GH Raisoni College Of Engineering Nagpur

advertisement
G. H. RAISONI COLLEGE OF ENGINEERING, NAGPUR
(AN AUTONOMOUS INSTITUTE UNDER UGC ACT 1956)
TEACHING PLAN
YEAR: 2012-13(Even Semester)
NAME OF STAFF
Ms. Archana R. Raut
SEMESTER
B.E. EIGHTH SEMESTER (A)
SUBJECT
MOBILE COMPUTING
DEPARTMENT
COMPUTER SCIENCE AND ENGINEERING
NUMBER OF LECTURES PER WEEK
5 (Theory)
UNIT
UNIT-I
UNIT-II
UNIT-III
S.N.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
TOPIC TO BE COVERED
Introduction to wireless communication
Introduction to wireless communication
Introduction to wireless communication
Wireless transmission
Frequencies for radio transmission
Signal prorogation
Multiplexing
Modulation
Spread spectrum
Introduction to cellular system
More about cellular system
Medium access control
Medium access control
Motivation for a specialized MAC
SDMA
FDMA
TDMA
CDMA
GSM : System architecture
Protocols
Localization and calling
Handover
Satellite systems
Introduction to Satellite systems
Introduction to Satellite systems
Wireless LAN : IEEE 802.11
Wireless LAN : IEEE 802.11
Recent topics in satellite communication
Recent topics in satellite communication
NO. OF
LECTURES
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Wireless LAN
UNIT-IV
UNIT-V
UNIT-VI
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
Ms. Archana Raut
[Subject Teacher]
Wireless LAN
HIPERLAN
HIPERLAN
Bluetooth
Bluetooth
Revision on Wireless LAN
Mobile Network Layer
Mobile Network Layer
Mobile IP
Dynamic host configuration protocol
Adhoc networks
Mobile transport layer
Traditional TCP
Indirect TCP
Snoopy TCP
Mobile TCP
Transaction oriented TCP
Security Issues in Mobile Computing
Security Issues in Mobile Computing
Security Issues in Mobile Computing
Advances in Mobile Computing
Advances in Mobile Computing
Recent security Issues in Mobile Computing
Recent security Issues in Mobile Computing
Revision on Mobile Computing
Revision on Mobile Computing
Dr. L. G. Malik
[H.O.D.CSE]
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
G H RAISONI COLLEGE OF ENGINEERING, NAGPUR.
Department of Computer Science & Engineering
Teaching Plan
Subject Name: Computer System Security
Year/Sem: 8 th Sem
Sec: A
Faculty Name:Ms. Sonali U Nimbhorkar
Session: 2012-13
Lecture
No
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Lecture 10
Lecture 11
Lecture 12
Lecture 13
Lecture 14
Lecture 15
Lecture 16
Lecture 17
Lecture 18
Lecture 19
Lecture 20
Lecture 21
Lecture 22
Lecture 23
Lecture 24
Lecture 25
Lecture 26
Lecture 27
Lecture 28
Lecture 29
Date
Unit
No
Topic Description
Introduction to the concepts of security, Principles and need for
security
Types of Attacks , Services
Mechanisms, A model for network security
Encryption model Classical encryption techniques
substitution techniques, Transposition techniques,
Rotor Machines, Steganography.
Block ciphers : simplified DES , Block cipher principles
Data encryption standard , Strength of DES
Block cipher design principles , Block cipher mode of operation,
Characteristics of advanced symmetric block ciphers
Confidentiality using symmetric Encryption : Placement of
II
encryption function
Traffic confidentiality
Key distribution , Random number generation
Key distribution , Random number generation
Public key cryptography : Principles , RSA algorithm
Public key cryptography : Principles , RSA algorithm
Key management ,
Diffie-Hellman key exchange
Diffie-Hellman key exchange
Diffie-Hellman key exchange
III Message authentication & Hash functions
Authentication requirements , Functions , Codes
Hash functions , Security of hash function & MAC's.
Hash algorithms : MD5 message digest algorithm ,
Secure hash algorithm( SHA-I )
Digital signatures, Authentication protocols, Digital signature
standard.
Networks security practice : Authentication applications –
IV
Kerberos,
Networks security practice : Authentication applications –
Kerberos,
X.509 directory authentication service
I
Topics
covered
Y/N
Lecture 30
Lecture 31
Lecture 32
Lecture 33
Lecture 34
Lecture 35
Lecture 36
Lecture 37
Lecture 38
Lecture 39
Lecture 40
Lecture 41
Lecture 42
Lecture 43
Lecture 44
Lecture 45
Lecture 46
Lecture 47
Lecture 48
Lecture 49
Lecture 50
X.509 directory authentication service
E-mail Security : Pretty good privacy , S/MIME
E-mail Security: Pretty good privacy , S/MIME
V IP security : Overview , Architecture
Authentication header
Encapsulating security payload
Combining security associations
Key management.
Web security : Web security considerations,
Secure Socket Layer and Transport Layer Security
Secure Electronic Transaction, SHTTP.
VI Security systems : Intruders ,
Intrusion detection
viruses and related threats ,
viruses and related threats
Firewalls design principles , Trusted systems
Virtual private networks.
Virtual private networks.
Virtual private networks.
Question Bank
Revision
Ms. Sonali U Nimbhorkar
[Subject Teacher]
Dr. L.G.Malik
H.O.D. [CSE]
Teaching Plan
Subject Name: Distributed And Object Oriented Database Management
Year/Sem:
IV year / VIII Sem
Faculty Name: P N Khade
Lecture
No
Lecture 1
Unit No
Topic/Topic Description
Lecture 7
Lecture 8
Lecture 9
Introduction of subject
Distributed Databases
Distributed Databases: What and Why?
The Distributed Database Management Systems.
The Reference Architecture for Distributed Databases,
Data Fragmentation
Distributed Transparency for Read-Only and
Applications
Distributed Database Access Primitives
Integrity Constraints in Distributed Databases
Distributed Database Design
Lecture 10
Framework for Distributed Database Design
Lecture 11
Lecture 12
The Database Fragmentation Design
Allocation of Fragments.
Lecture 13
Translation of Global Queries to Fragment Queries
Lecture 2
Lecture 3
Lecture 4
Lecture 5
I
Lecture 6
Lecture 14
II
Lecture 15
The Equivalence Transformation for Queries,
Transforming Global Queries into Fragment Queries
Distributed Grouping and Aggregate Function
Evaluation,
Lecture 16
Parametric Queries
Lecture 17
Optimization Of Access Strategies
Lecture 18
Framework for Query Optimization
Lecture 19
Lecture 20
Lecture 21
III
Lecture 22
Lecture 23
Lecture 24
Lecture 25
Lecture 26
Lecture 27
IV
IV
use of Semi-Join Programs for Join Queries,
the SDD-l Algorithm
the AHY approach
Use of Join as Query Processing Tactic; General
Queries
The Management of Distributed Transactions
Concurrency Control for Distributed Transactions;
Distributed Deadlocks;
Concurrency Control based on Timestamps
Optimistic Methods for Concurrency Control,
Distributed Database
Lecture 28
Authorization and Protection.
Lecture 29
The System R * The Architecture of System R*
Lecture 30
Lecture 31
Lecture 33
Lecture 34
Compilation, Execution and Recompilation of Queries
Transaction and Terminal Management.
The Object Oriented Databases Object Oriented
Databases - What and Why?
the Object Oriented Database Management Systems
Evolution of Object Oriented Concepts;
Lecture 35
Semantic Database Approach;
Lecture 32
Lecture 36
V
Object Oriented Programming Language Extension
Approach;
Lecture 37
Oriented Programming Language Extension Approach;
Lecture 38
the Object Definition Language and the Object Query
Language
Lecture 39
DBMS Generator Approach
Lecture 40
The Object Oriented DBMS Architectures;
Lecture 41
Lecture 42
Lecture 43
Lecture 44
Lecture 45
Performance Issues in Object Oriented DBMS
Application Selection for Object Oriented DBMS
The Database Design for an Object Relational DBMS.
The Structured Typed and ADTs;
Extending the ER Model
VI
Lecture 46
Lecture 47
Lecture 48
Lecture 49
Storage and Access Methods
Query Processing;
Query Optimization
Design and Architecture of POSTGRES
Lecture 50
Distributed Computing in CORBA and EJB.
P N Khade
[Subject Teacher]
L. G. Malik
H.O.D.[CSE]
Teaching Plan
Subject Name: Distributed And Object Oriented Database Management
Year/Sem:
IV year / VIII Sem
Faculty Name: N V Mahajan
Lecture
No
Lecture 1
Unit No
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
I
Topic/Topic Description
Introduction of subject
Distributed Databases
Distributed Databases: What and Why?
The Distributed Database Management Systems.
The Reference Architecture for Distributed Databases,
Data Fragmentation
Distributed Transparency for Read-Only and Applications
Distributed Database Access Primitives
Lecture 8
Integrity Constraints in Distributed Databases
Lecture 9
Distributed Database Design
Lecture 10
Framework for Distributed Database Design
Lecture 11
Lecture 12
The Database Fragmentation Design
Allocation of Fragments.
Lecture 13
Translation of Global Queries to Fragment Queries
Lecture 14
II
Lecture 15
The Equivalence Transformation for Queries,
Transforming Global Queries into Fragment Queries
Distributed Grouping and Aggregate Function Evaluation,
Lecture 16
Parametric Queries
Lecture 17
Optimization Of Access Strategies
Lecture 18
Framework for Query Optimization
Lecture 19
Lecture 20
Lecture 21
Lecture 22
Lecture 23
Lecture 24
Lecture 25
Lecture 26
Lecture 27
III
IV
IV
use of Semi-Join Programs for Join Queries,
the SDD-l Algorithm
the AHY approach
Use of Join as Query Processing Tactic; General Queries
The Management of Distributed Transactions
Concurrency Control for Distributed Transactions;
Distributed Deadlocks;
Concurrency Control based on Timestamps
Optimistic Methods for Concurrency Control, Distributed Database
Lecture 28
Lecture 29
Lecture 30
Lecture 31
Authorization and Protection.
The System R * The Architecture of System R*
Compilation, Execution and Recompilation of Queries
Transaction and Terminal Management.
The Object Oriented Databases Object Oriented Databases - What
and Why?
the Object Oriented Database Management Systems
Evolution of Object Oriented Concepts;
Semantic Database Approach;
Lecture 32
Lecture 33
Lecture 34
Lecture 35
Lecture 36
V
Object Oriented Programming Language Extension Approach;
Lecture 37
Oriented Programming Language Extension Approach;
Lecture 38
the Object Definition Language and the Object Query Language
Lecture 39
DBMS Generator Approach
Lecture 40
The Object Oriented DBMS Architectures;
Lecture 41
Performance Issues in Object Oriented DBMS
Lecture 42
Application Selection for Object Oriented DBMS
Lecture 43
Lecture 44
The Database Design for an Object Relational DBMS.
The Structured Typed and ADTs;
Lecture 45
VI
Extending the ER Model
Lecture 46
Storage and Access Methods
Lecture 47
Query Processing;
Lecture 48
Query Optimization
Lecture 49
Design and Architecture of POSTGRES
Lecture 50
Distributed Computing in CORBA and EJB.
Ms N V Mahajan
[Subject Teacher]
L. G. Malik
H.O.D.[CSE]
Teaching Plan
Subject Name: Embedded System
Year/Sem:
IV year / VIII Sem A
Faculty Name: A V Sakhare
Lecture
No
Lecture 1
Lecture 2
Lecture 3
Lecture 4
Lecture 5
Lecture 6
Lecture 7
Lecture 8
Lecture 9
Lecture 10
Lecture 11
Lecture 12
Lecture 13
Lecture 14
Lecture 15
Lecture 16
Lecture 17
Lecture 18
Lecture 19
Lecture 20
Lecture 21
Lecture 22
Lecture 23
Lecture 24
Lecture 25
Lecture 26
Lecture 27
Lecture 28
Lecture 29
Lecture 30
Lecture 31
Lecture 32
Lecture 33
Lecture 34
Lecture 35
Lecture 36
Unit No
I
II
III
IV
Topic/Topic Description
An Embedded system processor in the system
embedded system - on- chip (SOC) and in VLSI circuit.
Processor selection for an embedded system
Processor and memory organization
memory selection for an embedded systems
allocation of memory to program
cache and memory management
links segments and blocks and memory map of a system,
Interfacing processors,
memories and Input Output Devices
Revision
1/0 devices timer and colmting devices
serial communication using the "12 C' CAN
profibus foundation field bus.
advanced I/O buses between the network multiple devices
host systems
computer parallel communication between the networked
1/0 multiple devices using the ISA
PCL
PCI-X and advanced buses.
device drivers and interrupts servicing mechanism,
Device drivers
parallel port and serial port device drivers in a system
drivers for internal programmable
device timing devices
Interrupt servicing mechanism.
Revision
Programming concepts and embedded programming
Interprocess communication
synchronization of processes
task and threads.
multiple processes in an application
problem of sharing data by multiple tasks and routines,
interprocess communication
Problem Solving
Revision
Lecture 37
Lecture 38
Lecture 39
Lecture 40
Lecture 41
Lecture 42
Lecture 43
Lecture 44
Lecture 45
Lecture 46
Lecture 47
Lecture 48
Lecture 49
Lecture 50
V
A V Sakhare
[Subject Teacher]
software co-design in an embedded system
embedded system project management
embedded system design and co-design issues in system
development process
design cycle in the development phase for an embedded system
use of target systems
use of software tools for development of an embedded system
use of scopes and logic analysis for system
Hardware tests.
Issues in embedded system design.
Advanced Topic
Revision
Doubt Solving
Question Paper Discussion
L. G. Malik
H.O.D.[CSE]
Download