0% found this document useful (0 votes)
4 views

3rd Year Syllabus

The document outlines the syllabus for various computer science courses including Computer Networks, Compiler Design, Cryptography and Cyber Security, Distributed Computing, Business Analytics, and Web Technologies. Each course is divided into units covering foundational concepts, protocols, algorithms, and practical applications relevant to the field. The syllabus emphasizes both theoretical knowledge and practical skills necessary for students in computer science and engineering.

Uploaded by

Alone boy editz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

3rd Year Syllabus

The document outlines the syllabus for various computer science courses including Computer Networks, Compiler Design, Cryptography and Cyber Security, Distributed Computing, Business Analytics, and Web Technologies. Each course is divided into units covering foundational concepts, protocols, algorithms, and practical applications relevant to the field. The syllabus emphasizes both theoretical knowledge and practical skills necessary for students in computer science and engineering.

Uploaded by

Alone boy editz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

III- YEAR
SYLLABUS

CS3591- Computer Networks

Unit I: Introduction And Application Layer


Data Communication – Networks – Network Types – Protocol Layering – TCP/IP Protocol
suite – OSI Model – Introduction to Sockets – Application Layer protocols: HTTP – FTP –
Email protocols (SMTP – POP3 – IMAP – MIME) – DNS – SNMP
Unit II: Transport Layer
Introduction – Transport-Layer Protocols: UDP – TCP: Connection Management – Flow
control Congestion Control – Congestion avoidance (DECbit, RED) – SCTP – Quality of
Service
Unit III: Network Layer
Switching : Packet Switching – Internet protocol – IPV4 – IP Addressing – Subnetting –
IPV6, ARP, RARP, ICMP, DHCP
Unit IV: Routing
Routing and protocols: Unicast routing – Distance Vector Routing – RIP – Link State Routing
– OSPF – Path-vector routing – BGP – Multicast Routing: DVMRP – PIM
Unit V: Data Link And Physical Layers
Data Link Layer – Framing – Flow control – Error control – Data-Link Layer Protocols –
HDLC – PPP – Media Access Control – Ethernet Basics – CSMA/CD – Virtual LAN –
Wireless LAN (802.11) – Physical Layer: Data and Signals – Performance – Transmission
media- Switching – Circuit Switching.
CS3501- Compiler Design

Unit I: Introduction To Compilers & Lexical Analysis


Introduction- Translators- Compilation and Interpretation- Language processors -The Phases
of Compiler – Lexical Analysis – Role of Lexical Analyzer – Input Buffering – Specification
of Tokens – Recognition of Tokens – Finite Automata – Regular Expressions to Automata
NFA, DFA – Minimizing DFA – Language for Specifying Lexical Analyzers – Lex tool.
Unit II: Syntax Analysis
Role of Parser – Grammars – Context-free grammars – Writing a grammar Top Down Parsing
General Strategies – Recursive Descent Parser Predictive Parser-LL(1) – Parser-Shift Reduce
Parser-LR Parser- LR (0)Item Construction of SLR Parsing Table – Introduction to LALR
Parser Error Handling and Recovery in Syntax Analyzer-YACC tool – Design of a syntax
Analyzer for a Sample Language
Unit III: Syntax Directed Translation & Intermediate Code Generation
Syntax directed Definitions-Construction of Syntax Tree-Bottom-up Evaluation of S-
Attribute Definitions- Design of predictive translator – Type Systems-Specification of a
simple type Checker Equivalence of Type Expressions-Type Conversions. Intermediate
Languages: Syntax Tree, Three Address Code, Types and Declarations, Translation of
Expressions, Type Checking, Back patching.
Unit IV: Run-Time Environment And Code Generation
Runtime Environments – source language issues – Storage organization – Storage Allocation
Strategies: Static, Stack, and Heap allocation – Parameter Passing-Symbol Tables – Dynamic
Storage Allocation – Issues in the Design of a code generator – Basic Blocks and Flow graphs
Design of a simple Code Generator – Optimal Code Generation for Expressions– Dynamic
Programming Code Generation.
Unit V: Code Optimization
Principal Sources of Optimization – Peep-hole optimization – DAG- Optimization of Basic
Blocks Global Data Flow Analysis – Efficient Data Flow Algorithm – Recent trends in
Compiler Design
CB3491- Cryptography And Cyber Security

Unit I: Introduction To Security


Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services and Mechanisms – A Model for Network Security – Classical encryption techniques:
Substitution techniques, Transposition techniques, Steganography – Foundations of modern
Cryptography: Perfect security – Information Theory – Product Cryptosystem –
Cryptanalysis.
Unit II: Symmetric Ciphers
Number theory – Algebraic Structures – Modular Arithmetic – Euclid‘s algorithm –
Congruence and matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY
CIPHERS: SDES – Block Ciphers – DES, Strength of DES – Differential and linear
cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation
criteria for AES – Pseudorandom Number Generators – RC4 – Key distribution.
Unit III: Asymmetric Cryptography
Mathematics Of Asymmetric Key Cryptography: Primes – Primality Testing –
Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem – Chinese Remainder
Theorem – Exponentiation and logarithm Asymmetric Key Ciphers: RSA cryptosystem –
Key distribution – Key management – Diffie Hellman key exchange -– Elliptic curve
arithmetic – Elliptic curve cryptography.
Unit IV: Integrity And Authentication Algorithms
Authentication requirement – Authentication function – MAC – Hash function – Security of
hash function: HMAC, CMAC – SHA – Digital signature and authentication protocols – DSS
– Schnorr Digital Signature Scheme – ElGamal cryptosystem – Entity Authentication:
Biometrics, Passwords, Challenge Response protocols – Authentication applications –
Kerberos MUTUAL TRUST: Key management and distribution – Symmetric key distribution
using symmetric and asymmetric encryption – Distribution of public keys – X.509
Certificates.
Unit V: Cyber Crimes And Cyber Security
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and
Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access
Control – Cloud Security – Web Security – Wireless Security
CS3551- Distributed Computing
Unit I: Introduction
Introduction: Definition-Relation to Computer System Components – Motivation – Message -
Passing Systems versus Shared Memory Systems – Primitives for Distributed
Communication – Synchronous versus Asynchronous Executions – Design Issues and
Challenges; A Model of Distributed Computations: A Distributed Program – A Model of
Distributed Executions – Models of Communication Networks – Global State of a Distributed
System.
Unit II: Logical Time And Global State
Logical Time: Physical Clock Synchronization: NTP – A Framework for a System of Logical
Clocks – Scalar Time – Vector Time; Message Ordering and Group Communication: Message
Ordering Paradigms – Asynchronous Execution with Synchronous Communication –
Synchronous Program Order on Asynchronous System – Group Communication – Causal
Order – Total Order; Global State and Snapshot Recording Algorithms: Introduction –
System Model and Definitions – Snapshot Algorithms for FIFO Channels.
Unit III: Distributed Mutex And Deadlock
Distributed Mutual exclusion Algorithms: Introduction – Preliminaries – Lamport’s algorithm
– RicartAgrawala’s Algorithm –– Token-Based Algorithms – Suzuki-Kasami’s Broadcast
Algorithm; Deadlock Detection in Distributed Systems: Introduction – System Model –
Preliminaries – Models of Deadlocks – Chandy-Misra-Haas Algorithm for the AND model
and OR Model.
Unit IV: Consensus And Recovery
Consensus and Agreement Algorithms: Problem Definition – Overview of Results –
Agreement in a Failure-Free System(Synchronous and Asynchronous) – Agreement in
Synchronous Systems with Failures; Checkpointing and Rollback Recovery: Introduction –
Background and Definitions – Issues in Failure Recovery – Checkpoint-based Recovery –
Coordinated Checkpointing Algorithm – – Algorithm for Asynchronous Checkpointing and
Recovery
Unit V: Cloud Computing
Definition of Cloud Computing – Characteristics of Cloud – Cloud Deployment Models –
Cloud Service Models – Driving Factors and Challenges of Cloud – Virtualization – Load
Balancing – Scalability and Elasticity – Replication – Monitoring – Cloud Services and
Platforms: Compute Services – Storage Services – Application Services
CCW331- Business Analytics
Unit I: Introduction to Business Analytics
Analytics and Data Science – Analytics Life Cycle – Types of Analytics – Business Problem
Definition – Data Collection – Data Preparation – Hypothesis Generation – Modeling –
Validation and Evaluation – Interpretation – Deployment and Iteration
Unit II: Business Intelligence

Data Warehouses and Data Mart – Knowledge Management -Types of Decisions – Decision
Making Process – Decision Support Systems – Business Intelligence – OLAP – Analytic
functions
Unit III: Business Forecasting
Introduction to Business Forecasting and Predictive analytics – Logic and Data Driven
Models -Data Mining and Predictive Analysis Modelling -Machine Learning for Predictive
analytics.
Unit IV: Hr & Supply Chain Analytics

Human Resources – Planning and Recruitment – Training and Development – Supply chain
network – Planning Demand, Inventory and Supply – Logistics – Analytics applications in
HR & Supply Chain. Apply HR Analytics to make a prediction of the demand for hourly
employees for a year.
Unit V: Marketing & Sales Analytics
Marketing Strategy, Marketing Mix, Customer Behaviour -selling Process – Sales Planning -
Analytics applications in Marketing and Sales – predictive analytics for customers’ behaviour
in marketing and sales.
CCS375- WEB TECHNOLOGIES

Unit I: Website Basics, Html 5, Css 3, Web 2.0 7


Web Essentials: Clients, Servers and Communication – The Internet – World wide web –
HTTP Request Message – HTTP Response Message – Web Clients – Web Servers – HTML5
– Tables -Lists – Image – HTML5 control elements – Drag and Drop – Audio – Video
controls – CSS3 – Inline, embedded and external style sheets – Rule cascading – Inheritance
– Backgrounds – Border Images – Colors – Shadows – Text – Transformations – Transitions
– Animations. Bootstrap Framework
Unit II : Client Side Programming

Java Script: An introduction to JavaScript-JavaScript DOM Model-Exception Handling-


Validation-Built-in objects-Event Handling- DHTML with JavaScript- JSON introduction –
Syntax – Function Files.

Unit III: Server Side Programming 5


Servlets: Java Servlet Architecture- Servlet Life Cycle- Form GET and POST actions-
Session Handling- Understanding Cookies- DATABASE CONNECTIVITY: JDBC.

Unit IV: PHP and XML

An introduction to PHP: PHP- Using PHP- Variables- Program control- Built-in functions-
Form Validation. XML: Basic XML- Document Type Definition- XML Schema, XML
Parsers and Validation, XSL ,

Unit V : Introduction To Angular And Web Applications Frameworks


Introduction to AngularJS, MVC Architecture, Understanding ng attributes, Expressions and
data binding, Conditional Directives, Style Directives, Controllers, Filters, Forms, Routers,
Modules, Services; Web Applications Frameworks and Tools – Firebase- Docker- Node JS-
React- Django-UI & UX.

You might also like