M.TECH. SOFTWARE ENGINEERING

skillfulwolverineΛογισμικό & κατασκευή λογ/κού

2 Δεκ 2013 (πριν από 3 χρόνια και 4 μήνες)

119 εμφανίσεις


1


M.
TECH
. SOFTWARE ENGINEERING


SEMESTER I


S.No

Subject
Code

Subject

L

T

P

C

Theory

1

P1MAC08

Mathematical Foundation for Software
Engineering

3

1

0

4

2

P1SEC01

Software Documentation

3

1

0

4

3

P1SEC02

Advanced Software Engineering

3

1

0

4

4

P1SEC03

Object Oriented Software Engineering

3

1

0

4

5

*****

Elective I

3

0

0

3

Practical

6

P1SEC04

Software Engineering Lab
-
I

0

0

3

2

Total Credits


21


SEMESTER II


S.No

Subject
Code

Subject

L

T

P

C

Theory

1

P2SEC05

Formal Methods and Requirement
Engineering

3

1

0

4

2

P2SEC06

Software Reuse

3

1

0

4

3

P2SEC07

Software Quality Assurance

3

1

0

4

4

P2SEC08

Software Testing

3

1

0

4

5

*****

Elective II

3

0

0

3

Practical

6

P2SEC09

Software Testing Lab

0

0

3

2

7

P2SEC10

Software Engineering Lab
-
II

0

0

3

2

Total Credits

23


SEMESTER III

S.No

Subject
Code

Subject

L

T

P

C

Theory

1

*****

Elective III

3

0

0

3

2

*****

Elective IV

3

0

0

3

3

*****

Elective V

3

0

0

3

Practical

4

P3SEC11

Project Phase I

0

0

12

6

Total Credits

15


L


Lecture; T


Tutorial; P


Practical; C


Credit


2



SEMESTER IV

S.No

Subject
Code

Subject

L

T

P

C

Practical

1

P4SEC12

Project Phase II

0

0

24

12

Total Credits

12








Over all Total Credits = 71

LIST OF ELECTIVES


S.No

Subject
Code

Subject

L

T

P

C

1

PESEC13

Secured Software Development

3

0

0

3

2

PESEC14

Language Technologies

3

0

0

3

3

PESEC15

Design Patterns

3

0

0

3

4

PESEC16

Personal and Team Software Process

3

0

0

3

5

PESEC17

Component Based Technology

3

0

0

3

6

PESEC18

Object Oriented
Systems

3

0

0

3

7

PESEC19

Software Design

3

0

0

3

8

PESEC20

Software Agents

3

0

0

3

9

PESEC21

Software Project Management

3

0

0

3

10

PESEC22

User Interface Design

3

0

0

3

11

PESEC23

Learning Technologies

3

0

0

3

12

PESEC24

Mobile Computing

3

0

0

3

13

PEITC07

Web Technology

3

0

0

3

14

PEITC34

XML and Web Services

3

1

0

4

15

PECSC13

Data Mining and Data Warehousing

3

0

0

3

16

PECSC16

Adhoc Networks

3

0

0

3

17

PESEC25

Software Reliability and Metrics

3

0

0

3

18

PESEC26

Storage Area Networks

3

0

0

3

19

PE
ES
C25

Embedded System Design

3

0

0

3

20

PECS
C
24

Software Architecture

3

0

0

3

21

PECSC2
7

Virtualization Techniques

3

0

0

3

22

PEITC08

Cloud Computing

3

0

0

3



L


Lecture; T


Tutorial; P


Practical; C


Credit


3


SEMESTER I


P1MAC08
MATHEMATICAL FOUND
ATION FOR SOFTWARE ENGINEERING

L T P C




(M.E SOFTWARE)






3 1 0 4


UNIT
-
I PROBABILITY AND RANDOM VARIABLES





9+3

Axioms of probability


random variables


mathematical expectation
-

moment generating function


standard probability distributions


binomial, Poisson distributions


uniform distribution


exponential
distribution


normal distribution


functions of r
andom variables


UNIT
-
II RANDOM PROCESSES







9+3

Definition and description


random processes

stationary random processes


autocorrelation and cross
-
correlation functions and their properties


ergodic processes


UNIT
-
III SPECIAL RANDOM PROCESSES






9+3

Sine wave process


binomial, Poisson and normal processes


Markov process


Markov chains


transition probability matrix


steady
-
state distribution


classification of states of Markov chains


birth
and death process


UNIT
-
IV QUEUEING THEORY







9+3

Basics of queueing models


(M
-
M
-
1):(


/FIFO) model
-

(M
-
M
-
s):(


/FIFO) model
-
(M
-
M
-
1):(k/FIFO)
model
-

(M
-
M
-
s):(k/FIFO) model


(M
-
G
-
1) queueing model


Pollaczek
-
Khinchine formula


UNIT
-
V CLASSICAL OPTIMIZATION THEORY





9+3

Unconstrained proble
ms of maxima and minima


sufficient conditions for maxima and minima


constrained problems of maxima and minima


constraints in the form of equations


Lagrangian method


sufficient conditions for maximum and minimum


constraints in the form of inequa
lities


Kuhn
-
Tucker
conditions

TOTAL : 45+15(Tutorial) = 60 periods

TEXT BOOKS:

1. V. Sundarapandian, “Probability, Statistics and Queuing Theory”, PHI Learning, New Delhi, 2009.

2. H. Taha, “Operations Research”, eighth edition, Pearson education, New D
elhi, 2002.

REFERENCES:

1.

B.S. Grewal, “Higher Engineering Mathematics”, Khanna Publishers, New Delhi, 2005

2.

S.M. Ross, “Introduction to Probability Models”, eighth edition, Academic Press, San Diego, 2004.

3.

J.N. Kapur and H.C. Saxena, “Mathematical
Statistics”, S. Chand & Co, New Delhi, 2003

URL:

www.am.qub.ac.uk/users/g.gribakin/sor/chap1a.pdf

www.slideshare.net/guest44b78/probability
-
concepts
-
applications

www.vassarstats.net/bayes.html

www.borooah.com/teaching/microeco
nomics/bayes.pdf

www.ccs.neu.edu/course/.../probability/conditionalprobability.pdf

www.youtube.com/watch?v=2aplzhsesiw

www.cs.utexas.edu/~browne/.../papers/simplequeuingmodelspdf.pdf

web.pdx.edu/~stipakb/.../queuingmodelsingleserverformulas.html

www.slideshare.net/amitcyrus/queuing
-
theory

http://tutorial.math.lamar.edu/Classes/CalcIII/LagrangeMultipli
ers.aspx

http://www.economics.utoronto.ca/osborne/MathTutorial/KTCF.HTM

http://www.economics.utoro
nto.ca/osborne/MathTutorial/KTNF.HTM

Topics beyond the syllabus :
Integer valued programming problems, Bell man optimality
principle.



4



P1SEC01
SOFTWARE DOCUMENTATION



L T P C









3 1 0 4


AIM



To provide an in
-
depth knowledge in Software
Documentation and related issues

OBJECTIVES




To have a thorough understanding of the fundamentals of software documentation.



To discuss in detail the documentation planning.



To study in detail the documentation testing and issues.



To study the
documentation layouts and documentation guidelines.


UNIT I FUNDAMENTALS







9

Need for Software Documentation


Understanding Task Orientation


Analysing Users


Writing User
Scenarios


User Informational Needs


Document Goals


User Work Motivation
s


User Analysis
Checklist


Constructing a Task List


Categorization


Writing Steps as Actions


Task Analysis.


UNIT II DOCUMENTATION PLANNING





9

Planning and Writing Documents


Task List and Schedule


Guidelines


Documentation Process


Docume
ntation Plan


Document Review Form


Review Plan


Schedule


Checklist.


UNIT III DOCUMENTATION TESTING





9

Usability Tests


Advantages of Field Testing


Editing and Fine Tuning


Problems


Designing for Task
Orientation


Page Showing Elements of
Document Design


Screen Showing Elements for Online Help
Design


Solutions to the Design Problem for Printed and Online Documentation.


UNIT IV DOCUMENTATION LAYOUTS





9

Laying Out Pages and Screens


Elements of Page and Screen Design


Designing Typ
e


Effective
Writing Style


Using Graphical that Support Decision Making


Functions of Graphics


Type and
Elements of Graphics.


UNIT V DOCUMENTATION GUIDELINES





9

Writing to Guide


Procedures


Guidelines


Writing to Support


Reference


Struct
ural


Reference
Entry


Checklist


Designing Index


User Oriented Index


Case Studies.


TOTAL : 45+15(Tutorial) = 60 periods


REFERENCES

1. Thomas T. Barker, “Writing S/W Documentation
-

A Task Oriented Approach”, Allyn & Bacon Series of
Technical
Communication, 1998.

2. Edmond H. Weiss, “How To Write Usable User Documentation”, Second Edition, Oryx Press, 1991.


WEB REFERENCES

1.

www.cs.toronto.edu/~yijun/csc408h/handouts/
lecture
5.pdf

2.

www.literateprogramming.com/cse
1402
.pdf


3.

www.ceur
-
ws.org/Vol
-
1 1
/ ORUM
1
.pdf


4.

www2.cs.uidaho.edu/~jeffery/courses/383/
lecture
.html



BEYOND THE SYLLABUS

Product Documentation


System Documentation





5


P1SEC02
ADVANCED
SOFTWARE ENGINEERING




L T P C











3 1 0 4

AIM


To provide an in
-
depth
knowledge about computer Network models and data communication

OBJECTIVES



To have a thorough understanding about the basics of computer network and layered approach.



To discuss about the physical and data link layer importance and issues.



To study in
detail the packet delivery and session management.



To study the network applications and ATM networks.


UNIT


I
SOFTWARE DEVELOPMENT TECHNIQUES





9

Review of software development techniques: Life cycle models: water fall, prototyping, rapid application
development, spiral model, component based model. Development Approach: Object oriented Analysis
and Design


Artifacts. Introduction to Patterns
-

Application of Paaterns.


UNIT


II
MEASUREMENT AND EXPERIMENTATION




9


Introduction
-

the basics of measur
ement
-
goal based frame work for measurement
-
empirical
investigation
-
software metrics data collection


analyzing software measurement data.


UNIT


III
AGILE AND ITERATIVE DEVELOPMENT





9

Introduction
-
Iterative and Evolutionary
-
agile
-
motivation
-

Scrum
-
Ex
treme Programming
-
Unified Process.


UNIT


IV
DISTRIBUTED SOFTWARE ENGINEERING




9

Distributed systems issues
-

Client

server computing
-

Architectural patterns for distributed systems
-
Software as a service. Service
-
oriented Architecture
-

Services as reusab
le components
-
Service
engineering
-

Software development with services. Embedded Systems: Embedded systems design
-

Architectural patterns
-
Timing analysis. Real time operating systems.


UNIT


V

WEB ENGINEERING







9

An introduction to web
engineering
-
Requirements engineering for web application
-
Modeling web
applications
-
web application architecture
-
technology are web

application Design

Testing web
application
-
web application development process performance

of web applications

TOTAL :
45+15(Tutorial) = 60 periods


TEXT BOOK

1.

Ian Sommerville, “Software Engineering”, 9th Edition, 2010, University of St Andrews, Scotland.


REFERENCES

1. Dan Pilone and Neil Pitman, “UML 2. 0 In A Nutshell”, Shroff/o'reilly publisher, 2005.

2. Craig Larman
, “Agile and Iterative Development: AManager;s Guide” Pearson Education 2009.

3. Gerti Kappel, Brigit Proll,Siegfried Reich and Werner Retschitzegger, “Web Engineering”, Wiley India
2009.


WEB REFERENCES

1.

www.cse.msu.edu/~cse870/
lectures
.php

2.

www.cs.missouri.edu/~duan/cs4320/
lectures
.htm


3.

www0.cs.ucl.ac.uk/staff/ucacwxe/
lectures
/
3
C
05
-
04
-
05
/Introduction.pdf


4.

lectures
ppt.blogspot.com/2010/03/
software
-
engineering
-
pdf
-
slides.html



Beyond the syllabus

Implementing Business Rules Using Aspect Orient
ed Programming
-

AOP Tools Comparison .



6



P1SEC03
OBJECT ORIENTED SOFTWARE ENGINEERING



L T P C











3 1 0 4


AIM

To learn about the Engineering concepts with respect to objects


OBJECTIVE




To understand the planning, design and analysis of the
application.



To learn the testing strategies.



To assist in the system maintenance part.


UNIT I
INTRODUCTION








9


Software Engineering Paradigms
-

Software Development process models
-

Project & Process
-

Project
management
-

Process & Project metrics

-

Object Oriented concepts & Principles.


UNIT II
PLANNING & SCHEDULING







9


Software prototyping
-

Software project planning
-

Scope
-

Resources
-

Software Estimation
-

Empirical
Estimation Models
-

Planning
-
Risk Management
-

Software Project
Scheduling
-

Object Oriented
Estimation & Scheduling.


UNIT III
ANALYSIS & DESIGN







9


Analysis Modeling
-

Data Modeling
-

Functional Modeling & Information Flow
-

Behavioral Modeling
-
Structured Analysis
-

Object Oriented Analysis
-

Domain Analysis
-
Obj
ect oriented Analysis process
-

Object Relationship Model
-

Object Behaviour Model.

Design Concepts & Principles
-

Design Process
-

Design Concepts
-

Modular Design
-

Design Effective
Modularity
-

Introduction to Software Architecture
-

Data Design
-

Tran
sform Mapping
-

Transaction
Mapping
-

OOD
-

Design System design process
-

Object design process
-

Design Patterns.


UNIT IV
IMPLEMENTATION & TESTING






9


Top
-

Down, Bottom
-
Up, object oriented product Implementation & Integration. Software Testing
methods
-
White Box, Basis Path
-
Control Structure
-
Black Box
-
Unit Testing
-

Integration testing
-
Validation
& System testing.Testing OOA & OOD models
-
Object oriented testing strategies.



UNIT V
MAINTENANCE








9


Maintenance process
-

System documentation
-
program evolution dynamics
-
Maintenance costs
-
Maintainability measurement
-

Case Studies

TOTAL : 45+15(Tutorial) = 60 periods





7



REFERENCES:


1.

Roger S. Pressman, "Software Engineering A Practitioner's Approach", Fifth Edition, Tata McGraw
Hill

2.

Grady Booch
, James Rumbaugh, Ivar Jacobson
-

"the Unified Modeling Language User Guide"
-

Addison Wesley, 1999. (Unit III)

WEB REFERENCES

1.

www.cs.wfu.edu/~pauca/csc331
-
631/
lecture
1.pdf

2.

www.utdallas.edu/~chung/CS6354/ch01lect1.ppt

3.

http://www.site.uottawa.ca/school/research/lloseng/supportMaterial/slides/


BEYOND THE SYLLABUS

1.

Common design and coding methodologies, including Object
-
Oriented Design (OOD), Design
Patterns, Refactoring, and the Unified Modeling Language (UML)

2.

Standard software engineering tools, including Eclipse, JUnit, JavaDoc, Java Swing, and
Subversion






8


P1SEC04
SOFTWARE ENGINEERING LAB


I





L T P C












0 0 3 2


AIM

To introduce the lab environment and tools used in the software engineering lab

OBJECTIVES



To impart state
-
of
-
the
-
art knowledge on Software Engineering and UML in an interactive manner
through the Web



Present case studies to demonstrate practical applications of different concepts



Provide a scope to students where they can solve smal
l, real life problems


List of Experiments


1.

Identifying the Requirements from Problem Statements

2.

Estimation of Project Metrics

3.

Modeling UML Use Case Diagrams and Capturing Use Case Scenarios

4.

E
-
R Modeling from the Problem Statements

5.

Identifying Domain Classes from the Problem Statements

6.

State chart and Activity Modeling

7.

Modeling UML Class Diagrams and Sequence diagrams

8.

Modeling Data Flow Diagrams

9.

Estimation of Test Coverage Metrics and Structural Complexity

10.

Designing Test Suites










9


SEMESTER II


P2SEC05
FORMAL METHODS AND REQUIREMENTS ENGINEERING

L T P C











3 1 0 4

AIM



To provide an in
-
depth knowledge about formal methods and requirements engineering methods

OBJECTIVES




To have a thorough understanding of the
modeling systems and formal specifications.



To discuss in detail the formal proof with case studies.



To study in detail the requirements engineering, use cases and prototyping.



To study the advanced requirements engineering.


UNIT I FUNDAMENTALS








9


Need for Modeling Systems


Challenges in Software Development


Modeling Computing Systems


Verification


Formal Specification


Advantages and Disadvantages


Approaches to Formal Specification


Formal Specification Languages

Software Tools Supporti
ng Formal Specification


UNIT II FORMAL SPECIFICATION







9


Deficiencies of Less Formal Approaches


Mathematics in Software Development

Formal Methods
Concept


Z
-
Specification


Mathematical Preliminaries


First Order Logic


Sets


Logic
-
Sequences



Applying Mathematical Notation for Formal Specification


UNIT III FORMAL PROOF








9


Methods for Reasoning


Formal Proof


Rigorous Proof


Immanent Reasoning

Reification and
Decomposition


Floyd Hoare Logic


Case Studies


The Bill of Materials
Problem


A Route Planner


Wing’s Library Problem


UNIT IV REQUIREMENTS ENGINEERING






9


The Requirements Problem


Introduction to Requirements Management


Analyzing the Problem


Five
Steps in Problem Analysis


Business Modeling


Understanding Use
r Needs


The Challenge of
Requirements Elicitation


Brainstorming and Idea Reduction


Applying Use Cases


Prototyping


UNIT V ADVANCED REQUIREMENTS ENGINEERING




9


Defining the System

Managing Scope


Refining


Software Requirements


Refining Use
Cases


On
Ambiguity and Specificity


Building the Right System


From Requirements to Implementation


Using
Traceability to Support Verification


Validating System


TOTAL : 45+15(Tutorial) = 60 periods


REFERENCES:


1. Antoni Diller Z., “An Introducti
on to ormal Methods”, 2nd edition, John Wiley & Sons Ltd, 1994.

2. Dean Leffingwell & Don Widrig, “Managing Software Requirements A Unified Approach”, Addison
-
Wesley, 5th Printing, November, 2000.

3. Roger S. Pressman, “Software Engineering, A Practitione
r’s approach”, th Edition, McGraw
-
Hill
International, 2005.



10



P2SEC06
SOFTWARE REUSE






L T P C










3 1 0 4

AIM



To provide an in
-
depth knowledge about Software reuse tools, metrics and components

OBJECTIVES




To have a thorough
understanding of the basics of software reuse and related tools.



To discuss in detail the Reuse Metrics and Reuse Components.



To study in detail the Reuse phases.



To study the clean room software engineering methodologies.



UNIT I FUNDAMENTALS







9

Organizing Reuse


Introduction


Motivation for Reuse


Reuse Driven Organizations


Managing a
Reuse Project


The Characteristics of Reuse of Project


Roles in Reuse Projects


Adopting a Project to
Reuse


Reuse Tools


UNIT II REUSE METRICS







9

M
anaging a Repository


The REBOOT Component Model


Classification


Configuration Management of
the Repository


Managing the Repository


Computer Supported Cooperative Working


Process Metrics
for Reuse


Product Metrics


Cost Estimation


Forming a R
euse Strategy


Assessing Reuse Maturity


UNIT III REUSABLE COMPONENTS






9

Practicing Reuse


Generic Reuse Development Processes


Develop for Reuse


Develop with Reuse


Testing Reusable Components


Object Oriented Components


Techniques and Life
Cycles


Object
Oriented Development for Reuse


Detailed Design for Reuse


Implementation for Reuse


Verification

Test and Validation


UNIT IV REUSE PHASES







9

Development with Reuse


With Reuse Specific Activities


Common Reuse Processes


Phas
es of
Development with Reuse


Impact of Reuse on Development Cycle


UNIT V CLEAN ROOM SOFTWARE ENGINEERNG




9

Re
-
engineering for Reuse


Methodology


Retrieving Objects in Non

Object Oriented Code


Measurements


Tools Support for Re engineering


Over
view of Clean Room Software Engineering


Phases in Clean Room Method


Box Structures Algorithms


Adapting the Box Structures


TOTAL : 45+15(Tutorial) = 60 periods

REFERENCES:

1. Even
-
Andre Karisson, “Software Reuse A Holistic Approach”, John Wiley and
Sons, 1996.

2. Karma McClure, “Software Reuse Techniques Additional reuse to the Systems development process”,
Prentice Hall, 1997.


WEB REFERENCES

1.

www.cdf.toronto.edu/~csc408h/summer/handouts/
lecture
8x4.pdf

2.

faculty.washington.edu/stepp/.../
lectures
/
notes
/00
-
software
lifecycle.ppt


3.

www.csie.nuk.edu.tw/~ayen/teach/se/se
-
note
02
.pdf


4.

www.inf.ed.ac.uk/teaching/courses/.../
notes
/
LectureNotes
05_slides.pd


BEYOND THE SYLLABUS

Software Repositories


ADA and Software reuse.



11



P2SEC07
SOFTWARE QUALITY ASSURANCE





L T P C












3 1 0 4


AIM

To introduce an integrated approach to software development incorporating quality management
methodologies

OBJECTIVE




Software quality models



Quality measurement and metrics



Quality plan, implementation and documentation



Q
uality tools including CASE tools



Quality control and reliability of quality process



Quality management system models



Complexity metrics and Customer Satisfaction



International quality standards


ISO, CMM


UNIT
-
I

CONCEPTS










9


Concepts of Quality
Control


Quality Assurance


Quality Management


Total Quality Management


Cost of Quality


QC Tools


7 QC Tools and Modern Tools


Other Related Topics


Business Process
Re

engineering


Zero Defect


Six Sigma


Quality Function Deployment


Benchma
rking


Statistical
Process Control.


UNIT
-
II SOFTWARE ENGINEERING CONCEPTS






9


Software Engineering Principles


Software Project Management


Software Process


Project and Product
Metrics


Risk Management


Software Quality Assurance; Statistical Q
uality Assurance


Software
Reliability


Muse Model


Software Configuration Management


Software Testing; CASE (Computer
Aided Software Engineering).


UNIT
-
III QUALITY ASSURANCE MODELS







9


Models for Quality Assurance


ISO

9000


Series


CMM


S
PICE


Malcolm Baldrige Award.


UNIT
-
IV SOFTWARE QUALITY ASSURANCE COMPONENTS IN PROJECT LIFE CYCLE

9


Software Process


Definition and Implementation


Internal Auditing and Assessments


Software
Testing


Concepts


Tools


Reviews
-

Integrating qualit
y activities in project life cycle


Inspections &
Walkthroughs


Documentation and Control


Quality of Software Maintenance components
-

PCMM.


UNIT
-
V FUTURE TRENDS









9

PSP


TSP


CMMI


OO Methodology


Clean Room Software Engineering


Defect I
njection and
Prevention.


TOTAL : 45+15(Tutorial) = 60 periods




12


REFERENCES:


1. Watts Humphrey, “Managing Software Process”", Addison Wesley, 1998.

2. Roger Pressman, “Software Engineering”", th Edition, McGraw Hill, 2005.

3. Philip B Crosby, “Quality
is Free the Art of Making Quality certain ", Mass Market, 1992.


WEB REFERENCES

1.

www.inf.ed.ac.uk/teaching/.../
notes
/
LectureNote
20_
SoftwareQuality
.pdf

2.

www.cs.toronto.edu/~yijun/csc408h/handouts/
lecture
5.pdf


3.

web.uettaxila.edu.pk/CMS/SP2012/.../
notes
%5CSQA%20Lec_2.pdf


4.

www.facweb.iitkgp.ernet.in/~spp/lect14.ppt


5.

www.etsmtl.ca/Professeurs/.../Teaching
-
Software
-
Quality
-
Assurance
.pdf



BEYOND THE SYLLABUS

Application Life
-
Cycle Management


-

Secure Application Development







13


P2SEC08
SOFTWARE TESTING






L T P C











3 1 0 4

AIM



To provide an in
-
depth knowledge about software testing concepts and testing tools

OBJECTIVES




To have a thorough understanding of the basics of bugs and testing.



To discuss in detail the path flow testing and
transaction flow testing.



To study in detail the testing metrics and syntax testing.



To study the implementation of software testing and testing tools.


UNIT I FUNDAMENTALS








9

Purpose of Testing


A Model for Testing


A Taxonomy of Bugs


Path Test
ing


Predicates


Path
Predicates and Achieving Paths


Path Sensitizing


Path Instrumentation


Implement and Application of
Path Testing.


UNIT II TRANSACTION

FLOW TESTING






9

Transaction Flows


Transaction


Flow Testing Techniques


Data Flow Tes
ting Basics


Data Flow
Testing Strategies


Domain and Paths


Domain Testing


Domain and Interface Testing


Domains

and Testability.


UNIT III METRICS









9

Metrics


Linguistic Metrics


Structural Metrics


Hybrid Metrics


Metrics Implementatio
n.


UNIT IV SYNTAX TESTING








9

Why


What


and How


A Grammar for formats


Test Case Generation


Implementation and
Application


Logic Based Testing


Overview


Decision Tables


Path Expression


KV Charts


Specifications.


UNIT V IMPLEMENTATION








9

Overview


Strategies for Programmers


Strategies for Independent Testers


Tests for Software
Products


Tools.

TOTAL:

45+15(Tutorial)
= 60

periods


REFERENCES:

1. Boris Beizer, “Software Testing Techniques”, 2nd Edition,
Dream tech press, 2003.

2. Edward Kit, “Software Testing in the Real World
-

Improving the Process”, Pearson Education, 2004.

3. William E. Perry, “Effective methods for software testing”, 2nd Edition, John Wiley, 2000.


WEB REFERENCES

1.

www.inf.ed.ac.uk/tea
ching/.../
notes
/
LectureNote
17_
SoftwareTesting
.pdf


2.

www.ida.liu.se/~TDDC01/
lecture
Material/PUM
-
200
april
-
LC
-
1
.pdf


3.

www.cs.aau.dk/~kgl/TOV03/tretmans
-
notes
.PD


4.

www.slideshare.net/javiergs/
software
-
testing
-
notes
-
part
-
12


5.

www2.informatik.hu
-
berlin.de/~rok/zs/data/scripts/
testing
.pdf



BEYOND THE SYLLABUS

1.

Using a goal
-
driven approach to generate test cases for GUIs

2.

Predicate
-
based test generation for computer programs


3.

The evaluation of program
-
based software test data
adequacy criteria

4.

Automated test oracles for GUIs




14



P2SEC09

SOFTWARE TESTING LAB






L T P C











0 0 3 2

AIM

To provide a practical training in testing software using testing tools

OBJECTIVES



To teach the students to use testing tools to test
software



To implement the path testing, transaction flow testing and data flow testing



To use the tools to measure the Halstead’s Metrics and McCabe’s Metrics.



To simulate a test driver


a simple software testing tool



I. Do the following testing for a
chosen software implementation using any commercial or freeware tools

1. Path

testing

2. Transaction

flow testing

3. Data

flow testing

II. Do the following measurements on a chosen software implementation

1. Halstead’s Metrics

2. McCabe’s Metrics

III.
Simulate a test driver

Develop a simple software testing tool implementing any testing technique of your choice.






15



P2SEC10
SOFTWARE
ENGINEERING

LAB

-

II






L T P C













0 0 3 2


AIM

Identifying a suitable solution for a problem with its suitab
le strategies

OBJECTIVES






To highlight the development methodologies



To know the methodologies implemented in the various stages of development.


This laboratory course gives a complete understanding of the practical application od Software
Engineering
principles and methods.


Develop the following software using Software Engineering Methodology


1.

Student Course Registration

2.

Payroll Processing Application

3.

Banking Process

4.

Library Management System

5.

Railway Reservation System

6.

Trading System

7.

Cellular Phone

8.

Electrical Bill Payment

9.

Result Analysis

10.

Gaming

























16


LIST OF ELECTIVES


PESEC13
SECURED SOFTWARE DEVELOPMENT




L T P C












3 0 0 3

AIM



To provide an in
-
depth knowledge about various security issues and measures in
computing


OBJECTIVES




To have a thorough understanding of security problem in computing and cryptography security.



To discuss in detail
about risk management
.



To study the administration of security and ethical issues.


UNIT I
OVERVIEW OF INFORMATION
SECURITY






9

Introduction:
History of Information Security
-

critical characteristics of information.
NSTISSC security
model:

Components of Information System
-

Securing components.
Balancing information security
and access:

Approaches to information security implementation


SDLC


Security System Development
Life Cycle


SDLC and SecSDLC phase summary.

UNIT II
SECURITY INVESTIGATION







9

Need for security:

Business needs
-

threats: definition
-

categories of threats.
Attac
ks:

Definition
-

types
of attacks.
Secure software development:

Software assurance


software design principles software
development security problems.
Law and ethics in information security:

International Laws and legal
bodies


ethics and information secu
rity
-

codes of ethics and professional organizations

UNIT III
SECURITY ANALYSIS







9

Risk Management
-

overview
-

Risk Identification: Asset identification


vulnerability
-

identification.
Risk
Assessment:

Introduction
-
likelihood
-
risk determination
-
possib
le controls


Risk Control Strategies:

Selecting a risk control strategy
-

qualitative verses quantitative risk control
practices.
Risk management discussion points:

Recommended risk control practices


UNIT IV
SECURITY TECHNOLOGY







9

Firewalls:

Introduction
-

processing modes
-

firewall architectures


selecting the right firewall
-

content
filters.
VPN:

Introduction
-

transport mode
-

tunnel mode.
Intrusion Detection and Prevention
Systems (IDPS): T
ypes
-

IDPS detection methods.
Cryptography:
introduc
tion
-

cipher methods
-

cryptographic algorithms
-
cryptographic tools.

UNIT V
PHYSICAL SECURITY







9

Introduction:
Physical Access Control
-
Major physical security controls.
Fire Security and Safety:
I
ntroduction


Fire detection and response.
Failure of su
pporting utilities and structural collapse:
Heating, ventilation and air conditioning
-

power management and conditioning.
Interception of data:

Mobile and portable system


Special considerations for physical security threats.


TOTAL : 45 periods

REFERENCES:

1. Handbook of Information Security Management
-

Micki Krause, Harold F Tipton
-

Vol 1
-
3 CRC Press
LLC
-

2004

2. Hacking Exposed
-

Staurt Mc Clure, Joel Scrambray , George Kurtz
-

Tata McGrawHill 2003.


WEB REFERENCES

1.

www.cse.sc.edu/~farkas/csc
e548
-
2012/
lecture
-
slides.htm


2.

www.cs.ucf.edu/~czou/CAP6135/
software
-
security
-
intro.ppt

3.

www.slideshare.net/
Software
central/
lecture
-
notes
-
3 45121


4.

www.complang.tuwien.ac.at/b orner/book.pdf


BEYOND THE SYLLABUS

A
dvanced performance tuning, advanced schema and query patterns,


17



PESEC14
LANGUAGE TECHNOLOGIES





L T P C











3 0 0 3

AIM



To provide an in
-
depth knowledge about language
technology concepts and issues

OBJECTIVES




To have a thorough understanding of Natural Language Processing.



To discuss in detail the informal retrieval techniques.



To study in detail the text mining methods and generic issues.



To study the language technol
ogy applications.



UNIT I FUNDAMENTALS








9

Natural Language Processing


Linguistic Background


Spoken Language Input and Output Technologies


Written Language Input


Mathematical Methods


Statistical Modeling and Classification Finite State
Methods Grammar for Natural Language Processing


Parsing


Semantic and Logic Form


Ambiguity
Resolution


Semantic Interpretation


UNIT II INFORMATION RETRIEVAL






9

Design Features


Evaluation Measures


Vector Space Model


Term Distribution Mode
l


Latent
Semantic Indexing


Discourse Segmentation


Search Engine


Features


Performance Measure


NLP
Based Information Retrieval


Information Extraction


UNIT III TEXT MINING








9

Clustering


Hierarchical Clustering


Non Hierarchical Cluste
ring


Text Categorization Decision Tree


Maximum Entropy Model


Perception


K
-
Nearest Neighbor Classification


Use of Categories and
Clusters for Organizing Retrieval Result


UNIT IV GENERIC ISSUES








9

Multilinguality


Multilingual Information
Retrieval and Speech Processing


Multimodality


Text and
Images


Modality Integration


Transmission and Storage


Speech Coding


Evaluation of Systems


Human Factors and User Acceptability


UNIT V APPLICATIONS








9

Machine Translation


Transfer
Metaphor


Interlingua and Statistical Approaches


Discourse Processing


Dialog and Conversational Agents


Natural Language Generation


Surface Realization and Discourse
Planning

TOTAL : 45 periods

REFERENCES:

1. Daniel Jurafsky and James H. martin,
“Speech and Language Processing”, 2000.

2. Christopher D.Manning and Hinrich Schutze, “ oundations of Statistical Natural Language Processing”,
MIT Press, 1999.


WEB REFERENCES

1.

clt.gu.se/page/natural
-
language
-
processing
-
lecture
-
notes

2.

www.cse.iitb.ac.in/~cs626
-
449/cs626.../
lecture
_
notes
/
10
-
01
-
0
.ppt


3.

freepdfdb.com/
ppt
/introduction
-
to
-
information
-
technology
-
lecture
-
notes


BEYOND THE SYLLABUS

Machine Transliteration

-

Interlingua
-
based Machine Translation
-

Handling Translation
DivergenceS




18



PESEC15
DESIGN PATTERN
S







L T
P C











3 0 0 3


AIM



To provide an in
-
depth knowledge about patterns and various design issues

OBJECTIVES




To have a thorough understanding of Design pattern and solving problems.



To discuss in detail the design problems, formatting and user

operations.



To study in detail the creational and structural patterns.



To study the Behavioural patterns with case study.


UNIT I FUNDAMENTALS








9


Design Pattern


Design Pattern in Smalltalk MVC


Describing Design Patterns


Organizing Catalog


Solving Problems using Design Patterns


UNIT II
DESIGNING A DOCUMENT EDITOR






9


Design Problems


Document Structure


Formatting


Embellishing User Interface


Supporting Multiple
Look and Feel


Multiple Window Systems


User Operations


Spell
Check and Hyphenation


UNIT III CREATIONAL PATTERNS







9


Abstract factory


Builder


Factory Method


Prototype


Singleton


UNIT IV STRUCTURAL PATTERNS







9


Adapter


Bridge


Composite


Decorator


Facade Flyweight


Proxy


UNIT V BEHAVIORAL PATTERNS







9

Chain of Responsibility


Command


Interpreter


Iterators


Mediators


Momento


Observer


State


Strategy


Template Method


Visitor


Case Study

TOTAL : 45 periods


REFERENCES


1. Erich Gamma, Richard Helm, Ralph

Johnson, John Vissides and Grady Booch, “Design Patterns”,
Addison Wesley,
2005
.

2. Craig Larman, “Applying UML and Patterns”, Prentice Hall, 2nd Edition, 2002.

3. Thomas Mowbray and Raphel Malveaux, “CORBA and Design Patterns”, John Wiley, 199 .

4. Willi
am J Brown et al., “Anti
-
Patterns Re factoring Software, Architectures and Pro ects in Crisis”, .John
Wiley, 1998.


WEB REFERENCES

1.

www.cs.wustl.edu/~fredk/Courses/cse332/Lectures/
design
_
patterns
_I.
ppt


2.

www.michaelthorn.net/chap01.
ppt

3.

scm0329.googlecode.com/svn
-
history/r78/.../Principles_and_
Patterns
.
pd
..F

4.

i.cs.hku.hk/~clyip/SPACE/CIS212
-
Pgm.../090
-
DesignPatterns
.
pdf


BEYOND THE SYLLABUS

EJB Design Pattern


GoF Design Patterns



19



PESEC16
PERSONAL AND

TEAM SOFTWARE PROCESS



L T P C











3 0 0 3

AIM



To provide an in
-
depth knowledge about personal and team software process management

OBJECTIVES




To have a clear understanding of Software Engineering, Time management, Product Planning
and Managing Schedules.



To discuss in
detail the project planning, product quality and process quality.



To study in detail the Team Software Process strategy.



To study the product implementation and team management.



UNIT I FUNDAMENTALS








9


Software Engineering


Time management


Tracking Time


Period and Product Planning


Product
Planning


Product Size


Managing Your Time


Managing Commitments


Managing Schedules


UNIT II PLANNING









9


The Project Plan


The Software Development Process


Defects


Finding Defects


T
he Code Review
Checklist


Design Defects


Product Quality


Process Quality


UNIT III TSP STRATEGY








9


Team Software Process Overview


The Logic of the Team Software Process


Launching a Team Project


The Development Strategy


The Development
Plan


Defining the Requirement


UNIT IV PRODUCT IMPLEMENTATION






9


Designing with Teams


Product Implementation


Integration & System Testing


The Postmortem


UNIT V TEAM MANAGEMENT







9


The Team Leader Role


Development Manager Role


The
Planning Manager Role


The Quality


Process Manager Role


The Support Manager Role

TOTAL : 45 periods

REFERENCE


1.

Watt S Humphery, “Introduction to Personel Software Process, Addison Wesley, 2000


WEB REFERENCES

1.

www.crosstalkonline.org/storage/issue
-
arch
ives/.../200704
-
Webb.
pdf


2.

seij.dce.edu/vol_2_issue_2/paper4.
pdf


3.

www.secc.org.eg/TSP
-
PSP
-
Courses%20Outlines.
pdf


4.

www.swenet.org/materials/106/pro2
-
lecture
.
ppt



BEYOND THE SYLLABUS

proxy
-
based estimating (PROBE)
-

tracking and prediction using earned value

-

recognizing quality
problems and knowing how to fix them.




20



PESEC17
COMPONENT BASED TECHNOLOGY



L T P C










3 0 0 3

AIM



To provide an in
-
depth knowledge in component based design and programming technology

OBJECTIVES




To have a clear
understanding of Software components, component architecture and
middleware.



To discuss in detail the java component technologies.



To study in detail the CORBA, COM and .NET technologies.



To study the
component frameworks and development
.


UNIT I FUNDAMENT
ALS







9

Software Components


Objects


Fundamental Properties of Component Technology


Modules


Interfaces


Callbacks


Directory Services


Component Architecture


Components and Middleware


UNIT II JAVA COMPONENT TECHNOLOGIES




9

Threads


Ja
va Beans


Events and Connections


Properties


Introspection


JAR files


Reflection


Object Serialization


Enterprise Java Beans


Distributed Object Models


RMI and RMI

IIOP


UNIT III CORBA TECHNOLOGIES






9

Java and CORBA


Interface Definition

Language


Object Request Broker


System Object Model


Portable Object Adapter


CORBA Services


CORBA Component Model


Containers


Application Server


Model Driven Architecture.


UNIT IV COM AND .NET TECHNOLOGIES





9

COM


Distributed COM


Obje
ct Reuse


Interfaces and Versioning


Dispatch Interfaces


Connectable
Objects


OLE Containers and Servers


Active X Controls


.NET Components


Assemblies


App
-
Domains


Contexts


Reflection


Remoting


UNIT V COMPONENT FRAMEWORKS AND DEVELOPMENT



9

Connectors


Contexts


EJB Containers


CLR Contexts and Channels


Black Box Component
Framework


Directory Objects


Cross
-
Development Environment


Component


Oriented programming


Component Design and Implementation Tools


Testing Tools


Asse
mbly Tools


TOTAL : 45 periods

REFERENCES:

1.

Clemens Szyperski, “Component Software Beyond Ob ect
-
Oriented Programming”, Addison
Wesley, 2nd Edition 2002.

2.

Ed Roman, “Enterprise Java Beans”, 3rd Edition, Wiley, 2004.

3.

Andreas Vogel and Keith Duddy, “Java Progr
amming with CORBA”, John Wiley & Sons 1998.

4.

Corry, Mayfield and Cadman, “COM/DCOM Primer Plus”, Techmedia, irst Edition, 1999.

WEB REFERENCES

1.

citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.30.3429...
pdf

2.

ww.seas.gwu.edu/~bell/csci210/
lectures
/
components
.
pdf


3.

www.iist.unu.edu/www/docs/techreports/reports/report330.
pdf


4.

www.cs.vu.nl/~wai/Papers/DKE02.princ.
pdf


BEYOND THE SYLLABUS

Distributed Object Computing


Interoperability




21



PESEC18
OBJECT ORIENTED SYSTEMS





L T P C











3 0 0 3

AIM



To provide an in
-
depth knowledge about design and analysis of object oriented systems

OBJECTIVES




To have a clear understanding of
Object Oriented Design Fundamentals and OOSD life cycle
.



To discuss in detail the
Object Oriented Analysis and various
approaches
.



To study in detail the
Object Oriented Design Methods and UML
.



To study the
Object Oriented Development and case studies
.


UNIT I OBJECT ORIENTED DESIGN FUNDAMENTALS




9


The Object Model


Classes and Objects


Complexity


Classifications


Notation


Process


Pragmatics


Object types


Object State


OOSD Life Cycle.


UNIT II OBJECT ORIENTED ANALYSIS






9


Overview of Object Analysis


Shaller /Mellor


Coad/Yourdon


Rumbaugh


Booch

Object Analysis
Classification


Noun Phrase
approach


Common Class Patterns Approach


Use Case Driven Approach


Classes


Responsibilities and Collaborators.


UNIT III OBJECT ORIENTED DESIGN METHODS





9


UML


Class Diagram


Use case Diagram


Dynamic Modeling


Extensibility

Comparison with

other
Design Methods.


UNIT IV OBJECT ORIENTED DEVELOPMENT





9


OO Design Process and Axioms


Designing Classes


Access Layer


View Layer

Testing.



UNIT V CASE STUDIES IN OBJECT ORIENTED DEVELOPMENT



9


Case study on Analysis


Data Modeling
-

S
oftware Development and Debugging


Software Testing.

Case Stud
:

Expert Systems


Mobile Phone Environment


Real Time Scheduler


Remote Procedure Call
Implementation


TOTAL : 45 periods





22


REFERENCES:


1. Ali Bahrami, “Ob ect Oriented Systems
Development”, McGraw Hill International Edition, 1999.

2. Craig Larman, “Applying UML and patterns”, Addison Wesley, 2000.

3. Booch Grady, “Ob ect Oriented Analysis and Design”, 5th Edition, Addisson Wesley, 199 .

4. Grady Booch, James Rumbaugh, Ivar Ja
cobson, “The Unified Modeling Language User Guide”,
Addison Wesley Longman, 1999.

5. owler, “Analysis Patterns”, Addison Wesley, 199 .

. Shlaer S., Mellor S., “Ob ect Lifecycles Modeling the World in States”, Prentice Hall, 1992.

7. Coad P., Yourdon E
., “Ob ect
-
Oriented Analysis”, Yourdon Press, Prentice Hall, 1990.

8. Graham
-

I, “Ob ect Oriented Methods”, Addison Wesley, 1993.


WEB REFERENCES

1.

https://www2.bc.edu/~bernier/MC697/
LectureNotes
/
LectureNotes
5
.ppt


2.

www.cs.toronto.edu/~sme/CSC340F/slides/11
-
objects
.pdf

3.

www.cs.colorado.edu/~kena/classes/5828/s07/
lectures
/20/
lecture
20
.pdf


4.

www.cse.chalmers.se/edu/year/2010/.../
Lectures
/Slides11Co
nstraints.pdf


BEYOND THE SYLLABUS

Generic programming
-

Exception safety
-

Advanced C++ idioms such as RAII (resource
acquisition is initialization)
-

Smart pointers











23


PESEC19
SOFTWARE DESIGN






L T P C











3 0 0 3

AIM



To provide
an in
-
depth knowledge about architecture, design and analysis software development

OBJECTIVES




To have a clear understanding about

the fundamentals of design process
.



To discuss in detail the
structured system analysis and design
.



To study in detail the
ob
ject oriented analysis and design
.



To study the
various design methods and case studies
.



UNIT I GENERAL DESIGN FUNDAMENTALS





9


The Nature of Design Process


Objectives


Building Models


Constructs


Design Qualities


Assessing
the Design


Desig
n Viewpoints for Software


The Object Model


Classes and Objects


Complexity


Classification


Notation


Process


Pragmatics


UNIT II STRUCTURED SYSTEM ANALYSIS AND DESIGN




9


Structured Design


Design Principles


Problem Partitioning and
Hierarchy


Abstraction


Modularity


Top
-
Down and Bottom
-
Up Strategies


Transformation of a DFD to a Structure Chart


Transform

Analysis


Transaction Analysis


Coupling


Cohesion


Multiple Types of Cohesion in a Module


Data
Design


Normalization



De

Normalization


Procedural Design


UNIT III OBJECT ORIENTED ANALYSIS AND DESIGN




9


Overview of Object Oriented Analysis


Shaler/Mellor


Coad/ Yourdon


Rumbaugh


Booch


Uml


Use
Case


Conceptual Model


Behaviour


Class Analysis Patterns


Overview


Diagrams


Aggregation


UML


Diagrams


Collaboration


Sequence


Class


Design Patterns and Frameworks


Comparison
with other Design Methods


Managing Analysis and Design


Evaluation Testing


Coding


Maintenance


Metrics


UNIT IV DES
IGN METHODS








9


The Architecture Concepts


Design Methods


Design Patterns


Rationale for Methods


Design
Processes and Strategies


Design by Template


Designing with Patterns


Stepwise Refinement


Incremental Design


Prototyping


DSDM


S
tructured Systems Analysis and Structured Design


JSP


JSD.


UNIT V CASE STUDIES








9


Domain Name System


Email


World Wide Web (HTTP)


Simple Network Management Protocol


File
Transfer Protocol


Security


Multimedia Applications


TOTAL : 45
periods




24


REFERENCES:


1. David Budgen, “Software Design”, 2nd Edition, Pearson Education, 2004.

2. Roger S. Pressman, “Software Engineering”, th Edition, McGraw Hill Inc., 2005.

3. Steve McConnell, “Code Complete”, Word Power Publishers, 2001.

4. Ed Down
s, Peter Clare, Jan Coe, “Structured System Analysis and Design Methods Application and
Context “, Prentice Hall, 1998.

5. A. G. Suteliffe, “Human Computer Interface Design”, 2nd Edition Macmillan, 1995



WEB REFERENCES

1.

www.udanium.com/docs/SJSU
-
lecture
-
slides
-
v
3
.pdf


2.

mason.gmu.edu/.../
lecturenotes
621/SWE621
-
1
-
Intro
SoftwareDesign
.pdf


3.

www.control.aau.dk/~henrik/.../GomaaSWE621Fall06
LectureNotes
.pdf

4.

www.sussex.ac.uk/.../
SoftwareDesign
/
Lecture
%20
Notes
/SD
202004
.ppt



BEYOND THE SYLLABUS


Modelling
Languages & Specification
-

Patterns of Specification & Design
-

Programming
Mechanisms for Design
-

Decoupling Theory
-

Refactoring






25


PESEC20
SOFTWARE AGENTS










L T P C











3 0 0 3

AIM



To provide an in
-
depth knowledge about agents,
agent framework and agent reasoning

OBJECTIVES




To have a clear understanding about

the fundamentals of agents and agent programming
paradigms
.



To discuss in detail the

java agents
.



To study in detail the

multiagent systems and intelligent software agents
.



To study the various issues about agents and security.


UNIT I AGENTS


OVERVIEW







9

Agent Definition


Agent Programming Paradigms


Agent Vs Object


Aglet


Mobile Agents


Agent
Frameworks


Agent Reasoning


UNIT II JAVA AGENTS








9

Processes


Threads


Daemons


Components


Java Beans


ActiveX


Sockets


RPCs


Distributed
Computing

Aglets Programming


Jini Architecture


Actors and Agents


Typed and Proactive Messages


UNIT III MULTIAGENT SYSTEMS







9

Interaction between
Agents


Reactive Agents


Cognitive Agents


Interaction Protocols


Agent
Coordination


Agent negotiation


Agent Cooperation


Agent Organization


Self
-
Interested Agents in
Electronic Commerce Applications


UNIT IV INTELLIGENT SOFTWARE AGENTS





9

I
nterface Agents


Agent Communication Languages


Agent Knowledge Representation


Agent
Adaptability


Belief Desire Intension


Mobile Agent Applications


UNIT V AGENTS AND SECURITY







9

Agent Security Issues


Mobile Agents Security


Protecting Age
nts against Malicious Hosts


Untrusted
Agent


Black Box Security


Authentication for Agents


Security Issues for Aglets


REFERENCES
:



1. Bigus & Bigus, “Constructing Intellige
nt agents with Java”, Wiley, 2010
.

2. Bradshaw, “
Software Agents”, MIT
Press, 2012
.

3. Russel & Norvig, “Artificial Intelligence a modern approach”, Prentice Hall, 1994.

4. Richard Murch and Tony Johnson, “Intelligent Software Agents”, Prentice Hall, 2000.

5. Michael Wooldridge, “An Introduction to Multi Agent Systems”, John
Wiley, 2002.


WEB REFERENCES

1.

www.scs.carleton.ca/~arpwhite/courses/.../
notes
/SI%20
Lecture
202
.pdf


2.

www.cs.usask.ca/ftp/pub/aries/ao.pdf


3.

www.ia.hiof.no/softengin/ias/literature/ag/msao.pdf

4.

www.cs.uta.fi/sat/
lectures
/
lecture
-
24
-
01/sat
-
lecture
-
24
-
01.
ppt


5.

www.cs.usfca.edu/~brooks/S03classes/cs486/
lectures
/
lecture
2.
ppt


BEYOND THE SYLLABUS

Autonomous Agents


Heterogeneous Agents.




26



PESEC21
SOFTWARE PROJECT MANAGEMENT



L T P C










3 0 0 3

AIM



To provide an in
-
depth knowledge in
software project management

OBJECTIVES




To have a clear understanding about

the fundamentals conventional software management
.



To discuss in detail the

Software Management Process Framework
.



To study in detail the
Software Management Disciplines
.



To study the
managed and optimized process and case studies
.


UNIT I FUNDAMENTALS







9

Conventional Software Management


Evolution of Software Economics


Improving Software Economics


Conventional versus Modern Software Project Management


UNIT II SOFTWARE MANAGEMENT PROCESS FRAMEWORK


9

Lifecycle Phases


Artifacts of the Process


Model Based Software Architectures


Workflows of the
Process


Checkpoin
ts of the Process
.


UNIT III SOFTWARE MANAGEMENT DISCIPLINES



9

Iterative Process Planning


Organisation and Responsibilities


Process Automation


Process Control
and Process Instrumentation


Tailoring the Process.


UNIT IV MANAGED AND OPTIMIZED PROC
ESS




9

Data Gathering and Analysis


Principles of Data Gathering


Data Gathering Process


Softwaren
Measures


Data Analysis


Managing Software Quality


Defect Prevention.


UNIT V CASE STUDIES







9

COCOMO Cost Estimation Model


Change Metrics


CCPDS

R.


TOTAL : 45 periods


REFERENCES:


1. Walker Royce, “Software Pro ect Management
-

A Unified ramework”, Pearson Education, 2004.

2. Humphrey Watts, “Managing the software process”, Addison Wesley, 1989

3. Humphrey Watts, “Managing the software p
rocess”, Addison Wesley, 1989.

4. Ramesh Gopalaswamy, “Managing Global Pro ects”, Tata McGraw Hill, 2001.

5. Bob Hughes and Mike Cotterell, “Software Pro ect Management”, 3rd Edition, Tata McGraw Hill, 2004.


WEB REFERENCES

1.

www.phindia.com/rajibmall/chapte
rs/
LECTURE
12.
ppt


2.

web.uettaxila.edu.pk/CMS/seSPMbsSp09/
notes
/
Lecture
1.
ppt


3.

www.
project
reference.com/slides/Q7503_1post.
ppt


4.

www.inf.ed.ac.uk/.../
notes
/
LectureNote
07_
ProjectManagement
.
pdf


5.

www.cs.ox.ac.uk/people/michael.wooldridge/teaching/soft.../lect05.
pdf



BEYOND THE SYLLABUS

Project Procurement Management
-

Plan Procurements
-

Conduct Procurements
-

Administer
Procurements
-

Close Procurements




27


PESEC22
USER INTERFACE DESIGN




L T P C









3
0 0 3


AIM



To provide an in
-
depth knowledge
about Man
-
Machine interaction

OBJECTIVES




To have a thorough understanding of the basics of human
-
computer interface.



To discuss in detail the windows, presentation styles and various controls.



To study in detail the effective usage of multimedia in UID.



To study the advanced windows layouts and testing tools.


UNIT I FUNDAMENTALS







9


Human


Computer Interface


Characteristics of Graphics Interface


Direct Manipulation Graphical
System


Web User Interface


Popularity


Characteristic &
Principles.


UNIT

II HUMAN COMPUTER INTERACTION




9


User Interface Design Process


Obstacles


Usability


Human Characteristics in Design


Human
Interaction Speed


Business Functions


Requirement Analysis


Direct


Indirect Methods


Basic
Busines
s Functions


Design Standards


System Timings


Human Consideration in Screen Design


Structures of Menus


Functions of Menus


Contents of Menu


Formatting


Phrasing the Menu


Selecting Menu Choice


Navigating Menus


Graphical Menus.


UNIT III WI
NDOWS








9


Characteristics


Components


Presentation Styles


Types


Managements


Organizations


Operations


Web Systems


Device


Based Controls Characteristics


Screen


Based Controls


Operate Control


Text Boxes


Selection Control


Co
mbination Control


Custom Control


Presentation
Control.


UNIT IV MULTIMEDIA







9


Text for Web Pages


Effective Feedback


Guidance and Assistance


Internationalization


Accessibility


Icons


Image


Multimedia


Colouring.


UNIT V WINDOWS

AND
LINUX

LAYOUT


TEST




9


Prototypes


Kinds of Tests


Retest


Information Search


Visualization


Hypermedia


WWW


Software Tools.


TOTAL : 45periods




28


REFERENCES:


1. Wilbent. O. Galitz, “The Essential Guide to User Interface Design”, John Wiley&
Sons, 2001.

2. Ben Sheiderman, “Design the User Interface”, Pearson Education, 1998.

3. Alan Cooper, “The Essential of User Interface Design”, Wiley
-

Dream Tech Ltd., 2002



WEB REFERENCES

1.

www.letu.edu/people/.../pressman
-
ch
-
12
-
user
-
interface
-
design
.
ppt

2.

www.d.umn.edu/~cprince/cours
es/cs3121fall03/
lectures
/

3.

www.cse.lehigh.edu/~glennb/mm/05ui.
ppt


4.

http://s3.amazonaws.com/cramster
-
resource/6800_n_19609.pdf


BEYOND THE SYLLABUS

visual techniques and tools,
including visual languages and visualization
-

multimedia design
considerations and methods
-

adaptive approaches to design, including AI techniques.







29


PESEC23
LEARNING TECHNOLOGIES




L T P C










3 0 0 3

AIM

To
know

how e
-
commerce is conducted and
utilized

in geographically


OBJECTIVES






Provide instant information to prospects and customers by making it possible to view product
descriptions.



Offer an interactive web demo that sells product; publish testimonials.


UNIT I INTRODUCTION







9

Infrastructure for Electronic Commerce
-

Networks
-

Packet Switched Networks
-

TCP/IP Internet protocol
-

Domain name Services
-

Web Service Protocols
-

Internet applications
-

Utility programs
-

Markup
Languages
-

Web Clients a
nd Servers
-

Intranets and Extranets
-

Virtual private Network.


UNIT II CORE TECHNOLOGY







9


Electronic Commerce Models
-

Shopping Cart Technology
-

Data Mining
-

Intelligent Agents


Internet
Marketing
-

XML and E
-
Commerce

-

Elements of E
-
Commerce wi
th
VB
,
ASP
,
SQL
.


UNIT III ELECTRONIC PAYMENT SYSTEMS





9


Real world Payment Systems
-

Electronic Funds Transfer
-

Digital Payment
-
Internet Payment Systems


Micro Payments
-

Credit Card Transactions
-

Case Studies.


UNIT IV SECURITY








9


Threats
to Network Security
-

Public Key Cryptography
-

Secured Sockets Layer
-

Secure Electronic
Transaction
-

Network

Security Solutions


Firewalls
-

Electronic cash over internet, Internet

Security.


UNIT V INTER/INTRA ORGANIZATIONS ELECTRONIC COMMERCE

9


EDI
-

EDI application in business
-

legal, Security and Privacy issues
-

EDI and Electronic commerce
-

Standards
-

Internal Information Systems
-

Macro forces
-

Internal commerce
-

Workflow Automation and
Coordination
-

Customization and Internal com
merce
-

Sup
ply chain Management
-

Case studies
through

internet


TOTAL : 45 periods

REFERENCES:

1. Ravi Kalakota and Andrew B Whinston , Frontiers of Electronic commerce, AddisonWesley, 1996

2. Pete Loshin, Paul A Murphy , Electronic Commerce, II Edition , Jaico
Publishers1996.

3. David Whiteley, e
-

Commerce : Strategy, Technologies and Applications
-

McGraw Hill , 2000

4.
Beginning E
-
Commerce with
VB
,
ASP
,
SQL

Server 7.0
&

MTS

by Mathew Reynolds, Wrox

Publishers


WEB REFERENCES

1.

E
ngineering
ppt
.blogspot.com/2009/.../machine
-
learning
-
notes
-
ppt
-
pdf

2.

Sites.google.com/site/dnsclirconline/
lecture
-
notes

BEYOND THE SYLLABUS

We Scale Machine Learning


M
-
Learning




30


PESEC24
MOBILE
COMMUNICATION





L T P C











3 0 0 3

AIM


Mobile Computing provides

a comprehensive coverage of both the communication and computing
aspects.


OBJECTIVES



Facilitates an insight into the fundamental principles that form the basis of mobile computing



Includes a large number of examples and sample codes that demonstrate how various
technologies are used and integrated



Provides updated coverage of recent trends and developments in mobile computing


UNIT
-
I: FUNDAMENTALS








9


Medium Access Control


Motivation for Specialized MAC


SDMA


FDMA


TDMA


CDMA


Comparison
of Access Mechanisms


Tele communications GSM


DECT


TETRA


UMTS


IMT


200


Satellite
Systems Basics


Routing


Localization


Handover


Broadcast Systems Overview


Cyclic R
epetition of
Data


Digital Audio Broadcasting


Digital Video Broadcasting.


UNIT
-
II: WIRELESS NETWORKS







9


Wireless LAN Infrared Vs Radio Transmission


Infrastructure Networks


Ad hoc Networks


IEEE 802.11


HIPERLAN


Bluetooth


Wireless ATM
Working Group


Services


Reference Model


Functions


Radio Access Layer


Handover


Location Management


Addressing Mobile Quality of Service


Access
Point Control Protocol.


UNIT
-
III: MOBILE NETWORK LAYER






9


Mobile IP Goals


Assumptions and R
equirement


Entities


IP Packet Delivery


Agent Advertisement
and Discovery


Registration


Tunneling and Encapsulation


Optimization


Reverse Tunneling


IPv6


DHCP


Ad hoc Networks.


UNIT
-
IV: MOBILE TRANSPORT LAYER






9


Traditional TCP


Indi
rect TCP


Snooping TCP


Mobile TCP


Fast Retransmit/ Fast Recovery


Transmission/ Timeout Freezing


Selective Retransmission


Transaction Oriented TCP.


UNIT
-
V: WAP










9


Architecture


Datagram Protocol


Transport Layer Security


Transactio
n Protocol


Session Protocol


Application Environment


Wireless Telephony Application.

TOTAL : 45 periods





31


REFERENCES:


1. J.Schiller, “Mobile Communication”, Addison Wesley, 2000.

2. William Stallings, “Wireless Communication and Networks”, Pearson
Education, 2003.

3. Singhal, “WAP: Wireless Application Protocol”, Pearson Education, 2003.

4. Lother Merk, Martin S. Nicklaus and Thomas Stober, “Principles of Mobile Computing”, 2nd Edition,
Springer, 2003.

5. William C. Y. Lee, “Mobile Communication De
sign undamentals”, John Wiley, 1993.


WEB REFERENCES

1.

www.iitg.ernet.in/scifac/qip/public_html/cd_cell/EC632.
pdf


2.

seminarprojects.com/s/
mobile
-
communication
-
lecture
-
notes
-
ppt


3.

kguru.info/t
-
lecture
-
notes
-
on
-
mobile
-
communication
-
ppt




BEYOND THE SYLLABUS


4G Mobile Communications



MOBICOM
-

MOBISYS


SIGCOMM


MOBIHOC


INFOCOM


PERCOM
-








32


PEITC07
WEB TECHNOLOGY






L T P C










3 0 0 3

AIM

Provides information about web technologies that relate to the interface between web servers and their
clients.


OBJECTIVE



To develop web sites which are secure and dynamic in nature and writing scripts which get
executed on server.



Provides the concept of developing advanced HTML pages with the help of frames, scripting
languages, and evolving technology
like DHTML.



To understand web page site planning, management and maintenance.


UNIT
-
I:

INTRODUCTION







9





Introduction


Network concepts


Web concepts


Internet addresses
-

Retrieving Data with URL


HTML
5.0



DHTML: Cascading

Style Sheets
-

Scripting Languages: Javascript


Vbscript.


UNIT
-
II: COMMON GATEWAY INTERFACE





9


Common Gateway Interface: Programming CGI Scripts


HTML Forms


Custom Database Query Scripts


Server Side Includes


Server
security issues


XML.


UNIT
-
III: JAVA PROGRAMMING







9


Java fundamentals: Classes


Inheritance


Packages


Interfaces


Exceptions Handling


Multi
threading
-

Applets


UNIT
-
IV: SERVER SIDE PROGRAMMING





9

Server side Programming


Active server pages


Java server pages


Java Servlets: Servlet container


Exceptions


Sessions and Session Tracking


Using Servlet context


Dynamic Content Generation


Servlet Chaining and Communications.


UNIT
-
V: APPLIC
ATIONS







9

Simple applications


Internet Commerce


Database connectivity


Online databases


EDI Applications
in Business


Plug
-
ins


Firewalls


TOTAL : 45 periods








REFERENCES:

1. Deitel, Deitel and Neito,
“INTERNET and WORLD WIDE WEB


How to program”, Pearson education
asia, 2002

2. D.Norton and H. Schildt, “Java 2: The complete Reference”,
Fifth Edition,
TMH. Elliotte Rusty Herold ,
“Java Network Programming”, O’Reilly Publications, 3
rd

Edition, 2004.

3.E
ric Ladd and Jim O’Donnell, et al, “USING HTML 4, XML, and JAVA1.2”, PHI publications, 2003.


WEB REFERENCES

1.

ebookbrowse.com/we/
web
-
technology
-
notes
-
pdf

2.

www.mhhe.com/socscience/intro/cafe/graphics/apswork.
ppt


3.

www.csce.uark.edu/~sgauch/5013IR/
notes
/CGI
Lecture
.
ppt


BEYOND THE SYLLABUS

Searching and pattern matching using regular expressions


ASP.NET




33


PEITC34
XML AND WEB SERVICES





L T P C










3 0 0 3

AIM


To understand t
he fundamental building blocks in the move to distributed computing on the
Internet’s.


OBJECTIVES





XML Web Services expose useful functionality to Web users through a standard Web protocol.



XML Web services provide a way to describe their interfaces in enough detail to allow a user to
build a client application to talk to the
m.



XML Web services are registered so that potential users can find them easily.



UNIT I INTRODUCTION








9

Role Of XML


XML and The Web


XML Language Basics


SOAP


Web Services


Revolutions Of XML


Service Oriented Architecture (SOA).


UNIT II XML TECHNOLOGY







9

XML


Name Spaces


Structuring With Schemas and DTD


Presentation Techniques


Transformation


XML Infrastructure.


UNIT III SOAP









9

Overview Of SOAP


HTTP


XML
-
RPC


SOAP: Protocol


Message Structure


Intermediaries


Actors


Design Patterns And Faults


SOAP With Attachments.


UNIT IV WEB SERVICES








9

Overview


Architecture


Key Technologies
-

UDDI


WSDL


ebXML


SOAP And Web Services In E
-
Com


Overview Of .NET And J2EE.


UNIT V XML

SECURITY








9

Security Overview


Canonicalization


XML Security Framework


XML Encryption


XML Digital
Signature


XKMS Structure


Guidelines For Signing XML Documents


XML In Practice.


TOTAL : 45 periods

REFERENCES:

1.



Frank. P. Coyle,

XML, Web Services And The Data Revolution, Pearson Education, 2002.

2.

Ramesh Nagappan , Robert Skoczylas and Rima Patel Sriganesh, “ Developing Java Web Services”,
Wiley Publishing Inc., 2004.

3.

Sandeep Chatter ee, James Webber, “Developing Enterprise Web Ser
vices”, Pearson Education, 2004.

4.

McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann Publishers,2005.


WEB REFERENCES

1.

www.cs.huji.ac.il/course/2004/ssd/
webservices
/
WebServices
.
ppt


2.

web
.cecs.pdx.edu/~howe/cs410/
lectures
/
web
svcs.
ppt

3.

www.grid2004.org/spring2004/
WebServices
Overview.
ppt


4.

people.cs.uchicago.edu/~asiegel/courses/cspp51038...07/.../
notes
1.
ppt


BEYOND THE SYLLABUS

Creating a Simple Web Service and
Clients with JAX
-
WS

-

Types Supported by JAX
-
WS

-

Web
Services Interoperability and JAX
-
WS





34



PECSC13
DATA MINI
NG AND DATA WAREHOUSING



L T P C











3 0 0 3

AIM


The aim of this course is to explore reporting functionality in financial information systems.



OBJECTIVES






The Information Integration from multiple systems
-

Single point source for information



To have High Response Time
-

Production Databases are tuned to expected transaction load



To provide an adaptive and flexible source of information.



UNIT I FUNDAMENTALS








9


Relation to Statistics


Databases


Data Mining Functionalities


Steps in

Data Mining Process


Architecture of a Typical Data Mining Systems


Classification of Data Mining Systems


Overview of Data
Mining Techniques.


UNIT II DATA PREPROCESSING AND ASSOCIATION RULES



9


Data Preprocessing


Data Cleaning


Integration


Tr
ansformation


Reduction


Discretization Concept
Hierarchies


Concept Description Data Generalization and Summarization Based Characterization


Mining Association Rules in Large Databases.


UNIT III PREDICTIVE MODELING







9


Classification and
Prediction Issues Regarding Classification and Prediction


Classification by Decision
Tree Induction


Bayesian Classification


Other Classification Methods


Prediction


Clusters Analysis


Types of Data in Cluster Analysis


Categorization of Major Cl
ustering Methods


Partitioning Methods


Hierarchical Methods.


UNIT IV DATA WAREHOUSING







9


Data Warehousing Components


Multi Dimensional Data Model


Data Warehouse Architecture


Data
Warehouse Implementation


Mapping the Data Warehouse to Mul
tiprocessor Architecture


OLAP


Need


Categorization of OLAP Tools.


UNIT V APPLICATIONS








9


Applications of Data Mining


Social Impacts of Data Mining


Tools


An Introduction to DB Miner


Case
studies


Mining WWW


Mining Text Databases


M
ining Spatial Databases.

TOTAL : 45 periods





35


REFERENCES:


1. Jiawei Han, Micheline Kamber, "Data Mining Concepts and Techniques", Morgan Kaufmann Publishers,
2002.

2. Alex Berson, Stephen J Smith, “Data Warehousing, Data Mining & OLAP”, Tata Mcgraw Hill,

2004.

3. Usama M. Fayyad, Gregory Piatetsky , Shapiro, Padhrai Smyth and Ramasamy Uthurusamy, "Advances
In Knowledge Discovery And Data Mining", The M.I.T Press, 1996.

4. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley & Sons Inc., 1998
.

5. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997


WEB REFERENCES

1.

www.cse.iitb.ac.in/dbms/
Data
/Talks/krithi
-
talk
-
impact.
ppt

2.

www.business.mcmaster.ca/courses/com4kd3/
note
/11.
datawarehouse
.
ppt


3.

https://sites.google.com/site/dsce
datawarehousingdata
min/
lecture
-
notes

4.

www.inf.unibz.it/dis/teaching/DWDM/slides2012/dw1_introduction.
pdf

5.

www.cs.uiuc.edu/homes/hanj/bk2/toc.
pdf



BEYOND THE SYLLABUS


Integrating OLAP and mining
-

Online

aggregation






36


PECSC16
AD HOC NETWORKS






L T P C











3 0 0 3

AIM


To provide a thorough knowledge about Wireless Mobile AdHoc Networks


OBJECTIVES




To have an understanding about the Wireless Communication Technology and Ad Hoc Networks.



To discuss about the Ad Hoc Routing Protocols and Multicast
Routing.



To study in detail the transport layer and security issues.



To study the Quality of Service and Energy management.


UNIT I FUNDAMENTALS








9


Introduction


Fundamentals of Wireless Communication Technology


The Electromagnetic Spectrum


Ra
dio Propagation Mechanisms


Characteristics of the Wireless Channel


IEEE 802.11a

b Standard


Origin of Ad hoc Packet Radio Networks


Technical Challenges


Architecture of PRNETs


Components
of Packet Radios


Ad hoc Wireless Networks


What is an Ad

Hoc Network? Heterogeneity in Mobile
Devices


Wireless Sensor Networks


Traffic Profiles


Types of Ad hoc Mobile Communications


Types
of Mobile Host Movements


Challenges Facing Ad hoc Mobile Networks


Ad hoc wireless Internet.


UNIT II AD HOC ROUT
ING PROTOCOLS






9


Introduction


Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks


Classifications of
Routing Protocols


Table

Driven Routing Protocols


Destination Sequenced Distance Vector (DSDV)


Wireless Routing Protocol (WR
P)


Cluster Switch Gateway Routing (CSGR)


Source

Initiated On

Demand Approaches


Ad hoc On

Demand Distance Vector Routing (AODV)


Dynamic Source Routing
(DSR)

Temporally Ordered Routing Algorithm (TORA)


Signal Stability Routing (SSR)

Location

Aide
d
Routing (LAR)


Power

Aware Routing (PAR)


Zone Routing Protocol (ZRP).


UNIT III MULTICASTROUTING IN ADHOC NETWORKS




9


Introduction


Issues in Designing a Multicast Routing Protocol


Operation of Multicast Routing Protocols


An Architecture Refe
rence Model for Multicast Routing Protocols

Classifications of Multicast Routing
Protocols


Tree

Based Multicast Routing Protocols


Mesh

Based Multicast Routing Protocols


Summary
of Tree and Mesh based Protocols


Energy

Efficient Multicasting


Multic
asting with Quality of Service
Guarantees


Application


Dependent Multicast Routing


Comparisons of Multicast Routing Protocols.


UNIT IV TRANSPORT LAYER


SECURITY PROTOCOLS




9


Introduction


Issues in Designing a Transport Layer Protocol for Ad hoc

Wireless Networks


Design
Goals of a Transport Layer Protocol for Ad hoc Wireless Networks

Classification of Transport Layer
Solutions


TCP over Ad hoc Wireless Networks


Other Transport Layer Protocols for Ad hoc Wireless
Networks


Security in Ad Ho
c Wireless Networks


Network Security Requirements


Issues and
Challenges in Security Provisioning


Network Security Attacks


Key Management


Secure Routing in Ad
hoc Wireless Networks.





37


UNIT V QoS AND ENERGY MANAGEMENT






9


Introduction


Issues and Challenges in Providing QoS in Ad hoc Wireless Networks


Classifications of
QoS Solutions


MAC Layer Solutions


Network Layer Solutions


QoS Frameworks for Ad hoc Wireless
Networks Energy Management in Ad hoc Wireless Networks


Introduction



Need for Energy
Management in Ad hoc Wireless Networks


Classification of Energy Management Schemes


Battery
Management Schemes


Transmission Power Management Schemes


System Power Management
Schemes.


TOTAL : 45 periods


REFERENCES:


1. C. Siva Ram

Murthy and B. S. Mano , “Ad Hoc Wireless Networks Architectures and Protocols”, Prentice
Hall, PTR, 2004.

2. C. K. Toh, “Ad Hoc Mobile Wireless Networks Protocols and Systems”, Prentice Hall, PTR, 2001.

3. Charles E. Perkins, “Ad Hoc Networking”, Addison
Wesley, 2000



WEB REFERENCES

1.

www.cs.tut.fi/kurssit/TLT
-
2756/lect03.
pdf


2.

cone.informatik.uni
-
freiburg.de/teaching/.../
Adhocnetworks
.../topics.
ppt


3.

freepdfdb.com/doc/mobile
-
ad
-
hoc
-
networks
-
ppt



BEYOND THE SYLLABUS

Topology Control
-

Geometric Methods


-

Virtual Back Bone
-

Delay Tolerant Networks in VANETs


38


PESEC25

SOFTWARE RELIABILITY AND METRICS





L T P C












3 0 0 3



AIM



To provide an in
-
depth knowledge in
software reliability and metrics

OBJECTIVES




To have a clear understanding
about

the software reliability

fundamentals
.



To discuss in detail the

Software Reliability Modeling
.



To study in detail the
Measurements Theory
.



To study the measurement of
product attributes and management metrics
.


UNIT I FUNDAMENTAL TO SOFTWARE RELIABILITY




9


Basic Concepts


Failure and Faults


Environment


Availability

Modeling


Uses


UNIT II SOFTWARE RELIABILITY MODELING





9


Concepts


General Model Characteristic


Historical Development of Models


Model Classification
Scheme


Markovian Models


General Concepts


General Poisson

Type Models


Binomial


Type
Models


Poisson


Type Models


Fault Reduction Factor for Poisson


Type Models


UNIT III COMPARISON OF SOFTWARE RELIABILITY MODELS



9


C
omparison Criteria


Failure Data


Comparison of Predictive Validity of Model Groups


Recommended
Models


Comparison of Time Domains


Calendar Time Modelling


Limiting Resource Concept


Resource Usage model


Resource Utilization


Calendar Time Esti
mation and Confidence Intervals


UNIT IV MEASUREMENTS THEORY







9


Fundamentals of Measurement


Measurements in Software Engineering


Scope of Software Metrics


Measurements theory


Goal based Framework


Software Measurement Validation


UNIT V PRO
DUCTS AND MANAGEMENT METRICS





9


Measurement of Internet Product Attributes


Size and Structure


External Product Attributes


Measurement of Quality


Quality Management Models


Rayleigh Model


Problem Tracking Report

(PTR) Model


Reliability Gro
wth Model


Model Evaluation


Orthogonal Classification


TOTAL : 45 periods

REFERENCES:

1
.
John D. Musa, Anthony Iannino and Kazuhira Okumoto, “Software Reliability, Measurement, Prediction,
Application, Series in Software Engineering and Technology”, McG
raw Hill, 1987.

2
.
Norman E, enton and Share Lawrence Pfleeger, “Software metrics

, Second Edition, Thomson, 2002.

3
.
John D. Musa, “Software Reliability Engineering”, Tata McGraw Hill, 1999.


WEB REFERENCES

1.

citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.5727...
pdf

2.

e
-
archivo.uc3m.es/bitstream/10016/161/1/ws012014.
pdf


3.

www.sdml.info/collard/seF08/
notes
/
Software
%20
Metrics
.
ppt


BEYOND THE SYLLABUS

software reliability allocations
-

software and hardware
predictions



39



PESEC26
STORAGE AREA NETWORKS






L T P C












3 0 0 3

AIM



To provide a thorough knowledge in
storage area networks

OBJECTIVES




To have a clear understanding about

the basic networking
.



To discuss in detail about the

SAN Technology
.



To study in detail the
storage networking architecture
.



To study the Storage Network Management and designing storage area network.


UNIT I












9


Basic Networking Concepts and Topologies: OSI Reference Model, Common Network
Devices, Network
Topologies, MAC Standards
-

Need for Storage Networks


Storage Devices and Techniques Evolution
and benefits of SANs SAN Components and Building Blocks Fibre Channel Basics: Fibre Channel
Topologies, Fibre Channel Layers, Classes of Servi
ce SAN Topologies


UNIT II











9


SANs Fundamentals: SAN Operating Systems Software and Hardware Types of SAN Technology:
Technology and Configuration, High Scalability and Flexibility Standards Storage Management Challenges
Networked Storage Impleme
ntation Challenges Storage Subsystems for Video Services


UNIT III











9


Storage Networking Architecture Storage in Storage Networking: Challenges, Cost, Performance Network
in Storage Networking: Fibre Channel, Emerging SAN interconnect Technologie
s Basic Software Advanced
Software Backup Software Implementation Strategies


UNIT IV











9


Storage Network Management In
-
Band management Out
-
of
-
Band Management
-
SNMPHTTP
-

TELNET
Storage Network Management Issues Storage Resource Management Storage M
anagement Storage,
Systems, and Enterprise Management Integration


UNIT V












9


Designing and building a SAN
-

Design considerations Business requirements Physical layout Placement
Storage pooling Data availability Connectivity scalability migration

manageability fault tolerance and
resilience
-

prevention of congestion routability
-

backup and restoration
-

SAN Security & iSCSI
Technology Basic security guidelines implementing SAN security Backup and restoration iSCSI technology
-

Future of SANS.





40


REFERENCE
S:


1. Meeta Gupta, Storage Area Network Fundamentals , Cisco Press, 2002

2. John R. Vacca, The Essential Guide to Storage Area Networks , Prentice Hall, 2002

3. Richard Barker, Paul Massiglia, Storage Area Network Essentials , John Wiley & Sons,
Inc., 2002

4. Tom Clark, Designing Storage Area Networks , Addison Wesley Pearson Education (Second Edition)

5. Alex Goldman, Storage Area Networks Fundamentals , Cisco Press 2002

6. Christopher Poelker, Storage Area Networks for Dummies


WEB REFERENCES

1.

ht
tps://learning
network
.cisco.com/servlet/.../6432.../SAN
-
Acorno
-
01.
ppt


2.

seminarprojects.net/q/
lecture
-
notes
-
on
-
storage
-
area
-
network
-
ppt


3.

https://parasol.tamu.edu/~rwerger/Courses/614/lec/Lec08
-
network
1.
ppt


4.

www.comp.hkbu.edu.hk/~comp2330/
lecture
/
notes
/ch08.
ppt

BEYOND THE SYLLABUS

Storage Virtualization


Logic Volume management
-

ZFS






41



PEE
S
C25
E
MBEDDED SYSTEM DESIGN





L T P C

3 0 0 3

AIM


To provide a in
-
depth knowledge about Embedded system design and Embedded processors.

OBJECTIVES



To have an
understanding about Embedded Computing and Embedded C programming.



To discuss about the optimization of assembly code.



To study in detail the
processes and operating systems used in Embedded Systems
.



To study the Embedded system development tools and case
studies.



UNIT I EMBEDDED COMPUTING






9


Challenges of Embedded Systems


Embedded system design process. Embedded processors



ARM
processor


Architecture, ARM and Thumb Instruction sets


UNIT II EMBEDDED C PROGRAMMING





9


C
-
looping structures


Register allocation


Function calls


Pointer aliasing


structure

arrangement


bit
fields


unaligned data and endianness


inline functions and inline

assembly


portability issues.


UNIT III OPTIMIZING ASSEMBLY CODE





9


Profiling and cycle
counting


instruction scheduling


Register allocation


conditional

execution


looping constructs


bit manipulation


efficient switches


optimized primitives.


UNIT IV PROCESSES AND OPERATING SYSTEMS




9


Multiple tasks and processes


Context swit
ching


Scheduling policies


Interprocess

communication
mechanisms


Exception and interrupt handling
-

Performance issues.


UNIT V EMBEDDED SYSTEM DEVELOPMENT




9

Meeting real time constraints


Multi
-
state systems and function sequences. Embedded soft
ware
development tools


Emulators and debuggers. Design methodologies


Case studies


Complete design
of example embedded systems.

TOTAL : 45 periods

REFERENCES


1. Andrew N Sloss, D. Symes, C. Wright, ” ARM System Developers Guide”, Morgan

Kaufmann / El
sevier,
2006.

2. Michael J. Pont, “Embedded C”, Pearson Education , 200 .

3. Wayne Wolf, “Computers as Components : Principles of Embedded Computer

System Design”, Morgan
Kaufmann / Elsevier, 2nd. edition, 2008.

4. Steve Heath, “Embedded System Design” , E
lsevier, 2nd. edition, 2003.


WEB REFERENCES

1.

www.ida.liu.se/~TDTS30/
lectures
/lect1
-
2.frm.
pdf

2.

engineering
ppt
.blogspot.com/.../
embedded
-
system
-
design
-
ppt
-
slides.htm.

BEYOND THE SYLLABUS

Automotive Application


Hardware Synthesis




42



PESEC27
SOFTWARE ARCHITECTURE




L T P C










3 0 0 3


AIM



To provide a thorough knowledge about the modeling and designing of software architecture

OBJECTIVES




To have a clear understanding of
software process.



To discuss in detail about architectural modeling.



To study in detail the
software architecture design
.



To study the architectural description languages and tools.


UNIT I

INTRODUCTION









8

Introduction


software design levels


software engineering discipline


architecture business cycle


architectural patterns


reference models


architectural structures, views


UNIT II


ARCHITECTURAL STYLES








9

Architectural styles


pipes and filters


object
-
orientation


invocation


layered systems


repositories


interpreters


process control


heterogenous architectures


case studies


UNIT III

ARCHITECTURE DESIGN








10

Architecture and functionality


architecture qualities


architecture in the lifecycle
-

Architectural des
ign
-

Shared information systems


database integration


integration in software development environments


architectural structures for shared information systems


UNIT IV

ARCHITECTURAL DESIGN GUIDANCE






9

D
esign space


design rules


applying design space


quantified design space


formal models and
specification


formalizing architectural style, design space
-

z


notation


UNIT V

LINGUISTIC ISSUES









9

R
equirements for architectural description l
anguages


first class connectors


adding implicit invocation
to traditional programming languages


tools for architectural design


universal connector language
-

Software architecture Documentation


reconstruction

TOTAL: 45 PERIODS

REFERENCES:

1. Mary

shaw and David Garlan, Software Architecture


Perspectives on an emerging discipline, Pearson
education, 2008.

2. Len Bass, Paul Clements, Rick Kazman, Software Architecture in Practice, Addison
-

Wesley, 2003.

3. Christine Hofmeister, Robert Nord, Dili
p Soni, Applied Software Architecture: A Practical Guide for
Software Designers, Addison
-
Wesley, 1999

4. David M. Dikel, David Kane, James R. Wilson, Software Architecture: Organizational Principles and
Patterns, Prentice Hall, 2001

5. Jan Bosch, Morven Ge
ntleman, Christine Hofmeister, Juha Kuusela, Software Architecture: System
Design, Development and Maintenance, Springer, 2002

WEB REFERENCES

1.

lecturesppt
.blogspot.com/2011/09/
software
-
architectures
-
ppt
.html


2.

www.softlab.ntua.gr/~kkontog/ECE750
-
3/
software
-
architecture
.
pdf


3.

www.cs.toronto.edu/~sme/CSC340F/slides/21
-
architecture
.
pdf


BEYOND THE SYLLABUS

Anti Patterns


Cloud Computing



43



PECSC26
VIRTUALIZATION TECHNIQUES





L T P C


3 0 0 3


AIM

To develop a focused technology view targeted at Virtualization with a focus on Computing and
Networking
virtualization

.

OBJECTIVE



Computing Virtualization tools, applications and techniques



Network Virtualization



Virtualization and Cloud Computing


UNIT I OVERVIEW OF VIRTUALIZATION






10


Basics of Virtualization
-

Virtualization Types


Desktop Virtualization


Network Virtualization


Server
and Machine Virtualization


Storage Virtualization


System
-
level or Operating Virtualization


Application
Virtualization
-
Virtualization Advantages


Virtual Machine Basics



Taxonomy of Virtual machines
-

Process Virtual Machines


System Virtual Machines


Hypervisor
-

Key Concepts


UNIT II SERVER CONSOLIDATION







8

Hardware Virtualization


Virtual Hardware Overview
-

Sever Virtualization


Physical and Logi
cal
Partitioning
-

Types of Server Virtualization


Business cases for Sever Virtualization


Uses of Virtual
server Consolidation


Planning for Development


Selecting server Virtualization Platform


UNIT III NETWORK VIRTUALIZATION









10


Design of Scalable Enterprise Networks
-

Virtualizing the Campus WAN Design


WAN Architecture
-

WAN
Virtualization
-

Virtual Enterprise Transport Virtualization

VLANs and Scalability
-

Theory Network Device
Virtualization
Layer 2
-

VLANs Layer 3 VRF Instances Layer 2
-

VFIs Virtual Firewall Contexts Network
Device Virtualization
-

Data
-

Path Virtualization Layer 2: 802.1q
-

Trunking Generic Routing Encapsulation


Ipsec L2TPv3 Label Switched Paths
-

Control
-
Plane Virtualiza
tion

Routing Protocols
-

VRF
-

Aware
Routing Multi
-
Topology Routing.


UNIT IV VIRTUALIZING STORAGE





8


SCSI
-

Speaking SCSI
-

Using SCSI buses


Fiber Channel


Fiber Channel Cables


Fiber Channel
Hardware

Devices


iSCSI Architecture


Securing iSCSI


SAN backup and recovery techniques


RAID


SNIA Shared Storage Model


Classical Storage Model


SNIA Shared Storage Model


Host based
Architecture


Storage based architecture


Network based Architecture



Fault tolerance to SAN


Performing Backups


Virtual tape libraries.


UNIT V VIRTUAL MACHINES PRODUCTS





9


Xen Virtual machine monitors
-

Xen API


VMware


VMware products


Vmware Features


Microsoft
Virtual Ser
ver


Features of Microsoft Virtual Server

TOTAL : 45 periods






44


REFERENCES:


1. William von Hagen, Professional Xen Virtualization, Wrox Publications,January, 2008.

2. Chris Wolf , Erick M. Halter, Virtualization: From the Desktop to the Enterprise, APre
ss 2005.

3. Kumar Reddy, Victor Moreno, Network virtualization, Cisco Press, July, 2006.

4. James E. Smith, Ravi Nair, Virtual Machines: Versatile Platforms for Systems and Processes,
Elsevier/Morgan Kaufmann, 2005.

5. David Marshall, Wade A. Reynolds, Adv
anced Server Virtualization:VMware and Microsoft Platform in
the Virtual Data Center, Auerbach Publications, 2006.


WEB REFERENCES

1.

lecturer
.eepis
-
its.edu/~isbat/materikuliah/.../
Virtualization
.
ppt

2.

cs.nju.edu.cn/distribute
-
systems/
lecture
-
notes
/c11.
ppt


3.

https://edux.fit.cvut.cz/oppa/MI
-
POA/prednasky/MI
-
POA
10
.pdf


4.

www.cs.otago.ac.nz/cosc440/
lectures
/
lecture
%2010.
ppt


BEYOND THE SYLLABUS

x86 Virtualization
-

Paravirtualization








45



PEITC08
CLOUD COMPUTING








L T P C

3 0 0 3


AIM

The main purpose of
CLOUD COMPUTING

is to present a basic architecture and service models with
programming models for cloud applications


OBJECTIVE



To understand the concept of Cloud Service
Providers(CSPs)



To create the awareness of resource provisioning in Clouds



To understand the Cloud Computing architectures and programming models.



Developing applications using Enterprise Clouds.



UNIT I UNDERSTANDING CLOUD COMPUTING






6


Cloud Computing


History of Cloud Computing


Cloud Architecture


Cloud Storage


Why
Cloud Computing Matters


Advantages of Cloud Computing


Disadvantages of Cloud Computing


ompanies in the Cloud Today


Cloud Services


UNIT II DEVEL
OPING CLOUD SERVICES







10

Web
-
Based Application


Pros and Cons of Cloud Service Development


Types of Cloud Service
Development


Software as a Service


Platform as a Service


Web Services


On
-
Demand Computing


Discovering Cloud Services Develo
pment Services and Tools


Amazon Ec2


Google App Engine


IBM
Clouds


UNIT III CLOUD COMPUTING FOR EVERYONE






10

Centralizing Email Communications


Collaborating on Schedules


Collaborating on To
-
Do Lists


Collaborating Contact Lists


Cloud Com
puting for the Community


Collaborating on Group Projects and
Events


Cloud Computing for the Corporation


UNIT IV USING CLOUD SERVICES








10

Collaborating on Calendars, Schedules and Task Management


Exploring Online Scheduling Applications


Exp
loring Online Planning and Task Management


Collaborating on Event Management


Collaborating
on Contact Management


Collaborating on Project Management


Collaborating on Word Processing
-

Collaborating on Databases


Storing and Sharing Files


UNIT V
OTHER WAYS TO COLLABORATE ONLINE






9

Collaborating via Web
-
Based Communication Tools


Evaluating Web Mail Services


Evaluating Web
Conference Tools


Collaborating via Social Networks and Groupware


Collaborating via Blogs and Wikis



Total=45
PERIODS





46


REFERENCES


1.

Rajkumar Buyya, Christian Vecchiola, and thamarai Selvi, Mastering Cloud Computing, TMH, New
Delhi, India, 2013.

2.

Toby Velta, Anthony Velte, and Robert Elsenpeter, “Cloud Computing
-
A Practical Approach”,
TMH, 2010

3.

Michael Miller, “Cloud
Comptuign: Web
-
Based Applications That Change the way you work and
collaborate online”, QUE publishing, 2009.

4.

Jeorge Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the
cloud”, O’reilly Applications, 2009.


WEB REFERENC
ES

1.

www.umiacs.umd.edu/~jimmylin/
cloud
-
2008
-
Fall/Session1.
ppt


2.

www.qatar.cmu.edu/~msakr/15319
-
s10/
lectures
/
lecture
11
.pdf


3.

seminarprojects.com/s/
cloud
-
computing
-
lecture
-
notes
-
ppt

4.

www.msit2005.mut.ac.th/msit.../1.../
Lecture
/201206152346105G.
ppt


5.



BEYOND THE
SYLLABUS


Data Center Network Architectures
-

Network Management
-

Resource and Performance Management
-

MapReduce and Scheduling

-