Loading...
Showing posts with label CS 7th Semester Syllabus. Show all posts
Showing posts with label CS 7th Semester Syllabus. Show all posts
Computer Science(CS) 7th sem syllabus RGTU/RGPV  CS 7th sem syllabus

Computer Science(CS) 7th sem syllabus RGTU/RGPV CS 7th sem syllabus

siteowner 1:39 PM Add Comment
 Rajiv Gandhi Technological University, Bhopal (MP)
B.E. (CS)
Computer Science and Engineering Syllabus
RGPV RGTU SEVENTH- VII SEMESTER Syllabus


RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-7101 Network Management SYLLABUS

RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-7103 Embedded Computer Systems syllabus


RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-703 DISTRIBUTED SYSTEM SYLLABUS
 
RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS 7201 Network & Web Security SYLLABUS
 
RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-7202 Randomized Algorithms Syllabus


RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-7203 Data Mining & Knowledge Discovery


RGTU/RGPV Computer Science and Engineering CS 7th Semester Syllabus
CS-704 Industrial Training SYLLABUS









TAGS:CS 7th sem syllabus RGTU/RGPV Computer Science CS 7th sem syllabus
DISTRIBUTED SYSTEM SYLLABUS RGTU/RGPV CS-702 SYLLABUS

DISTRIBUTED SYSTEM SYLLABUS RGTU/RGPV CS-702 SYLLABUS

siteowner 7:02 AM Add Comment
CS-703 DISTRIBUTED SYSTEM SYLLABUS
RGTU/RGPV DISTRIBUTED SYSTEM SYLLABUS
Computer Science and Engineering 7th Semester Syllabus,

Unit-I Introduction to distributed systems Architecture for Distributed System, Goals of Distributed system, Hardware and Software concepts, Distributed Computing Model, Advantages & Disadvantage distributed system, Issues in designing Distributed System,

Unit-II Distributed Share Memory And Distributed File System Basic Concept of Distributed Share Memory (DSM), DSM Architecture & its Types, Design & Implementations issues In DSM System, Structure of Share Memory Space, Consistency Model, and Thrashing. Desirable features of good Distributed File System, File Model, File Service Architecture, File Accessing Model, File Sharing Semantics, File Catching Scheme, File Application & Fault tolerance. Naming: - Features, System Oriented Names, Object Locating Mechanism, Human Oriented Name.

Unit-III Inter Process Communication And Synchronization API for Internet Protocol, Data Representation & Marshaling, Group Communication, Client Server Communication, RPC- Implementing RPC Mechanism, Stub Generation, RPC Messages. Synchronization: - Clock Synchronization, Mutual Exclusion, Election Algorithms:- Bully & Ring Algorithms.

Unit-IV Distributed Scheduling And Deadlock Distributed Scheduling-Issues in Load Distributing, Components for Load Distributing Algorithms, Different Types of Load Distributing Algorithms, Task Migration and its issues. Deadlock-Issues in deadlock detection & Resolutions, Deadlock Handling Strategy, Distributed Deadlock Algorithms,

Unit-V Distributed Multimedia & Database system Distributed Data Base Management System(DDBMS), Types of Distributed Database, Distributed Multimedia:- Characteristics of multimedia Data, Quality of Service Managements. 

Case Study of Distributed System:- Amoeba, Mach, Chorus

DISTRIBUTED SYSTEM References/ Suggested Reading / Books:
  • Sinha, Distributed Operating System Concept & Design, PHI
  • Coulouris & Dollimore, Distributed System Concepts and Design, Pearson Pub
  • Singhal & Shivratari, Advance Concept in Operating System, McGraw Hill
  • Attiya & Welch, Distributed Computing, Wiley Pub.
Network Management SYLLABUS RGTU/RGPV CS-7101 Syllabus

Network Management SYLLABUS RGTU/RGPV CS-7101 Syllabus

siteowner 6:48 AM Add Comment
 RGTU/RGPV CS-7101 Network Management SYLLABUS
 Computer Science and Engineering 7th Semester Syllabus,

CS-7101 Network Management Course contents

Unit-I Introduction to Network Managements, Network Management Framework, Network Based Managements, Evolution of Network Management: SGMP, CMIP, SNMP. Network Implementation and Management Strategies, Network Management Categories: Performance Management, Fault Management, Configuration Management, Security Managements, Accounting Managements. Network Management Configuration: Centralized Configuration, Distributed Configuration. Selected Management Strategy.

Unit –II Man agement Information Base (MIB), Structure of Management Information, NMS Presentation of  the SMI, NMS Meter-ware Network View. Remote Monitoring (RMON), RMON Group. 
Desktop Management: Desktop Management Interface(DMI), DMI Architecture, DMI Browser, DMI/SNMP Mapping, Desktop SNMP Extension Agents. Setting up LAN Access, SNMP Configuration. 

Unit-III Introduction, layering, OSI Layering, TCP/IP Layering, Protocols & Standards, Internet standards, Internet administration, Internet Addresses, Internet protocol: introduction, IP header, IP routing,
Subnet addressing, subnet mask, special case of IP addresses, Comparative Study of IPV4 & IPV6, port numbers Address Resolution Protocol, ARP packet format, Proxy ARP, ARP command, ARP Example, Reverse Address Resolution Protocol (RARP): Introduction, RARP Packet format, RARP Examples, RARP server design 

Unit-IV Delivery and Routing of IP Packets, Routing Methods, Static versus Dynamic Routing, Routing table and Routing Module, Classless Addressing: CIDR. Internet Protocol (IP), Datagram, Fragmentation, Options, IP Package. Interior and Exterior Routing, Routing information protocol (RIP), Open shortest path first protocol (OSPF), BGP, GGP. Private Networks. Virtual Private Network (VPN), Network Address Translation (NAT). 

Unit –V Internet Control Message Protocols (ICMP):- Types of message, message format, error reporting, query, checksum, ICMP Package. IGMP, IGMP Message and its Operation, IGMP Package.
Transmission control protocol, Process-to-Process Communication, TCP Services Flow Control, TCP Timers. TCP Operation, TCP Package.. 
Application layers protocols Telnet Protocol, File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), X-Window system protocol, Remote procedure call, and Network file system.

References / Suggested Reading / Books for CS-7101 Network Management :

Forouzan, TCP/IP Protocol Suite 4th edition, TMH
J.Richard Burkey, Network Management Concept and Practice, PHI
Stevens, TCP/IP Illustrated Volume-I, Pearson
Tittel: TCP/IP, Cenage Learning
Uyless Black, TCP/IP and related protocols, McGraw Hill.
Doughals E. Comer, Internetworking with TCP/IP Vol. I, Principles, Protocols, and Architecture, Prentice Hall, India.
Embedded Computer Systems SYLLABUS RGTU/RGPV CS-7103

Embedded Computer Systems SYLLABUS RGTU/RGPV CS-7103

siteowner 6:37 AM Add Comment
Tags: Network & Web Security , RGPV, BE, CS syllabus, Network & Web Security syllabus, RGPV CS Network & Web Security syllabus, B.E. Computer Science and Engineering, Network & Web Security  CS VII Semester Network &

Embedded Computer Systems SYLLABUS Course code: CS-7203

Computer Science "CSE" 7th semester Embedded Computer Systems syllabus


Embedded Computer Systems Course Content:
Unit – I Introduction to Embedded systems Embedded Systems Vs General Computing Systems, Classification of Embedded Systems, Major application areas of Embedded Systems, Purpose of Embedded systems ,Core of the Embedded system, Memory, Sensors and Actuators, Communication Interface, Embedded firmware, PCB and Passive Components, Characteristics and Quality attributes of a Embedded System . 

Unit – II Design of Embedded Systems with 8bit Microcontrollers-8051 Factors for considering in selecting a Controller ,Designing with 8051 microcontroller ,Different addressing modes supported by 8051 , Instruction set for 8051 microcontroller .Fundamental issues in Hardware Software Co-Design , Computational models in Embedded Design .

Unit – III Embedded Hardware & Firmware Design and Development Analog &Digital Electronic components, VLSI & Integrated circuit design, Electronic Design Automation tools , PCB layout Design and its fabrication .Embedded firmware design approaches , Embedded firmware Development Languages ,Programming in Embedded C . Integration and testing of Embedded Hardware and Firmware , Safe & robust Design, Reliability, Faults, errors & Failure, Functional Design, Architecture Design, Prototyping.

Unit -IV Embedded System Development Environment Integrated Development Environment (IDE) , Types of files Generated on Cross- Compilation , Disassembler/Decompiler, Simulators, Emulators and Debugging, Boundary Scan

Unit – V Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry What is EDLC ,Objectives of EDLC , Different phases of EDLC , EDLC Approaches-Linear or waterfall model , Iterative Model , Prototyping/Evolutionary Model, Spiral Model . Processor trends in Industry , Embedded OS Trends , Development Language trends ,Open Standards, Frameworks and Alliances , Bottlenecks.

References / Suggested Reading / Books for CS-7202 Randomized Algorithms :

1. Shibu, Introduction to Embedded System:, TMH
2. Barrett ,Embedded Systems :Design and Applications ,Pearson Education
3. Rajkamal, Embeded System, TMH
4. Vahid ,Givargis ,Embedded System Design ,Wiley
5. Balbno, Embedded Micro Computer System Cengage Learning
6. Siewert, Real Time Embeded System & Components, Cengage Learning
Network & Web Security SYLLABUS RGTU/RGPV CS-7201 Syllabus

Network & Web Security SYLLABUS RGTU/RGPV CS-7201 Syllabus

siteowner 6:21 AM Add Comment
Tags: Network & Web Security , RGPV, BE, CS syllabus, Network & Web Security syllabus, RGPV CS Network & Web Security syllabus, B.E. Computer Science and Engineering, Network & Web Security  CS VII Semester Network & Web Security  syllabus, CS 7th Semester syllabus,


Rajiv Gandhi Technological University, Bhopal (MP)
B.E. (CS) Computer Science and Engineering Seventh 7th SEMESTER
CS 7201 Network & Web Security
Revised Syllabus and Scheme of Examination Effective from July 2007

UNIT I Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments,  Vulnerability Assessment, Types of Penetration Testing. Risk Management
UNIT II Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie-Hellman key exchange, elliptic curve cryptography. 
UNIT III Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes ,Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK) Digital Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates. 
UNIT IV Trojans and Backdoors: Overt and Covert Channels, Working, Types (Remote Access Trojans, Data-Sending Trojans, Destructive Trojans, Trojans, Proxy Trojans, FTP Trojans, Security Software Disablers). Viruses and Worms: Characteristics, Working, Infection Phase, Attack Phase. Sniffers: Definition,
spoofing, Sniffing, Vulnerable Protocols, Types. Phishing: Methods, Process, Attacks Types (Man-in-the-Middle Attacks, URL Obfuscation Attacks, , Hidden Attacks, Client-side Vulnerabilities, Deceptive Phishing, Malware-Based Phishing, DNSBased Phishing, Content-Injection Phishing, Search Engine Phishing). Web Application Security- Secured authentication mechanism, secured session management, Cross-site Scripting, SQL Injection and other vulnerabilitiesDenial-of Service Attacks: Types of Attacks  (Smurf Attack, Buffer Overflow Attack, Ping of Death Attack, Teardrop Attack, SYN Attack, SYN  Flooding), DDoS Attack(Distributed DoS Attack.), Session Hijacking, Spoofing v Hijacking, TCP/IP hijacking, CAPTCHA Protection
UNIT V IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.

Network & Web Security List of Experiments:

Network & Web Security Suggested Reading:

CS-7201 Network & Web Security List of Experiments/ Suggested Books Readings

CS-7201 Network & Web Security List of Experiments/ Suggested Books Readings

siteowner 6:17 AM Add Comment
List of Experiments, Suggested Books, CS-7201 Network & Web Security List of Experiments/ Suggested Books Readings

CS-7201 Network & Web Security List of Experiments/ Suggested Books Readings
B.E. (CS) Computer Science and Engineering Seventh 7th SEMESTER
Revised Syllabus and Scheme of Examination Effective from July 2007

CS-7201 Network & Web Security  List of Experiments:

1. Footprinting using footprinting tools(Open Source & Free)(ex-nslookup, ARIN, Whois, Google Earth etc..)
2. Scanning for vulnerabilities using (Angry IP, HPing2, IPScanner, Global Network Inventory Scanner, Net Tools Suite Pack.)
3. NetBIOS Enumeration Using NetView Tool, Nbtstat Enumeration Tool (Open Source).
4. Steganography using tools: Tool: Merge Streams, Image Hide, Stealth Files, Blindside, STools, Steghide, Steganos, Pretty Good Envelop, Stegdetect,.
5. Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.
6. How to Detect Trojans by using – Netstat, fPort, TCPView, CurrPorts Tool, Process Viewer.
7. Lan Scanner using look@LAN, wireshark.
8. Understanding DoS Attack Tools- Jolt2 , Bubonic.c, Land and LaTierra, Targa, Nemesy Blast, Panther2, Crazy Pinger, SomeTrouble, UDP Flood, FSMax.

Network & Web Security SYLLABUS RGTU/RGPV CS-7201 Syllabus

CS-7201 Network & Web Security  Suggested Reading:

1. William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson
2. Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “ Network Security - Private communication in a public world” TMH
3. Fourozon, “Cryptography & Network Security” TMH
4. Joseph Migga Kizza, Computer Network Security, , Springer International Edition
5. Atul Kahate,”Cryptography and Network Security” Mc Graw Hill
6. Carl Endorf, Eugene Schultz, Jim Mellander “INTRUSION DETECTION & PREVENSION” TMH
7. Neal, Krawetz, Introduction to Network Security,Cengage Learning

Network & Web Security SYLLABUS RGTU/RGPV CS-7201 Syllabus