CDAC M.TECH WIRELESS AND NETWORK SECURITY SEMESTER I

quarterceladonΚινητά – Ασύρματες Τεχνολογίες

10 Δεκ 2013 (πριν από 3 χρόνια και 11 μήνες)

225 εμφανίσεις


1


CDAC

M.TECH


WIRELESS AND NETWORK SECURITY


SEMESTER I

SL.

No

Subject
Code



Subject

L

T

P

C

Theory

1

P1WNIC01

Wireless Networks and Mobile
Computing

3

1

0

4

2

P1WNIC02

Network Defence and Counter Measures

3

1

0

4

3

P1WNIC03

Advanced Operating Syste
ms

3

1

0

4

4

P1CSIC15

Formal Languages And Automata
Theory

3

1

0

4

5

*****

Elective
-
I

3

0

0

3

Practical

6

P1WNIC04

Network Defence and Counter Measures
Laboratory

0

0

3

2

7

P1WNIC05

Advanced OS Laboratory

0

0

3

2

Total Credits

23


SEMESTER II

SL.

N
o

Subject
Code

Subject

L

T

P

C

Theory

1

P2WNIC06

Advanced Object Oriented Programming

3

1

0

4

2

P2WNIC07

Mobile Database

3

1

0

4

3

P2ITIC16

Programming using Android

3

1

0

4

4

*****

Elective
-
II

3

0

0

3

5

*****

Elective
-
III

3

0

0

3

Practical

6

P2WNI
C08

Advanced Object Oriented Programming

Laboratory

0

0

3

2

7

P2WNIC09

Android Programming Lab

0

0

3

2

Total Credits

22


SEMESTER III













SL.No

Subject
Code

Subject

L

T

P

C

Theory


1

*****

Elective
-
IV


3

0

0

3

2

*****

Elective
-
V

3

0

0

3

3

P3WNIC10

Coll
oquium

0

0

0

2


Practical

4

P3WNIC11

Project

Phase
-
I

0

0

12

6

Total Credits

14


2


SEMESTER IV





Total Credits: 71



ELECTIVE SUBJEC
TS


Semester I Electives

SL.

No

Subject
Code

Subject

L

T

P

C

1

PEWNIC13

Security in wireless and Mobile Systems

3

0

0

3

2

PEWNIC14

Mobile Ad
-
hoc Networks

3

0

0

3



Semester II Electives

SL.

No

Subject
Code

Subject

L

T

P

C

1

PEWNIC15

Wirele
ss Sensor Networks

3

0

0

3

2

PEWNIC16

Security in Sensor Networks

3

0

0

3

3

PEWNIC17

Distributed Computing

3

0

0

3

4

PEWNIC18

Data cent
er

Management

3

0

0

3




Semester III Electives

SL.

No

Subject
Code

Subject

L

T

P

C

1

PEWNIC19

Programming usi
ng iPhone

3

0

0

3

2

PEITIC15

Cloud Computing

3

0

0

3

3

PEWNIC20

PKI

3

0

0

3

4

PEWNIC21

Ethical Hacking and Cyber Laws

3

0

0

3



L


Lecture; T


Tutorial; P


Practical; C


Credit


















SL.

No

Subject
Code

Subject

L

T

P

C

Practical

1

P4WNIC12

Project

Phase
-
II

0

0

24

12

Total Credits

12


3



SEMESTER I


P1WNIC01
WIRELESS NETWORK AND MOBILE C
OMPUTING


L T P C






3 1 0 4


AIM


To learn about the basics of wireless network and the various mobile networks technologies.

OBJECTIVE

To understand wireless network operation and to understand and analyze the various network
technologies such a
s GSM, TDMA and CDMA, etc.



UNIT I
-

Wireless Medium








9

Air Interface Design


Radio propagation mechanism


Pathless modeling and Signal Coverage


Effect of
Multipath and Doppler


Channel Measurement and Modeling


Simulation of Radio Channel


P
hysical
layer Alternatives
-

Wireless Medium Access

-

Fixed Assignment Access for Voice Networks


Random
Access for Data Networks
-

Integration of Voice and Data Traffic.


UNIT II
-
Wireless Network Operation






9


Wireless Network Topologies


Cellular

Topology


Cell fundamentals


Signal to Interference Ratio


Capacity Expansion


Mobility Management


Resources and Power Management


Security in Wireless
Networks


UNIT III
-
Wireless WAN








9


GSM and TDMA Technology


CDMA Technology


IS95


IM
T2000


Mobile Data Networks
-

Mobility
Support in IEEE 802.11 issues & Enhancement


QOS Support for IEEE 802.11.


UNIT IV
-

Wireless LAN








9


Wireless LAN performance limitations of IEEE 802.11 Networks and potential enhancements
-

Saturation
perfo
rmance Analysis of IEEE 802.11 distributed co
-
ordination fun
-

Dynamic random access for wireless
LAN with multipacket reception
-
Wireless LAN protocol using busy tones and jamming signals
-

Mac &
Routing protocol for IEEE 802.11 wireless mesh networks
-

Thr
oughput analysis of the IEEE 802.11
enhancement distributed channel access.


UNIT V
-
Mobile Computing








9


Mobile network layer


Mobile Transport layer


Support for mobility


file Systems. Pico net and scatter
net management in Bluetooth networks
-

TCP performance in Bluetooth Pico nets
-

Scheduling in Bluetooth
networks
-

Scatter net Formation and sly routing in Bluetooth networks
-

High capacity Bluetooth access
point design for interference elimination
-

wireless application protocol
-

Near field Comm
unications (NFC)
-

Hardware interface enabled Mobile computing.


TOTAL: 45+15(Tutorial) = 60 periods

BEYOND THE SYLLABUS

1. Mobile OS

2. Data Broadcast using Mobile systems

3. Mobile in Cloud Environment



4


REFERENCES


1 Kaveth Pahlavan, K.Prasanth Krishnamu
rthy, “Principles of Wireless Networks”, Pearson Education Asia,
2002

2 Jon W Mark, Weihua Zhuang, ”Wireless communication and Networking”, Prentice Hall India 2003

3 William Stallings, “Wireless Communications and Networks”, Second Edition Prentice Hall,
India 2007

4 Leon Garcia, Widjaja, “Communication Networks”, Tata McGraw Hill, New Delhi, 2000.

5. Schiller, “
Mobile Communications, 2/E”,
Pearson Education India,

01
-
Sep
-
2008

.


WEB REFERENCES

1.

http://onlinelibrary.wiley.com/journal/10.1002/%28ISSN%291530
-
8677

2.

http://as.wiley.com/WileyCDA/WileyTitle/productCd
-
0471419028.html


5


P1WNIC02
NETWORK DEFENCE AND COUNTER MEASURES



L T P C











3 1 0 4



AIM

The main aim of this s
ubject is to learn about the various security measures using Security maintenance
concepts.


OBJECTIVE

To learn about various security issues and concepts such as IPS, Intrusion and VPN.


UNIT I
-

Security Fundamentals








9


Security Fundamentals, Firew
alls, Application Layer Firewalls, Packet Filtering Firewalls.


UNIT II
-
Intrusion & Monitoring








9


Hybrids, Intrusion Detection and Prevention, Intrusion risks, Security policy, Monitoring traffic and open
ports, Detecting modified files.


UNIT III
-
Intrusion Recovery








9

Investigating and verifying detected intrusions, Recovering from intrusions, reporting and documenting
intrusions, Define the Types of intrusion Prevention Systems.


UNIT IV
-
IPS











9

Set Up an IPS, Manage an IPS, Understa
nd Intrusion Prevention, Issues with Intrusion

Prevention, IP Signature and Analysis, Risk Analysis.


UNIT V
-
VPN











9

Virtual Private Networks, Define Virtual Private Networks, Deploy User VPNs, Benefits of user VPNs
Managing User VPNs, Issues wit
h User VPNs, Deploy Site VPNs, Benefits of Site VPNs, Managing Site
VPNs, Issues with Site VPNs

TOTAL: 45+15(Tutorial) = 60 periods

BEYOND THE SYLLABUS

1.

Know how to install and configure Check Point NG

2.

Know how to install and configure Microsoft ISA Server
2000

3.

Know how to manage and configure Iptables for Linux


REFERENCE BOOKS

1.

Firewalls and Internet Security: Repelling the Wily Hacker William R. Cheswick, Steven M.
Bellovin + Aviel D. Rubin

Addison
-
Wesley 2003

2.


VPNs :A beginner’s guide, by John ma
irs TMH 2002.

3.


Firewalls and VPNs: Principles and Practices,

1/E

Tibbs & Oakes ©2006

|


Prentice Hall

|

Published: 06/29/2005 ISBN
-
10: 0131547313

|

ISBN
-
13: 9780131547315


4.

Network Defense and Countermeasures: Principles and Practices,

I/E



Easttom©2006

|

Prentice

Hall | Published
: 07/06/2005

4.

Fundamentals of Network and Security by Eric Maiwald Publisher: TMH ISBN: 9780071070935


WEB REFERENCES

1.

http://www.alibris.com/Guide
-
to
-
Network
-
Defense
-
and
-
Countermeasures
-
Randy
-
Weaver/book/10653100

2.

http://msdn.microsoft.com/en
-
us/library/ff648641.aspx






6


P1WNIC03

ADVANCED OPERATING SYSTEMS





L T P C


3 1 0 4


AIM

To provide a wide knowledge in the design and implementation of distributed operating systems.


OBJECTI
VE




To get a comprehensive knowledge of the architecture of distributed systems.



To understand the deadlock and shared memory issues and their solutions in OS



To know the security issues and protection mechanisms for distributed environments.


UNIT I


DIST
RIBUTED SYSTEM STRUCTURES







9


Architectures of distributed systems − System architecture types − Issues in distributed operating
systems − Communication networks


Communication primitives. Theoretical foundations − Inherent
limitations of a distribu
ted system −Lamp ports logical clocks − Vector clocks − Casual ordering of
messages


Global state − Cuts of a distributed computation − Termination detection


Distributed
mutual exclusion − Basics − Classification of mutual exclusion and associated algor
ithms − Comparative
performance analysis.


UNIT II


DISTRIBUTED DEADLOCKS









9


Distributed deadlock detection − Basics − Deadlock handling strategies in distributed systems − Issues in
deadlock detection and resolution − Control organizations for di
stributed deadlock detection −
Centralized and distributed deadlock detection algorithms − Hierarchical deadlock detection algorithms −
Agreement protocols − Introduction to the system model − A Classification of agreement problems
−Solutions to the byzant
ine agreement problem − Applications of agreement algorithms − Distributed
resource management − Architecture − Mechanism for building distributed file systems − Design issues
− Log structured file systems.


UNIT III


DISTRIBUTED COORDINATION








9


Dis
tributed shared memory − Architecture − Algorithms for implementing DSM − Memory coherence and
protocols − Design issues − Distributed scheduling


Issues in load distributing − Components of a load
distributing algorithm − Stability


Load distributing al
gorithm − Performance comparison − Selecting a
suitable load sharing algorithm − Requirements for load distributing − Task migration and associated
issues − Failure recovery and fault tolerance − Introduction − Basic concepts − Classification of failures


Backward and forward error recovery − Backward error recovery − Recovery in concurrent systems −
Consistent set of check points − Synchronous and asynchronous check pointing and recovery − Check
pointing for distributed database systems − Recovery in repl
icated distributed databases.



7


UNIT IV


PROTECTION AND SECURITY









9

Protection and security − Preliminaries − The access matrix model and its implementations − Safety in
matrix model − Advanced models of protection


Data security − Cryptography − M
odel of cryptography
− Conventional cryptography − Modern cryptography − Private key cryptography − Data encryption
standard − Public key cryptography − Multiple encryptions − Authentication in distributed systems.


UNIT V


MULTIPROCESSOR AND DISTRIBUTED D
ATABASE





9

Multiprocessor operating systems − Basic multiprocessor system architectures


Inter connection
networks for multiprocessor systems − Caching − Hypercube architecture − Multiprocessor operating
system − Structures of multiprocessor operating

system − Operating system design issues − Threads −
Process synchronization and scheduling.

Database operating systems − Introduction − Requirements of a database operating system concurrency
control − Theoretical aspects


Introduction database systems


A concurrency control model of
database systems − The problem of concurrency control − Serializability theory − Distributed database
systems − Concurrency control algorithms − Introduction − Basic synchronization primitives − Lock
based algorithms − Time
stamp based algorithms − Optimistic algorithms − Concurrency control
algorithms − Data replication.


BEYOND THE SYLLABUS


Macintosh Operating System

Windows 8


TEXT BOOKS


1. Mukesh

Singhal and Niranjan G.Shivaratri, "Advanced concepts in operating systems
: Distributed
Database and multiprocessor operating systems" , TMH, 2001.

2. Andrew S.
Tanenbaum,

"Modern Operating System", PHI, 2003.



REFERENCES

1.Pradeep K. Sinha, "Distributed Operating System
-
Concepts and Design", PHI, 2003.

2.Andrew S. Tanenbaum, "
Distributed Operating System", Pearson Education, 2003.


WEB REFERENCES


http://www.systems.ethz.ch/node/218

http://www.scs.stanford.edu/05au
-
cs240c/





8


P1CSIC15
FORMAL LANGUAGES AND AUTOMATA THEORY


L T P C















3 1 0 4




AIM

To develop an appreciation of the theoretical foundations of computer science through study of
mathematical and abstract models of computer
s and the theory of formal languages.


OBJECTIVE




To know the concepts of
Finite State Machines in detail



To learn the
Structure of Sequential Machines and Finite Automaton



To evaluate
Pushdown Automata concepts
.

UNIT

I

-

Finite State Machines and Finite S
tate Machines Models



9

Finite State Machines
:
Definition

of FSM, concept of sequential circuits, state table and state assignments,
concept of synchronous, asynchronous and linear sequential machines models

Finite State models: Definition, mathematical r
epresentation, Moore versus Mealey machines, capability
and limitations of FSM, state equivalence and minimization, machine equivalence, incompletely specified
machines, merger graph and
compatibility

graph, merger table, finite memory, definite, informati
on loss
-
less and inverse machines, testing table and testing graph.

UNIT II
-

Sequential Machines and Finite Automaton




9

Structure of Sequential Machines: Concept of partitions, closed partitions, lattice of closed partitions,
decomposition: serial and

parallel.

Finite Automaton: Preliminaries (strings, alphabets and languages, graphs and trees, sets and relations),
definition of FA, recognition of a language by an automata, idea of grammar, DFA, NFA, equivalence of
DFA and NFA, NFA with move.

UNIT
III

-
Regular sets and Regular expressions





9

Regular sets and Regular expressions: Definitions of RS and RE, equivalence with finite automata, NFA
from regular expressions, regular expressions from DFA, two
-
way finite automata equivalence with one
-
way, equ
ivalence of Moore and Mealey machines, applications of finite automata.

UNIT
IV
-

Closure Properties of Regular set and CFG




9

Closure properties of Regular Sets: Pumping lemma for regular sets and its applications, closure
properties of regular sets, Dec
ision algorithm for regular sets, minimization of finite automata: Myhill
-
Nerode theorem.

Context
-
Free Grammars: Definition, Derivation trees, simplification of CFG, Chomsky normal form (CNF)
and Greibach normal form (GNF).


9


UNIT V

-

Pushdown Automata and
Closure properties of CFL



9

Pushdown Automata: Moves, Instantaneous description, language recognized by PDA, deterministic PDA,
acceptance by final state and empty stack, equivalence of PDA and CFL.

Closure properties of CFL: Pumping
lemma,

Ogden’s lemma
, closure properties, decision algorithm,
Introduction to Z. Regular language properties and their grammars
-

Context sensitive languages.



TOTAL:

45 periods

BEYOND THE SYLLABUS




Undecidability



Turing machine



Myhill
-
Nerode theorem


TEXT BOOK

1. J. Hopcrof
t, R. Motwani, and J. Ullman: Introduction to Automata Theory, Languages, and
Computation, 3
rd

Edition, 2006, Addison
-
Wesley.

REFERENCES

1.

A. Meduna: Automata and Languages: Theory and Applications, Springer, 2000.


2.

D.A. Simovici and R.L. Tenney: Theory of F
ormal Languages with applications, World Scientific,
1999.


3.

H.R. Lewis, and C.H. Papadimitron, Elements of the theory of Computation, PHI.


4.

L. Peter: An Introduction to Formal Languages and Automata, Narosa Pub. House.


5.

R.Y. Kain: Automata Theory: Machines

and Languages, McGraw
-
Hill.


WEB REFERENCES


1.

http://my.safaribooksonline.com/book/electrical
-
engineering/compu
ter
-
engineering/9788131760772/1dot
-
finite
-
state
-
machine/navpoint11


2.
http://www.cambridge.org/gb/knowledge/isbn/item1173872/?site_locale=en_GB


3.
http://jwfiles.net/ft895n2ea664/FORMAL_LANGUAGES_AND_AUTOMATA_THEORY.rar.html




10


P1WNIC04
NETWORK DEFENCE AND COUNTER MEASURES LABORATORY


LT P C



0 0 3 2


AIM


Aim

of this lab is

focuses on the understanding of the network security architecture.
The course covers network attacks and defenses, firewall systems, network design and configuration,
Virtual Personal Networks (VPN) configuration, Intrusion Detection System

(IDS) design and
configuration, intrusion signatures, and network security policies and configurations.

OBJECTIVE



To Provide an understanding of the architecture for network defense.



To Provide the opportunity to acquire network defense skills and strateg
ies.



Lab Assignments

1.

Monitor the network traffic by Packet capturing & analysis using any open source tool
such as wire shark ,SNORT,SNIFFAIR

2.

Implement the advance features of packet capturing & analysis.

3.

Implement the port handling mechanism usi
ng NETSTAT

4.

Implement any firewall policy for host based firewall

5.

Implement the firewall policies for enterprise based firewall

6.

Configure the protocol based IDS

7.

Configure the signature based IDS

8.

Implement the host based VPN

9.

Implement the network based VPN

10.

Sniff the wireless packets of any AP at your college campus.

11.

Give a Case study of cyber attacks.

12.

Design virtual Honey net and Honey pots.

13.


Setup a SPI Firewall that:


Allows all outgoing connections


Block all unwanted incoming connections

14.

Create a rule th
at will drop all incoming packets coming from 192.168.1.100 using ssh
port

15.


Create a rule in ISA Server 2004 that will enable the inside network clients (LAN) to
connect to a FTP Server outside (any FTP server) to perform read and write operations.


BEYOND

THE SYLLABUS


Install, configure and monitor a firewall.



Analyze IP Security Protocol
-

IPSec.


WEB REFERENCES


11


http://freepdfdb.com/ppt/guide
-
to
-
networ
k
-
defense
-
and
-
countermeasures
-
pdf
-
download

http://info.chesapeake.edu/faculty/syllabi/CIS
-
278
-
801
-
13Sp.pdf


P1WNIC05
ADVANCED OS LABORATORY

L

T P C



0 0 3 2











AIM

To design and implement distributed operating systems

OBJECTIVE

This course should enable the students to learn abou
t UNIX command and Linux programs.



1.

Basic UNIX commands

2.

Linux Kernel Programming: CPU Scheduling (FIFO)

3.

Linux Kernel Programming: Implementation of Dining Philosopher Problem

4.

Linux Kernel Programming: page replacement algorithm

5.

Linux Kernel Programming: b
anker’s algorithm

6.

Linux Kernel Programming: Dekker’s algorithm

7.

Implement concurrent echo client server application

8.

Implement a Linux kernel program incrementing a counter in shared memory in
Distributed environment.

9.

Create RMI based client server applicati
on

10.

Using RPC based remote services in Distributed environment.

11.

Case Study: of Linux operating systems.

12.

Case Study: Troubleshooting in Windows operating systems.

13.

Write a program to implement RPC Client and server communication.

14.

Deployment of Error semanti
c using test data.

15.

Configure a web sites in IIS in windows. The name for the web site will be
www.osadminlab.com

.

16.

Create a partition. Format the partition to ext3 filesystem. And modify fstab file to mount
this

partition in the /mnt/soft folder.

17.

Create a user named shane. Create a folder named reports in the /. Make the user
shane the owner of the folder reports. For others there should be no access on the Lab1
folder.

18.

Secure the GRUB boot loader in Linux by def
ining a password. The password to be
specified is “MNIK@SK_KD” . The password stored should be MD5 hash.

19.

Create an OU named student in the active directory domain. Apply a group policy to the
OU such that all the users in this OU will have RUN command disa
bled on their screens.
Also disable the control panel for these users. Turn off auto
-
play.

20.

Configure a FTP site in IIS. Using this web site a user named webadmin should be able
to update the above site www.lab1.com.


BEYOND THE SYLLABUS

Deadlocks in Distri
buted Operating System


12


Semaphores
-
Multiprocessor Operating System

WEB REFERENCES

http://www.academicearth.org/courses/operating
-
systems
-
and
-
system
-
programming

http://www.academicearth.org/courses/operating
-
systems
-
and
-
system
-
programming

http://www.academicearth.org/courses/operating
-
systems
-
and
-
system
-
programming



13


SEMESTER II

P2WNIC06
ADVANCED OBJECT ORIENTED PROGRAMMING

















L T P C













3 1
0 4


AIM


To expose the students to the advanced concepts of object
-
oriented programming by using the
Java language.



OBJECTIVE




To present the concept of advanced object oriented programming and discuss the important
elements of Java.



To ensure that the

students acquire adequate Java programming skills and be able to
independently develop a working software system


UNIT
I

-
Introduction

and
Programming in Java




9


Java Language features Object oriented concepts
-
Data types
-
Variables
-
Constants
-
operators
-
Control
Statements (if, for, while, switch etc.)
-

Classes
-

Constructors
-
Finalize, instance data and methods, the
new operator, Methods, overloading, parameter passing, objects as parameters
-

Memory management,
garbage collection, The this facility, static
data and methods, block, scope, lifetime, Access Control Rules,



UNIT
II

-
Handling

& Multithreaded programming




9


Exception Handling, Exceptions as objects, Exception hierarchy, Try, catch and finally, Different exception
classes, Data structure, Mult
ithreaded programming.


UNIT
III
-

Java Network Programming
and RMI




9


URL, Internet Address, Socket, and Server Socket, Datagram Pocket, Datagram Socket
-

case studies in
socket programming
-

Remote Method Invocation, The Remote interface, The UnicastRemo
teObject and
Naming classes
-
Case Studies
-
Compare RMI with CORBA
-

Compare RMI with RPC


UNIT
I
V
-

SERVLETS AND JSP






9


Introducing JSP, HTTP and Servlet Basics,

Setting Up the JSP Environment, JSP Application Development:
Generating Dynamic Content, Usi
ng Scripting Elements, Error Handling and Debugging
.


Introduction Servlet, Servlet Life cycle, Retrieving Information, Sending HTML Information, Sending
multimedia content ,session Tracking


UNIT
V
-

EJB and
JDBC







9


Overview, EJB Fundamentals, Sessio
n Bean, Entity Bean, Message

driven Bean
.


JDBC
Structure, Using JDBC Driver
, Accessing

ODBC using JDBC
,
the

Icon store

Multimedia JDBC
Application










TOTAL:

45+15(Tutorial)
= 60

periods



14


BEYOND THE SYLLABUS




Web application using contemporary techn
ologies



Database transactions using multithreading.



REFERENCES

1. Java 2: The Complete Reference, Fifth Edition McGraw
-
Hill

2. O’Reilly Java™ in a Nutshell: A Desktop Quick Reference
by David Flanagan ISBN 1
-
56592
-
487
-
8E.


3. O’Reilly

Java Network Progr
amming, 3rd Edition
by

Elliotte Rusty Harold
.


4. H.M.Deitel

and P.J.Deitel


Java How to Program
” Pearson Prentice Hall Sixth Edition
.


5.

O’Reilly


Java
server Programming

, by

Hans Bergsten
, December 2000.


6.

O’Reilly


Java Servlet Programming
”, by

Jason Hunter
,

William Crawford
, April 2010.

7.

“Database Programming with JDBC” by Pratik PatelCoriolis, The Coriolis Group


ISBN: 1576100561

http://ebooks.allfree
-
stuff.com/eBooks_down/Java/Java%20Database%20Programming%20with%20JDBC.pdf

8. “Mastering enterprise Java Bean” by Ed roman

and rima Patel, Third

Edition, Wiley.

http://media.techtarget.com/tss/static/books/wiley/masteringEJB/downloads/MasteringEJB3rdEd.pdf




WEB REFERENCES


1.


http://java.sun.com/docs/books/
tutorial/rmi/index.html

2.

http://people.richland.edu/fbrenner/syllabus/cs281course.html

3.

http://www3.imperial.a
c.uk/computing/teaching/courses/471






15


P2WNIC07
M
OBILE DATABASE


















L T P C











3 1 0 4

AIM

To provide a strong foundation in Mobile database technology and an introduction to the current trends
in Mobile Database and Mobile Devices.

OBJECTIVE



To learn the fundamentals of Mobile
number portability

mechanism and to analyze the Mobile
number portability Techniques.



To make a study of
Location and Handoff Management Techniques in mobile database
.



To know the fundamental concepts of mobi
le transaction processing
-

concurrency control in mobile database techniques and recovery procedure.


UNIT I

Introduction to Mobile database and Mobile number Portability


9

Mobile Database Systems
-

Introduction
-

Fully Connected Information Space
-

Type
s of Mobility


Wireless Networks Communication


Introduction


Contiguous Connectivity
-

Mobile Number Portability


Fixed
-
Network Number Portability


Number Portability for Mobile Networks


Mobile Number Portability
Mechanisms

UNIT II



Basics of Da
tabase Technology







8

Location and Handoff Management
-

Fundamentals of Database Technology


Conventional Database
Architecture


Database processing


Serialization of Transactions


Transaction Management in
Database Systems


Introduction


Executi
on Atomicity


Failure Atomicity


Distributed Databases


Advanced Transaction Models

UNIT III
-
Concurrency Control Mechanisms







8

Introduction to Concurrency Control Mechanisms
-

Data processing and Mobility


Introduction


Effect of
Mobility on th
e Management of Data

UNIT
IV
-

Transaction management








10

Transaction management in Mobile Database Systems


Mobile Database System


Transaction Execution
in MDS


Mobile Transaction Model


Execution Model based on ACID transaction Framework


Pre
-
write
Transaction Execution Model


Data Consistency in Intermittent Connectivity


The Consistency Model


Weak Connectivity Operation


A Consistency restoration Schema


Concurrency Control Mechanism


Transaction Commit


Commitment of Mobile Transact
ions


Transaction Commitment in Mobile Database
Systems



16


UNIT
V
-
Mobile Database Recovery

and Broadcasting





10

Mobile Database Recovery


Introduction


Log Management in Mobile Database Systems


Mobile
Database Recovery Schemes


Wireless Informatio
n Broadcast


Introduction


Broadcast Disk


Broadcast Infrastructure.




TOTAL: 45 periods

BEYOND THE SYLLABUS




Data Dissemination System



Location
-
Based Indexing

REFERENCE BOOKS

1.


“Mobile Database Systems”, Vijay Kumar, Wiley Series on Parallel and Distri
buted Computing,
John Wiley & Sons publications,
ISBN
-
10:

0471467928
| ISBN
-
13:

978
-
0471467922, June 2006,
First Edition

2.


“Wireless and Mobile Network Architectures”, Yi
-
Bing
-
Lin, Imrich Chlamtac, John Wiley & Sons,
Inc publications, 2001

3.

“Database Transac
tion Models For Advanced Applications”, Ahmed.K.Elmagarmid, Morgan
Kaufmann Publications. 1992, First Edition.


WEB REFERENCES




http://webserver.ignou.ac.
in/virtualcampus/adit/course/cst302/block2/cst302
-
bl2
-
u1.htm



k.web.umkc.edu/kumarv/co
-
tutorial.pp



http://www.drrbpatel.org/lecture/CSE
-
302
-
NewTransaction.pdf



17


P2ITIC16
PROGRAMMIN
G USING ANDROID











L T P C












3 1 0 4


AIM



To provide knowledge about mobile application development for the Android platform.

OBJECTIVES



Android is a software stack for mobile devices that includes an operating system, middleware and ke
y
applications.



The Android SDK provides the tools and APIs necessary to begin developing applications on the Android
platform using the Java programming language.



Students will learn skills for creating and deploying Android applications, with particula
r emphasis on
software engineering topics including software architecture, software process, usability, and deployment


UNIT
I
-

INTODUCTION TO ANDROID

Introduction of android,Time sharing OS,Android thread design,Threads in java , why develop for
andro
id,Design issue for mobile phone application, Android Stack, Android Versions and Installing Android
SDK and updating SDK components, Eclipse, IDEs and ADT plug
-
in,Using the Emulator, Android vs. Other
mobile platforms ,Anroid Architecture,Android SDK feat
ures,

UNIT II
-

UI DESIGN FOR ANDROID

Using different layouts


LinearLayout and TableLayout etc,Drawable Resources ,Resolution and
density independence ,Working with common widgets ,Working with ListView and Adapters,Creating and
using option menu,Working

with preferences ,Working with Dialogs and Toasts,Working with Graphics
and Animation
Introducing Intents,
Intent filters Invoking activities by class name and URI,Sharing data
using Extras Bundle and URI parameters,Working with Tabs and Fragments,Dialogs,
Types of Dialogs

UNIT III
-

ANDROID FILES AND DATABASE

Android Application lifecycle,Using File System ,Introducing SQLite on Android,Database
Connectivity,Cursors and content values,Using ContentProvider to share data,Understanding Security
model , Databas
es and content provider, Toast,Using Alarm


UNIT IV
-
USING SYSTEM SERVICES AND WEB SERVICES

Map,Geocoding,

Location based Services,
Working in the back ground,Invading the phone
-
Top,Audio,video and using the camera
,Telephony and SMS services, Bluetooth ,

Network and
WiFi,Sensors ,Multimedia and Camera ,Accessing Internet and Web Services from Android App,
.

UNIT V
-

APPLICATION

and UXPIN

tool



Introducing sensor management network and wi
-
fi connection,Advanced android
development,Linux kernal security,Imp
lement ADL Interface,Advanced Android development.Introducing
Android text to

speech.Using Internet services
-
UXPIN.


18


BEYOND THE SYLLABUS



Android Architecture



Working with data storage



User Interface Widgets

REFERENCES

1) Professional Android 2 Applicatio
n Development “Reto Meier”

2) Android programming tutorial “Mark.L.Murphy” 3
rd
Edition for Android 2.2.

3) Android How to Program” Paul Deitel; Harvey Deitel; Abbey Deitel” Prentice Hall.

4) Beginning Android 3” Mark.Murphy”

WEB REFERENCES

http://answers.oreilly.com/topic/1133
-
how
-
to
-
start
-
programming
-
in
-
android/

http://www.vogella.com/android.html




19


P2WNIC08
ADVANCED OBJECT ORIENTED PROGRAMMING
LABORATORY














L T P C












0 0 3 2

AIM


To expose the students to the advanced concepts of object
-
oriented programming by using the
Java language.


OBJECTIVES:




To make the student learn a object oriented way of solving problems.



To teach the student to write
programs in Java to solve the problems


1
. Write a java program that illustrates the following


a) Creation of simple package.


b) Accessing a package.


c) Imple
m
enting interfaces.

2
. Exception Handling Mechanism in Java

-

Handling pre
-
defined excepti
ons

-

Handling user
-
defined exceptions


3
. Write a program to transfer a File using TCP.

4
. Use the Inet Address class to manipulate IP address and hostnames,and to apply these


operations to network applications.

5
. Write a java program using java’s Dat
agramPacket and DataSocket classes for chat application.

6
. Perform secure remote method invocation in Java, and use the java.rmi package to write


programs that invocate methods on remote hosts.

7
.Expalin how some useful servers work, and able to d
esign and implement network servers with sockets
in java.

8
.Run threads in java,return information from a thread ,synchronize multiple threads ,resolve
deadlocks,schedule threads,and manage thread pools.

9.

Install TOMCAT web server. Validate the Registrat
ion, user login, user profile and payment by credit
card pages using Servlet and cookies.Hint: Users information (user id, password, credit card number)
would be stored in web.xml. Each user should have a separate Shopping Cart.

10. Bean Assignments


a. Cr
eate a Java Bean which gives the exchange value of INR (Indian

Rupees) into equivalent American/Canadian/Australian Dollar value.

b. Create a simple Bean with a label
-

which is the count of number of clicks. Than create a Bean
Info class such that only th
e “count” property is visible in the Property Window.

BEYOND THE SYLLABUS




Exposure to industry standard IDEs like net beans, eclipse etc.



JDBC connectivity to multiple DBMSs


WEB REFERENCES


1. www.mtholyoke.edu/~blerner/cs102/
Labs
/
Lab

.pdf


2. cgi.csc.li
v.ac.uk/ grant/Teaching/COMP
2 3
/Slides/
0
.pdf


3
. www.inf.ed.ac.uk/teaching/courses/inf

/.../
0
-
wrapup.handout
-
2
x
2
.pdf




20


P2WNIC09
ANDROID PROGRAMMING LAB












L T P C












0 0 3

2

AIM



To provide basic knowledge about Android Application deve
lopment.



OBJECTIVE


The intent of this course is to introduce the foundation of Android programming along with the
lastest Android SDKs and development tools



1.Create a Hello world application using eclipse and run it on Android Virtual Device(AVD)

2.C
reate an Application to illustrate the life cycle of an Activty.

3.Create an application to illustrate various layouts


3.1 Linear Layout


3.2 Relative Layout


3.3 Table Layout


3.4 Frame Layout


3.5 Scroll View


3.6 List View


3.7 Web view

4.UI Widgets


4
.1 Button


4.2 TextView


4.3 Editbox


4.4 Checkbox


4.5 Radio buttons


4.6 Toggle button


4.7 Rating bar


4.8 Spinner


4.9 Date picker


4.10 Time picker


4.11 Analog and digital clock


4.12 Progress bar


4.13 Alert Dialog


4.14 Toast


4.15 ImageView and Im
ageButton


21



5. Create

an application with multiple activities and navigate from one activity to another using intents.


6. Create

an application to which makes use of Android service.


7. Create

an application to illutrate the use of Broadcast receiver


8.
Create

a SOS SMS
messaging

application


9. Create

a simple Contacts application to create/edit a new contact using content providers


10.Create an android application to get the current location (latitude and longitude) using GPS.


BEYOND THE SYLLABUS



Buttons and Similar Clickable Widgets


WEB REFERENCES

http://www.coreservlets.com/android
-
tutorial/

http://develop
er.android.com/training/basics/firstapp/index.html

http://www.xda
-
developers.com/android/want
-
to
-
learn
-
how
-
to
-
program
-
for
-
android
-
start
-
here/











22


ELECTIVE LIST

SEMESTER
I


PEWNIC13
SECURITY IN WIRELESS AND MOBILE SYSTEMS















L T P C












3 0 0 3


AIM

To study about the security in wireless and mobile systems using various security concepts.


OBJECTIVES

The main objective of this

subject is to understand and identify the security concepts in mobile systems
using various security standards and technologies.




UNIT I

-

SECURITY OVERVIEW








9


Introduction


Need for Security


Threats


Vulnerability
-

Principles of Security


Confidentiality


Integrity


Authentication


Availability


Attacks


Passive Attacks


Active Attacks


Cryptography
Techniques
-

Plain Text and Cipher Text


Substitution Techniques


Transposition Techniques


Encryption and Decryption
-

Number Theory
and Finite Arithmetic, Counting in Modulus


Arithmetic,
Congruence Arithmetic, Fermat’s Theorem and Euler’s Theorem
-

Exponentiation.



UNIT II


SYMMETRIC KEY ALGORITHMS







9



Overview


Algorithm Types

Stream Ciphers


Block Ciphers


Algorithm Mode
s


Electronic
Code Book


Cipher Block Chaining


Cipher Feedback


Output Feedback


Counter
-

Data Encryption
Standard (DES)


Advanced Encryption Standard (AES).


UNIT III


ASYMMETRIC KEY ALGORITHMS






9



Introduction


Overview,

RSA Algorithm


Di
gital Signature


Digital Certificate
-

Public Key
Infrastructure (PKI)


Public Key Management


Public Key Cryptography Standards


Authentication


Basics


Passwords


Tokens


Kerberos, Digital

Signature Standards (FIPS 186
-
2), DSA (ANSI X9.30),
RSA (
ANSI X9.31)


RSA Certification

PKI Certificates.



UNIT IV


INTERNET SECURITY PROTOCOLS






9



Secure Socket Layer (SSL)


Transport Layer Security (TLS)


Secure Hyper Text Transfer
Protocol (SHTTP)


Time Stamp Protocol (TSP)
-

Secure Electronic Tra
nsaction (SET)


3D Secure
Protocol.



UNIT V


WIRELESS

AND MOBILE SYSTEM SECURITY





9



Wireless and Mobile System Security


Firewall
-

IP Security


Virtual Private Network


Intruders


Email Security


Web Security


Distributed System Security


R
outing Security


Security in GSM


Security in 3G

MANET Schemes.



TOTAL: 45 periods



23


BEYOND THE SYLLABUS


1.

4G technology

2.

Security in Mobile Systems in Cloud Environment.



TEXT BOOKS


1.

Atul Kahate, “
Cryptography and Network Security”,
3
rd


Edition,

Tata

McGraw


Hill, 201
3.

2.

William Stallings, “Cryptography and Network Security Principles and Practices”, Pearson/PHI,
5
th

edition, 2010
.

REFERENCES


1.

Behrouz A. Forouzan, “Cryptography and Network Security”, Special Indian Edition, Tata McGraw


Hill, 2007.

2.

Hakima Chaouchi, “Wireless and Mobile Network Security “, Willey, 2007.


WEB REFERENCES

1.

http://www.f
-
secure.com/en/web/home_global/mobile
-
security

2.

www.nq.com

3.

www.trustgo.com/





24


PEWNIC14
MOBILE ADHOC NETWORKS







L T P C












3 0 0 3


AIM

To learn and evaluate the various operations of Mobile Adhoc Networks and its tactical operations.


OBJECTIVE

-

To know the applications of MANET

-

To Learn different properties of the p
rotocols

-

To learn various algorithms in terms of safety routing


Unit


I

Introduction to ad
-
hoc networks

Introductory concepts
-

Models of operation: Symmetric Links


Adhoc Solutions


Proactive versus
Reactive Protocols, Commercial applications of M
ANET: Conferencing


Home Networking


Emergency
Services


Bluetooth


Embed Computing applications


Sensor Dust
-

PC Interaction


Other
Applications


Unit


II
Routing protocols I

Overview of routing methods
-

Destination
-
Sequenced Distance Vector pro
tocol:
-
Protocol Overview
-

Route Advertisement
-

Extending base station coverage. DSDV protocol: Properties of DSDV protocol
-

Dynamic Source Routing protocol
-

overview and properties
-

DSR Route Discovery
-

DSR Route
Maintenance
-

Support for heterogen
eous Networks and mobile IP
-

Multicast routing with DSR.


Unit


III

Routing Protocols II

Ad Hoc On
-
Demand Distance
-
Vector protocol:


AODV Properties
-

Unicast Route Establishment
-

Multicast Route Establishment


Broadcast
-

Optimizations and Enhancemen
ts.


Unit


IV

Transport layer protocols

Link Reversal Routing:
-

Gafni
-
Bertsekas algorithm
-
Lightweight mobile routing algorithm
-

Temporally
ordered routing algorithm, preserving battery life of mobile nodes:
-

Associatively based routing
-

Effects
of b
eaconing on battery life.

Unit


V

Advanced
topic in ad
-
hoc networks

Bandwidth efficient Link
-
state routing in wireless network: Updating routes in wireless networks


STAR
Description


Performance evaluation


Future works


Other approaches.


TOTAL : 4
5 periods

BEYOND THE SYLLABUS




QOS
-
Sensitive routing in Mobile multimedia Ad
-
hoc networks.



Multihop Relaying.


TEXT BOOK

1.

Perkins Charles E, Ad Hoc Networking,
Pearson Education India, 2008.

REFERENCES

1.

Murthy
,
Ad Hoc Wireless Networks: Architectures And

Protocols
,
Pearson Education India, 2004
.

2.

Aggelou
,
Mobile Ad Hoc Networks
,
Tata McGraw
-
Hill Education, 2005
.


WEB REFERENCES

w3.antd.nist.gov/wahn_mahn.shtml


www.ietf.org/html.charters/manet
-
charter.html


ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/







25


ELECTIVES

SEMESTER II

PEWNIC15
WIRELESS SENSOR NETWORKS





L T P C












3 0 0 3


AIM

To understand the basics of sensor networks


Objective:



To know the
design considerations



To understand the protocol and transmissions



To know the sensor related platforms and tools




UNIT
-
I


Introduction to sensor network







9

Sensor networks overview: introduction, applications, design issues, requirement
s, Sensor node
architecture, Network architecture optimization goals, evaluation metrics.


UNIT
-
II Sensor Network design








9

Network design principles. Sensor network operating systems and brief introduction to sensor network
programming.


UNIT
-
III Se
nsor network protocols








9

Network protocols: MAC protocols and energy efficiency, Routing protocols: data centric, hierarchical,
location
-
based, energy efficient routing etc.


UNIT
-
IV Sensor network deployment







9

Sensor deployment, scheduling
and coverage issues, self configuration and topology control. Querying,
data collection and processing, collaborative information processing and group connectivity.



UNIT
-
V Sensor tracking and power management






9

Target tracking, localization and id
entity management. Power management. Security and privacy,

Cyber
Physical Systems










Total Period: 45 Periods


BEYOND THE SYLLABUS

Energy consumption of sensor networks.

Clustering

Berkeley motes



26


REFERENCES


1.

Waltenegus Dargie and Christian Poellaba
uer “
Fundamentals of Wireless Sensor Networks
”,
Published by John Wiley & Sons, 2010.

2.

Ian.F. Akyildiz, Mehmet can Vuran, “ Wirreless Sensor Networks”, Wiley Publications, 20 0.

3.


Elena Gaura,

Lewis Girod,

James Brusey,

Michael Allen,

Geoffrey Challen, “
Wire
less Sensor
Networks:

Deployments and Design Framework
”, Published by Springer Science publications,
2010.

4.

C.

Siva Ram Murthy and B.S. Manoj, “
Ad Hoc Wireless Networks


Architectures and
Protocols
” Pearson Education, Second Edition, 2007.

5.

C.

Siva Ram Mur
thy and B.S. Manoj, “
Ad Hoc Wireless Networks


Architectures and
Protocols
” Pearson Education, Second Edition, 2007.

6.

Kazem Sohraby, Daniel Minoli & Taieb Znati, "
Wireless Sensor Networks
-

Technology,
protocols and Applications
” Published by Wiley Intersc
ience, 2007.

7.

Anna Hac, "
Wireless Sensor Network Designs
" Published by John Wiley & Sons, December
2003.

8.

Edgar H. Callaway, Jr. and Edgar H. Callaway, "
Wireless Sensor Networks: Architectures and
Protocols
," Published by CRC Press, 2003.



WEB REFERENCES

ww
w.
sensor
-
networks
.org

www.ni.com/wsn/


www.scirp.org/journal/wsn/

www.cs.utexas.edu/~mok/cs378/Spring13/Slides/IntroCPS.
ppt







27


PEWNIC16
SECURITY IN SENSOR NETWORKS






L T P C












3 0 0 3

AIM



To study about sensor node hardware and
software platforms and understand the simulation and
protocols.



Design and development of sensor nodes, wireless sensor network and sensor based automatic
devices.



To learn how to reducing the cost of each node.


OBJECTIVE



To provide an overview about sens
or networks and emerging technologies.



To study about the node and network architecture of sensor nodes and its execution
environment.



To understand the concepts of communication, MAC, routing protocols and also study about the
naming and addressing in WSN
.



To learn about topology control and clustering in networks with timing synchronization for
localization services with sensor tasking and control.


UNIT
-
I












9


Introduction
-

Overview of Sensor Networks
-

Classification of sensor networks

Archi
tecture and
Protocol Stack
-
Communication Protocols for Sensor Networks
-
Energy Efficient hardware design
-
Factors
Influencing WSN
-
Wireless Sensor Network Applications.

UNIT
-
II











9

Protocols
-

Application Layer
-
Transport Layer
-
Routing Algorithms
-
Medium Access Control
-
Error
Control
-
Physical Layer

Localization
-
Time Synchronization

QOS Security.

UNIT
-
III











9

Security for Wireless Sensor Networks
-

Overview
-
Basic cryptographic primitives, including
encryption, authentication, hashing, sign
atures and attacks they can prevent
-
Key Management
-
Security
in Sensor Networks: Watermarking Techniques

UNIT
-
IV











9

Localization and management

-

Group communication
-

Coordination and Communication Problems
in WASNs
-
Localization in Sensor Networ
ks
-
Sensor Management


Adapting to the inherent dynamic
nature of WSNs, and Sensor Networks and mobile robots

UNIT
-
V











9

Broadcast Authentication protocols

-

TESLA
-
Variation of TESLA
-
BiBa
-

HORNSSensor network
simulators.

Total Period:
45 Periods




28


REFERENCE BOOKS


1.

Ian.F. Akyildiz, Mehmet can Vuran, “ Wirreless Sensor Networks”, Wiley Publications, 20 0.

2.

Yang Xiao, “Security in Sensor Networks”, Auerbach publications, 2007.

3.

Lopez, J., Zhou, J, “
Wireless Sensor Network Security
” Published by IOS Pr
ess Publications,
2008.

4.

Adrian Perrig Ran Canetti J. D. Tygar Dawn Song, “The TESLA Broadcast Authentication Protocol”,
2002.

5.

Adrian Perrig, “
The BiBa One
-
Time Signature and Broadcast Authentication Protocol”, 200 .


BEYOND THE SYLLABUS

Network layer

Data

Aggregation

Clustering


WEB REFERENCES

www.
sensor
-
networks
.org

www.research.rutgers.edu/~mini/
sensornetworks
.html




29


PEWNIC17
DISTRIBUTED COMPUTING






L T P C












3 0 0 3

OBJECTIVE



To understand the concept of Distributed Computing,



To organization of Distributed Computing,



To know advantages and limitations of Distributed Computing


UNIT I


INTRODU
CT
ION TO DISTRIBUTED SYSTEM




9


Characterization of distributed systems − Examples of Distributed Systems− Resource sharing and the
web − Challenges − System models − Architectural and fundamental models − Networking and
internetworking − Case studies: Eth
ernet, WIFI

,Bluetooth and ATM


UNIT II

INTERPROCESS COMMUNICATION






9


Inter
-
process communication − The API for the Internet protocols − External data representation and
marshalling − Client
-
server communication − Group communication − Distributed fi
le systems − File
service architecture − Sun network file system −Case study: Inter
-
process communication in UNIX


UNIT III

DISTRIBUTED OBJECTS AND REMOTE INVOCATION




9



Communication between distribu
ted objects − Remote procedure call − Events and notifications − Case
study: Java RMI


Operating System Support


The OS layer − Protection − Processes and threads −
Communication and invocation − OS architecture


UNIT IV

TIME AND GLOBAL STATES










9


Introduction −

Time and Global States
-

Clocks − Events and process states − Synchronizing physical
clocks − Logical time and logical clocks − Global states − Distributed debugging − Distributed mutual
exclusion


Election A
lgorithm − Multicast communication

-

Case studies: Ethernet, WiFi, Bluetooth and
ATM


UNIT V


REPLICATION AND FAULT TOLERANCE SERVICES




9












Introduction − System Model and Group communication


Fault Tolerant Services− Highly
Available
Services


Transaction with replicated data −
Grid Computing, Cluster computing
-
Case study: CORBA.

TOTAL : 45 periods


BEYOND THE SYLLABUS

1.

Cryptographic algorithms

2.

Replication

3.

Naming services

4.

Distributed election algorithm




30


REFERENCES









. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts a
nd Design”, Pearson
Education, 5
th

Edition, 2011
.

2. Andrew S Tanenbaum, Maartenvan Steen, “Distributed Systems, Principles and Paradigms”, Pearson
Education, 2002.

3. Sa
pe Mullender, “Distributed Systems”, Addison Wesley, 2nd Edition, 3.

4. Albert Fleishman, “Distributed Systems Software Design and Implementation”, Springer Verlag, 4.



WEB REFERENCES

1.

en.wikipedia.org/wiki/
Distributed
_
computing

2.

distributedcomputing
.
info/

3.

en.wikipedia.org/wiki/List_of_
distributed
_
computing
_projects




31


PEWNIC18
DATA CENTER MANAGEMENT







L T P C

3 0 0 3



AIM


To provide knowledge about data center architechture, network architechture in data center and
data center servers













OBJECTIVE




To understand about data center security and network



To learn about the data center structure


UNIT


I

Introduction









9

Overview of Data center


Data center Architecture


Data center requirments, Data center
prerequisites, Req
uired Physical Area for Equipment and Unoccupied Space
-

Required power to run all
the devices
-

Required cooling and HVAC
-
Required weight, Required network bandwidth,budget
constraints, Selecting a geographic location
-

Safety from Natural hazards
-

Safe
from man made disaster.


UNIT


II

Outline of Data center management






9


Availability of local technical talent


Abundant and inexpensive Utilities, Selecting an Existing
building


Data center design


Characteristics of an outstanding design


Guid
elines for planning Data
center


Data center Structures


Raised floor design and Deployment


Design and plan against
vandalism


Data center design case study.


UNIT


III

Datacenter Architecture








9



Network infrastructure in a data center


Modu
lar cabling design


Data center distribution


ISP
network infrastructure


ISP WAN links


Data center maintenance


Network operation center


Network
monitoring.



UNIT


IV

Data center security








9


Data center physical security


Data center log
ical security


Data center consolidation


Consolidation opportunity


Server Consolidation storage


Consolidation network


Consolidation
Services


Consolidation process


Consolidation Staff


Data consolidation phases.


UNIT


V

Data center services








9


Data center servers


Server capacity planning


System management best practices


Data
storage best practices


Network management Best practices


Documentation best practices


Security
guidelines


Internet security


Source Security issues


Best practices for System administration


System administration work automation


Device naming.
-
Naming Practices, NIS, DNS,LDAP, Load
balancing, Terminology, Advantages, Types of load
balancing, Implementing

a Network with Load
-
Balancing Switches
-
REMED
Y IT service Management.





TOTAL:

45 periods

BEYOND THE SYLLABUS



Data Center Infrastructure Management


Virtualization Server





32


Text Books


1.

Deploying, Managing and Securing an Efficient Physical Infrastructure : siemon

2.

Cisco CCNA V 3.0

3.

Data Center
Storage: Cost
-
Effective Strategies, Implementation, and Management
-

Hubbert

Smith
.

4.


“Data Centers:Servers,storage,and Voice Over IP”
,k
ailash Jayaswal,Wiley Publication ,
ISBN:
8126506881, 9788126506880



Reference Books

1.

The Reference Guide to Data Center
Automation
-

by
Anil Desai

2.

Data center reference guide keith black 2007

3.

Making Your Data Center En
ergy Efficient

Gilbert Held

4.

VMware ESX Essentials in the Virtual Data Ce

nter
-

David

Marshall,


Hyper9, Austin, Texas,
USA
;

Stephen S.

Beaver,

Florida Hospital, Altamonte, Florida, USA
;

Jason W.

McCarty,

Equifax,
Baton Rouge, LA


5.

Venture Deployment Cor
poration , Power Over Ethernet ( PoE ): Global Market Demand Analysis,
Third Edition, March 2008
.


WEB REFERENCES

https://access.redhat.com/site/documentation/en
-
US/Red_Hat_Enterprise_Virtualization/3.0/html/Administration_Guide/Administrati

on_Guide
-
Managing_Data_Centers.html




http://www.w
ebopedia.com/TERM/D/data_center_management.html




33


ELECTIVES

SEMESTER III

PEWNIC19
PROGRAMMING USING iPhone






L T P C












3
0 0 3

.
AIM

To enable the students to design and develop iPhone applications using Program
ming


Using
SDK Technology.

OBJECTIVE



To learn
iPhone
programming concepts like MVC,

CSS transforms, transitions, and animations
etc.



To explain how the iPhone differs from its predecessors,

Designing web pages &
Advanced
WebKit
,
give knowledge about Apple
’s iPhone technology and
iPhone programming.



To understand Concepts needed for Web Apps Creation



To understand iPhone
Programming with the SDK Toolkit

UNIT
-
I

I
ntroducing the iPhone








9

iPhone core specifications
-

Comparing the two programming sty
les
-

central philosophy: the
continuum of programming
-

Advantages and disadvantages
-

Stand
-
alone iPhone development
-

Integrated iPhone development

UNIT
-
II
Designing web pages &
Advanced WebKit





9




The iPhone viewport
-

Making your web pages iP
hone friendly
-

Making your web pages iPhone
optimized
-

Manipulating iPhone chrome
-

Capturing iPhone events
-

Redisplaying web pages
-
Introducing
the WebKit
-

CSS transforms, transitions, and animations
-

The WebKit database
-

Adjusting the chrome
-

Reco
gnizing touches and gestures
-

Recognizing orientation
-

Upcoming features: CSS gradients and
masks

Responsive webpage designing.

UNIT
-
III Web Apps










9

Using
UI for web apps
-
Using Canvas for web apps
-
Building web apps with Dashcode
-
Debugging
iPhone web pages

iOS app framework
-
iOS design Pattern,iOS memory management,

iOS
blocks and multithreading
.

UNIT
-
IV SDK programming for web developers &
Learning SDK fundamentals

9

An introduction to C’s concepts
-

An introduction to object
-
oriented p
rogramming
-

The Model
-
View
-
Controller (MVC) pattern
-
Learning Objective
-
C and the iPhone OS
-
Using Xcode
-
Using Interface
Builder


34


UNIT
-
V
Programming with the SDK Toolkit






9

Data: actions, preferences, files, SQLite, and addresses
-
Positioning: ac
celerometers and location
-
Media: images and sounds
-

Graphics: Quartz, Core Animation, and OpenGL
-
The web: web views

and
internet
protocols, Performance

Tuning
.

TOTAL : 45 periods


BEYOND THE SYLLLABUS




Memory management in iPhone



Apple iOS Developer Lib
rary


REFERENCE BOOK

.”iPhone in Action
-
Introduction to Web and SDK Development”

Christopher Allen and


Shannon Appelcline.

http://www.inteum.com/sites/default/files/file
/iPhoneInAction.pdf



WEB REFERENCES



http://developer.apple.com/library/ios/documentation/iphone/conceptual/iphone
osprogrammingg
uide/iphoneappprogrammingguide.pdf



http://www.findbestdocs.com/find
-
doc
-
p/programming
-
concepts/10








35


PEITIC15
CLOUD COMPUTING





L T P C









3 0 0 0

AIM

The aim is to provide scalable, flexible environments for providing resources w
ith a specified
level of service and reliability.


OBJECTIVES



The main objective of cloud computing, accessing resources and services needed to
perform functions with dynamically changing needs.



To understand the cloud privacy and security concepts to crea
te secure cloud
environment.



To learn the various cloud platforms to implement real time cloud applications.


UNIT


I INTRODUCTION








7

Introduction to Cloud Computing, Definition, Characteristics, Components, Cloud provider,
SAAS, PAAS, IAAS and Oth
ers. Organizational scenarios of clouds, Administering & Monitoring
cloud services, benefits and limitations, Deploy application over cloud. Comparison among
SAAS, PAAS, IAAS. Cloud computing platforms: Infrastructure as service: Amazon
EC2,Platform as Ser
vice: Google App Engine, Microsoft Azure Utility Computing, Elastic
Computing.

Class Tutorial:

Comparison among Grid and cloud

Home Tutorial:

Cloud offerings from companies, SAAS, PAAS, IAAS

Presentation:

Cloud computing platforms
.


UNIT


II Cloud Techno
logies







9

Introduction to Cloud Technologies, Study of Hypervisors Compare SOAP and REST
Webservices, AJAX and mashups
-
Web services: SOAP and REST, SOAP versus REST, AJAX:
asynchronous 'rich' interfaces, Mashups: user interface services. Virtualizati
on Technology:
Virtual machine technology, virtualization applications in enterprises, Pitfalls of virtualization.
Multitenant software: Multi
-
entity support, Multi
-
schema approach, Multi
-
tenance using cloud
data stores, Data access control for enterprise

applications
Class Tutorial:

Architecture of
hypervisors

Home Tutorial:

Comparative study SOAP and REST

Presentation:

Virtualization, VM to VM communication


UNIT


III Data in Cloud








7

Data in the cloud: Relational databases, Cloud file systems:

GFS and HDFS, BigTable, HBase
and Dynamo. Map
-
Reduce and extensions: Parallel computing, The map
-
Reduce model,
Parallel efficiency of Map
-
Reduce, Relational operations using Map
-
Reduce, Enterprise batch
processing using Map
-
Reduce. Introduction to cloud d
evelopment, Example/Application of Map
reduce, Features and comparisons among GFS, HDFS etc, Map
-
Reduce model

Class Tutorial:

Daas and offerings

Home Tutorial:

map reduce and programming

Presentation:

Features and comparisons among GFS,HDFS etc


UNIT


I
V Security in Cloud








7

Cloud security fundamentals, Vulnerability assessment tool for cloud, Privacy and Security in
cloud, Cloud computing security architecture: Architectural Considerations
-

General Issues,
Trusted Cloud computing, Secure Executio
n Environments and Communications, Micro
-
architectures; Identity Management and Access control
-
Identity management, Access control,
Autonomic Security. Cloud computing security challenges: Virtualization security management
-


36


virtual threats, VM Security Re
commendations, VM
-
Specific Security techniques, Secure
Execution Environments and Communications in cloud.

Class Tutorial:

Vulnerability assessment tool for cloud, Privacy and Security in cloud

Home Tutorial:

Architecture of trusted cloud computing

Present
ation:

Identity management in cloud.


UNIT


V Issues in Cloud





9

Issues in cloud computing, Implementing real time application over cloud platform, Issues in
Inter
-
cloud environments, QOS Issues in Cloud, Dependability, data migration, streaming in
Cloud, Quality of Service (QoS) monitoring in a Cloud computing environment. Cloud
Middleware. Mobile Cloud Computing. Inter Cloud issues. A grid of clouds, Sky computing. Load
balancing, resource optimization, resource dynamic reconfiguration, Monitoring
in Cloud.

Class Tutorial:

Inter
-
cloud issues

Home Tutorial:
Sky computing

Presentation:

QOS Issues, Cloud middleware.


UNIT


VI Implementation of Cloud





6

Cloud computing platforms Installing cloud platform performance evaluation Features and
functions

of cloud platforms: Xen Cloud Platform, Eucalyptus. OpenNebula, Nimbus, Tplatform..
Apache Virtual Computing Lab (VCL), Enomaly Elastic Computing Platform,

Class tutorial:

Discussion How to install Eucalyptus Cloud

Home tutorial:

Installation of platfor
m

Presentation:

Demonstration and Comparisons of platforms


TOTAL: 45periods

REFERENCES:

1.

Michael Miller, “Cloud Computing”, Pearson Education, New Delhi, 2009

2.

Cloud Computing for Dummies by Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper (Wiley
India Edition
) [soft copy]

3.

Enterprise Cloud Computing by Gautam Shroff,Cambridge [main ref]

4.

Cloud Security by Ronald Krutz and Russell Dean Vines, Wiley
-
India [unit IV]

5.

Google Apps by Scott Granneman,Pearson

6.

Cloud Security & Privacy by Tim Malhar, S.Kumaraswammy, S.L
atif (SPD,O’REILLY)

7.

Cloud Computing : A Practical Approach, Antohy T Velte, et.al McGraw Hill,

8.

Cloud Computing Bible by Barrie Sosinsky, Wiley India

9.

Stefano Ferretti et.al.,

QoS

aware Clouds”, 2010 IEEE 3rd International Conference on
Cloud Computing [Qos Paper]

10.

Mitch Tulloch, “TCP/IP Networking” Lecture Material on web, 2006.

11.

Michael Miller, “Cloud Computing”, Pearson Education, New Delhi, 2009

12.

Introduction to Data Centers,
“Grantt Sauls, Certified Data Centers Specialist, Tutorial.

13.

Brendan O’Brien, Alberto Rodriguez, Stephen Sutherland and Mark Wheatley, “Server
Virtualization Software, Tutorial, 2009.

14.

Scott Lowe, Jason W, Mc. Carty and Mathew K. Johnson, “VMware, Vsphere 4
Administration, Instant Reference. Published by Sybex, 2009.


Further Reading:

CSA 3.0
,
Eucalyptus
,
handbook of CC
,
performance
,


Beyond the Syllabus


1.

Academic Integrity using Clou
d Environment


37


2.

Managing computational infrastructure to third parties such as Google, Microsoft, or
Amazon.


Web References

1.

https://www.cloudsigma.com/cloud
-
computing/what
-
is
-
the
-
cloud

2.

http://www.cloudcomputingexpo.com/

3.

http://www.ibm.com/cloud
-
computing/us
/en/

4.

https://cloud.google.com/

5.

http://www.saba.com/

6.

www.rackspace.com/cloud

7.

www.cloudcomputingexpo.com

8.

www.ibm.com/cloud
-
computing/us/en

9.

https://www.cloudsigma.com/cloud
-
computing/what
-
is
-
the
-
cloud

10.

h
ttp://www.cloudcomputingexpo.com/

11.

http://www.ibm.com/cloud
-
computing/us/en/

12.

https://cloud.google.com/


BEYOND THE SYLLABUS


How cloud contact centers are changing business
-

Increasing emphasis on better networking in
the Cloud

-

Cloud based website security services
-

Five ways cloud computing can speed up
your projects

Increased security in

the cloud with google.


Academic Integrity using Cloud Environment


Managing computational infrastructure to third parties such as Google, Microsoft, or Amazon.


38


PEWNIC20
PKI










L T P C












3 0 0 3


AIM

It aims
to process

of providing s
trong authentication and examine the functions of a certification
authority.


Objective:



To understand about the encryption concepts



To learn more about PKI standards and security issues



To improve the diffusion of electronic signatures into European marke
ts six concrete measures

are suggested.


UNIT I


Introduction








9



Basic Encryption Concepts, Attacks Against Encryption, Understand Private Key Encryption, Public Key
Encryption.


UNIT II

Cryptography Fundamentals






9


Cryptography Fundamentals
, Cryptographic Algorithm and protocols, Symmetric Key Encryption
Algorithms, Public Key Algorithms, Cryptographic issues, Strong Authentication, Digital Signatures.


UNIT III

PKI Standard








9


PKI Standards, PKI Fundamentals, Implementing Security.


UNIT IV

Key Management







9

Key Management;

ElGamal Algorithm, Needham Schroeder Protocol,

Understand Trust in the System,
Sign
-
On Solution
s, Secure E
-
Mail Implementation,


UNIT V


Security and Application






9



File Encryption Solutions, PKI Soluti
ons and Applications, Legal Issues of Network

Security,RSA,SSL





TOTAL : 45 periods

Reference books:

.”Crytography and network security “ by William Stallings

2.”Planning for PKI” by Russ Housley, Tim Polk

3. “Understanding the public key Infrastructure
” by Steve Lioyd,Carlisle Adams

4.”Public key Infrastructure” by John R.Vacca
.


Beyond the Syllabus



PKI Planning and Requirements Analysis



Applications and Protocols
-
Pretty Good Privacy (PGP)



Certification Authorities

Web References

1.

learn.myskillsource.co
m/CourseCatalog/.../course_
syllabus
.asp?...2396

2.

www.ipc.on.ca/images/resources/bio
-
encryp.pdf



39



PEWNIC21
ETHICAL HACKING

AND CYBER LAWS






L T P C












3 0 0 3

AIM

To understand, analyze the need for organization’s information security in various l
evels.



OBJECTIVES

Ethical hacking offers an objective analysis of an organization’s information security posture for
organizations of any level of security expertise.


UNIT I












9

Basics of Information System, The changing nature of Information S
ystem, Threats of
Information System, Threats and attacks, Classification of Threads and attacks, The Business
Aspects of Penetration Testing: Security Fundamentals


Security Testing


Hacker and
Cracker Descriptions


Ethical Hackers


Test plans
-
Keeping

It Legal


Ethical and Legality.
The Technical Foundations of Hacking: The attackers Process


The ethical hackers process


Security and the stack. Foot printing and scanning: Determining Assessment Scope


The
seven step information gathering process.


UNIT II











10

Enumeration and Step
-
by
-
Step System Hacking: The architecture of windows computer


Enumeration


Windows Hacking. Linux and automated Security Assesment Tools: Linux


automated Assesment Tools


Picking the right platform. Trojans an
d Backdoors: Overview of
Trojans


Convert Communications


Trojan and Backdoor countermeasures, Security Policy,
Standards, Responsibility for Information Security Management, Building Blocks of Information
Security, Basic principal of Information Systems

Security, Information Security risk analysis,
Term and Definitions for Risk Analysis of Information Security, Risk Management and Risk
Analysis, Data Privacy Fundamentals, The Business Aspects of Penetration Testing, The
Technical Foundations of Hacking,
Foot printing and scanning, Enumeration and Step
-
by
-
Step
System Hacking


UNIT III











9

Trojans and Backdoors, Sniffers, session Hijacking and Denial of Service,

Web Server Hacking,
Web application Vulnerabilities and Database Attacks, Wireless Techn
ologies, Security and
Attacks, Wireless LANs


Wireless Hacking Tools


Securing wireless Networks.


UNIT IV











8

Firewalls


Buffer overflows, Viruses and Warms
-
Security Auditing
-

Random oracle model,
Cryptographic Attacks, Cryptographic Attacks an
d Defenses


Functions


History


Algorithms


Hashing


Digital Signatures


Steganography


Digital Certificate


Public Key Infrastructure


Protocols, standards, and applications


Encryption Cracking and Tools, Phisical Security and
Social Engineerin
g



UNIT V











9

Social Engineering, Mail bombs, Cyber Crime Investigation and cyber security, Understanding
Copy Right in Information Technology, Understanding the technology of Software software
-
copyright vs Patent debate Authorship, Assignment iss
ues Commissioned work, Work for hire
Idea/Expression dichotomy, Copy right in internet, Legal Issues in internet and Software
Copyright Jurisdiction Issues,

Copyright Infringe Remedies of Infringement Multimedia,

40


Copyright issues Software Piracy, Patents u
nderstanding, Cyber Crimes, Understanding Cyber
Crimes in context of Internet, Indian Penal Law & Cyber Crimes Fraud Hacking Mischief

Indian Legal Position on E
-
Commerce IT Act 2000/Indian Evidence Act/Draft law on E
-
Commerce










TOTAL: 45 periods


BE
YOND THE SYLLABUS


1.

Google Hacking

2.

Linux Hacking

3.

Email Hacking

4.

Mobile Phone Hacking


TEXT BOOK

1.

Michael Gregg, “
Certified Ethical Hacker Exam Prep”,
Pearson Certification, April 07,
2006. Print
ISBN
-
10:

0
-
7897
-
3531
-
8,
Print ISBN
-
13:

978
-
0
-
7897
-
3531
-
7.

2.

Gray H
at Hacking: The Ethical Hackers Handbook by Shon Harris

3.

“Cyber Law and IT Protection” by Harish Chander , PHI Learning ,2012.




WEB REFERENCES


1.

http://www.ankitfadia.in/

2.

http://www.ethicalhacking.com/

3.

www.sli
deworld.com/pptslides.aspx/hacking
-
tutorial


4.

freepdfdb.com/ppt/ethical
-
hacking
-
tutorial


5.

www.nc
-
net.info/.../Ethical_Hacking_Presentation_
October_2006.
ppt


6.

samsclass.info/123/
ppt
/ch01.
ppt