G H RAISONI COLLEGE OF ENGINEERING, NAGPUR. (An Autonomous institute under UGC Act 1956) Department of Computer Science & Engineering Teaching Plan Subject: Computer System Security VIII Semester BE Computer Science & Engineering (Section A) 2011-2012 Even Semester Lecture No 1. Unit Topics I Introduction to the concepts of security : need, principles, Types of Attacks , Services , Mechanisms 2. Introduction to the concepts of security : need, principles, Types of Attacks , Services , Mechanisms 3. A model for network security , Encryption model Classical encryption techniques: substitution techniques, Transposition techniques 4. Block ciphers : simplified DES , Block cipher principles 5. Block ciphers : simplified DES , Block cipher principles 6. Data encryption standard , Strength of DES , Block cipher design principles 7. Block cipher mode of operation, Characteristics of advanced symmetric block ciphers. Block cipher mode of operation, Characteristics of advanced symmetric block ciphers. Confidentiality using symmetric Encryption : Placement of encryption function 8. 9. II 10. Traffic confidentiality , Key distribution , Random number generation 11. Traffic confidentiality , Key distribution , Random number generation 12. Public key cryptography : Principles , RSA algorithm 13. Public key cryptography : Principles , RSA algorithm 14. Public key cryptography : Principles , RSA algorithm 15. Key management , Diffie-Hellman key exchange 16. Key management , Diffie-Hellman key exchange 17. III Message authentication & Hash functions : Authentication requirements , Functions , Codes , Hash functions 18. Message authentication & Hash functions : Authentication requirements , Functions , Codes , Hash functions 19. Message authentication & Hash functions : Authentication requirements , Functions , Codes , Hash functions 20. Security of hash function & MAC's. Hash algorithms : MD5 message digest algorithm 21. Secure hash algorithm( SHA-I ) , Digital signatures and authentication protocols : Digital signatures 22. Authentication protocols , Digital signature standard. 23. Authentication protocols , Digital signature standard. 24. IV Networks security practice : Authentication applications 25. Networks security practice : Authentication applications 26. Kerberos, X.509 directory authentication service 27. Kerberos, X.509 directory authentication service 28. Kerberos, X.509 directory authentication service 29. Kerberos, X.509 directory authentication service 30. E-mail security : Pretty good privacy , S/MIME 31. V IP security : Overview , Architecture 32. Authentication header , Encapsulating security payload , Combining security associations 33. Authentication header , Encapsulating security payload , Combining security associations 34. Authentication header , Encapsulating security payload , Combining security associations 35. Key management. Web security 36. Key management. Web security 37. Secure Socket Layer and Transport Layer Security 38. Secure Socket Layer and Transport Layer Security 39. Secure Electronic Transaction, SHTTP 40. Secure Electronic Transaction, SHTTP 41. VI Security systems : Intruders 42. Intrusion detection 43. Intrusion detection 44. viruses and related threats 45. viruses and related threats 46. Firewalls design principles 47. Firewalls design principles 48. Trusted systems, Virtual private networks. 49. REVISION OF SYLLABUS AND TOPICS 50. REVISION OF SYLLABUS AND TOPICS Kapil N Hande Subject Teacher G H RAISONI COLLEGE OF ENGINEERING, NAGPUR. Department of Computer Science & Engineering Teaching Plan Subject Name: Computer System Security Year/Sem: 8 th Sem Sec: B Faculty Name: Vrushali V. Kadu Session: 2011-12 Lecture Date Unit No Topic Description No Y/N I Lecture 2 Introduction to the concepts of security, Principles and need for security Types of Attacks , Services Lecture 3 Mechanisms, A model for network security Lecture 1 Lecture 6 Encryption model Classical encryption techniques substitution techniques, Transposition techniques, Rotor Machines, Steganography. Lecture 7 Block ciphers : simplified DES , Block cipher principles Lecture 4 Lecture 5 Lecture 8 Lecture 9 Lecture 10 II Lecture 11 Lecture 12 Lecture 13 Lecture 14 Topics covered Data encryption standard , Strength of DES Block cipher design principles , Block cipher mode of operation, Characteristics of advanced symmetric block ciphers Confidentiality using symmetric Encryption : Placement of encryption function Traffic confidentiality Key distribution , Random number generation Key distribution , Random number generation Lecture 15 Public key cryptography : Principles , RSA algorithm Lecture 16 Public key cryptography : Principles , RSA algorithm Lecture 17 Key management , Lecture 18 Diffie-Hellman key exchange Lecture 19 Diffie-Hellman key exchange Lecture 20 Diffie-Hellman key exchange III Lecture 22 Message authentication & Hash functions Authentication requirements , Functions , Codes Lecture 23 Hash functions , Security of hash function & MAC's. Lecture 21 Hash algorithms : MD5 message digest algorithm , Secure hash algorithm( SHA-I ) Lecture 24 Lecture 25 Lecture 29 Digital signatures, Authentication protocols, Digital signature standard. Networks security practice : Authentication applications – Kerberos, Networks security practice : Authentication applications – Kerberos, X.509 directory authentication service Lecture 30 X.509 directory authentication service Lecture 31 E-mail Security : Pretty good privacy , S/MIME E-mail Security: Pretty good privacy , S/MIME IP security : Overview , Architecture Lecture 26 Lecture 27 IV Lecture 28 Lecture 32 Lecture 33 V Lecture 34 Authentication header Lecture 35 Encapsulating security payload Lecture 36 Combining security associations Lecture 37 Key management. Lecture 38 Web security considerations, : Web security Secure Socket Layer and Transport Layer Security Secure Electronic Transaction, SHTTP. Lecture 39 Lecture 40 Lecture 41 VI Security systems : Intruders , Lecture 42 Intrusion detection Lecture 43 viruses and related threats , Lecture 44 viruses and related threats Lecture 45 Lecture 46 Firewalls design principles , Trusted systems Virtual private networks. Lecture 47 Virtual private networks. Lecture 48 Virtual private networks. Lecture 49 Question Bank Lecture 50 Revision Ms. Vrushali V. Kadu Dr. L.G.Malik [Subject Teacher] H.O.D. [CSE] Teaching Plan Subject Name: Embedded Systems Year/Sem: 8 th Sem B Faculty Name: Shubhangi J. Moon Lecture No Unit No Topic/Topic Description Lecture 1 An introduction to embedded systems, Applications Lecture 2 An Embedded system processor in the system., other hardware units,. Lecture 3 Software embedded into a system Lecture 4 Exemplary embedded systems Lecture 5 Embedded system - on- chip (SOC) and in VLSI circuit. Lecture 6 Processor and memory organization Lecture 8 Structural Units in a Processor. Processor selection for an embedded system, memory devices. memory selection for an embedded systems, Lecture 9 allocation of memory to program cache and memory management links segments Lecture 10 blocks and memory map of a system, DMA Lecture 11 Interfacing processors memories Lecture 12 Input Output Devices Lecture 13 Devices and buses for device networks Lecture 14 1/0 devices timer and colmting devices Lecture 15 Serial communication using the "12 C' CAN. Lecture 16 Profibus foundation field bus Lecture 17 Advanced I/O buses between the network multiple devices Lecture 18 Host systems Lecture 7 Lecture 19 I II Computer parallel communication between the networked Lecture 20 1/0 multiple devices using the ISA. Lecture 21 PCL PCI-X Lecture 22 Advanced buses Lecture 23 Device drivers Lecture 24 Interrupts servicing mechanism Lecture 25 Device drivers, parallel port Lecture 26 III Serial port device drivers in a system Lecture 27 Device drivers for internal programmable timing devices Lecture 28 Interrupt servicing mechanism Lecture 29 Programming Concepts And Embedded Programming Lecture 30 Embedded Programming In C Lecture 31 Embedded Programming In C++ Lecture 32 Embedded Programming In VC++ Lecture 33 IV Embedded Programming In Java Lecture 34 Interprocess communication & Synchronization of processes Lecture 35 Task and threads. Lecture 36 Multiple processes in an application. Lecture 37 problem of sharing data by multiple tasks and routines Lecture 38 Interprocess communication. Lecture 39 Hardware co-design in an embedded system Lecture 40 Software co-design in an embedded system Lecture 41 Embedded system project management Lecture 42 Embedded system design Lecture 43 Co-design issues in system development process Lecture 44 Design cycle in the development phase for an embedded system, Lecture 45 Use of target systems Lecture 46 Lecture 47 V Use of software tools for development of an embedded system, Use of scopes and logic analysis for system Lecture 48 Hardware tests Lecture 49 Issues in embedded system design. Lecture 50 Revision Ms. S.J.Moon [Subject Teacher] Dr.L.G.Malik [H.O.D CSE] Teaching Plan Subject Name: Embedded Systems Year/Sem: 8 th Sem A Faculty Name: Priya S.Kamble Lecture No Unit No Topic/Topic Description Lecture 1 An introduction to embedded systems, Applications Lecture 2 An Embedded system processor in the system., other hardware units,. Lecture 3 Software embedded into a system Lecture 4 Exemplary embedded systems Lecture 5 Embedded system - on- chip (SOC) and in VLSI circuit. Lecture 6 Processor and memory organization Lecture 8 Structural Units in a Processor. Processor selection for an embedded system, memory devices. memory selection for an embedded systems, Lecture 9 allocation of memory to program cache and memory management links segments Lecture 10 blocks and memory map of a system, DMA Lecture 11 Interfacing processors memories Lecture 12 Input Output Devices Lecture 13 Devices and buses for device networks Lecture 14 1/0 devices timer and colmting devices Lecture 15 Serial communication using the "12 C' CAN. Lecture 16 Profibus foundation field bus Lecture 17 Advanced I/O buses between the network multiple devices Lecture 18 Host systems Lecture 7 Lecture 19 I II Computer parallel communication between the networked Lecture 20 1/0 multiple devices using the ISA. Lecture 21 PCL PCI-X Lecture 22 Advanced buses Lecture 23 Device drivers Lecture 24 Interrupts servicing mechanism Lecture 25 Device drivers, parallel port Lecture 26 III Serial port device drivers in a system Lecture 27 Device drivers for internal programmable timing devices Lecture 28 Interrupt servicing mechanism Lecture 29 Programming Concepts And Embedded Programming Lecture 30 Embedded Programming In C Lecture 31 Embedded Programming In C++ Lecture 32 Embedded Programming In VC++ Lecture 33 IV Embedded Programming In Java Lecture 34 Interprocess communication & Synchronization of processes Lecture 35 Task and threads. Lecture 36 Multiple processes in an application. Lecture 37 problem of sharing data by multiple tasks and routines Lecture 38 Interprocess communication. Lecture 39 Hardware co-design in an embedded system Lecture 40 Software co-design in an embedded system Lecture 41 Embedded system project management Lecture 42 Embedded system design Lecture 43 Co-design issues in system development process Lecture 44 Design cycle in the development phase for an embedded system, Lecture 45 Use of target systems Lecture 46 Lecture 47 V Use of software tools for development of an embedded system, Use of scopes and logic analysis for system Lecture 48 Hardware tests Lecture 49 Issues in embedded system design. Lecture 50 Revision Ms. P.S.Kamble [Subject Teacher] Dr.L.G.Malik [H.O.D CSE] TEACHING PLAN Name of Teacher : Ms. N. A. CHAVHAN. Name of subject : Mobile Computing NCSL419 (8th Sem CSE) Year/Sem/Section : IV/8th /A Lectures Day Date Portion of syllabus to be covered to Sessional planned 1 UNIT-I : Introduction communication wireless 2 Wireless transmission 3 Frequencies for radio transmission 4 Signal prorogation 5 Multiplexing Types 6 Modulation Techniques 7 Spread spectrum Techniques 8 Introduction to cellular system 9 Revision Of Unit 1 10 UNIT-II: Medium access control 11 Motivation for a specialized MAC 12 SDMA 13 FDMA 14 TDMA 15 CDMA 16 GSM : System architecture 17 GSM : protocols 18 GSM : localization 19 GSM : calling 20 GSM : handover 21 Revision Of Unit 2 22 UNIT-III: Satellite systems 23 Types : LEO, MEO and GEO 24 Wireless LAN 25 IEEE 802.11 Introduction 26 IEEE 802.11 Terminology 27 Revision Of Unit 3 28 UNIT-IV Wireless LAN Introduction 29 Wireless LAN Terminology 30 HIPERLAN Introduction 31 HIPERLAN Terminology 32 Bluetooth Technology 33 Revision Of Unit 4 34 UNIT-V: Mobile Network Layer 35 Mobile IP 36 dynamic host, 37 configuration protocol, 38 Adhoc networks 39 Mobile transport layer 40 Traditional TCP, Indirect TCP , 41 Snoopy TCP,mobile TCP, 42 Transaction oriented TCP. 43 Revision Of Unit 5 44 UNIT-VI: Security Issues in Mobile Computing Introduction to Security Issues in Mobile Computing 45 46 Terminologies in Security of Mobile Computing 47 Securing Devices And USb Ports 48 Improving Mobile Security 49 Firewalls And Encryption techniques 50 Revision Of Unit 6 Total Classes Planned : 50 Subject Teacher H.O.D. G.H.RAISONI COLLEGE OF ENGINEERING DAY WISE TEACHING PLAN B.E. (CSE) Sem: VIII Sub:Topics in Distributed System(E –III) Faculty Name: Ms. Urmila Shrawankar Lect. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 Topics Introduction, Motivations, System Architecture Types Design Issues like global knowledge, naming, scalability, compatibility Limitation of distributed systems, absence of global clock, shard memory Lamport’s Logical clock, Limitation of Lamport’s logical clocks, example Vector clocks, IR’s, casually related events Local State, Global state Termination Detection , Huang’s Termination Detection Algorithm Mutual exclusion algorithm Non –Token Based Algorithm’s LAMPORT’S Algorithm with correctness and example The Ricart-Agrawala algorithm with correctness and ex Token Based algorithm’s, Suzuki-Kasami’s Broadcast algorithm Singhal’s Heuristic Algorithm, comparative performance analysis Issues in Deadlock Detection and Resolution, Centralized, Distributed and Hierarchical control The completely centralized algorithm, The Ho-Ramamoorthy Algorithms A Path Pushing Algorithm, An Edge- Chasing algorithm A Diffusion Computation Based Algorithm and A Global State Detection Based Algorithm Agreement protocols Classification, The Byzantine Agreement Problem, The consensus problem Byzantine Agreement Distributed File System Distributed File System Design Issues Case Studies: The Sun Network File System Distributed Shared Memory, Architecture, Memory coherence, Coherence Protocols Case Studies: IVY, Mirage and Cloud as Distributed Shared Memory Distributed Scheduling, Issues like Load, Load balancing and Load Sharing, components Load Distributing Algorithms The Load Sharing Policies Recovery: Introduction, Basic Concept, Forward and Backward error recovery Synchronous Check pointing and Recovery Asynchronous Check pointing and Recovery Fault Tolerance: Atomic actions and Committing The Two-Phase Commit Protocol Voting Protocol, The Voting Algorithm Cryptography: Data Encryption Standard (DES) Cipher Block Chaining Public Key Cryptography, The RSA method Authentication Services, Authentication servers, Establishing Interactive Connections Case Study: The Kerberos system, Phase I, Phase II and Phase III Ms. Urmila Shrawankar Subject Teacher