+ All Categories
Home > Documents > IT Department - jmit.ac.in

IT Department - jmit.ac.in

Date post: 15-Oct-2021
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
37
IT Department Vision of the Department To produce a blend of creativity & ethical engineering graduates and making them capable of facing the real life challenges. Mission of the Department The mission elements of Information Technology Department are: M-1. Inculcating the fundamentals of Information Technology and analyzing the engineering problems along with the development of solutions keeping environmental aspects. M-2. To cultivate ability for modern tool usage on ethical grounds to widely solve real life issues. M-3. Building team spirit within the students, creating effecting communication for lifelong learning. Programme Outcomes (PO) 1 Engineering Knowledge: Apply knowledge of science, computing, mathematics and fundamentals of engineering appropriate for the solution of engineering problems. 2 Problem Analysis:Analyze and identify the complex problems to formulate and interpret the solutions through the use of research methodology and technical skills to produce meaningful conclusions and recommendations. 3 Design/development of solutions: Design, develop and implement system components for real world problems which results to new innovations in information technology and related interdisciplinary areas like social, cultural, healthy and secure environment. 4 Conduct investigations of complex problems: Make use of research skills and basic principles of engineering and technology for various computing and communication system applications through design of experiments, analysis and implementation of algorithms and unification of information. 5 Modern tool usage: Learn latest hardware and software tools and engineering methodologies to model the complex engineering activities. 6 The engineer and society: Show the impact of engineering practices on the society for assessing social, cultural, secure, healthy and legal issues to demonstrate the knowledge and needs for sustainable development. 7 Environment and sustainability: Create an impact of all the engineering solutions in the context of social and environmental issues. 8 Ethics: Inculcate ethical and moral values in the context of engineering practices. 9 Individual and team work: Work excellently as a team member and/or leader in distinct fields of engineering using management and engineering principles. 10 Communication: Communicate effectively the engineering principles to the society and community through written and oral modes such as report writing, presentations, documentation. 11 Project management and finance: Project completion and cost estimation through management and engineering tools and techniques. 12 Lifelong learning: Understand the need for, and have the preparation and ability to engage in independent and life-long learning.
Transcript
Page 1: IT Department - jmit.ac.in

IT Department

Vision of the Department

To produce a blend of creativity & ethical engineering graduates and making them capable of facing the real life

challenges.

Mission of the Department

The mission elements of Information Technology Department are:

M-1. Inculcating the fundamentals of Information Technology and analyzing the engineering problems along with

the development of solutions keeping environmental aspects.

M-2. To cultivate ability for modern tool usage on ethical grounds to widely solve real life issues.

M-3. Building team spirit within the students, creating effecting communication for lifelong learning.

Programme Outcomes (PO)

1 Engineering Knowledge: Apply knowledge of science, computing, mathematics and fundamentals of

engineering appropriate for the solution of engineering problems.

2 Problem Analysis:Analyze and identify the complex problems to formulate and interpret the solutions

through the use of research methodology and technical skills to produce meaningful conclusions and

recommendations.

3 Design/development of solutions: Design, develop and implement system components for real world

problems which results to new innovations in information technology and related interdisciplinary areas like

social, cultural, healthy and secure environment.

4 Conduct investigations of complex problems: Make use of research skills and basic principles of

engineering and technology for various computing and communication system applications through design of

experiments, analysis and implementation of algorithms and unification of information.

5 Modern tool usage: Learn latest hardware and software tools and engineering methodologies to model the

complex engineering activities.

6 The engineer and society: Show the impact of engineering practices on the society for assessing social,

cultural, secure, healthy and legal issues to demonstrate the knowledge and needs for sustainable

development.

7 Environment and sustainability: Create an impact of all the engineering solutions in the context of social

and environmental issues.

8 Ethics: Inculcate ethical and moral values in the context of engineering practices.

9 Individual and team work: Work excellently as a team member and/or leader in distinct fields of

engineering using management and engineering principles.

10 Communication: Communicate effectively the engineering principles to the society and community through

written and oral modes such as report writing, presentations, documentation.

11 Project management and finance: Project completion and cost estimation through management and

engineering tools and techniques. 12 Life‐long learning: Understand the need for, and have the preparation and ability to engage in independent

and life-long learning.

Page 2: IT Department - jmit.ac.in

PROGRAM EDUCATIONAL OBJECTIVES (PEOS)

PEO: 1 To provide quality computer education to inculcate modern technical skills among the students.

PEO: 2 To cultivate the ability to analyze the demand of software industry for carrying out hands on

projects.

PEO: 3 Inculcate direction qualities to work mutually as a team member with effective briefing skills.

Program Specific Objectives (PSO)

PSO-1 To understand analyze and develop computer programs related to system software, web design, DBMS and

networking for efficient design of computer based applications for real world problems.

PSO-2 To work professionally in software industries with a broad range of programming language thus creating

innovative career paths to sustain passion and zeal for real-world applications.

Page 3: IT Department - jmit.ac.in

KURUKSHETRA UNIVERSITY, KURUKSHETRA

Bachelor of Technology (Information Technology)

SCHEME OF STUDIES / EXAMINATIONS

Semester – VIII ( w.e.f Session 2019-20)

S. Course Teaching Schedule Allotment of Marks Duration

Course Title L T P Hours/ Theory Sessional Practical Total of Exam

No. No.

Week (Hrs.)

1.

IT-402N Mobile Communication 4 1 - 5 75 25 -- 100 3

2. IT-404N Advanced Database 4 1 - 5 75 25 -- 100 3

3.

System

IT-406N Information Security 4 1 -- 5 75 25 -- 100 3

4. DEC-3 Elective-3 * 4 1 -- 5 75 25 -- 100 3

5. DEC-4 Elective-4 * 4 1 -- 5 75 25 -- 100 3

6. IT-408 N Mobile Communication --- -- 3 3 --- 40 60 100 3

7.

Lab -

IT-410N Python Programming Lab --- -- 3 3 --- 40 60 100 3

8. IT-412 N Project II -- -- 3 3 --- 40 60 100 3

9. IT-414 N Comprehensive Viva ## -- -- -- -- --- 25 -- 25 --

10 IT-416 N General Fitness & -- -- -- -- --- -- 25 25 --

. Professional Aptitude **

Total 20 5 09 34 375 270 205 850

## IT-414 N (Comprehensive Viva) Marks will be based on student’s Technical knowledge , professional aptitude, GK

, current affairs, logical / analytic reasoning etc. Each student will be evaluated by a team comprising of at least 03

senior faculty members of the department.

** IT-416 N (General Fitness & Professional Aptitude ) : To be examined by an external and internal examiner at the

rank of the Director / Principal / Senior faculty member of department. Marks on the basis of student’s Technical

knowledge , professional aptitude, GK , current affairs, logical / analytic reasoning etc.

* The student should select two Departmental Elective Courses (DEC) from the following list:-

Departmental Elective Courses

Course No. DEC-3 Course No. DEC-4

IT- 418 N Cloud Computing IT- 424 N Expert system

IT- 420 N Introduction to Internet of Things IT- 426 N Big Data and Analytic

IT- 422N Image Processing IT- 428 N Object Oriented Software Engineering

Page 4: IT Department - jmit.ac.in

Unit-1

Introduction: Introduction cell mobile system, tuning efficiency, mobile radio environment, frequency reuse, co

channel interface reduction, and handoff mechanism cell cite and mobile antennas, non cochannel

interface. Frequency spectrum utility and management channel management, type of handoff and

dropped call rat, cell splitting.

Analog and digital modulation techniques, performance of various modulations, spectra efficiency, and

error rate, GMSK, GFSK, DQPSK modulation technique in wireless system comparison of various

modulation techniques. Unit-2

Point to point model propagation over terrains, Losses, Power requirements, Smart Antennas, antennas

at cite, gain and pattern relationship mobile antennas, tilting effect, parasitic elements usage, diversity

techniques. Unit-3

Unit-4 Digital technology, digital speech, digital mobile telephony, GSM, Multiples access techniques,

north TDMA, American TDMA (ISI36), Japauer cellular TDMA (DDC), CDMA, ISFS North American

CDMA standards, PCS, PHS, Advanced system, GPRS, UMTS, IMT, WAP.

Unit-4 Satellite system architecture, satellite orbit and constellations, LEO and MEO system, GPS Information,

Iridium, MSAT, VSAT, DBS, Orbcomm satellite service, use of mobile communication networks,

concepts, advanced mobile communication system

using satellite.

Text Book : 1. Rappapart T.S, “Wireless communication”, Prentice Hall, NJ.

2. GSM, CDMA & 3G System-steel Lee and Gluis, JW.

Reference Books.: 1. K.FEHER-Wireless Digital engineering

2. Mobile Satellite communication Engineering-Richards Addison Wesley.

3. Lee, WCY, “Mobile Communication Engineering”, TMIH, New Delhi.

NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be

required to attempt five questions in all, selecting at least one question from each unit.

IT-402 N Mobile Communication

Lecture Tutorial Practical Major Test Minor Test Total Time

4 1 - 75 25 100 3

Purpose To impart knowledge of mobile and wireless communication systems and techniques.

Course Outcomes

CO 1 To study the concepts of mobile communication and antennas.

CO 2 Learn the basic concepts of GSM, GPRS.

CO 3 Study of various analog & digital modulation techniques.

CO 4 To study digital mobile telephony

CO 5 To study satellite system architecture

CO 6 To study GPS

Page 5: IT Department - jmit.ac.in

Lesson Plan

Week LECTURE TOPIC

1 1. Introduction: Introduction cell mobile

system, ,

2. trunking efficiency

3.

mobile radio environment

4. frequency reuse

2 5. co channel interface

reduction

6. handoff mechanism

7. cell cite and mobile antennas

8. non cochannel interface

3 9. Frequency spectrum utility

and management

10. channel management

11. type of handoff

12. dropped call rate

4 13. cell splitting

14. Analog and digital modulation

techniques

15. performance of various

modulations

16. spectra efficiency

5 17. error rate

18. GMSK

19. GFSK

20. DQPSK modulation

technique in wireless system 6 21. comparison of various

modulation techniques.

22. propagation over terrains

23. Losses

24. Power requirements

7 25. Smart Antennas

26. antennas at cite

27. gain and pattern relationship

28. mobile antennas

8 29. tilting effect

30. parasitic elements usage

31. diversity techniques

32. Digital technology

9 33. digital speech

34. digital mobile telephony

35. GSM

Page 6: IT Department - jmit.ac.in

36. Multiples access techniques

10 37. north TDMA

38. American TDMA (ISI36)

39. Japauer cellular TDMA

(DDC)

40. CDMA 11 41. ISFS North American CDMA

standards

42. PCS

43. PHS

44. Advanced system 12 45. GPRS

46. UMTS

47. IMT

48. WAP 13 49. Satellite system architecture

50. satellite orbit

51. constellations

52. LEO and MEO system 14 53. GPS Information

54. Iridium

55. MSAT

56. VSAT 15 57. DBS

58. Orb comm satellite service

59. use of mobile communication

networks,

concepts

60. Advanced mobile

communication system

using satellite

Tutorial sheet -1

Q1. What is co –channel interference? How it can be reduced?

Q2. Explain cellular mobile telephony system.

Q3. Explain the types of handoff.

Q4. Explain the difference between cell splitting and cell sectoring.

Tutorial sheet -2

Q1. Explain Analog and digital modulation techniques

Q2. Explain gain and pattern relationship.

Q3. Explain GMSK nad GFSK modulation techniques.

Q4. Explain why smart antenna is used and its functioning

Page 7: IT Department - jmit.ac.in

Tutorial sheet -3

Q1. Explain multiple access techniques.

Q2. Explain PCS and PHS

Q3. Explain digital mobile telephony

Q4. Explain parasitic elements and diversity techniques.

Tutorial sheet -4

Q1.Describe satellite system architecture in detail.

Q2. Explain orbcomm satellite services

Q3. What is VSAT? why it is used

Q4. Describe DBS in detail.

Page 8: IT Department - jmit.ac.in
Page 9: IT Department - jmit.ac.in
Page 10: IT Department - jmit.ac.in

IT-404 N Advanced database systems

Lecture Tutorial Practical Major Test Minor Test Total Time

4 1 - 75 25 100 3

Purpose

The student will get knowledge of query optimization, parallel and distributed

database systems

Course Outcomes

CO 1

To study the fundamental theories and requirements that

influence the design of modern database systems

CO 2

To apply acquired knowledge for developing holistic

solutions based on database systems/database techniques

CO 3

To study and evaluate methods of storing, managing

and interrogating complex data

CO 4

To analyze the background processes involved in

queries and transactions, and explain how this impact

on database operation and design

CO 5 To study temporal databases and their implementation

CO 6

Study and implementation of

ORDBMS

Unit-1

Parallel & Distributed Databases : Architecture for parallel database, parallel query evolution,

parallelizing individual operations, parallel query optimization introduction to distributed databases,

distributed DBMS architectures, sorting data in a distributed database DBMS, Distributed catalog

management, Distributed query processing, updating distributed data, introduction to distributed

transactions, Distributed concurrency control, recovery.

Unit 2

Data Mining : Introduction, counting co-occurrences, mining for rules, tree structured rules, clustering,

similarity search over sequence

Unit 3

Object database systems : User defined ADT, structured types, objects and reference types,

inheritance, design for an ORDBMS, challenges in implementing an ORDBMS, OODBMS, comparison

of RDBMS with OODBMS and ORDBMS

Unit 4

Advanced topics : Advanced transactions processing, integrated access to multiply data source, mobile

data bases main memory databases, multimedia data bases, GIS, Temporal and sequenced databases.

TEXT BOOKS: 1. R. Ramakrishna & J. Gehrks “Database Management Systems” MGH, International Ed., 2000.

REFERENCE BOOKS: 1. Korth, Silberschatz, Sudershan: Data Base concepts, MGH, 2001.

2. C. J. Date, Database Systems, 7th Ed., Addison Wesley, Pearson Education, 2000.

Page 11: IT Department - jmit.ac.in

NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will

be required to attempt five questions in all, selecting at least one question from each unit.

Page 12: IT Department - jmit.ac.in

Lesson Plan

Week LECTURE TOPIC

1. 1. Parallel & Distributed

Databases

2. Architecture for parallel

database

3.

parallel query evolution

4. parallelizing individual

operations

2. 5. parallel query optimization

6. Introduction to distributed

databases

7. distributed DBMS architectures

8. sorting data in a distributed

database DBMS

3. 9. Distributed catalog management

10.

Distributed query

processing

11. updating distributed data

12. ---do---

4. 13. introduction to distributed

transactions

14. ---do---

15. Distributed concurrency control

16. ---do--- 5. 17. recovery

18. Data Mining : Introduction

19. ---do---

20. counting co-occurrences 6. 21. ---do---

22. mining for rules

23. tree structured rules

24. clustering

7. 25. similarity search over

sequences

26. Object database systems

27. ---do---

28. User defined ADT 8. 29. structured types

30. objects and reference types

31. ---do---

Page 13: IT Department - jmit.ac.in

32. inheritance 9. 33. design for an ORDBMS

34. challenges in implementing an

ORDBMS

35. ---do---

36. challenges in implementing an

ORDBMS

10. 37. OODBMS

38. comparison of RDBMS with

OODBMS and ORDBMS

39. Advanced topics 40. ---do---

11 41. Advanced transactions

processing

42. integrated access to multiply

data source

43. integrated access to multiply

data source

44. ---do--- 12 45. mobile data bases

46. ---do---

47. mobile data bases

48. ---do--- 13 49. main memory databases

50. ---do---

51. ---do---

52. GIS 14 53. ---do---

54. multimedia data bases

55. ---do---

56. Temporal databases 15 57. ---do---

58. ---do---

59. sequenced databases

60. ---do---

Tutorial sheets

Tutorial-1

1) Explain the architecture of parallel database.

2) Discuss parallel query optimization with the help of an example.

3) What are the methods for updating distributed data?

4) Explain distributed concurrency control in detail.

Tutorial-2

Page 14: IT Department - jmit.ac.in

1) What is data mining? Discuss the knowledge discovery process.

2) Explain counting co-occurrences with the help of an example.

3) Discuss about the tree structured rules used in data mining.

4) What is clustering?

Tutorial -3

1) What are different user defined ADTs.

2) Explain the design of an ORDBMS.

3) What are the various challenges in implementing ORDBMS.

4) Compare RDBMS with OODBMS and ORDBMS.

Tutorial -4

1) How data is stored in multimedia database.

2) List the advance databases used. Explain any one of them.

3) Explain the working of GIS.

4) Write a short note on Temporal database.

Page 15: IT Department - jmit.ac.in
Page 16: IT Department - jmit.ac.in
Page 17: IT Department - jmit.ac.in
Page 18: IT Department - jmit.ac.in

IT – 406 N Information Security

Lecture Tutorial Practical Major Test Minor Test Total Time

4 1 - 75 25 100 3

Purpose

. The course will be useful for students who plan to do research/product

development/analysis in areas related to secure computing in their career

Course Outcomes

CO 1 To learn basics of network security and cryptography.

CO 2

To study network authentication mechanism, with

security algorithms.

CO 3 To explore the knowledge of key exchange protocols.

CO 4 To realize the effect on digitized security.

CO 5 To analyze various security algorithms

CO 6 To study various web security issues

Unit-1 Attacks on Computers and Computer Security: Introduction, The need for security, Security approaches,

Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network

Security. Cryptography: Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques,

transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, stenography,

key range and key size, possible types of attacks.

Unit-2 Symmetric key Ciphers: Block Cipher principles, Differential and Linear Cryptanalysis, Block cipher modes of

operation, Stream ciphers, RC4, Location and placement of encryption function, Key distribution.

Asymmetric key Ciphers: Principles of public key crypto systems, Algorithms (RSA, Diffie-Hellman, and

ECC), Key Distribution.

Unit-3 Message Authentication Algorithms and Hash Functions: Authentication requirements, Functions, Message

authentication codes, Hash Functions, Secure hash algorithm, HMAC, CMAC, Digital signatures, knapsack

algorithm Authentication Applications: Kerberos, X.509 Authentication Service, Public – Key Infrastructure, Biometric

Authentication.

Unit-4

E-Mail Security: Pretty Good Privacy, S/MIME. Web Security: Web security considerations, Secure Socket Layer and Transport Layer Security, Secure

electronic transaction

Intruders, virus and Firewalls: Intruders, Intrusion detection, password management, virus and related

threats, Firewall design principles, types of firewalls.

TEXT BOOKS 1. William Stallings , “Cryptography and Network Security” :, Pearson Education,4″‘ Edition 2. Atul Kahate , “Cryptography and Network Security”, Mc Graw Hill Edition

REFERENCE BOOKS 1. Cryptography and Network Security : Forouzan Mukhopadhyay, MC Graw Hill, 2″” Edition 2. Mark Stamp , “Information Security, Principles and Practice” Wiley India. 3. WM.Arthur Conklin, Greg White , “Principles of Computer Security”, TMH

Page 19: IT Department - jmit.ac.in

NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be

required to attempt five questions in all, selecting at least one question from each unit

Lesson Plan

Week LECTURE TOPIC

1. 1. Attacks on Computers and

Computer Security

2. Introduction, The need for

security

3. Security approaches

4. Principles of security

2. 5. Types of Security attacks

6. Security services, Security

Mechanisms

7. A model for Network Security.

8. Cryptography: Concepts and

Techniques

3. 9. Introduction, plain text and

cipher text

10. substitution techniques

11. transposition techniques

12. encryption and decryption

4. 13. symmetric and asymmetric key

cryptography

14. stenography

15. key range and key size

16. possible types of attacks

5. 17. Symmetric key Ciphers

18. Block Cipher principles

19. Differential and Linear

Cryptanalysis

20. Block cipher modes of operation

6. 21. Stream ciphers

22. RC4

23. Location and placement of

encryption function

24. Key distribution

7. 25. Asymmetric key Ciphers

26. Principles of public key crypto

systems

27. Algorithms (RSA)

28. Diffie-Hellman ( ECC)

8. 29. Key Distribution

30. Message Authentication

Algorithms

31. Hash Functions

32. Authentication requirements

9. 33. Functions

34. Message authentication codes

Page 20: IT Department - jmit.ac.in

35. Hash Functions

36. Secure hash algorithm

10 37. HMAC

38. CMAC

39. Digital signatures

40. knapsack algorithm

11 41. Authentication Applications

42. Kerberos

43. X.509 Authentication Service

44. Public – Key Infrastructure

12. 45. Biometric Authentication

46. E-Mail Security

47. Pretty Good Privacy

48. S/MIME

13. 49. Web Security

50. Web security considerations

51. Secure Socket Layer

52. Transport Layer Security

14. 53. Secure electronic transaction

54. Intruders, virus and

Firewalls

55. Intruders

56. Intrusion detection

15. 57. password management

58. virus and related threats

59. Firewall design principles

60. types of firewalls

Tutorial sheets

Tutorial-1

1) Explain the types of attack on computers.

2) What is computer security? Explain its need.

3) Explain the types of security attacks.

4) Explain the model of network security.

Tutorial-2

1) Explain various substitution and transposition techniques

2) Explain the difference between symmetric and asymmetric key cryptography.

3) Explain the operation of block ciphers and stream ciphers

4) Explain RSA algorithm

Page 21: IT Department - jmit.ac.in

Tutorial-3

1) What is hash function? Explain secure hash algorithm.

2) Explain digital signatures.

3) Explain Knapsack algorithm.

4) Explain Biometric authentication.

Tutorial-4

1) Explain PGP.

2) Explain SSL.

3) Explain the types of firewalls.

4) Explain virus and related threats.

Page 22: IT Department - jmit.ac.in
Page 23: IT Department - jmit.ac.in
Page 24: IT Department - jmit.ac.in

IT-418N Cloud Computing

Lecture Tutorial Practical Major Test Minor Test Total Time

4 1 - 75 25 100 3

Purpose To familiar the concepts of cloud services and storage to deploy various resources

and arbitrary software.

Course Outcomes

CO 1 Facilitate the basic usage and applicability of computing paradigm.

CO 2 Explore various cloud service and deployment models to utilize different cloud services.

CO 3 To get enabled for various data, scalability & cloud services in order to get efficient database for cloud storage.

CO 4

To deal with various security threats and their controlling mechanism for accessing safe cloud services

CO 5 To study various service management methods in cloud computing

CO 6

To study various cloud security issues

Unit-1

Overview of Computing Paradigm: Recent trends in Computing, Grid Computing, Cluster Computing,

Distributed Computing, Utility Computing, Cloud Computing, evolution of cloud computing, Business driver for

adopting cloud computing. Cloud Computing (NIST Model), History of Cloud Computing, Cloud service providers, Properties,

Characteristics & Disadvantages, Pros and Cons of Cloud Computing, Benefits of Cloud Computing, Cloud

computing vs. Cluster computing vs. Grid computing, Role of Open Standards.

Unit-2

Cloud Computing Architecture : Cloud computing stack, Comparison with traditional computing architecture

(client/server), Services provided at various levels,How Cloud Computing Works, Role of Networks in Cloud

computing, protocols used, Role of Web services, Service Models (XaaS) -Infrastructure as a Service (IaaS),

Platform as a Service (PaaS), Software as a Service (SaaS), Deployment Models-Public cloud, Private cloud,

Hybrid cloud, Community cloud.

Unit-3

Service Management in Cloud Computing: Service Level Agreements (SLAs), Billing & Accounting, comparing Scaling Hardware: Traditional vs. Cloud, Economics of scaling: Benefitting enormously, Managing

Data-Looking at Data, Scalability & Cloud Services, Database & Data Stores in Cloud, Large Scale Data

Processing. Case study: Eucalyptus, Microsoft Azure, Amazon EC2.

Unit-4

Cloud Security: Infrastructure Security, Network level security, Host level security, Application level security,

Data security and Storage, Data privacy and security Issues, Jurisdictional issues raised by Data location, Identity

& Access Management, Access Control, Trust, Reputation, Risk, Authentication in cloud computing, Client

access in cloud, Cloud contracting Model, Commercial and business considerations.

Text Books 1.Barrie Sosinsky, Cloud Computing Bible, Wiley - India,2010. 2. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Cloud Computing: Principles and

Paradigms, Wiley, 2011.

Reference Books 1. Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications,

Springer, 2012.

2. Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley- India, 2010.

NOTE:

Page 25: IT Department - jmit.ac.in

Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be

required to attempt five questions in all, selecting at least one question from each unit.

Lesson Plan

Week LECTURE TOPIC

1

1. Overview of Computing

Paradigm

2. Recent trends in Computing

3. Grid Computing

4. Cluster Computing

2

5.

Distributed Computing,

6. Utility Computing,

7. Cloud Computing,

8. evolution of cloud computing

3

9. Business driver for adopting

cloud computing.

10. Cloud Computing (NIST Model),

11. Cloud Computing (NIST Model),

12. History of Cloud Computing,

4

13. Cloud service providers

14. Properties of cloud computing

15. Characteristics of cloud

computing

16. Disadvantages of cloud

computing

5

17. Pros and Cons of Cloud

Computing

18. Benefits of Cloud Computing

19. Cloud computing vs. Cluster

computing

20. Cluster computing vs. Grid

computing

6

21. Role of Open Standards.

22. Cloud Computing Architecture

23. Cloud computing stack

24. Comparison with traditional

computing architecture

(client/server)

7

25. Services provided at various

levels

26. How Cloud Computing Works

27. Role of Networks in Cloud

computing, protocols used

Page 26: IT Department - jmit.ac.in

28. Role of Networks in Cloud

computing, protocols used

8

29. Role of Web services

30. Service Models (XaaS)

31. Infrastructure as a Service

(IaaS),

32. Platform as a Service (PaaS)

9

33. Software as a Service (SaaS)

34. Private cloud

35. Hybrid cloud

36. Community cloud

10

37. Service Management in Cloud

Computing,

38. Service Level Agreements

(SLAs)

39. Billing & Accounting,

40. comparing Scaling Hardware:

Traditional vs. Cloud

11

41. Economics of scaling:

Benefitting enormously

42. Managing Data-Looking at Data

43. Scalability & Cloud Services

44. Database & Data Stores in Cloud

12

45. Large Scale Data Processing

46. Case study: Eucalyptus

47. Case study: Microsoft Azure

48. Case study: Amazon EC2

13

49. Cloud Security: Infrastructure

Security

50. Network level security,

51. Host level security

52. Application level security, Data

security and Storage

14

53. Data privacy and security Issues

54. Jurisdictional issues raised by

Data location

55. Identity and

Access management.

56. Access Control, Trust,

Reputation, Risk

15

57. Authentication in cloud

computing.

58. Client access in cloud

59. Cloud contracting Mode

60. Commercial and business

considerations

Page 27: IT Department - jmit.ac.in

Tutorial sheet -1

1) Differentiate grid computing and cluster computing.

2) What is cloud computing? Discuss its evolution.

3) Explain the NIST model of cloud computing.

4) Discuss the role of open standards.

Tutorial sheet -2

1) Compare cloud computing architecture with traditional computing architecture.

2) Discuss the role of networks in cloud computing.

3) List the different service models. Explain any two in detail.

4) Explain the various deployment models of cloud computing.

Tutorial sheet -3

1) Explain service level arguments (SLA) in detail.

2) Compare the scaling hardware for cloud computing with traditional computing.

3) How data is managed in data stores in a cloud?

4) Discuss the case study of Microsoft Azure.

Tutorial sheet - 4

1) Discuss the various security levels in cloud security.

2) What are the different commercial and business considerations for cloud security.

3) How is access control managed in cloud computing?

4) Explain cloud contracting model in detail.

Page 28: IT Department - jmit.ac.in
Page 29: IT Department - jmit.ac.in
Page 30: IT Department - jmit.ac.in
Page 31: IT Department - jmit.ac.in

IT-424 N Expert System

Lecture Tutorial Practical Major Test Minor Test Total Time

4 1 - 75 25 100 3

Purpose To familiarize the student about the methodologies used to transfer the knowledge of a

human expert into an intelligent program to solve real-time problems

Course Outcomes

CO 1 Examining the fundamentals and terminologies of expert system.

CO 2 To introduce students to expert system tools.

CO 3 Development of Expert systems

CO 4

Analyzing the pitfalls in building Expert systems

CO 5 Signifying AI techniques to solve social, industrial and environmental problems.

CO 6 Application of professional aspects in multi-disciplinary approach to meet global Standards

towards design, realizing and manufacturing.

Unit-1

Introduction to AI programming languages, Blind search strategies, Breadth first – Depth first – Heuristic search techniques Hill Climbing – Best first – A Algorithms AO* algorithm – game tress,

Min-max algorithms, game playing – Alpha beta pruning.

Knowledge representation issues predicate logic – logic programming Semantic nets- frames and

inheritance, constraint propagation; Representing Knowledge using rules, Rules based deduction

systems. Unit-2

Introduction to Expert Systems , Architecture of expert system, Representation and organization of

knowledge, Basics characteristics, and types of problems handled by expert systems.

Expert System Tools: Techniques of knowledge representations in expert systems, knowledge

engineering, System-building aids, support facilities, stages in the development of expert systems.

Unit-3

Building an Expert System: - Expert system development, Selection of tool, Acquiring Knowledge,

Building process.

Unit-4

Problems with Expert Systems: Difficulties, common pitfalls in planning, dealing with domain expert,

difficulties during development.

TEXT BOOKS 1. Elain Rich and Kevin Knight, “Artificial Intelligence”, Tata McGraw-Hill, New Delhi, 2008. 2. Waterman D.A., “A Guide to Expert Systems”, Addison Wesley Longman, 1985.

REFERENCE BOOKS 1. Staurt Russel , Peter Norvig, “Artificial Intelligence – A Modern Approach”, Prentice Hall, 1995. 2. Patrick Henry Winston, “Artificial Intelligence”, Addison Wesley, 1979. 3. Patterson, Artificial Intelligence & Expert System, Prentice Hall India, 1999. 4. Hayes-Roth, Lenat and Waterman: Building Expert Systems, Addison Wesley, 1983.

NOTE: Eight questions are to be set in all by the examiner taking two questions from each unit. Students will be

required to attempt five questions in all, selecting at least one question from each unit.

Page 32: IT Department - jmit.ac.in

Lesson Plan

Week LECTURE TOPIC

1 1. Introduction to Artificial intelligence, their scope and applications.

2. Introduction to search techniques.

3. Blind search strategies, Breadth first – Depth first strategies

4. Heuristic search techniques Hill Climbing Techniqe

2 5. Best first and A Algorithms

6. Introduction and implementation of AO* algorithm

7. Illustration of Game tress

8. Min-max algorithms

3 9. Game playing – Alpha beta pruning

10. Knowledge representation issues

11. Predicate logic – logic programming

12. Different methods of logic programming

4 13. Semantic nets with examples

14. frames and inheritance

15. Difference of semantic nets and frames.

16. Constraint propagation in predicate logic

5 17. Representing Knowledge using rules

18. Rules based deduction systems.

19. Comparative analysis of search techniques.

20. Differentiation of various logic programming methods. 6 21. Introduction to Expert Systems

22. Study of various Expert Systems

23. Knowledge Representation

24. Representation and organization of knowledge

7 25. Architecture of expert system

26. Architecture of expert system(Contd.)

27. Basics characteristics and Types of problems handled by expert systems

28. Study of Expert System Tools.

8 29. Techniques of knowledge representations in expert systems

30. knowledge Engineering

31. System-building aids and support facilities

32. Stages in the development of expert systems. 9 33. Stages in the development of expert systems(contd.)

34. Discussion of Expert System Tools

35. Building an Expert System

36. Expert system development 10 37. Expert system development(Contd.)

38. Expert system development(Contd.)

39. Selection of tool for Expert system development

40. Selection of tool for Expert system development(Contd.) 11 41. Selection of tool for Expert system development(Contd.) 42. Acquiring Knowledge

43. Acquiring Knowledge(Contd.)

44. Acquiring Knowledge(Contd.)

Page 33: IT Department - jmit.ac.in

12 45. Building process

46. Building process(Contd.)

47. Building process(Contd.)

48. Assignment of Expert system development 13 49. Problems with expert systems.

50. Problems with expert systems(Contd.)

51. Common pitfalls in planning.

52. Common pitfalls in planning(Contd.). 14 53. Techniques for dealing with domain expert.

54. Techniques for dealing with domain expert(Contd.).

55. Techniques for dealing with domain expert(Contd.).

56. Difficulties during development 15 57. Difficulties during development(Contd.)

58. Difficulties during development(Contd.)

59. Comarison of various techniques of dealing with domain expert

60. Class test of Problems with expert systems

Tutorial Sheet 1

Q1. What do you understand by Artificial Intelligence?

Q2. What do you understand by predicates ?write the name of any five predicates.

Q3. Explain Semantic nets and frames.

Q4.Write a short note on the following algorithms:

I) AO* Algorithm

II) Max-min Algorithm

Tutorial Sheet 2

Q1. What is knowledge organization?

Q2. Explain Architecture of expert system.

Q3. Explain various stages in the development of expert systems.

Q4. Explain Techniques of knowledge representations in expert systems

Tutorial Sheet 3

Q1. Explain expert system development.

Q2. Write a short note on selection of expert system tools.

Q3. Write a short note on acquiring knowledge.

Q4. Write a short note on building process.

Tutorial Sheet 4

Q1. Explain various difficulties with expert systems.

Q2. Write methodology to deal with domain expert.

Q3. Write a short note on common pitfalls in planning.

Q4. What are various difficulties during development.

Page 34: IT Department - jmit.ac.in
Page 35: IT Department - jmit.ac.in
Page 36: IT Department - jmit.ac.in

IT-408 N Mobile Communication Lab

Lecture Tutorial Practical Major Test Minor Test Total Time

- - 3 60 40 100 3

Purpose To understand and demonstrate the mobile communication techniques and satellite system.

Course Outcomes

CO 1 To study of home networking

CO 2 To study RF environment and GSM networks.

CO 3 To establish the link of establish link between GPS satellite and GPS trainer

CO 4 To analyze the function of CDMA trainer

CO 5 To observe the modulation techniques

CO 6 To establish PC to PC communication using satellite communication link

LIST OF PRACTICALS:

1. Observe the Modulation and demodulation using internal generation of 2047 bit PN sequence as

modulator input and Bit error rate measurement with PRBS-11data (2047 bits).

2. Study of home networking using combination of CDMA, BLUETOOTH, infrared Ethernet &

various sensors like fire, gas air conditioning. Use at least five sensors

3. Understanding RF environment & study of GSM network by actually connecting to the GSM

environment by any services provide SIM like airtel, idea, RPG etc.

4. Real time study of various GSM commands like Network registration, call control, call setting,

call information, phone book commands & commands related to network information about

number of cells and their strength etc.

5. To understanding the concept of GPS and establishing link between GPS Satellite & GPS

Trainer.

6. To establish audio & video combined link & data communication between transmitters, receiver

satellite transponder simulated in a lab.

7. To study and observe the difference in uplink & downlink frequency.

8. To establish PC-to-PC communication using satellite communication link.

9. To calculate antenna gain and antenna beam width.

10. Study and observe the Wave Modulation and Demodulation

11. To plot the radiation pattern of micro strip antennas.

12. Study and observe the antenna matching and antenna radiation with distance.

Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the

above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.

Page 37: IT Department - jmit.ac.in

IT – 410 N Python Programming Lab

Lecture Tutorial Practical Major Test Minor Test Total Time

- - 3 60 40 100 3

Purpose The course is designed to provide Basic knowledge of Python

Course Outcomes

CO 1

To study fundamentals of python

programming and implement basic

programs.

CO 2

To implement the searching technique

using python.

CO 3

To implement sorting techniques

using python.

CO 4

To implement matrix multiplication

using python.

CO 5 To compute the GCD of two numbers

CO 6 To implement merge sort

LIST OF PRACTICALS:

1. WAP to compute the GCD of two numbers.

2. WAP to find the square root of a number

3. WAP to find the Exponentiation (power of a number)

4. WAP to find the maximum of a list of numbers

5. WAP for Linear search and Binary search

6. WAP for Selection sort, Insertion sort

7. WAP for Merge sort

8. WAP to find first n prime numbers

9. WAP to multiply matrices

10. WAP that take command line arguments (word count)

11. WAP to find the most frequent words in a text read from a file

12. WAP to Simulate elliptical orbits in Pygame

13. WAP to Simulate bouncing ball using Pygame

Note: A student has to perform at least 10 experiments. At least seven experiments should be performed from the

above list. Three experiments may be designed & set by the concerned institution as per the scope of the syllabus.


Recommended