, and also a few
other topics related to Germany.
Module III: Dative case
Dative case, comparison with accusative case
Dative case with the relevant articles
Introduction to 3 different kinds of sentences – nominative, accusative and dative
Module IV: Dative personal pronouns
Nominative, accusative and dative pronouns in comparison
Module V: Dative prepositions
Dative preposition with their usage both theoretical and figurative use
Module VI: Dialogues
In the Restaurant,
At the Tourist Information Office,
A telephone conversation
Module VII: Directions
Names of the directions
Asking and telling the directions with the help of a roadmap
Module VIII: Conjunctions
To assimilate the knowledge of the conjunctions learnt indirectly so far
Examination Scheme:
Components CT1 CT2 C I V A
Weightage (%) 20 20 20 20 15 5
C – Project + Presentation
I – Interaction/Conversation Practice
102
SPANISH
Course Objective:
To enable students acquire knowledge of the Set/definite expressions (idiomatic expressions)
in Spanish language and to handle some Spanish situations with ease.
Course Contents:
Module I
Revision of earlier semester modules
Set expressions (idiomatic expressions) with the verb Tener, Poner, Ir….
Weather
Module II
Introduction to Gustar…and all its forms. Revision of Gustar and usage of it
Module III
Translation of Spanish-English; English-Spanish. Practice sentences.
How to ask for directions (using estar)
Introduction to IR + A + INFINITIVE FORM OF A VERB
Module IV
Simple conversation with help of texts and vocabulary
En el restaurante
En el instituto
En el aeropuerto
Module V
Reflexives
Examination Scheme:
C – Project + Presentation
I – Interaction/Conversation Practice
Español, En Directo I A
Español Sin Fronteras -Nivel Elemental
103
CHINESE
Course Objective:
Foreign words are usually imported by translating the concept into Chinese, the emphasis is on
the meaning rather than the sound. But the system runs into a problem because the underlying
name of personal name is often obscure so they are almost always transcribed according to their
pronciation alone. The course aims at familiarizing the student with the basic aspects of speaking
ability of Mandarin, the language of Mainland China. The course aims at training students in
practical skills and nurturing them to interact with a Chinese person.
Course Contents:
Module I
Drills
Dialogue practice
Observe picture and answer the question.
Introduction of written characters.
Practice reading aloud
Practice using the language both by speaking and by taking notes.
Character writing and stroke order
Module II
Measure words
Position words e.g. inside, outside, middle, in front, behind, top, bottom, side, left, right, straight.
Directional words – beibian, xibian, nanbian, dongbian, zhongjian.
Our school and its different building locations.
What game do you like?
Difference between “hii” and “neng”, “keyi”.
Module III
Changing affirmative sentences to negative ones and vice versa
Human body parts.
Not feeling well words e.g.; fever, cold, stomach ache, head ache.
Use of the modal particle “le”
Making a telephone call
Use of “jiu” and “cal” (Grammar portion)
Automobiles e.g. Bus, train, boat, car, bike etc.
104
Traveling, by train, by airplane, by bus, on the bike, by boat.. etc.
Module IV
The ordinal number “di”
“Mei” the demonstrative pronoun e.g. mei tian, mei nian etc.
use of to enter to exit
Structural particle “de” (Compliment of degree).
Going to the Park.
Description about class schedule during a week in school.
Grammar use of “li” and “cong”.
Comprehension reading followed by questions.
Module V
Persuasion-Please don’t smoke.
Please speak slowly
Praise – This pictorial is very beautiful
Opposites e.g. Clean-Dirty, Little-More, Old-New, Young-Old, Easy-Difficult, Boy-Girl, Black-
White, Big-Small, Slow-Fast … etc.
Talking about studies and classmates
Use of “it doesn’t matter”
Enquiring about a student, description about study method.
Grammar: Negation of a sentence with a verbal predicate.
Examination Scheme:
C – Project + Presentation
I – Interaction/Conversation Practice
105
PROJECT WORK / INTERNSHIP/ DISSERTATION
Course Code L T P Credit
MCS460/461/462 - - - 25
Report Layout
The report should contain the following components
106
Company Profile
Introduction
Chapters
Appendices
References / Bibliography
Table of Contents
Titles and subtitles are to correspond exactly with those in the text.
Acknowledgement
Acknowledgment to any advisory or financial assistance received in the course of work may be
given.
Student Certificate
Given by the Institute.
Introduction
Here a brief introduction to the problem that is central to the project and an outline of the
structure of the rest of the report should be provided. The introduction should aim to catch the
imagination of the reader, so excessive details should be avoided.
Chapters
All chapters and sections must be appropriately numbered, titled and should neither be too long
nor too short in length.
The first chapter should be introductory in nature and should outline the background of the
project, the problem being solved, the importance, other related works and literature survey. The
other chapters would form the body of the report. The last chapter should be concluding in nature
and should also discuss the future prospect of the project.
Appendices
The Appendix contains material which is of interest to the reader but not an integral part of the
thesis and any problem that have arisen that may be useful to document for future reference.
References / Bibliography
107
This should include papers and books referred to in the body of the report. These should be
ordered alphabetically on the author's surname. The titles of journals preferably should not be
abbreviated; if they are, abbreviations must comply with an internationally recognised system.
Essentially, marking will be based on the following criteria: the quality of the report, the
technical merit of the project and the project execution. Technical merit attempts to assess the
quality and depth of the intellectual efforts put into the project. Project execution is concerned
with assessing how much work has been put in.
The File should fulfill the following assessment objectives:
5. Bibliography
This refer to the books, Journals and other documents consulting while
working on the project
Examination Scheme:
Components MRP V S FP R
Weightage (%) 20 20 20 20 20
MRP – Mid Report Presentation, V – Viva, S – Synopsis, FP – Final Presentation, R - Report
108