Scesyll Cloud
Scesyll Cloud
NOTE; Use AT89C52 microcontroller as main kit with peripherals and KeilµVision 4/ Equivalent tool.
Course Outcomes
The students should be able to:
• Distinguish the characteristics of embedded computer systems.
• Examine the various vulnerabilities of embedded computer systems.
• Design an embedded system.
• Design and develop modules using RTOS.
• Implement RPC, threads and tasks.
Conduction of Practical Examination:
1. All laboratory experiments (nos) aretobeincludedforpracticalexamination.
2. Studentsare allowed to pick one experimentfrom each part and execute both
3. Strictlyfollow theinstructions as printed on the cover page of answer script for breakup of marks
4. Change of experiment is allowed only once and marks allotted to the procedure part to be made
zero.
MANAGING BIG DATA
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI251 / 18SCE21 / 18SCN252 /
18SCS21 / 18SFC331 / 18SIT31 / IA Marks 40
18SSE322
Number of Lecture Hours/Week 03 Exam Marks 60
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Deal with Big data using Hadoop and SPARK technologies
• Explain basic concepts of Map and Reduce
• Explain basic concepts of Hadoop Distributed File System
• Develop map-reduce analytics using Hadoop and related tools
Module -1 Teaching
Hours
Meet Hadoop: Data!, Data Storage and Analysis, Querying All Your Data, Beyond Batch, 10 Hours
Comparison with Other Systems: Relational Database Management Systems, Grid
Computing, Volunteer Computing Hadoop Fundamentals MapReduce A Weather
Dataset: Data Format, Analyzing the Data with Unix Tools, Analyzing the Data with
Hadoop: Map and Reduce, Java MapReduce, Scaling Out: Data Flow, Combiner
Functions, Running a Distributed MapReduce Job, Hadoop Streaming
The Hadoop Distributed Filesystem The Design of HDFS, HDFS Concepts: Blocks,
Namenodes and Datanodes, HDFS Federation, HDFS High-Availability, The Command-
Line Interface, Basic Filesystem Operations, Hadoop Filesystems Interfaces, The Java
Interface, Reading Data from a Hadoop URL, Reading Data Using the FileSystem API,
Writing Data, Directories, Querying the Filesystem, Deleting Data, Data Flow: Anatomy
of a File Read, Anatomy of a File Write.
RBT: L1, L2, L3
Module -2
YARN Anatomy of a YARN Application Run: Resource Requests, Application Lifespan, 10 Hours
Building YARN Applications, YARN Compared to MapReduce, Scheduling in YARN:
The FIFO Scheduler, The Capacity Scheduler, The Fair Scheduler, Delay Scheduling,
Dominant Resource Fairness
Hadoop I/O Data Integrity, Data Integrity in HDFS, LocalFileSystem,
ChecksumFileSystem, Compression, Codecs, Compression and Input Splits, Using
Compression in MapReduce, Serialization, The Writable Interface, Writable Classes,
Implementing a Custom Writable, Serialization Frameworks, File-Based Data Structures:
SequenceFile
RBT: L1, L2, L3
Module – 3
Developing a MapReduce Application The Configuration API, Combining Resources, 10 Hours
Variable Expansion, Setting Up the Development Environment, Managing Configuration,
GenericOptionsParser, Tool, and ToolRunner, Writing a Unit Test with MRUnit: Mapper,
Reducer, Running Locally on Test Data, Running a Job in a Local Job Runner, Testing the
Driver, Running on a Cluster, Packaging a Job, Launching a Job, The MapReduce Web UI,
Retrieving the Results, Debugging a Job, Hadoop Logs, Tuning a Job, Profiling Tasks,
MapReduce Workflows: Decomposing a Problem into MapReduce Jobs, JobControl,
Apache Oozie
How MapReduce Works Anatomy of a MapReduce Job Run, Job Submission, Job
Initialization, Task Assignment, Task Execution, Progress and Status Updates, Job
Completion, Failures: Task Failure, Application Master Failure, Node Manager Failure,
Resource Manager Failure, Shuffle and Sort: The Map Side, The Reduce Side,
Configuration Tuning, Task Execution: The Task Execution Environment, Speculative
Execution, Output Committers
RBT: L1, L2, L3
Module-4
MapReduce Types and Formats:MapReduce Types, Input Formats: Input Splits and 10 Hours
Record,s Text Input, Binary Input, Multiple Inputs, Database Input (and Output) Output
Formats: Text Output, Binary Output, Multiple Outputs, Lazy Output, Database Output,
Flume Installing Flume, An Example,Transactions and Reliability, Batching, The HDFS
Sink, Partitioning and Interceptors, File Formats, Fan Out, Delivery Guarantees, Replicating
and Multiplexing Selectors, Distribution: Agent Tiers, Delivery Guarantees, Sink Groups,
Integrating Flume with Applications, Component Catalog
RBT: L1, L2, L3
Module-5
Pig Installing and Running Pig, Execution Types, Running Pig Programs, Grunt, Pig 10 Hours
Latin Editors, An Example: Generating Examples, Comparison with Databases, Pig Latin:
Structure, Statements, Expressions, Types, Schemas, Functions, Data Processing
Operators: Loading and Storing Data, Filtering Data, Grouping and Joining Data, Sorting
Data, Combining and Splitting Data.
Spark An Example: Spark Applications, Jobs, Stages and Tasks, A Java Example, A
Python Example, Resilient Distributed Datasets: Creation, Transformations and Actions,
Persistence, Serialization, Shared Variables, Broadcast Variables, Accumulators, Anatomy
of a Spark Job Run, Job Submission, DAG Construction, Task Scheduling, Task
Execution, Executors and Cluster Managers: Spark on YARN
RBT: L1, L2, L3
Course outcomes:
The students shall able to:
• Understand managing big data using Hadoop and SPARK technologies
• Explain HDFS and MapReduce concepts
• Install, configure, and run Hadoop and HDFS.
• Perform map-reduce analytics using Hadoop and related tools
• Explain SPARK concepts
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012.
Reference Books:
1. MateiZaharia and Bill Chambers, SPARK: The Definitive Guide, Oreilly, 2018
2. S. D'Souza and Steve Hoffman, Apache Flume: Distributed Log Collection for Hadoop, Oreilly.
2014
MULTI-CORE ARCHITECTURE AND PROGRAMMING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER - II
Subject Code 18SCE22 / 18SCN152 /
IA Marks 40
18SCS152
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS - 04
Course objectives: This course will enable students to
• Define technologies of multicore architecture and performance measures
• Demonstrate problems related to multiprocessing
• Illustrate windows threading, posix threads, openmp programming
• Analyze the common problems in parallel programming
Module -1 Contact
Hours
Introduction to Multi-core Architecture Motivation for Concurrency in software, Parallel 10 Hours
Computing Platforms, Parallel Computing in Microprocessors, Differentiating Multi-core
Architectures from Hyper- Threading Technology, Multi-threading on Single-Core versus
Multi-Core Platforms Understanding Performance, Amdahl’s Law, Growing Returns:
Gustafson’s Law. System Overview of Threading : Defining Threads, System View of
Threads, Threading above the Operating System, Threads inside the OS, Threads inside the
Hardware, What Happens When a Thread Is Created, Application Programming Models and
Threading, Virtual Environment: VMs and Platforms, Runtime Virtualization, System
Virtualization.
RBT: L1, L2, L3
Module -2
Fundamental Concepts of Parallel Programming :Designing for Threads, Task 10 Hours
Decomposition, Data Decomposition, Data Flow Decomposition, Implications of Different
Decompositions, Challenges You’ll Face, Parallel Programming Patterns, A Motivating
Problem: Error Diffusion, Analysis of the Error Diffusion Algorithm, An Alternate
Approach: Parallel Error Diffusion, Other Alternatives. Threading and Parallel Programming
Constructs: Synchronization, Critical Sections, Deadlock, Synchronization Primitives,
Semaphores, Locks, Condition Variables, Messages, Flow Control- based Concepts, Fence,
Barrier, Implementation-dependent Threading Features
RBT: L1, L2, L3
Module – 3
Threading APIs :ThreadingAPls for Microsoft Windows, Win32/MFC Thread APls, 10 Hours
Threading APls for Microsoft. NET Framework, Creating Threads, Managing Threads,
Thread Pools, Thread Synchronization, POSIX Threads, Creating Threads, Managing
Threads, Thread Synchronization, Signaling, Compilation and Linking.
RBT: L1, L2, L3
Module-4
OpenMP: A Portable Solution for Threading : Challenges in Threading a Loop, Loop-carried 10 Hours
Dependence, Data-race Conditions, Managing Shared and Private Data, Loop Scheduling and
Portioning, Effective Use of Reductions, Minimizing Threading Overhead, Work-sharing
Sections, Performance-oriented Programming, Using Barrier and No wait, Interleaving
Single-thread and Multi-thread Execution, Data Copy-in and Copy-out, Protecting Updates of
Shared Variables, Intel Task queuing Extension to OpenMP, OpenMP Library Functions,
OpenMP Environment Variables, Compilation, Debugging, performance
RBT: L1, L2, L3
Module-5
Solutions to Common Parallel Programming Problems : Too Many Threads, Data Races, 10 Hours
Deadlocks, and Live Locks, Deadlock, Heavily Contended Locks, Priority Inversion,
Solutions for Heavily Contended Locks, Non-blocking Algorithms, ABA Problem, Cache
Line Ping-ponging, Memory Reclamation Problem, Recommendations, Thread-safe
Functions and Libraries, Memory Issues, Bandwidth, Working in the Cache, Memory
Contention, Cache-related Issues, False Sharing, Memory Consistency, Current IA-32
Architecture, Itanium Architecture, High-level Languages, Avoiding Pipeline Stalls on IA-
32,Data Organization for High Performance.
RBT: L1, L2, L3
Course outcomes:
The students shall able to:
• Identify the limitations of ILP and the need for multicore architectures
• Define fundamental concepts of parallel programming and its design issues
• Solve the issues related to multiprocessing and suggest solutions
• Make out the salient features of different multicore architectures and how they exploit parallelism
• Demonstrate the role of OpenMP and programming concept
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Multicore Programming , Increased Performance through Software Multi-threading by Shameem
Akhter and Jason Roberts , Intel Press , 2006
Reference Books: NIL
INTERNET OF THINGS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI22 / 18SCE23 / 18SCN14 /
IA Marks 40
18SCS14 / 18SSE321
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define and explain basic issues, policy and challenges in the IoT
• Illustrate Mechanism and Key Technologies in IoT
• Explain the Standard of the IoT
• Explain resources in the IoT and deploy of resources into business
• Demonstrate data analytics for IoT
Module -1 Contact
Hours
What is The Internet of Things? Overview and Motivations, Examples of Apllications, IPV6 10 Hours
Role, Areas of Development and Standardization, Scope of the Present Investigation.Internet
of Things Definitions and frameworks-IoT Definitions, IoT Frameworks, Basic Nodal
Capabilities. Internet of Things Apjplication Examples-Overview, Smart Metering/Advanced
Metering Infrastructure-Health/Body Area Networks, City Automation, Automotive
Applications, Home Automation, Smart Cards, Tracking, Over-The-Air-Passive
Surveillance/Ring of Steel, Control Application Examples, Myriad Other Applications.
RBT: L1, L2, L3
Module -2
Fundamental IoT Mechanism and Key Technologies-Identification of IoT Object and 10 Hours
Services, Structural Aspects of the IoT, Key IoT Technologies. Evolving IoT Standards-
Overview and Approaches, IETF IPV6 Routing Protocol for RPL Roll, Constrained
Application Protocol, Representational State Transfer, ETSI M2M,Third Generation
Partnership Project Service Requirements for Machine-Type Communications, CENELEC,
IETF IPv6 Over Low power WPAN, Zigbee IP(ZIP),IPSO
RBT: L1, L2, L3
Module – 3
Layer ½ Connectivity: Wireless Technologies for the IoT-WPAN Technologies for 10 Hours
IoT/M2M, Cellular and Mobile Network Technologies for IoT/M2M,Layer 3 Connectivity
:IPv6 Technologies for the IoT: Overview and Motivations. Address Capabilities,IPv6
Protocol Overview, IPv6 Tunneling, IPsec in IPv6,Header Compression Schemes, Quality of
Service in IPv6, Migration Strategies to IPv6.
RBT: L1, L2, L3
Module-4
Case Studies illustrating IoT Design-Introduction, Home Automation, Cities, Environment, 10 Hours
Agriculture, Productivity Applications.
RBT: L1, L2, L3
Module-5
Data Analytics for IoT – Introduction, Apache Hadoop, Using Hadoop MapReduce for Batch 10 Hours
Data Analysis, Apache Oozie, Apache Spark, Apache Storm, Using Apache Storm for Real-
time Data Analysis, Structural Health Monitoring Case Study.
RBT: L1, L2, L3
Course outcomes:
At the end of this course the students will be able to:
• Develop schemes for the applications of IOT in real time scenarios
• Manage the Internet resources
• Model the Internet of things to business
• Understand the practical knowledge through different case studies
• Understand data sets received through IoT devices and tools used for analysis
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. Daniel Minoli, ”Building the Internet of Things with IPv6 and MIPv6:The Evolving World of M2M
Communications”, Wiley, 2013.
2. ArshdeepBahga, Vijay Madisetti, ”Internet of Things: A Hands on Approach” Universities Press.,
2015
Reference Books:
1. Michael Miller,” The Internet of Things”, First Edition, Pearson, 2015.
2. Claire Rowland,Elizabeth Goodman et.al.,” Designing Connected Products”, First Edition,O’Reilly,
2015.
WIRELESS NETWORKS AND MOBILE COMPUTING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18LNI331 / 18SCE241 / 18SCN151 / IA Marks 40
18SCS323
Number of Lecture Hours/ 04 Exam Marks 60
Total Number of Lecture 50 Exam Hours 03
Hours
CREDITS – 04
Course objectives: This course will enable students to
• Define concepts of wireless communication.
• Compare and contrast propagation methods, Channel models, capacity calculations multiple
antennas and multiple user techniques used in the mobile communication.
• Explain CDMA, GSM. Mobile IP, WImax and Different Mobile OS
• Illustrate various Markup Languages CDC, CLDC, MIDP; Programming for CLDC, MIDlet
model and security concerns
Module -1 Contact
Hours
Mobile Computing Architecture: Architecture for Mobile Computing, 3-tier
Architecture, Design Considerations for Mobile Computing. Emerging Technologies:
Wireless broadband (WiMAX), Mobile IP: Introduction, discovery, Registration,
Tunneling, Cellular IP, Mobile IP with IPv6. Wireless Networks : Global Systems for
Mobile Communication (GSM): GSM Architecture, Entities, Call routing in GSM,
PLMN Interface, GSM Addresses and Identities, Network Aspects in GSM, Mobility 10 Hours
Management, GSM Frequency allocation. Short Service Messages (SMS):
Introduction to SMS, SMS Architecture, SMMT, SMMO, SMS as Information bearer,
applications, GPRS and Packet Data Network, GPRS Network Architecture, GPRS
Network Operations, Data Services in GPRS, Applications for GPRS, Billing and
Charging in GPRS.
RBT: L1, L2, L3
Module -2
Spread Spectrum technology, IS-95, CDMA versus GSM, Wireless Data, Third
Generation Networks, Applications on 3G, Mobile Client: Moving beyond desktop, 10 Hours
Mobile handset overview, Mobile phones and their features, PDA, Design Constraints
in applications for handheld devices.
RBT: L1, L2, L3
Module – 3
Mobile OS and Computing Environment: Smart Client Architecture, The Client: User
Interface, Data Storage, Performance, Data Synchronization, Messaging. The Server:
Data Synchronization, Enterprise Data Source, Messaging. Mobile Operating Systems: 10 Hours
WinCE, Palm OS, Symbian OS, Linux, Proprietary OS Client Development: The
development process, Need analysis phase, Design phase, Implementation and Testing
phase, Deployment phase, Development Tools, Device Emulators
Module -2
Cybercrime: Mobile and Wireless Devices: Introduction, Proliferation of Mobile and 10 Hours
Wireless Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing
Era, Security Challenges Posed by Mobile Devices, Registry Settings for Mobile Devices,
Authentication Service Security, Attacks on Mobile/Cell Phones, Mobile Devices: Security
Implications for organizations, Organizational Measures for Handling Mobile, Organizational
Security Policies and Measures in Mobile Computing Era, Laptops
Module -1 Contact
Hours
Introduction, Overview and Applications of Wireless Sensor Networks Introduction, Basic 10 Hours
overview of the Technology, Applications of Wireless Sensor Networks: Introduction,
Background, Range of Applications, Examples of Category 2 WSN Applications, Examples
of Category 1 WSN Applications, Another Taxonomy of WSN Technology. (Chapter 1:
1.1, 1.2, Chapter2: 2.1-2.6)
RBT: L1, L2, L3
Module -2
Basic Wireless Sensor Technology and Systems: Introduction, Sensor Node Technology, 10 Hours
Sensor Taxonomy, WN Operating Environment, WN Trends, Wireless Transmission
Technology and Systems: Introduction, Radio Technology Primer, Available Wireless
Technologies (Chapter3: 3.1-3.5, Chapter 4: 4.1-4.3)
RBT: L1, L2, L3
Module – 3
MAC and Routing Protocols for Wireless Sensor Networks: Introduction, Background, 10 Hours
Fundamentals of MAC Protocols, MAC Protocols for WSNs, Sensor-MAC case Study, IEEE
802.15.4 LR-WPANs Standard Case Study. Routing Protocols for Wireless Sensor
Networks: Introduction, Background, Data Dissemination and Gathering, Routing
Challenges and Design Issues in WSNs, Routing Strategies in WSNs. (Chapter 5: 5.1-5.6,
Chapter 6: 6.1-6.5)
RBT: L1, L2, L3
Module-4
Transport Control and Middleware for Wireless Sensor Networks: Traditional Transport 10 Hours
Control Protocols, Transport Protocol Design Issues, Examples of Existing Transport Control
Protocols, Performance of Transport Control Protocols. Middleware for Wireless Sensor
Networks: Introduction, WSN Middleware Principles, Middleware Architecture, Existing
Middleware. (Chapter 7: 7.1-7.4, Chap. 8: 8.1-8.4)
RBT: L1, L2, L3
Module-5
Network Management and Operating System for Wireless Sensor Networks: Introduction, 10 Hours
Network Management Requirements, Traditional Network Management Models, Network
Management Design Issues. Operating Systems for Wireless Sensor Networks: Introduction,
Operating System Design Issues, Examples of Operating Systems. (Chapter 9: 9.1-9.5,
Chapter 10: 10.1-10.3)
RBT: L1, L2, L3
Course outcomes:
The students shall able to:
• Explain existing applications of wireless sensor actuator networks
• Apply in the context of wireless sensor networks and explain elements of distributed computing
and network protocol design
• Contrast Various hardware, software platforms that exist for sensor networks
• Summarize various network level protocols for MAC, routing, time synchronization, aggregation,
consensus and distributed tracking
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. KAZEM SOHRABY, DANIEL MINOLI, TAIEB ZNATI, “Wireless Sensor Networks:
Technology, Protocols and Applications:, WILEY , Second Edition (Indian) , 2014
Reference Books:
1. Ian F. Akyildiz, Mehmet Can Vuran "Wireless Sensor Networks", Wiley 2010
2. Feng Zhao & Leonidas J. Guibas, “Wireless Sensor Networks- An Information Processing
Approach", Elsevier, 2007.
ADVANCES IN DATA BASE MANAGEMENT SYSTEMS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – II
Subject Code 18SCE252 /
18SCS13 / 18SIT14 / IA Marks 40
18SSE151
Number of Lecture Hours/Week 04 Exam Marks 60
Total Number of Lecture Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define parallel and distributed databases and its applications.
• Show applications of Object Oriented database
• Explain basic concepts, principles of intelligent databases.
• Utilize the advanced topics of data warehousing and mining .
• Infer emerging and advanced data models
• Extend knowledge in research topics of databases.
Module 1 Teaching
Hours
Review of Relational Data Model and Relational Database Constraints: 10 Hours
Relational model concepts; Relational model constraints and relational database schemas;
Update operations, anomalies, dealing with constraint violations, Types and violations.
Object and Object-Relational Databases:
Overview of Object Database Concepts, Object Database Extensions to SQL, The ODMG
Object Model and the Object Definition Language ODL, Object Database Conceptual
Design, The Object Query Language OQL, Overview of the C++ Language Binding in the
ODMG Standard.
RBT: L1, L2, L3
Module 2
Disk Storage, Basic File Structures, Hashing, and Modern Storage Architectures: 10 Hours
Introduction, Secondary Storage Devices, Buffering of Blocks, Placing File Records on
Disk Operations on Files, Files of Unordered Records (Heap Files) , Files of Ordered
Records (Sorted Files), Hashing Techniques, Other Primary File Organizations,
Parallelizing Disk Access Using RAID Technology, Modern Storage Architectures.
Distributed Database Concepts:
Distributed Database Concepts, Data Fragmentation, Replication, and Allocation
Techniques forDistributed Database Design, Overview of Concurrency Control and
Recovery in Distributed Databases, Overview of Transaction Management in Distributed
Databases,Query Processing and Optimization in Distributed Databases, Types of
Distributed Database Systems , Distributed Database Architectures, Distributed Catalog
Management.
RBT: L1, L2, L3
Module 3
NOSQL Databases and Big Data Storage Systems: 10 Hours
Introduction to NOSQL Systems, The CAP Theorem, Document-Based NOSQL Systems
and MongoDB, NOSQL Key-Value Stores, Column-Based or Wide Column NOSQL
Systems, NOSQL Graph Databases and Neo4j.
Big Data Technologies Based on MapReduce and Hadoop:
What Is Big Data? Introduction to MapReduce and Hadoop, Hadoop Distributed File
System (HDFS), MapReduce: Additional Details Hadoop v2 alias YARN, General
Discussion
Reference Books:
2. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, “Multimedia Communication Systems”,
Pearson education, 2004.
3. John Billamil, Louis Molina, “Multimedia : An Introduction”, PHI, 2002.
ADVANCES IN STORAGE AREA NETWORKS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – III
Subject Code 18LNI243 / 18SCE323 /
18SCN241 / 18SCS241 / IA Marks 40
18SIT253 / 18SSE153
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Define and contrast storage centric and server centric systems
• Define metrics used for Designing storage area networks
• Illustrate RAID concepts
• Demonstrate, how data centers maintain the data with the concepts of backup mainly remote
mirroring concepts for both simple and complex systems.
Module 1 Contact
Hours
Introduction: Server Centric IT Architecture and its Limitations; Storage – Centric IT 10 Hours
Architecture and its advantages. Case study: Replacing a server with Storage Networks The
Data Storage and Data Access problem; The Battle for size and access. Intelligent Disk
Subsystems: Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O
Channels; JBOD, Storage virtualization using RAID and different RAID levels; Caching:
Acceleration of Hard Disk Access; Intelligent disk subsystems, Availability of disk
subsystems.
RBT: L1, L2, L3
Module 2
I/O Techniques: The Physical I/O path from the CPU to the Storage System; SCSI; Fibre 10 Hours
Channel Protocol Stack; Fibre Channel SAN; IP Storage. Network Attached Storage: The
NAS Architecture, The NAS hardware Architecture, The NAS Software Architecture,
Network connectivity, NAS as a storage system. File System and NAS: Local File Systems;
Network file Systems and file servers; Shared Disk file systems; Comparison of fibre
Channel and NAS.
RBT: L1, L2, L3
Module 3
Storage Virtualization: Definition of Storage virtualization; Implementation 10 Hours
Considerations; Storage virtualization on Block or file level; Storage virtualization on
various levels of the storage Network; Symmetric and Asymmetric storage virtualization in
the Network.
RBT: L1, L2, L3
Module 4
SAN Architecture and Hardware devices: Overview, Creating a Network for storage; 10 Hours
SAN Hardware devices; The fibre channel switch; Host Bus Adaptors; Putting the storage
in SAN; Fabric operation from a Hardware perspective. Software Components of SAN: The
switch’s Operating system; Device Drivers; Supporting the switch’s components;
Configuration options for SANs.
RBT: L1, L2, L3
Module 5
Management of Storage Network: System Management, Requirement of management 10 Hours
System, Support by Management System, Management Interface, Standardized
Mechanisms, Property Mechanisms, In-band Management, Use of SNMP, CIM and
WBEM, Storage Management Initiative Specification (SMI-S), CMIP and DMI, Optional
Aspects of the Management of Storage Networks, Summary
RBT: L1, L2, L3
Course Outcomes
The students should be able to:
• Identify the need for performance evaluation and the metrics used for it
• Apply the techniques used for data maintenance.
• Realize strong virtualization concepts
• Develop techniques for evaluating policies for LUN masking, file systems
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Ulf Troppens, Rainer Erkens and Wolfgang Muller: Storage Networks Explained, Wiley
India,2013.
Reference Books:
1. Robert Spalding: “Storage Networks The Complete Reference”, Tata McGraw-Hill, 2011.
2. Marc Farley: Storage Networking Fundamentals – An Introduction to Storage Devices,
Subsystems, Applications, Management, and File Systems, Cisco Press, 2005.
3. Richard Barker and Paul Massiglia: “Storage Area Network Essentials A Complete Guide to
understanding and Implementing SANs”, Wiley India, 2006.
AGILE TECHNOLOGIES
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – III
Subject Code 18SCE324 /
18SCS242 /
IA Marks 40
18SIT331 /
18SSE323
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Explain iterative, incremental development process leads to faster delivery of more useful
software
• Evaluate essence of agile development methods
• Illustrate the principles and practices of extreme programming
• Show the roles of prototyping in the software process
• Explain the Mastering Agility
Module -1 Contact
Hours
Why Agile?: Understanding Success, Beyond Deadlines, The Importance of Organizational 10 Hours
Success, Enter Agility, How to Be Agile?: Agile Methods, Don’t Make Your Own Method,
The Road to Mastery, Find a Mentor
RBT: L1, L2, L3
Module -2
Understanding XP: The XP Lifecycle, The XP Team, XP Concepts, Adopting XP: Is XP 10 Hours
Right for Us?, Go!, Assess Your Agility
RBT: L1, L2, L3
Module – 3
Practicing XP: Thinking: Pair Programming, Energized Work, Informative Workspace, 10 Hours
Root-Cause Analysis, Retrospectives, Collaborating: Trust, Sit Together, Real Customer
Involvement, Ubiquitous Language, Stand-Up Meetings, Coding Standards, Iteration Demo,
Reporting, Releasing:“Done Done”, No Bugs, Version Control, Ten-Minute Build,
Continuous Integration, Collective Code Ownership, Documentation. Planning: Vision,
Release Planning, The Planning Game, Risk Management, Iteration Planning, Slack, Stories,
Estimating. Developing: Incremental requirements, Customer Tests, Test-Driven
Development, Refactoring, Simple Design ,Incremental Design and Architecture, Spike
Solutions, Performance Optimization, Exploratory Testing
RBT: L1, L2, L3
Module-4
Mastering Agility: Values and Principles: Commonalities, About Values, Principles, and 10 Hours
Practices, Further Reading, Improve the Process: Understand Your Project, Tune and
Adapt, Break the Rules, Rely on People :Build Effective Relationships, Let the Right People
Do the Right Things, Build the Process for the People, Eliminate Waste :Work in Small,
Reversible Steps, Fail Fast, Maximize Work Not Done, Pursue Throughput
RBT: L1, L2, L3
Module-5
Deliver Value: Exploit Your Agility, Only Releasable Code Has Value, Deliver Business 10 Hours
Results, Deliver Frequently, Seek Technical Excellence :Software Doesn’t Exist, Design Is
for Understanding, Design Trade-offs, Quality with a Name, Great Design, Universal Design
Principles, Principles in Practice, Pursue Mastery
RBT: L1, L2, L3
Course outcomes:
Students should be able to
• Define XP Lifecycle, XP Concepts, Adopting XP
• Evaluate on Pair Programming, Root-Cause Analysis, Retrospectives, Planning, Incremental
Requirements, Customer Tests
• Demonstrate concepts to Eliminate Waste
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. The Art of Agile Development (Pragmatic guide to agile software development),
James shore, Chromatic, O'Reilly Media, Shroff Publishers & Distributors, 2007.
Reference Books:
1. Agile Software Development, Principles, Patterns, and Practices,Robert C. Martin, Prentice
Hall; 1st edition, 2002.
2. Agile and Iterative Development A Manger’s Guide”, Craig Larman Pearson Education, First
Edition, India, 2004.
CLOUD SECURITY
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – III
Subject Code 18LNI333 /
18SCE331 /
IA Marks 40
18SCN154 /
18SFC152
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Describe the fundamentals of Cloud Computing.
• Summarize the need of cloud compliance and existing cloud solutions.
• Explain the cloud security concepts.
• Demonstrate the operations of Data Centre.
• Distinguish the concepts of Identity management and virtualization.
Module 1 Contact
Hours
Cloud Computing Architectural Framework: Cloud Benefits, Business scenarios, Cloud 10 Hours
Computing Evolution, cloud vocabulary, Essential Characteristics of Cloud Computing,
Cloud deployment models, Cloud Service Models, Multi- Tenancy, Approaches to create a
barrier between the Tenants, cloud computing vendors, Cloud Computing threats, Cloud
Reference Model, The Cloud Cube Model, Security for Cloud Computing, How Security
Gets Integrated.
RBT: L1, L2, L3
Module 2
Compliance and Audit: Cloud customer responsibilities, Compliance and Audit Security 10 Hours
Recommendations. Portability and Interoperability: Changing providers reasons, Changing
providers expectations, Recommendations all cloud solutions, IaaS Cloud Solutions, PaaS
Cloud Solutions, SaaS Cloud Solutions.
RBT: L1, L2, L3
Module 3
Traditional Security, Business Continuity, Disaster Recovery, Risk of insider abuse, 10 Hours
Security baseline, Customers actions, Contract, Documentation, Recovery Time Objectives
(RTOs), Customers responsibility, Vendor Security Process (VSP).
RBT: L1, L2, L3
Module 4
Data Center Operations: Data Center Operations, Security challenge, Implement Five 10 Hours
Principal Characteristics of Cloud Computing, Data center Security Recommendations.
Encryption and Key Management: Encryption for Confidentiality and Integrity, Encrypting
data at rest, Key Management Lifecycle, Cloud Encryption Standards, Recommendations.
RBT: L1, L2, L3
Module 5
Identity and Access Management: Identity and Access Management in the cloud, Identity 10 Hours
and Access Management functions, Identity and Access Management (IAM) Model,
Identity Federation, Identity Provisioning Recommendations, Authentication for SaaS and
Paas customers, Authentication for IaaS customers, Introducing Identity Services,
Enterprise Architecture with IDaaS , IDaaS Security Recommendations. Virtualization:
Hardware Virtualization, Software Virtualization, Memory Virtualization, Storage
Virtualization, Data Virtualization, Network Virtualization, Virtualization Security
Recommendations.
RBT: L1, L2, L3
Course Outcomes
The students should be able to:
• Demonstrate the growth of Cloud computing, architecture and different modules of
implementation.
• Evaluate the different types of cloud solutions among IaaS, PaaS, SaaS.
• Access the security implementation flow, actions and responsibilities of stake holders.
• Generalize the Data Centre operations, encryption methods and deployment details.
• Provide recommendations for using and managing the customer's identity and choose the type of
virtualization to be used.
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
2. Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy, An Enterprise
Perspective on Risks and Compliance”, Oreilly Media 2009.
Reference Books:
2. Vic (J.R.) Winkler, “Securing the Cloud, Cloud Computer Security Techniques and Tactics”,
Syngress, April 2011.
DATABASE SECURITY
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2018 -2019)
SEMESTER – III
Subject Code 18SCE332 / IA Marks
40
18SFC252
Number of Contact Hours/Week 04 Exam Marks 60
Total Number of Contact Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Fundamental security concepts and architectures that serve as building blocks to database security
• Concepts of user account management and administration, including security risks
• To use current database management system to design and configure the user and data
permissions
• Operational components necessary to maximize database security using various security models
Module 1 Contact
Hours