You are on page 1of 8

XVI Academic Council Meeting

SASTRA

B.Tech. (CSE) Scheme (For Candidates Admitted From 2008 Onwards) NEW SYLLABUS SEMESTER VI: Periods of Instruction L T 3 1 3 1 3 1 4 1 3 1 3 1 0 0 1 20 0 0 0 6

Subject Code BCSCCS 601 R01 BCSCCS 602 R01 BCSCCS 603 R01 BCSCCS 604 R01 BCSDXX XXX BCSDXX XXX BCSCCS 605 R01 BCSCCS 606 R01 BCSCTP 607

Subject Title Cryptography & Network Security Software Engineering Computer Graphics System Software DE 5 DE 6 System Software and Computer Graphics Lab Software Engineering Lab HR SKILLS - IV TOTAL

Credits P 0 0 0 0 0 0 3 3 0 6 4 4 4 5 4 4 2 2 1 30

DEPARTMENTAL ELECTIVES: BCSDMA 601 R01 BCSDCS 602 R01 BCSDCS 603 R01 BCSDCS 604 BCSDCS 605 R01 BCSDCS 606 R01 BCSDCS 607 Probability & Queuing Theory Data Warehousing and Data Mining Digital Image Processing Robotics Mobile Communication Real Time Systems Advanced Internet Programming 3 3 3 3 3 3 2 1 1 1 1 1 1 0 0 0 0 0 0 0 3 4 4 4 4 4 4 4

BCSCCS601R01

CRYPTOGRAPHY & NETWORK SECURITY


L T P CREDITS 1

XVI Academic Council Meeting 3 1 0

SASTRA 4

UNIT I (15 Periods) Introduction: Security Threats, Security Attacks, Security Services, Mechanisms- Model for Network Security-Classical Encryption Techniques-Substitutions-Transpositions Techniques- Stream Cipher, Block Cipher- Cipher Modes-ECB-CBC-CFB-OFB- Traffic Confidentiality - Feistal Cipher Structure - Key Management - Random Number Generation. UNIT II (15 Periods)

Types & Algorithms: Symmetric Public Key Cryptography- Combining Block ciphers Double, Triple Encryption, Doubling the Block length- How Crypto system fails? Choosing between Strong and Weak Crypto Systems - Data Encryption Standards - AESRSA Algorithm Blowfish Knapsack Algorithm. UNIT III (15 Periods)

Hash Algorithm, Key Management: Diffie Hellman Key Exchange EKE Conference Key Distribution - Elliptic Curve Cryptography Authentication Message Authentication Codes - Hash Functions - Secure Hash Algorithm Digital Signatures DSA - Authentication Protocols- Kerberos AKEP2. UNIT IV (15 Periods)

E-Mail Security: Pretty Good privacy - S/MIME - IP Security: Overview Architecture Authentication Header Encapsulating security payload Combining Security associations Web Security: SSL- TLS-SET Firewalls: Design Principles Trusted systems Text Books: 1. Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Second Edition, 1996. [Units I, II & III] 2. William Stallings, Cryptography and Network Security: Principles and Practice, Pearson Education, Fourth Edition, 2006. [Units I, III & IV] References: 1. Alfred J. Menezes, Paul C. Van OorSchot, Scott A. Van Stone, Handbook of Applied Cryptography, CRC Press, 1996. 2. Richard E. Smith, Internet Cryptography, Addison Wesley, 1997. 3. Atul Kahate, Cryptography and Network Security, Tata McGraw Hill, 2003.

XVI Academic Council Meeting

SASTRA

BCSCCS602R01

SOFTWARE ENGINEERING
L T P CREDITS 3 1 0 4 (15 Periods)

(Common for CSE, IT and ICT)

UNIT I

Software Engineering: Introduction to Software Engineering- -Evolving role of softwareSoftware-Changing Nature-Legacy software-Generic View of Process-layered technology-CMMI-Process Patterns-Process Assessment- PSP & TSP-Process Technology-Product & Process-Process Models- System Engineering. UNIT II (15 Periods)

Requirement Engineering: Estimation-Project Planning Process-ResourcesDecomposition techniques- Empirical Estimation Models- Estimation for Object Oriented Projects- Requirements engineering-Tasks- Process- Eliciting Requirements- Developing Use cases and building the model- negotiating and validating requirements-Building the Analysis Model-Requirement analysis-approaches- data modeling concepts- OOAScenario, flow oriented and class based modeling- Creating a behavioral model. UNIT III (15 Periods)

Design Engineering: Design Concepts- design model- pattern based software designCreating an architectural design-software architecture- data design- architectural styles and patterns-architectural design- assessing- mapping data flow into architectureModeling Component level design-Performing user interface design. UNIT IV (15 Periods)

Testing and Metrics: Testing Strategies-strategic approach to software testing-strategic issues- test strategies for conventional and OO software-Validation testing-System testingart of debugging- Testing Tactics- Product Metrics-Software Measurement. Text Book: 1. Roger S Pressman, Software Engineering - A Practitioners approach, McGraw Hill, Sixth Edition, 2005. References: 1. Pankaj Jalote, An Integrated Approach to Software Engineering, Narosa Publishing House, Third Edition, 2005. 2. Rajib Mall, Fundamentals of Software Engineering, Prentice Hall of India, Second Edition, 2004.

XVI Academic Council Meeting

SASTRA

BCSCCS603R01 COMPUTER GRAPHICS (Common for CSE, IT and ICT)

L T P CREDITS 3 1 0 4

UNIT-I (15 Periods) Introduction: Application areas of Computer Graphics, overview of graphics systems, video-display devices, and raster-scan systems, random scan systems, graphics monitors and workstations and input devices. Output primitives: Points and lines, DDA Line Drawing Algorithm Bresenhams Line, Circle & Ellipse algorithms. Filled area primitives: Scan line polygon fill algorithm, boundaryfill and flood-fill algorithms. UNIT-II (15 Periods) 2-D geometrical transforms: Translation, scaling, rotation, reflection and shearing transformations, matrix representations and homogeneous coordinates, composite transforms, transformations between coordinate systems.

2-D Viewing & Clipping: The viewing pipeline, viewing coordinate reference frame, window to view-port coordinate transformation, viewing functions, CohenSutherland and Cyrus-beck line clipping algorithms, Sutherland Hodgeman polygon clipping algorithm Text Clipping.
UNIT-III (15 Periods) 3-D Geometric transformations: Translation, rotation, scaling, reflection and shearing transformations, composite transformations. 3-D viewing: Viewing pipeline, viewing coordinates, view volume and general projection transforms and clipping 3-D object representation: Polygon surfaces, quadric surfaces, spline representation, Hermite curve, Bezier curve and B-Spline curves, Bezier and B-Spline surfaces. Basic illumination models, polygon-rendering methods. UNIT-IV (15 Periods) Hidden Surface Elimination: Back Face Elimination Z Buffer Algorithm-Scan Line Algorithm-Painters Algorithm Computer animation: Design of animation sequence, general computer animation functions, raster animation, computer animation languages, key frame systems, motion specifications. Text Book: 1. Donald Hearn, Computer Graphics C version 2e, Dorling Kindersley (India) Pvt. Ltd, 2006. References: 1. Zhigand Xiang, Roy Plastock, Computer Graphics, Tata McGraw Hill, Second Edition, 2000. 2. Foley, VanDam, Feiner and Hughes, Computer Graphics Principles & Practice, Addison Wesley Professional, Second Edition, 1995.

XVI Academic Council Meeting

SASTRA

BCSDCS604 R01

SYSTEM SOFTWARE
L T P CREDITS 4 1 0 5

(Common for CSE and IT )

UNIT I (18 Periods) Machine Architecture and Assemblers: Introduction, System Software and Machine Architecture, The Simplified instructional Computers (SIC)-SIC machine architecture. SIC/XE Machine Architecture, SIC programming Examples. UNIT II (19 Periods) Assemblers-1: Basic Assembler Functions- A simple SIC Assembler, Assembler Algorithm & Data Structures, Machine Dependent Assembler Features- Instruction Formats and addressing modes, Program Relocation. Assemblers-2: Machine Independent Assembler Features-Literals, Symbol Defining statements, Expressions, Program Blocks, Control Sections and Program Linking, Assembler Design Options-One Pass Assemblers, Multi Pass Assemblers, Implementation Example-MASM Assembler. UNIT III (19 Periods) Basic Loader Functions- Design of an Absolute Loader, A simple Bootstrap Loader, Machine Dependent Loader Features-Relocation, Program Linking, Algorithm and Data Structures for a Linking Loader, Machine independent Loader Features-Automatic Library Search, Loader Options, Loader Design Options-Linkage editor, Dynamic Linking, Implementation Example-MSDOS Linker. UNIT IV (19 Periods) Macro Processors, Editors and Debugging Systems: Basic Macro Processor FunctionsMacro Definition and Expansion, Macro Processor Algorithm & Data Structures, Machine independent Macro Processor Features- Concatenation of Macro Parameters, Generation of Unique Labels, Conditional Macro Expansion, Keyword Macro Parameters, Macro Processor design Options overview, Implementation Examples -MASM Macro Processor, ANSI C Macro Processor. Text Editors-Overview of editing process, User interface, editor structure, Interactive Debugging Systems-Debugging Functions and capabilities, Relationship with other parts of the system, User interfaces criteria. Text Book: 1. Leland. L.Beck and D. Manjula, System Software: An Introduction to Systems Programming, Pearson Education, Third Edition, 2007. References: 1. John R. Levine, Loaders and Linkers, Academic Press, 2004. 2. D.M.Dhamdhere, System Programming and Operating Systems, Tata McGraw Hill, Second Edition, 1999.

XVI Academic Council Meeting

SASTRA

BCSDCS602 R01

DATA WAREHOUSING AND DATA MINING


(Common for CSE, IT and ICT) L T P CREDITS 3 1 0 4

UNIT-I (15 Periods) Data Warehouse and OLAP Technology: Data Warehouse - A Multidimensional Data Model - Data Warehouse Architecture Data Warehouse Implementation - From Data Warehousing to Data Mining. UNIT-II (15 Periods) Introduction: Data Mining - Data Mining Functionalities; Data preprocessing: Data cleaning: Missing Values -Data Cleaning as a Process; Data Integration and Transformation; Data Reduction: Data Cube Aggregation - Attribute Subset Selection -Dimensionality Reduction - Numerosity Reduction; Data Discretization and Concept Hierarchy Generation: Discretization and Concept Hierarchy Generation for Numerical Data - Concept Hierarchy Generation for Categorical Data. UNIT-III (15 Periods) Association Rules: Basic Concepts -Efficient and Scalable Frequent Item set Mining Methods - Mining Various Kinds of Association Rules Classification and Prediction: Decision tree induction Attribute Selection Measures - Tree pruning Scalability and Decision Tree Induction; Bayesian classification: Bayes Theorem - Nave Bayesian Classification; - Accuracy and Error Measures: Classifier Accuracy Measures -Predictor Error Measures. UNIT-IV (15 Periods) Cluster Analysis: Introduction to cluster analysis and its types-Hierarchical Methods: Agglomerative and Divisive Hierarchical Clustering - BIRCH: Balanced Iterative Reducing and Clustering using Hierarchies Mining the World Wide Web: Mining the Web Page Layout Structure -Mining the Webs Link Structures to Identify Authoritative Web Pages -Mining Multimedia Data on the Web -Automatic Classification of Web Documents -Web Usage Mining. Text Book: 1. Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, First Edition, 2006. References: 1. Margaret H. Dunham, Data Mining Introductory and Advanced Topics, Pearson Education, First Edition, 2003. 2. Alex Berson, Stephen J. Smith, Data Warehousing, Data Mining and OLAP, McGraw Hill, 2001.

XVI Academic Council Meeting

SASTRA

BCSDCS605R01

MOBILE COMMUNICATION
L T P CREDITS 3 1 0 4

(Common for CSE, IT and ICT)

UNIT I

(15 Periods)

Wireless Transmission: Introduction Frequencies signals antennas signal propagation multiplexing modulation spread spectrum cellular systems Medium access control. UNIT II (15 Periods)

Wireless Communication Systems: Telecommunication systems GSM, DECT Satellite systems Broadcast systems Wireless LAN Infrared vs Radio transmission, Infrastructure and Ad-Hoc networks, Bluetooth, WiMAX and Voice over Wi-Fi UNIT III (15 Periods)

Network and Transport Layers: Mobile Network layer Mobile IP, DHCP, Ad hoc networks Mobile transport layer Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP UNIT IV (15 Periods)

Application Layer & WML: WAP-architecture Wireless datagram protocol Wireless transport layer security Wireless transaction protocol Wireless session protocol Wireless application environment Introduction to WML and WML Script Writing programs in WML Text Books: 1. Jochen H. Schiller, Mobile Communications, Pearson Education, Second Edition, 2008. [Units I, II, III & IV] 2. Alex Shneyderman & Alessio Casati, Fixed Mobile Convergence, Tata McGraw Hill, 2008. [Unit II] References: 1. Asoke K Talukder & Roopa R Yavagal, Mobile Computing - Technology, Applications and Service Creation, Tata McGraw Hill, 2005. 2. W.C.Y.Lee, Mobile Communication Engineering : Theory and Applications, Tata McGraw Hill, 1998. 3. Ben Forta, Paul Fonte, Ronan Mandel, Dylan Bromby, WAP development with WML and WMLScript, Techmedia, 2001. 7

XVI Academic Council Meeting

SASTRA

You might also like