Professional Documents
Culture Documents
1.
This book is to be brought to the class daily.
2.
Students are not permitted to attend the class without the identity card, once i
ssued.
3.
Students should be well on time right from the first class.
4.
Students should keep the Classrooms, Laboratories and Workshops clean.
5.
Writing on desks and walls is strictly prohibited, failing which the students wi
ll be fined heavily. If the identity of
the individual is not established the entire class / students in the block will
be fined.
6.
Students are advised to show due respect to all faculty regardless of their depa
rtment and maintain affable personality.
7.
Students are to maintain absolute discipline and decorum, so as to promote the f
air name of their college in all its activities.
8.
Students securing less than 85% attendance in any individual subject will not be
allowed to take up the university
exams.
9.
Students are informed to clarify their doubts in the respective subjects with th
e faculty by taking prior appointment.
10.
Students are to inform their parents that they should follow up the progress of
their wards by being in touch with the college
authorities at regular intervals.
11.
Ragging is punishable under Karnataka Education Act and is strictly prohibited.
Any student involved in ragging,
will be severely punished.
12.
Students who secure less than 60% in the University exam and / or who secure les
s than 60% in the internal test are to go
through the Academic Support programme compulsorily. The guidelines will be issu
ed separately by the concerned
department.
13.
The suggestion boxes are maintained at strategic places in the campus. Students
are to avail these facilities.
14.
Students are not supposed to alter the configuration of the system / any softwar
e on the system.
15.
Students are informed to follow the schedule as given in the calendar of events
with respect to seminar work
16.
Students are informed to follow the schedule as given in the calendar of events
with respect to Project work
SEMESTER - VIII - TIME TABLE
Day / Time 8.15 - 9.15 9.15 - 10.15 10.45 11.45 11.45-12.45 1.30-2.30 2.30-3.30 3
.45-4.45 4.45-5.45
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
SCHEME OF STUDY AND EXAMINATIONS
FOR BE DEGREE COURSE IN COMPUTER SCIENCE & ENGINEERING
Sl.
No
Code
No.
Subject No. of Hr. / week Examination
Theory Practical Duration I.A Marks Theory/Pract. Total Marks
1. CIP81 Constitution of India &
Professional Ethics
04 -03
25 100 125
2. CS82 Advanced Computer
Architecture
04 -03
25 100 125
3. Elective IV (Group D) 04 -03
25 100 125
4. Elective V (Group E) 04 -03
25 100 125
5. CS85 Project Work -06
03 100 100 200
6. CS86 Seminar ( Contact Hours ------50 --50
Total 16 06 15 250 500 750
STUDENT SELF APPRAISAL
SUBJECT MARKS ATTENDANCE
TEST 1 TEST 2 TEST 3 REPORT 1 REPORT 2 REPORT 3
Constitution of India &
Professional Ethics
Advanced Computer
Architecture
Elective IV (Group
D)
Elective V (Group
E)
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
1
CIP81: CONSTITUTION OF INDIA AND PROFESSIONAL ETHICS
Faculty: No. of Hours: 52
Class #
Chapter Title /
Reference Literature Topic to be Covered
% of Portion Covered
Reference Chapter Cumulative
01 Preamble & Evolution Of
Constitutional Law
T2 - Chapter-
Preamble to the constitution of India
5% 5%02 Evolution of constitutional Law
03 Scope and Extent of Fundamental
Rights,
Details of Exercise of Rights,
Limitations and Important Cases
T2 Chapter-6
Pages : 522-603
Scope of fundamental rights under part - III
17% 22%
04 Extent of fundamental rights under part - III
05 Details of exercise of rights
06 Details of exercise of rights
07 Limitations and Important cases of rights
08
Relevance Of Directive Principles Of
State Policy Under Part - IV
T1-Chapter-8
Pages: 721-834
T2-Chapter-7
Pages: 604-671
Classification of Directive
17% 39%
09 Scope of Directive
10 Nature o Economic Democracy Envisaged
11 Socialistic pattern of society
12 42nd and 44th Amendments
13 Directives and Fundamental Rights -comparison
14 Directives and Fundamental Rights conflicts
15 Non-Justiciability
16 Utility of Directives
17 Implementation of Directives
18 Directives in other parts of Constitution
19 Significance of Fundamental DutiesT2
Significance of Fundamental Duties under part IVa 5% 44%
20
Union Executive
Union Executive - President, Vice President
7% 51%
21 Council of Ministers
22 Prime Minister
23 Parliament and Supreme Court of India
24
State Executive
State Executive - Governor
7% 58%
25 Council of Ministers
26 Chief Minister
27 Legislature and High Courts
28
Constitutional Provisions For
Special Areas.
Scheduled castes and Tribes
7% 65%29 Women and children
30 Backward classes
31 Emergency Powers, Major
Constitutional Amendments
Emergency Powers
7% 72%32 Emergency Powers
33 Major constitutional Amendments
34
Electoral Process
Elections, Legislatorial powers, Decision of Disputes
5% 77%35 Amendments, Special Jurisdiction
36 Election Commission
37 Scope and Aims of Engineering
Ethics
T3: Chapters 1, 3, 4
Professional Ethics
5% 82%38 Moral Problem Solving
39 Organizing Principles
40 Responsibility of Engineers
Impediments to Resp.
T3: Chapter 5
Concepts of Responsibility
5% 87%41 Reasonable care and Good Works
42 Virtues and Impediments to Responsibility
43
Honesty, Integrity and Reliability
T3 Chapter 6
Ways of misusing the Truth
7% 94%
44 Honesty on Campus
45 Integrity with respect to various aspects
46 Conflicts of interest
47
Risk Safety and Liability in
Engineering
T3 Chapter 7
The codes and Engineering Practice
6% 100%
48 Estimating Risks
49 Acceptable Risks
50 Engineer s Liability for Risks
51 Becoming a responsible engineer regarding Risk
52 Honesty, Integrity and Reliability
Literature:
Book Type Code Title & Author
Publication Info
Edition Publisher Year
Text Books T1 An Introduction to constitution of India (Students Ed), Durga Das
Basu, 19th / 20th PHI 2001
Text Books T2 Constitution of India, V.N.Shukla Latest
Text Books T3 Engineering Ethics by Charles E Harris, Michael S Pritchard and M.
J Robins 2nd Thompson Asia 03-08-05
Reference Books R1 Introduction to constitution of India, M.V. Pylee Vikas 2002
Reference Books R2 Ethics in Engineering by Mike W martin and Roland Schinzinger
Reference Books R3 Introduction to Engineering Ethics by Roland Schinzinger and
Mike W martin 2002
Reference Books R4 Introduction to constitution of India by Brij Kishore Sharma
PHI 2002
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
2
1.
2.
3.
4.
OBJECTIVE OF THE SUBJECT:
According to its constitution, India is a "sovereign, socialist, secular, democr
atic republic." India
has a federal form of government. However, the central government in India has g
reater power
in relation to its states, and its central government is patterned after the Bri
tish parliamentary
system. India's independent judicial system began under the British, and its con
cepts and
procedures resemble those of Anglo-Saxon countries. The first nine chapters of t
he course focus
on the main features of Constitution of India.
The last four chapters focus on the ethical dimensions of engineering practice.
Engineers play a
vital role in protecting and assisting the public and this requires imagination,
persistence and a
string sense of responsibility. Personal ethics is a foundation for professional
ethics. The
importance and the different ways of developing it is given under these sections
.
QUESTION BANK
PREAMBLE OF CONSTITUTION OF INDIA AND EVOLUTION OF
CONSTITUTION LAW
OBJECTIVE: The preamble summarizes the aims and objects of constitution. The pur
poses are
Which part of the Constitution of India contains the Directive Principles of Sta
te Policy? 2
A. part I B. Part II C. Part III D. Part IV
Who is responsible for administration and making of Directive principles of Stat
e Policy? 2
A. The President B. The Central C. The State D. The people
The Directives are not enforceable in court 2
A. True B. False C. Not under emergency D. cannot say
The Directives are implemented by Legislature 2
A. True B. False C. Not under emergency D. cannot say
It shall be the duty of the state to apply these principles in making laws 2
A. True B. False C. Only under emergency D. cannot say
SIGNIFICANCE OF FUNDAMENTAL DUTIES
OBJECTIVE: The Fundamental rights have been provided at the cost of some fundame
ntal
duties. These are considered as the duties that must be and should be performed
by every
citizen of India. These fundamental duties are defined as:
It shall be the duty of every citizens of India:
To abide by the Constitution and respect its ideals and institutions, the Nation
al Flag and
the National Anthem;
To cherish and follow the noble ideals which inspired our national struggle for
freedom;
To uphold and protect the sovereignty, unity and integrity of India;
To defend the country and render national service when called upon to do so;
To promote harmony and the spirit of common brotherhood amongst all the people o
f
India transcending religious, linguistic and regional or sectional diversities;
to renounce
practices derogatory to the dignity of women;
To value and preserve the rich heritage of our composite culture;
To protect and improve the natural environment including forests, lakes, rivers
and wild
life, and to have compassion for living creatures;
To develop the scientific temper, humanism and the spirit of inquiry and reform;
There are proposals to reserve seats for women in the House of the People and in
the
Legislative Assemblies of the States by amending the Constitution.
48. The Scheduled Areas doesn t include
2
A. Assam B. Tripura C. Meghalaya D. All the above
49. The power to declare any area as Scheduled Area in any state is given to
2
A. President B. Prime Minister C. Governor D. Chief Minister of that state
50. The tribal areas include the areas in the state
2
A. Assam B. Tripura C. Meghalaya D. All the above
51.
Who can make regulations to restrict the transfer of land related to members of
2
Scheduled Tribes
A. President B. Prime Minister C. Governor D. Chief Minister of that state
52. Who appoints the commission to report on the welfare of Scheduled areas
2
A. President B. Prime Minister C. Governor D. Chief Minister of that state
EMERGENCY POWERS, MAJOR CONSTITUTIONAL AMENDMENTS
OBJECTIVE: NATIONAL EMERGENCY ART 352 (1) If the President is satisfied that a g
rave
emergency exists whereby the security of India or any part of the territory ther
eof is
threatened, whether by war or external aggression or armed rebellion, he may, by
Proclamation, make a declaration to that effect, in respect of the whole or such
part of the
territory thereof.........,
ART 353 While a Proclamation of emergency is in operation, then not withstanding
anything in
this Constitution, the executive power of the Union shall extend to the giving o
f directions to
any State as to the manner in which the executive power thereof is to be exercis
ed.
STATE:
ART 356 If the President on a receipt of report from the Governor of a state or
is otherwise
satisfied that a situation has arisen in which the government of a state cannot
be carried on in
accordance with the provisions of the Constitution, the President may by Proclam
ation -
a.
assume to himself all or any of the functions of the government of the state or
any body or authority in the state except the powers of the legislature.
b. declare that the powers of the legislature shall be exercisable by the Parlia
ment,
Provided nothing in this Art authorizes the President to assume to himself any o
f the powers
vested in the High Court.
The Proclamation shall be in operation for a period of 6 months.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS 7
53.
Which is not an emergency situation? 2
A. War
B. Failure of constitutional machinery in states
C. Financial emergency D. none of the above
54.
Existence of a condition in which an area is threatened by war or external aggre
ssion or 2
armed rebellion is known as
A. Emergency B. Election C. both D. None of above
55.
Under a proclamation of emergency in case of constitutional machinery, 2
A. State legislature would continue to operate
B. State legislature would be suspended
C. State legislature is not related
D. None of the above
56.
Under a proclamation of emergency 2
A. Centre shall suspend State Government
B. Centre cannot suspend State government
C. Both Central and State Governments are suspended
D. None of the above
57.
The duration for proclamation of emergency shall ordinarily be for 2
A. 15 days B. One month C. 2 Months D. Not defined
58.
The maximum duration of extension of a proclamation is 2
A. One month B. 2 Months C. One year D. Not defined
ELECTORAL PROCESS
OBJECTIVE: The Constitution of India has vested in the Election Commission of In
dia the
superintendence, direction and control of the entire process for conduct of elec
tions to
Parliament and Legislature of every State and to the offices of President and Vi
ce-President of
India.
The Election Commission -Election Commission of India is a permanent Constitutio
nal Body.
The Election Commission was established in accordance with the Constitution on 2
5th January
1950. The Commission celebrated its Golden Jubilee in 2001. Originally the commi
ssion had
only a Chief Election Commissioner. It currently consists of Chief Election Comm
issioner and
two Election Commissioners; it had only the Chief Election Commissioner before 1
989. The
concept of multi-member Commission has been in operation since 1993, with decisi
on making
power by majority vote.
Electoral Laws & System -Elections are conducted according to the constitutional
provisions,
supplemented by laws made by Parliament. The major laws are Representation of th
e People
Act, 1950, which mainly deals with the preparation and revision of electoral rol
ls, the
Representation of the People Act, 1951 which deals, in detail, with all aspects
of conduct of
elections and post election disputes. The Supreme Court of India has held that w
here the
enacted laws are silent or make insufficient provision to deal with a given situ
ation in the
conduct of elections, the Election Commission has the residuary powers under the
Constitution
to act in an appropriate manner.
Appointment & Tenure of Commissioners - The President appoints Chief Election
Commissioner and Election Commissioners. They have tenure of six years, or up to
the age of
65 years, whichever is earlier. They enjoy the same status and receive salary an
d perks as
available to Judges of the Supreme Court of India. The Chief Election Commission
er can be
removed from office only through impeachment by Parliament.
59.
There shall be ---------- number of electoral roll(s) for every territorial cons
tituency for 2
election
A. 2 ( One for Parliament and one for State Legislature
B. only one
C. One for each community
D. One for each party
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
8
60.
For Adult suffrage basis, essential conditions are 2
A. Citizenship B. Above 18 years of age C. no disqualifications by any law
D. All the above
61. Proportional representation has been prescribed for election to office of
2
A. President
B. Vice president
C. Both
D. None
62.
The supervision of entire election process is given to 2
A. Parliament B. respective state legislatures C. Election commission
D. All the above
63.
The provision for removal of ------------- makes Election commission , independe
nt of 2
executive control
A. Control by High Court B. Control by President C. Election commissioner
D. All the above
64.
The regional commissioners are appointed by 2
A. President B. Election Commissioner C. Election commission D. Any of the above
65.
With regards to election disputes, questions can be agitated by 2
A. Rising questions in Houses
B. Filing case in High Court
C. Filing case in Supreme Court
D. Election Petition
SCOPE AND AIMS OF ENGINEERING ETHICS
OBJECTIVE: Professional ethics is the set of standard adopted by professionals i
nsofar as they
see themselves acting as professionals. It is the set of one s own ethical commitm
ents, usually
given in early home or religious training and often modified by later reflection
.
Aims of engineering ethics are as follows:
142.
What is scalability? Discuss the different types of scalability. 10
143.
Considering the example of the ocean study problem, show that when the problem i
s 10
scaled up and the processing system is fixed, the compute load per processor inc
reases,
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
18
but the communication load per unit time decreases.
144. Techniques like message passing using physical DMA or dedicated message pro
cessing 10
as done in Intel paragon system are used among others for obtaining highly scala
ble
systems. Explain any one such message passing systems.
145. When systems are scaled up, processor cost and memory cost increase linearl
y with the 10
no. of nodes n, while the switching network cost increases roughly as nlog2 n. A
ssuming
in a 64 processor system, the cost is equally divided between processors, memory
and
interconnection networks, find the ratios of this cost division when the no. of
nodes is
increased to 8192 from 64.
Marks No of Questions
4 02
5 23
6 07
8 05
10 106
14 02
Total 145
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
CS834: NETWORK MANAGEMENT
Faculty: No. of Hours: 52
Class
#
Chapter Title /
Reference Literature
Topics to be Covered
% of Portion Covered
Reference
Chapter
Cumulative
1.
Data
Communications and
Network
Management
Overview
T: Chap. 1
Pages 3-55
Introduction: Data Communications and Network Management
Analogy of Telephone Network Management, Data and
Telecommunication Network.
12.3% 12.3%
2. Distributed Computing Environments, TCP/IP Based network.
3. Communications Protocols and Standards
4. Case Histories of Networking Management.
5. Challenges of Information Technology Managers.
6. Network Management: Goals, Organization and Function.
7. Network and System Management, Future of Network Management
8. Basic Foundations:
standards, models
and language
T: Chap. 3
Pages 101-141
Basic Foundations: Standards, Models. And Organization Model
7.9% 20.2%
9. Information Model, Communication Model
10. Abstract Syntax Notation One:ASN.1
11. Encoding Structure, Macros
12. Function Model
13.
SNMPv1 Network
Management
T: Chap. 4
Pages 141- 203
SNMPv1 Network Management: Case Histories and Examples
15.4% 35.6%
14. The history of SNMP Management
15. Internet Organizations and Standards
16. The SNMP Model
17. The organization model
18. System Overview
19. Information Model
20. Information Model cont.
21. SNMPv1 Network
Management:
Function Model
T: Chap. 5
Pages 203- 229
SNMPv1 Network Management: Communication Model
7.9% 43.5%
22. SNMP Architecture, Administrative model,
23. SNMP protocol specifications
24. Operations and MIB Group
25. Function Model
26.
SNMP
Management: RMON
T: Chap. 8
Pages 322- 345
SNMP Management: Remote Monitoring, RMON SMI and MIB
9.2% 52.7%
27. RMON1
28. RMON2, ATM Remote Monitoring
29. Case study of Internet Traffic using RMON
30.
Broadband Network
Management: ATM
Network
T: Chap. 9
Pages 345- 387
Broadband Networks and Services, ATM Technology
13.9% 66.6%
31. ATM LAN Emulation and Virtual LAN
32. ATM Network Management: Reference Model
33. Integrated Local Management Interface,
34. ATM Management Information base
35. M1 Interface and M2 Interface
36. M3 Interface and M4 Interface,
37. Digital Exchange Interface
38.
Broadband Network
Management
T: Chap. 10
Pages 387- 429
Broadband Network Management: Broadband Access Networks
12.3% 78.9%
39. HFC Technology
40. Data Over Cable Reference Architecture
41. HFC Management
42. DSL Technology,
43. Asymmetric Digital Subscriber Line Technology
44. ADSL management, ADSL Configuration Profiles
45.
Network
Management
Applications
T: Chap. 13
Pages 501- 557
Network Management Applications: Configuration Management
21.0% 100%
46. Fault Management, Performance Management
47. Event Correlation Technique
48. Security Management
49. Accounting Management
50. Report Management, Policy Based Management
51. Service Level Management
52. Question Paper Discussion
Literature:
Book Type Code Title & Author Publication Info
Text Book T
Network Management-
Principles &Practice Mani
Subramanian,
Edition Publisher Year
7th Pearson Education 2005
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
QUESTION BANK
INTRODUCTION
1.
You can discover the hosts in your subnetwork by using the ping command with you
r network IP address 04
and host address of decimal 255. Discover all the hosts in the subnetwork that y
ou are logged on.
2.
Send an e-mail to a remote site with a wrong userid, but correct node address. E
xplain the error 04
messages that you get and the servers that sent them.
3.
You are given a class B IP address of 145.45.x.y for your network node. As a net
work engineer, you are 04
asked to configure your network for 126 subnets (remember that 0 and 1 are reser
ved).
a.
How would you configure your address for subnets and hosts?
b.
What is the maximum number of hosts that each subnet can accommodate?
4.
Explain the terms: Protocol, SAP, Subnet, Internet and PDU. 05
5.
Explain the data and telecommunication networks. 05
6.
Explain client/server network in a distributed computing environment. 06
7.
Explain the Internet and Intranets model in an TCP/IP based networks. 06
8.
Explain Basic Communication Architecture and ISO Communication Architecture? 08
9.
Compare SNA, ISO and Internet Protocol Layer Model. 10
10.
Explain the goals of network management. 08
Basic Foundations: Standards, Models and Language
11.
In brief mention network management standards. 10
12.
Explain the role of organization model, information model and function model in
ISO network 10
management model.
13.
What are the standards used for the various layers in an Ethernet-based network
that is managed by 04
the Internet management protocol? Assume that the Ethernet runs on 10 Mbps on an
unshielded
twisted-pair cable.
14.
Write an ASN.1 module that defines DaysOfWeek as an ENUMERATED data type with va
lues from 0 to 6. 08
15.
Write an ASN.1 module that specifies DayOfWeek as a SEQUENCE type with each day
of the week 10
(day1, day2, ) as the type VisibleString. Write the ASN.1 description (a) for the
structure and (b) for
the value.
16.
For your home address which contains Name, Address, City, State and Zip Code: 08
a.The informal record structure.
b.An ASN.1 description of the record structure.
c. The record value for your home address.
17. a.
Describe a list and an ordered list in ASN.1 syntax. 10
b. Identify the differences between them.
c. Using examples differentiate between list construction and repetitive constru
ction.
SNMPv1 Network Management: Organization and Information Models
18.
With an example explain a managed LAN Network. 08
19.
Explain SNMP based ASN.1 data type structures. 08
20.
Write about the evolution of SNMP Documents. 05
21.
With an example explain the Object-Type Macro. 10
22.
Explain the Two-Tier, Three-Tier and Proxy Server Organization Model. 10
23.
Explain SNMP Network Management Architecture. 05
24.
Write about aggregate managed object macro. 10
25.
What is meant by Management Information Base? Explain in brief. 10
26.
Access the Simple Gateway Monitoring Protocol (SGMP) RFC 1028 on the Internet. D
escribe the 05
four message types defined in the document.
27.
Present the OBJECT IDENTIFIER for the object sun. products in two formats, one m
nemonic and 08
the other numeric.
28.
Encode IP Address 10.20.30.40 in TLV format. 06
29.
(refer to RFC 1213 for the following exercise) 08
a. Write the ANS.1 specifications for sysServices.
b. Illustrate the specifications with values for a bridge.
c. Illustrate the specifications with values for a router.
30.
Write the object descriptor and syntax of the following SNMP managed entities: 0
8
a. IP address.
b. A row in the Interfaces table (row specification only)
c. The MAC address of an interface card.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
31.
Explain how you would determine whether a device is acting as a host or as a rou
ter using an 06
SNMP command.
32.
A network manager discovers that a network component is performing poorly and is
sues an order 04
to the technician to replace it. Which MIB group contains this information for t
he technician to
find out the physical location of the component?
33.
How would you use one of the standard MIB objects to determine which of the stat
ions in a LAN 10
is functioning as a bridge to the external network?
34.
TCP is a connection-oriented protocol and UDP is a connectionless protocol. Iden
tify the 06
differences in the two MIBs that exemplify this difference.
35.
FDDI is heavily used as a backbone network in a corporate complex. 10
a. Draw a MIB tree for FDDI MIB. Limit your tree to the top five groups.
b.
Develop a three-column table presenting entity, OID and brief descriptions of th
e groups
and the tables under each group.
36.
What OBJECT TYPE would you use to identify the address of the neighboring gatewa
y from your 04
local gateway?
SNMPv1 Network Management: Communication and Functional Models
37.
Briefly explain the SNMP Communication Model. 08
38.
Describe SNMP Protocol Specifications. 06
39.
In brief explain the SNMP Operations. 08
40.
An SNMP manager sends a request for the values of the sysUpTime in the System gr
oup and 10
ifType in the interfaces group for ifNumber value of 3. Write the PDUs with the
fields filled in for
a. The get-request PDU and
b. The get-response PDU with noSuchName error message for ifType.
SNMP Management: RMON
41.
What is meant by remote monitoring? Explain. 06
42.
Explain RMONI Groups and Functions 05
43.
In brief explain RMONI Common and Ethernet Group. 08
44.
Write about RMON2 Conformance Specifications. 06
45.
Explain RMON Token Ring Extension. 04
46.
In brief explain ATM Remote Monitoring 06
47. a. Describe qualitatively how the utilization ( number of frames offered/num
ber of frames 05
transmitted) depends on frame size.
b.How would you measure the distribution of the frame size on the LAN?
48. a. Describe the two methods of measuring collisions on an Ethernet LAN.
06
b. Compare the two methods in terms of what you can measure.
49.
How would you measure the types and distribution of frames in a token ring LAN?
06
Broadband Network Management: ATM Networks
50.
Explain broadband services networks 05
51.
Explain ATM LAN Emulation. 04
52.
In brief explain ATM Network Management. 10
53.
Write short notes on M1 interface, M2 interface. 10
54.
Explain class I and class II Interface Management Functions of M3. 06
55.
With a neat diagram explain the Dual views of the M4 Interface. 04
56.
Although cell transmission of multimedia services offers numerous benefits, ther
e is an 04
inefficiency penalty. Calculate the maximum efficiency (data bytes/ (data bytes+
overhead bytes)
for ATM transmission.
57.
Calculate the efficiency of transmission to transmit: 06
a. An Ethernet packet of 1500 bytes (including the overhead with 6-bytes address
es).
b. Equivalent data using ATM cells.
58.
Communication between two ATM switches is broken in a private ATM network. You a
re 04
troubleshooting the problem from a network management station. What M interfaces
would you
use? Justify.
59.
Explain how networks can be interconnected. 04
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
Broadband Network Management
60.
Explain the broadband access networks and technologies. 08
61.
Write a short note on HFC technology. 08
62.
Explain the Protocol Layer Architecture in an HFC System. 04
63.
Write a short note on DSL Technology and ADSL Technology. 06
64.
With a neat diagram explain ADSL Architecture. 04
65.
With an ADSL reference model explain ADSL management framework. 06
66.
Write short note on ADSL Configuration Profiles. 04
67.
A half-duplex channel is carrying a 2-Mbps signal. Calculate the baud rate and b
andwidth in Hz 06
for the following modulated signals.
a. ASK(binary) b. PSK(binary) c. QPSK d. 16QAM
68.
The downstream channel bandwidth for cable modem is 6Mhz. Calculate the bit rate
if signal is 08
a. QPSK b. 64 QAM
Network Management Applications
69.
What is meant by Configuration Management? Explain in brief. 08
70.
Explain the different steps involved in Fault Management. 04
71.
Mention and explain different metrics in Performance Management 05
72.
What is meant by Case-Based Reasoning? Explain. 05
73.
Explain the Codebook Correlation Model. 05
74.
Mention in brief the various measures used in security management 10
75.
How does the Client/Server authenticate each other 06
76.
Write explanatory notes on PEM processes. 05
77.
Explain the policy management architecture. 06
78.
List and contrast the tools available to discover network components. 06
79.
You are responsible for designing the auto discovery module of an NMS. Outline t
he procedure and 04
the software tools that you would use.
80.
What MIB object would you monitor for measuring the collision rate on an Etherne
t LAN? 04
Marks No. of Questions
4 18
5 12
6 19
8 16
10 15
Total 80
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
CS843: CRYPTOGRAPHY AND NETWORK SECURITY
Faculty: No. of Hours: 52
Class
#
Chapter Title /
Reference Literature
TOPICS TO BE COVERED
% of portions covered
Reference Cumulative
1. Chapter 1
Overview
Symmetric Ciphers
Page # 19-35
Text Book: T1
Symmetric Ciphers-Overview: Services
35% 35%
2. Mechanisms and Attacks
3. The OSI Security Architecture
4. A model of network security
5. Chapter 2
Classical Encryption
techniques
Page # 41-66
Text Book: T1
Classical Encryption techniques: Symmetric Cipher Model,
6. Substitution Techniques.
7. Transposition Techniques
8. Rotol Mechanisms
9. Steganography
10. Chapter 3
Block Cipher & Data
Encryption Standard
Page # 73-103
Text Book: T1
Block Cipher & Data Encryption Standard: Simplified DES
11. Block Cipher Principles
12. The data encryption standard
13. The Strength of DES
14. Differential and Linear Cryptanalysis
15.
Chapter 6,7
Symmetric Ciphers
Page #191-202
Page #219-244
Text Book: T1
Symmetric Ciphers: Triple DES
16. Blowfish algorithm
17.
Confidentiality using Conventional Encryption: Placement of
Encryption function
18. Traffic confidentiality
19. Key Distribution
20. Random Number Generation
21.
Chapter 8,9,10
Public Key
Encryption, Digital
Signatures
Page #251-260
Page #275-314
Text Book: T1
Number Theory: Prime Numbers, Formats
27% 62%
22. Euler s Theorems
23. Testing for primality
24.
Public key Cryptography & RSA: Principles of Public key
Cryptosystems
25. The RSA Algorithm
26. Key Management
27. Diffie-Hellman Key exchange
28. Chapter 11
Message
Authentication and
Hash Functions
Page #329-345
Text Book: T1
Message Authentication and Hash Functions
29. Authentication Requirements
30. Authentication Functions
31.
Message Authentication Codes
32. Chapter 12,13
Message Digest
Algorithm, Protocol
Page #365-374
Page #397-416
Text Book: T1
MD5 Message Digest Algorithm
33. Digital Signatures and Authentication Protocols
34. Digital Signatures
35. Authentication Protocols
36. Digital Signature Standard
37.
Chapter 14,15,16
Network Security
Page #417-436
Page #453-472
Page #499-518
Text Book: T1
Authentication Applications: Kerberos
31% 93%
38. X.509 Directory Authentication Service
39. Electronic Mail Security
40. Pretty Good Privacy
41. IP security
42. IP security Overview
43. IP Security Architecture
44. Authentication header
45. Encapsulating Security Payload
46.
Chapter 17
Web Security
Page #545-580
Text Book: T1
Web Security
47. Web Security Requirements
48. Secure Sockets Layer Security
49.
Transport Layer Security
Secure Electronic Transaction
50. Chapter 18,19,20
System Security
Page #581-654
Text Book: T1
System Security
7% 100%51. Intruders , Viruses , Worms & Related Threats
52.
Countermeasures, Firewalls , Firewall Design Principles
Trusted Systems
Literature:
Book Type Code Title & Author
Publication Info
Edition Publisher Year
Text Book T1
Cryptography and Network Security by William
Stallings
3rd Pearson Education/PHI 2003
Reference
Book
R1
Network Security Private Communication in a Public
world by Charlie Kaufman, Radia Perlman, Mike
Speciner
2nd PTR Prentice Hall 2002
Reference
Book
R2 Cryptography and Network Security by Atul Kahate Tata McGrawHill 2003
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
QUESTION BANK
CRYPTOGRAPHY
OBJECTIVE: At the end of this section the student will know the basics of
Cryptography. The section deals with chapters on algorithms that are used with
cryptography, public key cryptography, Authentication and Hash functions and the
math that is required for a introductory understanding of Cryptography.
1.
Explain briefly the four types of security attacks that are normally encountered
. Also 10
distinguish between active and passive attacks.
2.
Bring out the differences between 10
Diffusion and Confusion.
Steganography and Cryptography.
Known and Chosen plaintext Cryptanalysis.
3.
Explain a typical key distribution scenario. What are the tradeoffs involved in
14
determining the life of a particular session key?
4.
Explain the differential Cryptanalysis mechanism. 06
5.
What is the need for public key cryptography? Explain its principle and how it c
an be 10
adopted for Encryption and authentication.
6.
Explain the principle of Diffie-Hellman key exchange with a suitable example. 10
7.
Explain how hash functions can be used for message authentication. How are these
10
susceptible to birthday attacks?
8.
Enunciate and explain the digital signature algorithm. 10
9.
What is triple encryption? How many keys are used here? 06
10.
What primitive operations are used in Blowfish? What is the key size for Blowfis
h? 06
11.
List ways in which keys can be distributed to two communicating parties. What is
a 08
key distribution centre? What is the difference between a session key and a mast
er
key?
12.
What is the difference between differential and linear cryptanalysis? 06
NETWORK SECURITY
OBJECTIVE: At the end of this section the student will understand the applicatio
n
of Authentication techniques learnt in the earlier chapter. Applications such as
Kerberos, X.509 Directory, Email Security, SET are studied. IP security, Web
Security, Firewalls and the related threats associated with it are also studied.
13.
What is Kerberos? Discuss the motivation and requirements for Kerberos approach.
10
14.
What are the key features of X..509 Certificate? How are they issued and revoked
10
by the certificate authority?
15.
What is the purpose of the X.509 standard? 05
16.
Why is the segmentation and re-assembly function in PGP needed? How does PGP 05
use the concept of trust?
17.
What is S/MIME? 05
18.
Why does PGP generate a signature before applying compression? 05
19.
What are the five basic services available for the users of Pretty good privacy?
How 20
are they provided?
20.
What the examples of and services provided by IPSec. 06
21.
What is Encapsulating Security Pay load? Why does ESP include a padding field? 0
6
22.
Explain the secure socket layer SSL-V3 architecture, indicating how the session
10
state and connection state are defined.
23.
What is the need for dual signatures in SET? How are they constructed? 10
24.
What are the four basic techniques of choosing passwords? Compare their relative
10
merits.
25.
List and briefly explain 3 classes of intruders and list three benefits of using
06
intrusion detection systems.
26.
In general terms, how does a worm propagate? 06
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
27.
List the 3 goals for a firewall. List four techniques used by firewalls to contr
ol access 06
and enforce security policy.
28.
What is a virus? What are the typical stages it passes through in its lifetime?
10
Suggest suitable virus architecture.
Marks No. of Questions
5 4
6 9
8 1
10 12
14 1
20 1
Total 28
NOTES
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
26
CS845: DATA MINING
Faculty: No of Hours: 52
Class #
CHAPTER TITLE/
Reference literature Topic to be Covered
% of portions covered
Reference
chapter
Cumulative
1
Chapter# 1 Introduction
T1:Page# : 39-98, 109-130
What is Data Warehouse?
18% 18%
2,3 A multidimensional Data Model
4,5 Data Warehouse Architecture
6,7 Data Warehouse Implementation
8 Data cube Technology
9 From Data warehousing to Data Mining
10 Data cleaning
11 Data integration and Transformation
12 Data Reduction
13,14 Chapter# 2 Data Mining
Primitives, languages
and System
Architectures
T1:Page# : 146-170
Data Mining Primitives, Presentation and Visualization
of discovered patterns
15% 33%
15,16,17 A Data Mining Query Language
18,19 Chapter# 3 Mining
Association Rules in
Large Data bases
T1:Page# : 225-269
Association Rule Mining
12% 45%
20,21 Single-Dimensional Boolean Association Rules from
Transactional Databases
22,23,24 Mining Multilevel Association Rules from Transactional
Databases
25
Chapter# 4
Classification and
Prediction
T1:Page# : 279-322
Issues Regarding Classification and Prediction
22% 67%
26,27 Classification by Decision tree induction
28,29 Bayesian Classification
30 Classification by Back propagation
31,32 Classification Based on the concepts from association
rule mining
33,34 Other classification methods
35 Prediction
36
Chapter# 5 Cluster
Analysis
T1:Page# : 335-388
What is Cluster Analysis?
18% 85%
37,38 Types of data in Cluster Analysis: A Categorization of
Major Clustering Methods
39 Partitioning Methods
40 Hierarchical Methods
41,42 Density-Based Methods
43,44 Model-Based Clustering Methods: Statistical Approach
& Neural Network Approach
45 Outliner Analysis
46
Chapter# 6 Applications
and Trends in Data
Mining
T1:Page# : 451-480
Data Mining Applications
15% 100%
47,48 Data Mining System Products and Research Prototypes
49,50,51 Additional Themes on Data Mining, Data Mining and
Intelligent Query Answering
52 Trends in Data Mining
Literature
Book type Code Title and Author
Publication specification
Edition Publication Year
Text Book T1
Data Mining Concepts and Techniques By Jiawei Han and
Micheline Kamber
1st Morgan KaufMann
Publishers
2003
Reference Boo R1
Data Mining A Hands-On Approach for Business Professionals
By Robert Growth 1s Prentice Hall PTR 1998
Reference Bo R2
Data Warehousing Fundamentals A Comprehensive Guide for IT
Professionals By Paulraj Ponniah 1s John Wiley & Sons 2001
Syllabus for Tests
Test 1: Class 1-12
Test 2: Class 13-27
Test 3: Class 28-38
General:
1. Batch formation :
i) Students can do their project work in batches. However the batch size can var
y from
1[min] to 4[max].
ii) Students are to be regularly in touch with their guide on a weekly basis or
as is needed
by.
iii) Students can form their own batches within the stipulated time otherwise de
partment will
form batches and students have to accept it.
iv) Batch once formed cannot be changed.
v) Each batch will have a designated staff in charge to monitor the work progres
s at every
stage.
vi) All the projects are to be demonstrated with source code for all the evaluat
ions.
vii) Evaluation process will be in 2 stages.
S1.
1. Panel Approval : 20 Marks.
2. Guide Evaluation : 40 Marks.
S2
1. Final Project Presentation: 40 Marks.
S3
Total Evaluation Marks (20+40+40):100Marks.
2. Work Progress & Monitoring Procedure :
Stage 1:
Week No Date
01 Jan 29 Feb 3 Batch Submission in the prescribed format.
02 Feb 5 Feb 10 Final approved batch list along with staff in charge.
Stage 2:
Week No Date
03 Feb 12 Feb 17 Project title finalization, Place and Guide.
04 Feb 19 Feb 24 Literature survey document with detailed synopsis.
05 Feb 26 Mar 03 Software requirement document [SRS] to be
submitted.
Stage 3:
Week No Date
06 Mar 05 Mar 10 Design
07 Mar 12 Mar 17 Design document to be submitted. Viva-voce to be
conducted.
Stage 4:
Week No Date
08 Mar 19 Mar 24 Implementation & coding
09 Mar 26 Mar 31 Implementation, Coding & unit testing.
10 Apr 02 Apr 07 Implementation, Coding & unit testing.
11 Apr 09 Apr 14 Integration & Testing.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
28
Stage 5:
Week No Date
12 Apr 16 Apr 21 Unbounded draft copy of final report in the
prescribed format to be submitted for approval.
13 Apr 23 Apr 28 Evaluation presentation and viva-voce by
departmental council.
Stage 6:
Week No Date
14 Apr 30 May 05 Final bounded report to be submitted to the
department duly signed by the guide
Note:
The details regarding the color of binding, format for the report submission, an
d its contents will be
notified later.
CS85: PROJECT WORK
SCHEDULE
Week
No
COMPONENT
01 Batch Submission in the prescribed format.
02 Final approved batch list along with staff incharge.
03 Project title finalization, Place and Guide.
04 Literature survey document with detailed synopsis.
05 Software requirement document [SRS] to be submitted.
06 Design
07 Design document to be submitted. Viva-voce to be conducted.
08 Implementation & coding
09 Implementation, Coding & unit testing.
10 Implementation, Coding & unit testing.
11 Integration & Testing.
12 Unbounded draft copy of final report in the prescribed format to be submitted
for approval.
13 Evaluation presentation and viva-voce by departmental council.
14 Final bounded report to be submitted to the department duly signed by guide.
P E S Institute of Technology Education for the Real World Course Information B.
E. 8th Semester CS
GUIDELINES FOR SEMINAR [CS86]
General:
viii) Student has to individually carry out the seminar work
ix) Students are to be regularly in touch with the guide.
x) The seminar topic has to be a paper selected from leading journals in the are
a of
interest of the individual.
xi) Formal permission has to be taken from the author of the paper.
xii) Every student will have a designated staff in charge to monitor the work pr
ogress
at every stage.
xiii) The seminar is to be presented as per the guidelines to be given later.
xiv) Seminar doesn t have external evaluation.
xv) Evaluation process will be in 2 stages.