G. H. RAISONI COLLEGE OF ENGINEERING, NAGPUR (AN AUTONOMOUS INSTITUTE UNDER UGC ACT 1956) TEACHING PLAN YEAR: 2012-13(Even Semester) NAME OF STAFF Ms. Archana R. Raut SEMESTER B.E. EIGHTH SEMESTER (A) SUBJECT MOBILE COMPUTING DEPARTMENT COMPUTER SCIENCE AND ENGINEERING NUMBER OF LECTURES PER WEEK 5 (Theory) UNIT UNIT-I UNIT-II UNIT-III S.N. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 TOPIC TO BE COVERED Introduction to wireless communication Introduction to wireless communication Introduction to wireless communication Wireless transmission Frequencies for radio transmission Signal prorogation Multiplexing Modulation Spread spectrum Introduction to cellular system More about cellular system Medium access control Medium access control Motivation for a specialized MAC SDMA FDMA TDMA CDMA GSM : System architecture Protocols Localization and calling Handover Satellite systems Introduction to Satellite systems Introduction to Satellite systems Wireless LAN : IEEE 802.11 Wireless LAN : IEEE 802.11 Recent topics in satellite communication Recent topics in satellite communication NO. OF LECTURES 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 Wireless LAN UNIT-IV UNIT-V UNIT-VI 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Ms. Archana Raut [Subject Teacher] Wireless LAN HIPERLAN HIPERLAN Bluetooth Bluetooth Revision on Wireless LAN Mobile Network Layer Mobile Network Layer Mobile IP Dynamic host configuration protocol Adhoc networks Mobile transport layer Traditional TCP Indirect TCP Snoopy TCP Mobile TCP Transaction oriented TCP Security Issues in Mobile Computing Security Issues in Mobile Computing Security Issues in Mobile Computing Advances in Mobile Computing Advances in Mobile Computing Recent security Issues in Mobile Computing Recent security Issues in Mobile Computing Revision on Mobile Computing Revision on Mobile Computing Dr. L. G. Malik [H.O.D.CSE] 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 G H RAISONI COLLEGE OF ENGINEERING, NAGPUR. Department of Computer Science & Engineering Teaching Plan Subject Name: Computer System Security Year/Sem: 8 th Sem Sec: A Faculty Name:Ms. Sonali U Nimbhorkar Session: 2012-13 Lecture No Lecture 1 Lecture 2 Lecture 3 Lecture 4 Lecture 5 Lecture 6 Lecture 7 Lecture 8 Lecture 9 Lecture 10 Lecture 11 Lecture 12 Lecture 13 Lecture 14 Lecture 15 Lecture 16 Lecture 17 Lecture 18 Lecture 19 Lecture 20 Lecture 21 Lecture 22 Lecture 23 Lecture 24 Lecture 25 Lecture 26 Lecture 27 Lecture 28 Lecture 29 Date Unit No Topic Description Introduction to the concepts of security, Principles and need for security Types of Attacks , Services Mechanisms, A model for network security Encryption model Classical encryption techniques substitution techniques, Transposition techniques, Rotor Machines, Steganography. Block ciphers : simplified DES , Block cipher principles Data encryption standard , Strength of DES Block cipher design principles , Block cipher mode of operation, Characteristics of advanced symmetric block ciphers Confidentiality using symmetric Encryption : Placement of II encryption function Traffic confidentiality Key distribution , Random number generation Key distribution , Random number generation Public key cryptography : Principles , RSA algorithm Public key cryptography : Principles , RSA algorithm Key management , Diffie-Hellman key exchange Diffie-Hellman key exchange Diffie-Hellman key exchange III Message authentication & Hash functions Authentication requirements , Functions , Codes Hash functions , Security of hash function & MAC's. Hash algorithms : MD5 message digest algorithm , Secure hash algorithm( SHA-I ) Digital signatures, Authentication protocols, Digital signature standard. Networks security practice : Authentication applications – IV Kerberos, Networks security practice : Authentication applications – Kerberos, X.509 directory authentication service I Topics covered Y/N Lecture 30 Lecture 31 Lecture 32 Lecture 33 Lecture 34 Lecture 35 Lecture 36 Lecture 37 Lecture 38 Lecture 39 Lecture 40 Lecture 41 Lecture 42 Lecture 43 Lecture 44 Lecture 45 Lecture 46 Lecture 47 Lecture 48 Lecture 49 Lecture 50 X.509 directory authentication service E-mail Security : Pretty good privacy , S/MIME E-mail Security: Pretty good privacy , S/MIME V IP security : Overview , Architecture Authentication header Encapsulating security payload Combining security associations Key management. Web security : Web security considerations, Secure Socket Layer and Transport Layer Security Secure Electronic Transaction, SHTTP. VI Security systems : Intruders , Intrusion detection viruses and related threats , viruses and related threats Firewalls design principles , Trusted systems Virtual private networks. Virtual private networks. Virtual private networks. Question Bank Revision Ms. Sonali U Nimbhorkar [Subject Teacher] Dr. L.G.Malik H.O.D. [CSE] Teaching Plan Subject Name: Distributed And Object Oriented Database Management Year/Sem: IV year / VIII Sem Faculty Name: P N Khade Lecture No Lecture 1 Unit No Topic/Topic Description Lecture 7 Lecture 8 Lecture 9 Introduction of subject Distributed Databases Distributed Databases: What and Why? The Distributed Database Management Systems. The Reference Architecture for Distributed Databases, Data Fragmentation Distributed Transparency for Read-Only and Applications Distributed Database Access Primitives Integrity Constraints in Distributed Databases Distributed Database Design Lecture 10 Framework for Distributed Database Design Lecture 11 Lecture 12 The Database Fragmentation Design Allocation of Fragments. Lecture 13 Translation of Global Queries to Fragment Queries Lecture 2 Lecture 3 Lecture 4 Lecture 5 I Lecture 6 Lecture 14 II Lecture 15 The Equivalence Transformation for Queries, Transforming Global Queries into Fragment Queries Distributed Grouping and Aggregate Function Evaluation, Lecture 16 Parametric Queries Lecture 17 Optimization Of Access Strategies Lecture 18 Framework for Query Optimization Lecture 19 Lecture 20 Lecture 21 III Lecture 22 Lecture 23 Lecture 24 Lecture 25 Lecture 26 Lecture 27 IV IV use of Semi-Join Programs for Join Queries, the SDD-l Algorithm the AHY approach Use of Join as Query Processing Tactic; General Queries The Management of Distributed Transactions Concurrency Control for Distributed Transactions; Distributed Deadlocks; Concurrency Control based on Timestamps Optimistic Methods for Concurrency Control, Distributed Database Lecture 28 Authorization and Protection. Lecture 29 The System R * The Architecture of System R* Lecture 30 Lecture 31 Lecture 33 Lecture 34 Compilation, Execution and Recompilation of Queries Transaction and Terminal Management. The Object Oriented Databases Object Oriented Databases - What and Why? the Object Oriented Database Management Systems Evolution of Object Oriented Concepts; Lecture 35 Semantic Database Approach; Lecture 32 Lecture 36 V Object Oriented Programming Language Extension Approach; Lecture 37 Oriented Programming Language Extension Approach; Lecture 38 the Object Definition Language and the Object Query Language Lecture 39 DBMS Generator Approach Lecture 40 The Object Oriented DBMS Architectures; Lecture 41 Lecture 42 Lecture 43 Lecture 44 Lecture 45 Performance Issues in Object Oriented DBMS Application Selection for Object Oriented DBMS The Database Design for an Object Relational DBMS. The Structured Typed and ADTs; Extending the ER Model VI Lecture 46 Lecture 47 Lecture 48 Lecture 49 Storage and Access Methods Query Processing; Query Optimization Design and Architecture of POSTGRES Lecture 50 Distributed Computing in CORBA and EJB. P N Khade [Subject Teacher] L. G. Malik H.O.D.[CSE] Teaching Plan Subject Name: Distributed And Object Oriented Database Management Year/Sem: IV year / VIII Sem Faculty Name: N V Mahajan Lecture No Lecture 1 Unit No Lecture 2 Lecture 3 Lecture 4 Lecture 5 Lecture 6 Lecture 7 I Topic/Topic Description Introduction of subject Distributed Databases Distributed Databases: What and Why? The Distributed Database Management Systems. The Reference Architecture for Distributed Databases, Data Fragmentation Distributed Transparency for Read-Only and Applications Distributed Database Access Primitives Lecture 8 Integrity Constraints in Distributed Databases Lecture 9 Distributed Database Design Lecture 10 Framework for Distributed Database Design Lecture 11 Lecture 12 The Database Fragmentation Design Allocation of Fragments. Lecture 13 Translation of Global Queries to Fragment Queries Lecture 14 II Lecture 15 The Equivalence Transformation for Queries, Transforming Global Queries into Fragment Queries Distributed Grouping and Aggregate Function Evaluation, Lecture 16 Parametric Queries Lecture 17 Optimization Of Access Strategies Lecture 18 Framework for Query Optimization Lecture 19 Lecture 20 Lecture 21 Lecture 22 Lecture 23 Lecture 24 Lecture 25 Lecture 26 Lecture 27 III IV IV use of Semi-Join Programs for Join Queries, the SDD-l Algorithm the AHY approach Use of Join as Query Processing Tactic; General Queries The Management of Distributed Transactions Concurrency Control for Distributed Transactions; Distributed Deadlocks; Concurrency Control based on Timestamps Optimistic Methods for Concurrency Control, Distributed Database Lecture 28 Lecture 29 Lecture 30 Lecture 31 Authorization and Protection. The System R * The Architecture of System R* Compilation, Execution and Recompilation of Queries Transaction and Terminal Management. The Object Oriented Databases Object Oriented Databases - What and Why? the Object Oriented Database Management Systems Evolution of Object Oriented Concepts; Semantic Database Approach; Lecture 32 Lecture 33 Lecture 34 Lecture 35 Lecture 36 V Object Oriented Programming Language Extension Approach; Lecture 37 Oriented Programming Language Extension Approach; Lecture 38 the Object Definition Language and the Object Query Language Lecture 39 DBMS Generator Approach Lecture 40 The Object Oriented DBMS Architectures; Lecture 41 Performance Issues in Object Oriented DBMS Lecture 42 Application Selection for Object Oriented DBMS Lecture 43 Lecture 44 The Database Design for an Object Relational DBMS. The Structured Typed and ADTs; Lecture 45 VI Extending the ER Model Lecture 46 Storage and Access Methods Lecture 47 Query Processing; Lecture 48 Query Optimization Lecture 49 Design and Architecture of POSTGRES Lecture 50 Distributed Computing in CORBA and EJB. Ms N V Mahajan [Subject Teacher] L. G. Malik H.O.D.[CSE] Teaching Plan Subject Name: Embedded System Year/Sem: IV year / VIII Sem A Faculty Name: A V Sakhare Lecture No Lecture 1 Lecture 2 Lecture 3 Lecture 4 Lecture 5 Lecture 6 Lecture 7 Lecture 8 Lecture 9 Lecture 10 Lecture 11 Lecture 12 Lecture 13 Lecture 14 Lecture 15 Lecture 16 Lecture 17 Lecture 18 Lecture 19 Lecture 20 Lecture 21 Lecture 22 Lecture 23 Lecture 24 Lecture 25 Lecture 26 Lecture 27 Lecture 28 Lecture 29 Lecture 30 Lecture 31 Lecture 32 Lecture 33 Lecture 34 Lecture 35 Lecture 36 Unit No I II III IV Topic/Topic Description An Embedded system processor in the system embedded system - on- chip (SOC) and in VLSI circuit. Processor selection for an embedded system Processor and memory organization memory selection for an embedded systems allocation of memory to program cache and memory management links segments and blocks and memory map of a system, Interfacing processors, memories and Input Output Devices Revision 1/0 devices timer and colmting devices serial communication using the "12 C' CAN profibus foundation field bus. advanced I/O buses between the network multiple devices host systems computer parallel communication between the networked 1/0 multiple devices using the ISA PCL PCI-X and advanced buses. device drivers and interrupts servicing mechanism, Device drivers parallel port and serial port device drivers in a system drivers for internal programmable device timing devices Interrupt servicing mechanism. Revision Programming concepts and embedded programming Interprocess communication synchronization of processes task and threads. multiple processes in an application problem of sharing data by multiple tasks and routines, interprocess communication Problem Solving Revision Lecture 37 Lecture 38 Lecture 39 Lecture 40 Lecture 41 Lecture 42 Lecture 43 Lecture 44 Lecture 45 Lecture 46 Lecture 47 Lecture 48 Lecture 49 Lecture 50 V A V Sakhare [Subject Teacher] software co-design in an embedded system embedded system project management embedded system design and co-design issues in system development process design cycle in the development phase for an embedded system use of target systems use of software tools for development of an embedded system use of scopes and logic analysis for system Hardware tests. Issues in embedded system design. Advanced Topic Revision Doubt Solving Question Paper Discussion L. G. Malik H.O.D.[CSE]