PROPOSED SCHEME (2013) M.E. (IT) 1 SEMESTER S.NO SUBJECT CODE SUBJECT NAME Hours Per Week

tastelessbeachInternet and Web Development

Nov 12, 2013 (3 years and 7 months ago)

98 views


PROPOSED SCHEME (2013)

M.E. (IT)

1
ST

SEMESTER

S.NO

SUBJECT
CODE

SUBJECT NAME

Hours
Per Week

Marks

Credits

L

T

P

INT

EXT

Total


1

ITT501A

INFORMATION
THEORY AND
CODING

4

1

-

40

60

100

4

2

ITT502

MULTIMEDIA
TECHNOLOGIES

4

-

-

40

60

100

4

3

ITT503/
CST503

DIGITAL IMAGE
PROCESSING

4

1

-

40

60

100

4

4

ITT504

COMMUNICATION
SYSTEMS

4

-

-

40

60

100

4

5

ITT505/CST505

ADVANCED
DATABASE
MANAGEMENT
SYSTEMS

4

-

-

40

60

100

4

7

ITP506

SOFTWARE LAB
-
I

-

-

4

60

40

100

2

8

ITP507

SEMINAR

-

-

2

100

0

100

1



TOTAL

20

3

6

360

340

700

23


2
ND

SEMESTER

S.NO

SUBJECT
CODE

SUBJECT NAME

Hours
Per Week

Marks

Credits

L

T

P

INT

EXT

Total


1

ITT521

STORAGE
MANAGEMENT

4

-

-

40

60

100

4

2

ITT522/CST522

ADVANCED
SOFTWARE
ENGINNEERING

4

-

-

40

60

100

4

3

ITT523/CST523

DATA
WAREHOUSING &
DATA MINING

4

-

-

40

60

100

4

4

ITT524

WIRELESS & MOBILE
COMMUNICATION

4

-

-

40

60

100

4

5

ITT53X

ELECTIVE
-
1

4

-

-

40

60

100

4

6

ITP525

SOFTWARE Lab II

-

-

4

60

40

100

2

7

ITP526

SEMINAR

-

-

2

100

0

100

1



TOTAL

20

0

4

360

340

700

23





ELECTIVE 1

S.NO.

SUBJECT CODE

SUBJECT NAME

1

ITT531

SECURING WINDOWS AND LINUX

2

ITT532

PENETRATION TESTING AND AUDITING

3

ITT533

ENTERPRISE COMPUTING

4

ITT534

SOCIAL COMPUTING

5

ITT535

CYBER LAWS & INTELLECTUAL PROPERTY RIGHTS



3
RD

SEMESTER

S.NO

SUBJECT
CODE

SUBJECT NAME

Hours Per
Week

Marks

Credits

L

T

P

INT

EXT

Total


1

ITT601/CST601

RESEARCH
METHODOLOGY

4

-

-

40

60

100

4

2

ITT60X

ELECTIVE
-
II

4

-

-

40

60

100

4

3

ITP602

RESEARCH PROJECT

-

-

-

150

150

300

6

4

ITP603

Seminar

-

-

-

100

-

100

2



Total

8

0

4

330

270

600

15



ELECTIVE II

S.NO.

SUBJECT CODE

SUBJECT NAME

1

ITT606/CST606

SOFT COMPUTING

2

ITT607/CST533

CLOUD COMPUTING

3

ITT608/CST608

SYSTEM SIMULATION

& MODELLING

4

ITT609

NETWORK SECURITY



4
TH

SEMESTER

S.NO

SUBJECT
CODE

SUBJECT
NAME

Hours Per
Week

Marks

Credits

L

T

P

INT

EXT

Total


1

ITT621

THESIS

-

-

-

250

250

500

20



Total











CHANDIGARH UNIVERSITY

GHARUAN





Scheme & Syllabus of M.E.


Information Technology [IT]


1
st

Semester






CHANDIGARH UNIVERSITY, GHARUAN

Information Theory & Coding

(
ITT501
A
)


L

T
P

Credit


4 1
-

4








Total Hours:
64


Course Objectives:



To define

concepts of Information Theory like Reasoning under uncertainty & Quantifying
information.



To state & discuss
the
coding
concept
s



To explore Data compression & Error
-
control coding techniques.






UNIT
-
I


Model for C Information Channel
:
Discrete Memoryl
ess Channel, Binary Symmetric Channel
(BSC), Burst Channel, Bit
-
error rates. Probability, Entropy and Shano
n
's measure of
information. Mutual information. Channel capacity theorem. Rate and optimality of information
transmission
.












[20
]









UNIT

II


Variable Length Codes
:
Prefix codes. Huffman Codes, Lempel
-
ziev (LZ) codes. Optimality of
these codes. Information content of these codes
.







[10
]

Error Correcting and Detecting Codes
:
Finite fields, Hamming distance, Bounds of c
odes,
Linear (Parity Check) codes, Parity check matrix, Generator matrix, Decoding of linear codes,
Hamming codes.












[12
]

UNIT
-
III

Image Processing
:
Image Registration, Spatial Fourier Transforms, Discrete Spatial (2
-
dimensional) Fourier transforms, Restoration, Lossy Compression of images (pictures)

[10
]

Data Compression Techniques
:
Representation and compression of text, sound, picture, and
vid
eo files (based on the JPEG and MPEG standards)




[12
]


















Recommended books:

1.

Bose Ranjan,”
Information Theory,Coding and Cryptography
”;Tata McGrawHill.

2.

NAbramson ,”
Information and Coding
”,Tata McGrawHill.

3.

MMansurpur , “
Introduction to Information Theory
”, Tata McGrawHill.

4.

RBAsh,”
Information Theory
”,Prentice Hall.

5.

ShuLin, DJCostelloJr, “
Error Control Coding
”,PrenticeHall.

6.

Richard Wesley Hamming
,”

Coding and Information Theory
”,

Prentice
-
Hall
publications
.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questi
ons from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.











CHANDIGARH UNIVERSITY, GHARUAN

Multimedia Technologies
(
ITT502
)


L T P Credits












4

-

-

4












Total Hours: 64

Course Objectives:



To familiarize students with the principles and current technologies of multimedia system
applications



To understand multimedia hardware and software, architecture of multimedia system and
advance topics in multimedia.



UNIT
-
I


Introduction:
Review of ba
sic multimedia concepts
,

Multimedia and Personalized Computing,
Multimedia Highway, Uses of Multimedia and motivation for multimedia usage.



[6
]


Working with Multimedia
: Multimedia


making it work


multimedia building blocks


Text,
Sound, Images, Animation and Video, Digitization of Audio and Video objects, Data
Compression: Different algorithms concern to text, audio, video and images etc., Working
Exposure on Tools
like Dream Weaver, 3D Effects, Flash Etc.





[8]


Example cases for Multimedia Systems:

telemedicine, telerobotics, video on demand, remote
access applications, wireless and light weight clients





[8
]


UNIT
-
II


Making multimedia



The Stages of project, requirements to make good multimedia,
Multimedia skills and training, Training opportunities in Multimedia.




[4
]



Multimedia
-
Hardware and Software
: Multimedia Hardware


Macintosh and Windows
production Platforms, Hardware

peripherals


Connections, Memory and storage devices, Media
software


Basic tools, making Instant multimedia, Multimedia software and Authoring tools,
Production Standards.










[8
]


Multimedia Systems Architecture
: networks, standards, servi
ces (ATM, wireless services),
Multimedia Devices Data models and System Support, High Definition Television and Desktop
Computing, Video versus Computing, Quality and Conditions, The Anatomy of an Intelligent
Multimedia System.











[8]





UNIT
-
III


Multimedia and the Internet

: History, Internet working, Connections, Internet Services, The
World Wide Web, Tools for the WWW


Web Servers, Web Browsers, Web page makers and
editors, Plug
-
Ins and Delivery Vehicles, HTML, VRML, Designing for the WWW


Working on
the Web, Multimedia Applications


Media Communication, Media Consumption, Media
Entertainment, Media games.









[8
]


Architectures and Issues for Distributed Multimedia Systems
: Distributed Multimedia
Systems, The Role of standards
: Synchronization, Orchestration, and quality of services (QoS),
Architecture.













[6
]


Advanced Topics in Multimedia

: Multimedia
-
looking towards Future: Digital
Communication and New Media, Interactive Television, Digital Broadcasting, Dig
ital Radio,
Multimedia Conferencing, Assembling and delivering a project
-
planning and costing, Designing
and Producing, content and talent, Delivering, CD
-
ROM technology.




[8
]



Recommended

Books :


1.

Heath S., “
Multimedia & Communication Systems
”, Focal Press, UK.

2.

Shumann,
Multimedia Systems

, Cengage Learning .

3.

Buford J. F., “
Multimedia Systems
”, Addison Wesley.

4.

Steinmettz R. And Nahrstedt K., “
Multimedia Fundamentals: Media Coding and Content


Processing
”,Pentice Hall.

4.
Rao K. R. Bojkovic

Z. S.,Milanovic D. A., “
Multimedia Communication Systems: Techniques,
Standards and Networks
”, Prentice Hall
.

5
. Tay Vaughan, “
Multimedia: Making it work
”, TMH.

4. K. Andleigh and K. Thakkar, “
Multimedia System Design
”, PHI, PTR.





Instructions for
paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candid
ate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.







CHANDIGARH UNIVERSITY, GHARUAN

Digital Image Processing
(
ITT503/ CST503
)











L T P

Credit


4 1
-

4












Total Hours: 64

Course objectives:
-




To understand
the

basic
concepts of image
processing
.



To e
nhance knowledge about fundamental steps in image processing.



To a
pply different image processing

concepts to solve research problems.

.


UNIT

I


Introduction
:
-

Basic concept and origin, Examples of fields that use Digital Image Processing,
Fundamental steps in Digital Image Processing, Components of Image Processing System.

[6
]


Digital
Image Fundamentals:
-

Image Sensing

and

acquisition,
digital image representation,

Image Sampling and Quantization, Some basic relationships between pixels.



[6
]


Image Enhancement:

-

Introduction,

Enhancement in spatial domain:
Some basic gray le
vel
transformations, Histogram processing, Basics of spatial filtering, Smoothing and sharpening
spatial filters. Enhancement in frequency domain: Fourier transform and filtering in frequency
domain, smoothing and sharpening frequency d
omain filters.






[10
]


UNIT
-
II


Image Restoration:
-

Introduction, a model of the image degradation/ Restoration process
. [6
]


Color Image Processing:
-

Color fundamentals,

C
olor
M
odels,
C
olor
T
ransformation.


[6
]


Image Compression:
-


Redundancy and types of redundancy,

Image compression models, Error
free compression, Lossy compression.


[8
]


UNIT
-
III


Morphological Image P
rocessing:

-

Introduction, Dilation and erosion, Opening and closing,
Some basic morphological algorithms.








[6
]



Image S
egmentation

and Representation
:
-

Introduction, Detection of discontinuities: point
detection, Line detection, edge detection. Edge li
nking and boundary detection,

Thresholding,

region based segmentation. Boundary representation,
Bound
a
ry and Regional Descriptors,
Relational Descriptors.










[10
]


Object Recognition:
-

Pattern and pattern classes, recognition based on Decision T
heoretic
Methods, Structural Methods.









[6
]




Recommended

B
ooks:


1.

Gonzalez, R. C., Woods R. E. “
Digital Image Processing
”, Pearson Prentice Hall.

2.

Jain, Kasturi and Schunk, “
Machine Vision
”,
Tata
McGraw Hill
.

3.

Gonzalez, R. C., Woods R. E., Eddins, S. L., “
Digital Image Processing using
MATLAB
”, Pearson Prentice Hall.

4.

Sonka, Hlavac and Boyle, “
Image
-
processing, Analysis and Machine Vision
”, Cengage
Learning .

5.

Low
,


Introductory Computer Vision and
Image Processing
”,

Tata McGraw Hill
.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each
unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.


























CHANDIGARH UNIVERSITY, GHARUAN

Communication Systems (
ITT504)


L T P Credit










4

-

-

4


Total Hours: 64

Course Objectives:



To explain various modulation & demodulation methods.



To understand the
concepts of Information Theory



To explore modern equipments

UNIT I


Analog Modulation Methods:
Amplitude Modulation: Generation & Demodulation of AM
waves, DSBSC waves, Coherent Detection of DSBSC signal, Angle Modulation: Frequency &
Phase Modulation, BW o
f FM waves, Generation & Demodulation of FM waves, Comparison of
AM, FM & PM.











[12
]



Pulse Analog Modulation:
Sampling theorem, Sampling of Low Pass and Band pass signals,
Aliening, Aperture effect, PAM, PWM and PPM generation and demodulation
, TDM.


[8
]




UNIT II


Pulse Digital Modulation:
Pulse code modulation signal to quantization noise ratio,
companding, DPCM, Prediction Filter, DM and ADM modulators and demodulators, Data
Modem, Data encoding methods, ASK, FSK, PSK, QAM, M
-
ary

systems, line coding, Inter
symbol Interference, Multiplexing methods: time division multiplexing (TDM), STDM, CDMA,
FDM.













[22
]


UNIT III



Introduction to Information Theory
:Discrete

messages, The concept of amount of
information, Entropy, Information rate, mutual information, Shannon’s source coding Theorem,
Huffman code, Lempel

ziv code, .channel coding and channel capacity theorem. Coding to
increase average information per bit, S
hannon’s theorem, Capacity of a Gaussian channel,
Bandwidth


S/N tradeoff, use of orthogonal signals to attain Shannon’s limit.

[16
]












Modern Equipment:
Modern Technology, Modem classification, Modem Modulation Methods,
Mode
m Interface specifications, Modem Transmission characteristics, Modem features,
compatibility, selection criteria.


[6
]















Recommended Books:


1.
Taub and Schili
ng, “P
rinciples

of Communication Systems
”, TMH, 2
nd

Edition.

2.Prokis, “
Modern Communication Systems”
, Cengage Learning.

S. Haykin, “
Analog and Digital Communication
”, Wiley.

3.
Hancocok J. C., “
An Introduction to the Principles of Communication Theory
”,
TMH.

4.
Tomasi, “
Electronic Communication Systems
”, 4
th

ed., Pearson Education.

5.
William Stallings, “
Data & Computer Communications
”, PHI (6
th

Ed.).


6.
Forouzan,”
Data Communication & Networking
”, McGraw Hill.



Instructions for paper setter.


The syllabus

has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to att
empt six questions
including the compulsory question number no 1 and not more than two questions from each unit.























CHANDIGARH UNIVERSITY,GHARUAN

Advanced Database Management Systems

(ITT506
-
CST506)


L T P Credit


4 1
-

4








Total Hours: 64

Course Objectives:



To review existing database concepts



To understand advanced databases like parallel,
distributed, object oriented etc.



To gain familiarization with backup and recovery technique
.


UNIT I

Introduction:
-

Database System Concepts and Architecture, Data Independence, Data
Models, SQL: DDL, DML, DCL, Database Integrity.






[8
]















Normalization:

-

1NF, 2NF, 3
NF, BCNF, 4NF, 5NF.






[6
]


Advanced Transaction Processing and Concurrency Control:
-

Transaction Concepts,
Concurrency Control:
Locking Methods, Time stamping Methods, Optimistic

Methods for Concurrency Control, Concurrency Control in Distributed Systems.



[8]



UNIT II


Parallel and Distributed Databases:
-

Parallel Databases, Distributed Databases, Architecture
of Distributed Databases,

Architecture of Parallel Databases, Key elements of Parallel
Database Processing, Fragmentation,

Replication and Allo
cation for distributed databases,
Intra
-
query parallelism, Inter
-
query parallelism, Intra
-

operation parallelism, Inter
-
operation
parallelism.











[11
]


Backup and Recovery Techniques:
-

Backup and Recovery Concepts, Types o
f Database
Failures, Types of Database Recovery, Recovery Techniques: Deferred Update, Immediate
Update, Shadow Paging, Checkpoints, Buffer Management, Recovery Control in Distributed
Systems.









[11
]


UNIT III

Em
erging Database Technologies:
-

Introduction to Object Oriented Databases, Multimedia
Databases, Mobile Databases, Spatial and Multidimensional Databases, Main Memory
Databases, Data Wa
rehouse.











[12
]

Future Trends in data models:
-

Sema
ntic data models, Data Model for loosely structured
data
items.













[8
]


Recommended Books:


1.

Elmasri, R. and Navathe, S., “
Fundamentals of Database Systems
”, 5
th

Edition,
Pearson Education, 2007
.

2.

Silberschatz, A.,
Korth, Henry F. and Sudarshan, S., “
Database System Concepts
”, 5
th

Edition.

3.

Pratt, “
Database Management Systems
”, Cengage Learning.

4.

Ramakrishnan, R. and Gehrke, J., “
Database Management Systems
”, 2
nd

Edition, Tata
McGraw
-
Hill, 2000.

5.

Date, C.J., “
An
Introduction to Database System”,

A
ddison
-
Wesley, 2000.

6.

Desai, Bipin C., “
An Introduction to Database System”,
West Pub. Co., 1990.

7.

Ceri, S. and Pelagatt, G., “
Distributed Databases: Principles and Systems
”, Tata
McGraw
-
Hill, 2002.

8.

Ozsu, M. T. and Valdurie
z, P., “
Principles of Distributed Database Systems
”, Pearson
Education Pvt, 2005.




Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each
unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit


CHANDIGARH UN
IVERSITY, GHARUAN

Software Lab I

(
ITP506
)


L T P Credit


-

-

4 2













Course objectives:
-

Research & Practical Perspectives


Student will develop a minor Project /Application by using
suitable front end platform.



CHANDIGARH UNIVERSITY

GHARUAN





Scheme & Syllabus of M.E.


Information Technology [IT]


2
nd

Semester











CHANDIGARH UNIVERSITY, GHARUAN

Storage Management (
ITT521)


L

T P Credit

4
-

-

4

Total Hours: 64

Course Objective
s
:



To define Storage architectures, including storage subsystems, DAS, SAN, NAS, and
CAS.



To describe Backup, recovery, disaster recovery, business continuity, and replication.
Emerging technologies including IP
-
SAN.



To understand logical

and physical components of a storage infrastructure.



To identify components of managing and monitoring the data center.



To understand Information security and different storage virtualization technologies.


UNIT
-
I


Introduction to Information Storage Technology:
Review data creation and the amount of
data being created and understand the value of data to a business, Challenges in Data Storage and
Management, Data Storage Infrastructure.







[6
]


Storage Systems Environment:
Components of a Storage System Environment: Disk drive
components, Disk Drive Performance,
Logical Components.





[6
]


Data protection:
Concept of RAID and its Components, Different RAID levels and their
suitability for
different application environments: RAID 0, RAID 1, RAID 3, RAID 4, RAID 5,
RAID 0+1, RAID 1+0, RAID 6, Com
parison of Levels.






[6
]


Intelligent Storage Systems;
Components, Intelligent Storage Array, High
-
level architecture
and working of an inte
lligen
t storage system.







[6
]


UNIT
-

II

Introduction to Networked Storage:
Evolution of networked storage, Architecture, Overview
of FC
-
SAN, NAS, and IP
-
SAN. Network
-
Attached Storage (NAS): Benefits of NAS,
Components, Implementations, File Shari
ng, I/O operations, Performance and Availability. [6]














Content Addressed Storage (CAS):
features and Benefits of a CAS. CAS Architecture, Storage
and Retrieval, Examples.











[4]


Storage Virtualization
: Forms, Taxonomy
, Configuration, Challenges, Types of Storage
Vir
tualizations.











[4
]


Information Availability & Monitoring & Managing Datacenter:
Information Availability,
Business continuity, Failure Analysis, Business impact Analysis, Differentiate betwee
n business
continuity (BC) and disaster recovery (DR).






[6
]

UNIT
-
III


Disaster Recovery:
Backup, Methods, And Technologies, Replication technologies: Local
replicas, Technologies, Restore and Restart, Multiple Re
plicas. Remote Replication. DR in
practice.













[
8
]

Storage Security and Management
: Security Framework, Storage security domains, List and
analyzes the common threats in each domain, Secur
ity Implementations.




[8
]


Managing The

Storage Infrastructure:
Monitoring the Storage Infrastructure, Storage
Management Activities, Challenges and solutions.








[4]



Recommended Books:


1. EMC Educational Services,

Information Storage and Management
”, Wiley India.

2. Richard Barker and Paul Massiglia
,

Storage Area Network Essentials: A Complete Guide to

Understanding and Implementing SANs

, Wiley India.

3. Robert Spalding,

Storage Networks: The Complete Reference
”, Tata McGraw Hill Osborne.

4. Marc Farley,

Buildi
ng Storage Networks

, Tata McGraw Hill, Osborne.

5. Meet Gupta,

Storage Area Network Fundamentals
”, Pearson Education Limited.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
q
uestions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than
two questions from each unit.


















CHANDIGARH UNIVERSITY, GHARUAN

Advanced Software Engineering
(
ITT522
)














L T P Credit


4

-

-

4


Total Hours: 64

Course Objectives:
-



To understand software engineering process and models

of software development.



To gain familiarization with Quality management concepts, Quality Standards and various
metrics.


UNIT
-
I


Introduction
:Software and changing nature of software,

Software

Engineering
-
A layered technology,
Process models: classical
waterfall model, incremental process model, RAD model, evolutionary
process model.














[8
]


Requirement Engineering
: Requirement gathering and analysis, software requirement specification
(SRS).















[6
]


Software
design
: Characteristics of good software design, cohesion and coupling.Function oriented
and object oriented design.












[8
]



UNIT
-

II


Coding and testing
:

Coding standards and guidelines, code reviews, Testing: Test strategies
forconventional

and object oriented software. Blackbox and whitebox testing,

System testing.


[8
]


Software Maintenance
: Characteristics of software maintenance,

Software reverse engineering,

software maintenance models.












[
6
]


Product metrics
:

framework for
product metrics, metrics for analysis,design,source code,testing and
maintenance.












[8
]



UNIT
-

III


Software project management
: Responsibilities of software project manager, project

planning,
Metrics for project cost estimation.
Project estimation techniques. Scheduling,

organization and team
structure. Risk

management. Software configuration management.






[
8
]


Software quality management
:

Quality concepts,

software quality assurance, software reliability and
reliability metr
ics. ISO 9000 quality standards, SEI Capability Maturity Model, Six Sigma.

Metrics for
Software Quality.












[
8
]


Recent trends
:

Component based software

development and software reuse, Software Re
-
Engineering.













[4
]



Recommended Books:


1.

Pressman,Roger.S, “
Software Engineering: A Practitioner's Approach
”, 6
th

Edition, Tata McGraw
-
Hill.

2.

Mall, R., “
Fundamentals of Software Engineering
”, 3
rd

Edition, PHI.

3.

Sommerville, I., “
Software Engineering
”, 7
th

Edition, Pearson Education.

4.

Limaye, Milind,“
Software

Quality Assurance
“,Tata McGraw
-
Hill Education.

5.

Gustafson,David,”
Software Engineering


Schaum's Outline, McGraw Hill Professional


Instructions for paper setter:


The syllabus has been divided into

three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
inc
luding the compulsory question number no 1 and not more than two questions from each unit.























CHANDIGARH UNIVERSITY, GHARUAN

Data Warehouse & Data Mining

(
ITT523
/ CST5
23
)



L T P Credit










4

-

-

4



Total Hours: 64

Course Objectives:



To understand

the basic concepts of Data Warehouse & the Data Mining.



To understand
Advance implementation techniques and their applications
.


UNIT
-
1

Data Warehousing
:
-

An Introduction to Data Warehousing and Characte
ristics of a Data
Warehouse, Benefits of Data Warehouse, Differences B/W Operational Databases & Data
Warehouses, Architecture of Data

Warehouse, Implementations of

Data

Warehouse,
Data
Marts.

[8
]

Multidimensional Data Model
:
-

Stars, Snowflakes, and Fact Constellations, Examples for
Defining Star, Snowfla
ke and Fact Constellation Schemas, Measures: Their Categorization and
Computation, Concept Hierarchies, OLAP Operations in the Multidimensional Data Model, A
Starnet Query Model for Querying Multidimensional Databases.




[8
]

On Line Analytical processing
:
-

OLTP and OLAP systems, Types of OLAP, OLAP Tools,
Web OLAP, Decision support system: Characteristics, benefits and Components. Distributed and
virtual data warehouses, DataWarehouse Manager.





[6
]

UNIT
-
II

Data Mining:
-

Definition, Objectives of Data Mining, Data Mining Functionalities, Data
mining for different types of data: Transactional Databases, Relational Databases, Data
Warehouse
s. Data Mining Task

Primitives.

Major Issues in data mining.


[8
]

Data Preprocessing
:
-

Need of Preprocessing, Data Cleaning, Data Integration and
Transformation, Data Reduction, Data Discretization and Concept Hierarchy Generation.

[6
]

Cla
ssification and Prediction
:
-

Issues Regarding Classification and Prediction, Classification by
Decision Tree Induction, Bayesian Classification, Rule
-
Based Classification, Classification by
Backpropagation.











[
8
]



UNIT
-
III

Clustering:
-

Cluster Analysis
-

Types of Data


Categorization of Major Clustering Methods


Kmeans, Partitioning Methods


Hierarchical Methods
-

Density
-
Based Methods

Grid

Based Methods


Model
-
Based Clustering Methods


Clustering High Dimensional Data

-

Constraint



Based Cluster Analysis


Outlier Analysis






[10
]

Data Mining Environment
:
-

Applications & Trends in Data Mining, Application of Data
Warehousing and Data mining in Government, Trends& Planning of Data Warehouse.




[6
]

Case Study
:
-

Data minin
g in building business environment, Data Warehouses



[
4
]


Recommended Books:

1.

Han
, J.

and

Kamber M., “
Data Mining: Concepts and Techniques
”,
Kaufman publishers.

2.

Devlin, B., “
Data Warehouse: From Architecture to Implementation
”.

3.

Reeves, L.,


A Manager's Guide to Data Warehousing
”.

4.

Singh, S. K., “
Database Systems Concepts, Designs & Applicat
ions
”, Pearson


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based
on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.
















CHANDIGARH UNIVERSITY, GHARUAN

Wireless and Mobile Communication
(ITT524
)



L T P Credit



4
-

-

4



Total Hours:
64

Course objectives:



To understand a broad perspective on the wireless networks



To gain familiarization with basic architecture of mobile and cellular services



To get
familiar with new technologies introduced.

UNIT
-
I


Introduction to wireless communication systems:
Evolution of mobile radio communication,
Examples of Wireless Communication System
, trends in cellular radio and personal
c
ommunications.











[8
]


Modern Wireless Communication Systems:
Second Generation (2G) cellular networks, Third
generation (3G) wireless networks, wireless local loop (
WLL), WLAN

s, Bluetooth and PAN [8
]















Global System for Mobile Communication
(GS
M):
Evolution , mobile services,

system
architecture, radi
o interface protocols, handoff
and security
, GPRS.







[6
]









UNIT
-
II


Cellular concepts
:

Basic cellular system,
performance criteria,
fading , frequency reuse
,

channel assignment strategies.









[7
]

Multiple Access Techniques
:
-


FDMA, TDMA,
FHMA,
C
DMA and SDMA, Modulation
techniques for mobile radio.











[7
]

Wireless Networking:
Overview of

wireless networks, differences between wireless and fixed
telephone systems, development of wireless networks (1G,2G,3G),

traffic routing in wireless
networks , wireless data services.










[8
]

UNIT
-
III



WiFi and IEEE 802.11 WLAN standard:
IEEE 802 architecture, IEEE802.11 architecture &
services, 802.11 MAC , 802.11 physical layer and standards




[10
]


Bluetooth & IEEE 802.15

: Protocol Structure





[2
]


Migration to 3G Technologies
: UMTS N/W architect
ure, 3G protocol stack



[8
]

























Recommended

Books:


1.

Rappaport, T.S., “
Wireless Communication
-
Principles and practice
”, Pearson.

2.

Schiller, J., “
Mobile Communication
”, Pearson Education.

3.

Aggarwal, “Introduction to Wireless Mobile” , Cengage Learning.

4.

Lee, W.C.Y, “
Mobile Cellular Telecommunication
”,

TMH.

5.

Murthy, C. S. R.,and Manoj, B. S, “
Adhoc Wireless Networks


Architecture and Protocols
”,
Prentice Hall.

6.

Tse, D., Viswanath
,

P.,


Fundamentals of Wireless Communication
”,

Cambridge

7.

Sumit Kasera
,
Nishit Narang
,


3G Networks:

Architecture, Protocols and Procedures
”,

TMH.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all,

three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions fr
om each unit.



CHANDIGARH UNIVERSITY, GHARUAN

Software Lab II

(
ITP525
)


L T P Credit


-

-

4 2













Course objectives:
-

Research & Practical Perspectives


Student will develop a minor Project

/Application by using suitable front end platform.



CHANDIGARH UNIVERSITY, GHARUAN

Elective
-
1: Securing Windows And Linux
(
ITT531)


L T P Credit












4
-

-

4











Total Hours:
64


Course Objectives:



Best practices and tips for

gathering evidence in a secure fashion



Investigating attacks on Windows and Linux Machines


UNIT

I


Introduction to General Security Concepts
: Principles of Information Security, Information
Security Standards, Regulations, and Compliance,
Authentication, Authorization, and
Accounting (AAA).


[8
]


Cryptography:
Basic Cryptography Concepts, PKI Concepts, Implementing PKI and Cert
ificate
Management
.





[6
]



Network Security:
General Network Concepts and Vulnerabilities, Network Services and
Network Devices, Internet Security and Vulnerabilities, Network Security Tools and Devices
[8
]















UNIT
-
II


Application Security:
HTTP Security, Electronic Mail, Samba Secur
ity.


[6
]



System Security:
General System Security Threats, Hardware and Peripheral Devices, OS and
Application Security, Virtualization, System
-
Based Security Applications, Understanding Linux
Security, System Monitoring an
d Auditing.

[8]


Organizational and Operational Security:
Physical Security Concepts and Vulnerabilities,
Policies and Procedures,
Risk Analysis, Business Continuity and Disaste
r Recovery,
Network
layer firewalls, transport layer firewalls, application layer firewalls

[
8
]

UNIT
-
III


Security Assessments and Audits:
Vulnerability Assessments and Testing, Monitoring,
Logging and Auditing


[10
]


Remote Access and Authentication:
Virtual Private Networki
ng,Strong User authentication.














[10
]









Recommended

Books:


1.

Security for Microsoft Windows System Administrators,

Introduction to key
Information Security concepts

, Derrick
Rountree
, Elsevier

2.

Daniel J. Barrett, Richard E. Silverman, Robert G. Byrnes, O'Reilly


Linux Security
Cookbook

, June 2003 ISBN:
0
-
596
-
00391
-
9

3.

Mark Sobell,

Practical Guide to Linux Programmin

g
, Pearson Education.

4.

Ray Whlie, C., “
Advanced Engineering Mathematics”,

McGraw Hill.

5.

Jain, R.K. and Lyengar, S.R.K., “
Advanced Engineering Mathematics
”, Narosa
Publishing House, New Delhi.



Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole s
yllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.















CHANDIGARH UNIVERSITY
, GHARUAN

Elective
1
: Penetration Testing And Auditing
(ITT532)


L

T P Credit


4
-

-

4

Total Hours:
64

Course
Objectives:



To identify the Risks in the network



To Explain Penetrations testing techniques


UNIT
-
I


Identify Risk, Manage Risk, Risk mitigation, Customers and legal agreements, Penetration
testing planning and scheduling, Information gathering, external and internal network penetration
testing.











[
21
]

UNIT
-
II


Router penetration testing, Firewalls penetration testing, Intrusion detection system penetration
testing
,
Wireless networks penetration testing, Passwo
rd cracking penetration testing. [
22
]


UNIT
-
III


Social engineering penetration testing, Application penetration testing, Policies and controls
testing
,
Penetration testing report and documentation writing
.





[
21
]




Recom
m
ended Books:

1.

T. J.

Klevinsky, Scott

Laliberteand Ajay Gupta,

“Hack I.T.
-

Security Through
Penetration Testing

Addison
-
Wesley, ISBN: 0
-
201
-
71956
-
8
.

2.

David Kennedy, Jim O'Gorman, Devon Kearns,

Mati

Aharoni
,

“Metasploit:
The
Penetration Tester's Guide”.

3.

Thomas Wilhelm

,
“Professional Penetration Testing: Creating and
Operating a Formal
Hacking Lab”
.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five
sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.



CHANDIGARH UNIVERSITY
, GHARUAN


Elective 1: Enterprise
Computing (
ITT533)












L T P Credits


4


-


-

4



Total

H
ours:
64


Course Objective:



To Understand complexity of enterprise
applications




To Differentiate between Java platforms


J2SE, J2ME, and J2EE




To understand J2EE architecture and components


UNIT
-
I


J2EE:

Introduction to J2EE, Building J2EE Applications, JDBC, Servlets and Web

Applications, Java Server Pages and
Model/View/Controller, J2EE Web Services

Overview,
Introduction to EJB, Session EJBs, Entity EJBs, JMS and message driven

Beans, Transactions
and Security, Application Servers (Case Study of any one of IBM

Websphere, BEA Weblogic,
JBoss)
.













[
22
]


UNIT
-
II


Hibernate:

Principles of Object Relational Mapping, Hibernate configuration, HQL

making
objects persistent, Hibernate semantics, Session management, flushing,

concurrency and
Hibernate, Optimistic and Pessimistic Locking, Object mapping

Mapping

simple properties,
Single and multi valued associations, Bi
-
directional

associations, Indexed collections, Using
Hibernate Template, Querying, Session

management, Transaction integration and demarcation.














[
21
]

UNIT
-
III


Spring:

Introduction
of Spring Framework: Spring Architecture, Spring Framework

definition,
Spring & MVC, Factory Pattern, BeanFactory, Spring Context definition,

Inversion of Control
(IoC), Spring AOP, Application Context and BeanFactory, Spring

ORM, Mapping API for JDO,
Hibe
rnate, Hibernate Mapping, JDO Mapping, iBATIS,

Spring Abstract Transaction layer,
Employing Spring transaction, Using EJB declarative

transactions, Integration process,
integrating Spring MVC in web application, MVC in

web application, MVC Framework
.


Web
Services:

Introduction to XML, Service
-
Oriented Architectures SOAP, SOAP

message
structure, handling errors WSDL, UDDI, Java Web Service implementations

JAX
-
RPC, Web
service clients in Java, Introduction to Ajax.










[
21
]


Recommended

Books:


1.

Jim Farley, William Crawford, O’Reilly and Associates, “
Java Enterprise in a Nutshell
”.

2. Brett McLaughlin, O’Reilly, “
Java and XML”,

2
nd
Edition.

3.
Elliott Rusty Harold and W. Scott Means, O’R
eilly, “
XML in a Nutshell
”.

4
. James Cooper, “
Java Design
Pattersn: A Tutorial
”, Addison Wesley
.

5.
Govind Sesadri, “
Enterprise java Computing: Application and Architectures
”,

Cam
bridge
University Publications.



Instructions for paper setter.

The syllabus has been divided into three equal units. The paper setter
is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number

no 1 and not more than two questions from each unit.





















CHANDIGARH UNIVERSITY
, GHARUAN

Elective 1
-

S
ocial Computing

(
ITT534)


L

T
P

Credit












4
-

-

4








Total Hours:
64

Course Objectives:




To critically examine existing social computing services,



To familiarize with the approach of using socio
-
technical designs for supporting aspects of
social behaviors.


UNIT

I


Introduction:

Medieval & Renaissance Cosmology, Clockwork, Cross
-
Cultur
al Connections
[
8
]















The Industrial Revolution and Calculating Engines:

Analytics of Capital and Gender
Difference in the Work of Charles Babbage and Ada Lovelace
.





[
8
]


World War Two and the Cold War:

Cybernetics, Communication,

and Control

[
6
]


UNIT
-
II

Computing Countercultures:

Early PCs, Hacking, Open sources, Wikiworlds
,

Artificial

Intelligence, Art
ificial Life, Cognition, Gender
Computing and Proof
. [
21
]














UNIT
-
III

Computer Graphics and Simulation,

Social Networks, Media, and Gaming,

Materialities of
Networks and Wireless Connections,

Robots, DNA Computing, Quantum Computing
.


[
21
]















Recommended
Books
:


1.

Advances in Social Computing
”,

Third International Conference on Social Computing
,
Behavioral Modeling, and Prediction, SBP 2010 Bethesda, MD,USA, March2010,Proceedings
Ed.Springer.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper sette
r is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question numb
er no 1 and not more than two questions from each unit.

CHANDIGARH UNIVERSITY
, GHARUAN

Elective 1
-

Cyber Laws and Intellectual Property Rights (ITT535)


L

T P Credit

4
-

-

4

Total Hours:
64

Course Objective
s
:



To understand the major concepts of Cyber Security and Forensics



To learn how to avoid becoming victims of cyber crimes.

UNIT
-
I

Introduction to cyber crime:

Introduction to Cybercrime and information security,
Classifications of Cybercrimes: E
-
Mail
Spoofing, Spamming, Cyber defamation, Internet Time
Theft, Salami Attack/Salami Technique, Data Diddling, Forgery, Web Jacking, Newsgroup
Spam/Crimes Emanating from Usenet Newsgroup, Industrial Spying/Industrial Espionage,
Hacking, Online Frauds, Pornograp
hic Offenses , Software Piracy, Computer Sabotage, E
-
Mail
Bombing/Mail Bombs, Usenet Newsgroup as the Source of Cybercrimes , Computer Network
Intrusions, Password Sniffing, Credit Card Frau
d
s, Identity Theft.





[14
]


Cyberoffences:

Categories of c
ybercrime, Planning of attacks, Cyberstalking, Types of Stalkers,
Real life incident of cyberstalking, Cybercafé, Botnets, Attack vectors, Zero day attack,
Proliferation of wireless devices, Credit card frauds, Security challenges posed by mobile
devices,
Attacks on mobile phones.












[10
]

UNIT


II

Methods Used in Cybercrime:
Proxy

Servers, Password Cracking, Online and Offline attacks,
Types of Viruses, Protection methods against viruses, Phishing, Methods of Phishing, Identify
theft, Personally identifiable Information (PII).



[
8
]










Cyber Law:
Need of Cyber Laws, Advantages of Cyber Laws, The Indian IT Act, Challenges to
Indian Law and Cybercrime Scenario in India, Cyber Forensics, Need of Cyber Forensics,
Online Scams:


Scam No. 1


Foreign Country Visit Bait

Scam No.

2


Lottery Scam

Scam No. 3


Fake

Job Offer Scam









[
12
]








UNIT
-

II
I

Intellectual Property in the Cyberspace
:

Introduction to Intellectual Property in Cyberspace,
copyright, Patent, Trademarks, Trade secret, Trade Name, Domain Name, The Psychology,
Mindset and s
k
ills of Hackers.









[10
]


Cybersecurity:

Roles and Responsibilities of IT Security Organizati
on, Career in cybersecurity
,
Assurance and Compliance Security Audit, Types of Assurance and Compliance, Network
Security, Computer Forensics, Cybersecu
rity Certifications.






[
10
]


Recom
m
ended Books:


1.

Stim
,”
Intellectual Property: Patents,
Trademarks and Copyrights
, Cengage Learning
.

2.

Godbole,“
Information Systems Security
”, Willey
.



3.

Farrera, “
Cyber Law

, Cengage Learning.

4.

Merkov, Breithaupt,“
Information Security
”, Pearson Education
.


5.

Yadav, “
Foundations of Information Technology
”, New Age
, Delhi
.

6.

Schou, Shoemaker, “ Information Assurance for the Enterprise”, Tata McGraw Hill
.


7.

Sood,“
Cyber Laws Simplified
”, Mc Graw Hill
.


8.

Furnell, “
Computer Insecurity
”, Springer
.


Instructions for paper setter.


The syllabus has been divided into three
equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including
the compulsory question number no 1 and not more than two questions from each unit.











CHANDIGARH UNIVERSITY

GHARUAN





Scheme & Syllabus of M.E.


Information Technology [IT]


3
rd

Semester



CHANDIGARH UNIVERSITY
, GHARUAN

Research Methodology

(
ITT601/

CST601
)


L

T
P

Credit


4
-

-

4








Total Hours:
64


Course Objective
s
:




To enable researchers in developing most appropriate methodology for their studies



To gain familiarization with different research methods and
techniques.



To
provide knowledge about systematic process of collecting and analyzing data.



To understand different tests of hypothesis.



To gain familiarization with interpretation and report writing fundamentals.



UNIT
-
I


Introduction:

Meaning, Objectives and significance of research, Types of research, Research
approaches, Research and scientific method, research process, criteria of good research,
defining
the research problem,
Problems encountered by researchers.






[
8
]


Re
search Design:

Meaning and need for research design
, Features of a good design, different
research designs, basic principles of experimental design.



[
6
]


Sampling Design:

Sampling and its need
,
Implications
of a sample design, steps in sampling
design, criteria of selecting a sampling procedure, characteristics of a good sample designs,
Different types of sample designs.






[
8
]


UNIT
-
II




Methods of Data Collection:

Primary data and Secondary Data,
Collection

of primary data,
Collection of data through Questionnaires and schedules, Collection of secondary data. Selection
of appropriate method for data collection.





[
8
]



Processing and analysis of Data
: Processing operation
s, Problems in Processing, Elements and
types of analysis, Measures of central tendency and dispersion, Regression and Correlation
analysis.








[
8
]


Probability and Probability distributions
:
Binomial, Poisson, Geometric, Exponential and
Normal Distributions.

[
6
]







UNIT
-
III


Testing of Hypotheses
:

Basic concept, procedure and flow diagram for hypothesis testing,
Tests of Hypothesis, Parametric tests: z
-
test, t
-
test, chi square test, F
-
test. ANOVA. Non
-
parametric or distribution free tests.







[
10
]


Multivariate Analysis Techniques
:

Growth, characteristics and applications of multivariate
techniques.







[2]


Interpret
ation and Report Writing
: Meaning and techniques of interpretation, Significance of
report writing, Different steps in report writing, Types of reports. [
8
]



Recommended

Books:


1.

Zikmund, W.G., “
Business
Research Methods
”, 7
th

Edition,
Cengage Learning.

2.

Bordens K.S., Abbott B.B., “
Research and Design Methods
”, 6
th

Edition, TMH
Publishing Company Limited.

3.

Trivedi K.S., “
Probability & Statistics With Reliability, Queuing And Computer Science
Applications”

, 2
nd

Edition, John Wiley & Sons
.

4.

Meyer, P.L., “
Introduction to Probability & Statistical, Applications”,

Oxford, IBH
.

5.

Johnson, R.A., “Probability and Statistics”, PHI, New Delhi
.

6.

Krishnaswami, K.N., Sivakumar, A. I. and Mathirajan, M., “
Management
Research
Methodology
”, Pearson Education: New Delhi
.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question
consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.




CHANDIGARH UNIVERSITY, GHARUAN

Elective 2

-
Soft Computing

(ITT606/
CST606
)


L

T
P

Credit












4
-

-

4








Total Hours:
64

Course Objective
s:



To get basic knowledge of different soft computing techniques.



To explain
problem solving techniques and their
implementations and applications
.




To introduce i
ntelligent systems and learning techniques.


UNIT
-
I

Neural Networks
: History, overview of biological Neuro
-
system, Mathematical Models of
Neurons, ANN architecture, Learning rules, Learning
Paradigms
-
Supervised, Unsupervised and
reinforceme
nt Learning,
ANN training Algorithms
-
perceptions, Training rules, Delta, Back
Propagation Algorithm, Multilayer Perceptron

Model, Hopfield Networks, Associative
Memories, Applications of Artificial Neural Networks.






[
14
]

Fuzzy Logic
: Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets,
Membership Function, Fuzzy rule generation.









[
8
]

UNIT
-
II

Operations on Fuzzy Sets
: Compliment, Intersections, Unions, Combinations of Operations,

Aggregation Operations.










[4]

Fuzzy Arithmetic
: Fuzzy Numbers, Linguistic Variables, Arithmetic Operations on Intervals &
Numbers, Lattice of

Fuzzy Numbers, Fuzzy Equations.







[6
]

Neuro
-
Fuzzy Systems

:
Introduction of Neuro
-
Fuzzy Systems, Architecture of Neuro Fuzzy
Networks.












[6
]

Application of Fuzzy Logic
: Medicine, Economics etc.






[4]

UNIT
-
III

Intelligent Agents:
Agents Behavior and Environments, Structure of Agents, Planning Problem,

Planning with

state Space Search, Partial order Planning, GRAPHPLAN, Planning in logic,
Planning in

non
-
deterministic domains, hierarchical task planning, Multi a
gent planning,
execution.












[14
]

Genetic Algorithm:

An Overview of GA, GA operators, GA in proble
m solving,
Implementation of GA, Applications of GA , G
P and Hybrid Systems.




[8
]


Recommended

Books:


1.

Stuart J.Russel, Norvig, “
AI:A

Modern Approach
”, Pearson Education, Latest Edition.

2.

Michael Negnevitsky, ”
Artificial Intelligence: A Guide to Intelligent Systems
”,
2/E,Addison
-
Wesley
.

3.

Klir and Yuan,
““
Fuzzy Sets & Fuzzy Logic
”, ”
, Prentice Hall
.

4.

Timothy Ross,

Fuzzy Logic

, Wiley Indi
a
,
2nd ed.

5.

James Freeman A. and David Skapura M, ”
Neural Networks
-

Algorithms, Applications &
Programming Techniques
”, Addison Wesley.

6.

Yegnanarayana B, ”
Artificial Neural Networks
”,Prentice Hall of India Private Ltd.,New
Delhi.

7.

Goldberg, David E,”
Genetic

algorithms in search, optimization and machine learning
”,
Latest Edition, Addison Wesley.

8.

Melanie Mitchell, “
An Introduction to Genetic Algorithm
”, PHI
.

9.

Vijay Lakshmi, Pai,

Neural Networks, Fuzzy Logic and Genetic Algorithms, Soft
Computing Paradigms

,
Prentice Hall of India.



Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five
sub parts
and based on the whole syllabus. The candidate will be required to attempt six
questions including the compulsory question number no 1 and not more than two questions
from each unit.




CHANDIGARH UNIVERSITY

GHARUAN

Elective 2
-
Cloud Computing (ITT607/CST53
3)


L T P Credit




4
-

-

4








Total Hours:
64

Course objectives:



To understand the basics of Cloud Computing, service delivery models and architecture.



To understand
Virtualization and Resource Provisioning in Clouds



To gain comprehensive knowledge of cloud computing applications, recent
advancements and challenges in
cloud computing.


UNIT
-
I


Introduction
:
-

Overview of Existing Hosting Platforms, Grid Computing, Utility Computing,
Autonomic Computing,

Grid Computing
-

the way to Cloud, Cloud Computing,
Why Cloud
Computing, Cloud and IT perspective, Cloud and Virtualizat
ion, Cloud service requirements,
Cloud and Dynamic infrastructure, Cloud characteristics , Benefits and

Disadvantages of Cloud
Computing.



[
12
]




Cloud Computing Architecture:
Introduction, Cloud computing architecture,
D
eployment
Models, Gamut of Cloud solutions
: SAAS,

PAAS and IAAS. Cloud


characteristics

Application
and Benefits of Cloud Computing.




[
10
]



UNIT
-
II


Assessing the role of open standards
:
different architectural standards
,
early ado
pters and new
applications, challenges and obstacles to cloud computing [
6
]




Understanding Abstraction and Virtualization:
Introduction and Inspiration, virtualization,
why virtualizati
on, Types of Virtualization and benefits, Virtual Machines (VM), VM
Provisioning and Manageability, VM Migration Services, VM Provisioning in the Cloud
Context.





[8]


Advanced Topics:

Integration of Private and Public Clouds, Hybrid Cloud Network, Cloud Best
Practices.












[
6
]



UNIT
-
III


Cloud Applications and case studies:
GrepTheWeb on Amazon

Cloud, ECG Data Analysis
on cloud using Aneka, Hosting Massively Multiplayer Games On Cloud, Content Delivery
Network Using Clouds, Hosting Twitter And Facebook On Cloud. Review of Cloud Services By
Google,
Microsoft, Linux.










[
12
]


Challen
ges in Cloud Computing:
Security, Privacy, Risk Management and Trust management
issues, Resource management and scheduling, Interoperability between Clouds, Internetworking
between Clouds (InterClouds).




[
10
]




Recommended Books:


1.

Buyya, R.K., Broberg, J. and Goscinki, A.M., “
Cloud Computing: principles and
paradigms
”.

2.

Miller, M., “
Cloud Computing
”,
Que Publishing
.

3.

Reese, G., “
Cloud Application Architectures: Building Applications

and Infrastructure in the
Cloud
”, O’Reilly Media.

4.

Moyer, Christopher M., “
Building Applications and Infrastructure in the Cloud
”.

5.

Hurwitz, J., Bllor, R., Kaufman, Marcia. and Halper, F., “
Cloud Computing for dummies
”.

6.

Armbrust
, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G.,
Patterson, D.A., Rabkin, A., Stoica, I. and Zaharia, M., “
Above the Clouds: A Berkeley View
of Cloud Computing
”, Berkeley Tech Report.

7.

Rhoton, J., “
Cloud Computing Explained: Im
plementation Handbook for Enterprises
”.

8.

Linthicum, David S., “
Cloud Computing and SOA Convergence in Your Enterprise
”.



Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions

in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two ques
tions from each unit.



CHANDIGARH UNIVERSITY, GHARUAN

Elective 2: System
Simulation and Modeling (
IT608
)


L T P Credit




4
-

-

4








Total Hours:
64

Course Objectives:



To familiarize with various simulation techniques
.



To provide good knowledge of simulation concepts and simulation languages.








UNIT
-
I


Introduction
: Definition of

modeling and simulation
, model and simulation, introduction to
discrete
-
event and continuous simulation
,Event graphs of queuing model,
Determining the
events and variables.










[
10
]


Simulation
Methods:
Time advance Mechanisms,Flowchart of next
-
event time advance
approach
,

Random Number generation methods
,
Stochastic activities
,

binomial distribution,
poisson distribution,

uniform distribution.








[
10
]

UNIT

II

Modeling and
languages
:
The Bufon Needle Problem,Modeling with Petri Nets,The Petri net
Graph,The Petri net structure,

Sim Net
:a simulation Net Tool.modeling examples,simulation
languages:S
imula,SIMNEX,GPSS.









[
12
]

Control system:
Inventory control systems for

illustration of applications,introduction to the
basic principles underlying dynamic feedback systems,the principles underlying
growth,exponential decay and sigmod growth.







[
12
]

UNIT
-
III

Techniques of Simulation:
Simulation techniques, Monte Carl
o method, type of system
simulations, real time, simulation stochastic variables and discre
te probability function.


[10
]

Verification & Validation of simulation models:
Model building,verification and
validation,verification of simulation
models,calibration & validation of models techniquesfor
increasing model validity and creadibility.









[10
]














Recommended books:


1.

Averill M. Law and W. David Kelton:


Simulation Modeling and Analysis
”, Tata
McGraw
-
Hill Publication
.

2.

Selia, “
Applied Simulation Modeling

“ , Cengage Learning
.

3.

Geoffery Gordon:


System Simulation
”, Prentice
-
Hall of India.

4.

Stephen J. Chapman:


MATLAB Programming for Engineers
”, Thomson learning in c
.

5.

Jerry Banks, John S. Carson, Barry L. Nelson and David M
. Nicol : “
Discrete
-
Event
System Simulation”
, Prentice
-
Hall of India.


Instructions for paper setter.


The syllabus has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a com
pulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to attempt six questions
including the compulsory question number no 1 and not more than two questions from each unit.



CHANDIGARH UNIVERSITY,
GHARUAN

Elective 2:
Network Security

(ITT609)


L T P Credit




4
-

-

4








Total Hours:
64

Course Objectives:



To
have good understanding of network security

concepts.



To explore crucial topics such as basics of cryptography, secret and public key
cryptography
.




To understand

E
-
Mail, IP, web service and system security.

UNIT
-
I

Introduction:

The Security, functionality

and ease of use Triangle, Essential Terminology,
Elements of Security,

Attacks, services, mechanisms, security services, Model for network
security..
Difference between Penetration Testing and Ethical Hacking, Deliverables ethics and
legality, Computer Cri
mes and Implications








[
12
]


Conventional encryption and message confidentiality:
Conventional encryption principles,

conventional encryption algorithms, cipher block modes of operations, location of encryption

devices, k
ey distribution.











[
10
]

UNIT
-
II

Public Key cryptography and authentication:
Approaches to message authentication, Secure

Hash Functions and HMAC, Public Key Cryptography, Principles Public Key Cryptography

Algorithms, Digital signatu
res, Key management.







[
14
]


Authentication & E mail Security:
Kerberos, X.509 Directory Authentication Services
-
PGPS/

MIME.













[6
]

UNIT
-
III


IP Security:
IP security overview, IP Security Architecture, Authentication Header,
Encapsulating Security Pay load, Combing Secur
ity Associations,
Key Management.


[8
]


Web Security:
Web Security Requirements, SSL and Transport Layer Security, SET Network

Management Security.










[4]

System Security:
Intruders, viruses related threats, Fire Desig
n principles, Trusted
Systems.[4
]

Session Hijacking
: Understanding Session Hijacking, Spoofing vs Hijacking, Steps in Session
Hijacking, Types of S
ession Hijacking, TCP Concepts three way and shake, Sequence number[6]



Recommended books:


1.

William Stallings,

Network Security
Essentials Applications and Standards

, Pe
arson
Education Asia, New Delhi.


2.

Bernard Menezes

, “
Network Security and Cryptography

, Cengage Learning Pvt. Ltd
.


3.


Eric Core,


Hackers Beware

,
EC
-
Council Press

.



Instructions for paper setter.


The syllabus
has been divided into three equal units. The paper setter is required to set Ten
questions in all, three questions from each unit and a compulsory question consisting of five sub
parts and based on the whole syllabus. The candidate will be required to atte
mpt six questions
including the compulsory question number no 1 and not more than two questions from each unit.







CHANDIGARH UNIVERSITY

GHARUAN





Scheme & Syllabus of M.E.


Information Technology [IT]


4
th

Semester