CS

defiantneedlessNetworking and Communications

Oct 23, 2013 (3 years and 7 months ago)

70 views


LESSON PLAN


Teacher:Ankita Mehrotra File Name: LP- ECS-701-AM.doc
Subject Code:EIT-801 Subject Name: CRYPTOGRAPHY
Session:2011-2012 Group: 08 CS (A+B)

Le
ct.
N
o.
Ref.
Pt.
Topics to be covered



UNIT:1
1

1.1


Goals and Applications of Networks

2

1.2

Network structure and architecture

3

1.3


The OSI reference model

4

1.4

services, Network Topology Design

5

1.5

Delay Analysis, Back Bone Design
6

1.6

Local Access Network Design

7

1.7

Physical Layer Transmission Media,
8

1.8

Switching methods

9

1.9

ISDN, Terminal Handling



UNIT:2
10

2.1

Medium Access sub layer

11

2.2

Channel Allocations
12

2.3

LAN protocols
13

2.4

ALOHA protocols

14

2.5

Overview of IEEE standards - FDDI.

15

2.6

Data Link Layer
16

2.7

Elementary Data Link Protocols
17

2.8

Sliding Window protocols
18

2.9

Error Handling



UNIT:3
19

3.1

Network Layer - Point - to Pont Networks

20

3.2

Routing
21

3.3

Congestion control

22

3.4

Internetworking -TCP / IP
23

3.5

IP packet

24

3.6

IP address, IPv6


UNIT:4

29

4.1

Symmetric key distribution

30

4.2

Diffie-Hellman Key Exchange
31

4.3

Public key distribution

32

4.4

X.509 Certificates,
33

4.5

Public key Infrastructure

34

4.6

Authentication Applications: Kerberos


35

4.7

Electronic mail security: pretty good privacy (PGP), S/MIME.



UNIT:5
36

5.1

IP Security: Architecture, Authentication header

37

5.2

Encapsulating security payloads

38

5.3

Combining security associations
39

5.4

key management
40

5.5

Introduction to Secure Socket Layer, Secure electronic, transaction
(SET)

41

5.6

Introductory idea of Intrusion, Intrusion detection

42

5.7

Viruses and related threats
43

5.8

Firewalls


References:
1. William Stallings, Cryptography and Network Security: Principals and Practice,
Pearson Education.
2. Behrouz A. Frouzan: Cryptography and Network Security, TMH
3. Bruce Schiener, Applied Cryptography. John Wil ey & Sons
4. Bernard Menezes, Network Security and Cryptography, Cengage Learning.
5. Atul Kahate, Cryptography and Network Security, TMH

Lesson Plan


Teacher Ashutosh Pandey File Name: LP-ECS087-AP.doc
Subject Code ECS087 Subject Name MOBILE COMPUTING
Session 2011-12 Group 08CSA, 08CSB, 08IT
Lecture
No. Ref. Pt.

Topics to be Covered Remarks




Unit
-
1



1

1
.1

Introduction


2 1.2 issues in mobile computing
3 1.3
overview of wireless telephony:
cellular concept
4 1.4 GSM: air-interface
5 1.5 channel structure
6 1.6
location management: HLR-VLR

7 1.7
hierarchical

7 1.8
handoffs

7 1.9 channel allocation in cellular systems
8 1.10 CDMA
9 1.11 GPRS




Unit
-
2



10 2.1 Wireless Networking
10 2.2
Wireless LAN Overview: MAC issues

11 2.3
IEEE 802.11

12 2.4 Blue Tooth
13 2.5 Wireless multiple access protocols
14 2.6 TCP over wireless

14 2.7 Wireless applications
15 2.8
data broadcasting, Mobile IP

16 2.9
WAP: Architecture, protocol stack

17 2.10 application environment, applications


Unit
-
3



18 3.1 Data management issues
19 3.2 data replication for mobile computers
20 3.3
adaptive clustering for mobile wireless
networks
21 3.4 File system
22 3.5
Disconnected operations



Unit
-
4



23 4.1
Mobile Agents computing

24 4.2
security

25 4.3 fault tolerance
26 4.4
transaction processing in mobile
computing environment





Unit
-
5



27 5.1 Ad Hoc networks
28 5.2 localization
29 5.3 MAC issues
30 5.4 Routing protocols
30 5.5 global state routing (GSR)
31 5.6
Destination sequenced distance vector
routing (DSDV)
32 5.7
Ad Hoc on demand distance vector
routing (AODV)
33 5.8
Temporary ordered routing algorithm
(TORA)
34 5.9 QoS in Ad Hoc Networks
34 5.10 applications













Text Books:

1. J. Schiller, Mobile Communications, Addison Wesley

2. A. Mehrotra , GSM System Engineering.

3. M. V. D. Heijden, M. Taylor, Understanding WAP, Artech
House.

4. Charles Perkins, Mobile IP, Addison Wesley.

5. Charles Perkins, Ad hoc Networks, Addison Wesley.

Reference Books/Websites:

1. Mobile Computing, Prof.(Dr.) B. K. Gupta, Khanna ubliushers

2. IIT Kanpur Dept Of Computer Science Website

3. Different website


Instruction Plan
Details

Lecture No. Ref. Pt. Topics to be Covered
Unit-1
1 1.1
Introduction
2 1.2 issues in mobile computing
3 1.3 overview of wireless telephony: cellular concept
4 1.4
GSM: air-interface
5 1.5 channel structure
6 1.6 location management: HLR-VLR
7 1.7 hierarchical
7 1.8 handoffs
7 1.9 channel allocation in cellular systems
8 1.10
CDMA
9 1.11 GPRS
Unit-2
10 2.1 Wireless Networking
10 2.2
Wireless LAN Overview: MAC issues
11 2.3 IEEE 802.11
12 2.4
Blue Tooth
13 2.5 Wireless multiple access protocols
14 2.6
TCP over wireless
14 2.7 Wireless applications
15 2.8
data broadcasting, Mobile IP
16 2.9 WAP: Architecture, protocol stack
17 2.10
application environment, applications
Unit-3
18 3.1 Data management issues
19 3.2
data replication for mobile computers
20 3.3 adaptive clustering for mobile wireless networks
21 3.4 File system
22 3.5 Disconnected operations
Unit-4
23 4.1 Mobile Agents computing
24 4.2
security
25 4.3 fault tolerance
26 4.4
transaction processing in mobile computing
environment
Unit-5
27 5.1 Ad Hoc networks
28 5.2 localization
29 5.3 MAC issues
30 5.4 Routing protocols
30 5.5 global state routing (GSR)




LAB CONDUCT PLAN


Teacher KRISHAN KUMAR
Subject Code ECS-851
Subject Name Artificial Intelligence Lab
Session 2011-12
Group 08CSA, 08CSB

Class
No.
Name of experiment
1. Introduction of LISP language
2. Arithmetic and logical operation & function defining in LISP
3.
Conditional and format functions in LISP
4. Iteration and property list, mapping function
5. Water jug problem using LISP
6. Introduction of PROLOG language
7. Arithmetic and logical operation in PROLOG
8. Conditional statements and looping in PROLOG
9. Creating knowledge base and Inference rules
10. Solving Monkey banana problem using PROLOG

A. LAB CONDUCT PLAN:
1. Explain today’s lab objective
2. Explain the concept on board
3. Demonstrate the concept
4. Giving assignment to repeat and releasing the concept

B. LAB EVALUATION/MARKING SCHEME
Total internal marks (Each 2 marks for each experiment performance): 20
Attendance marks: 5
31 5.6
Destination sequenced distance vector routing
(DSDV)
32 5.7 Ad Hoc on demand distance vector routing (AODV)
33 5.8
Temporary ordered routing algorithm (TORA)
34 5.9 QoS in Ad Hoc Networks
34 5.10 applications

Lab Record (File) : 5
Internal Viva/Quiz 10