IT Course Syllabus For DIT University
IT Course Syllabus For DIT University
Summarized Scheme
Semester
CREDITS
TOTAL
MARKS
19
23
1150
II
16
20
1000
III
17
10
22
1100
IV
16
10
21
1050
17
10
24
1200
VI
17
10
24
1200
VII
15
21
1050
VIII
14
20
1000
TOTAL
131
12
74
175
8750
Page 1 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 1st
Semester:-1
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Engineering Maths I
30
20
50
100
150
30
20
50
100
150
Introduction to Electrical
Engineering
30
20
50
100
150
30
20
50
100
150
30
20
50
100
150
Computer Programming I
20
10
30
70
100
EE lab
25
25
50
Workshop Practice
50
50
100
100
100
Electronics Lab
25
25
50
Total 19
480
670
1150
23
Page 2 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 1st
Semester:-2
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Engineering Maths II
30
20
50
100
150
Engineering Physics
30
20
50
100
150
Essentials of Mechanical
Engineering
30
20
50
100
150
30
20
50
100
150
Computer Programming II
20
10
30
70
100
ME lab
25
25
50
Engineering Graphics
50
50
100
100
100
Physics Lab
25
25
50
Total 16
430
570
1000
20
Page 3 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 2nd
Semester:-3
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Discrete Mathematics
30
20
50
100
150
Data Structures
30
20
50
100
150
20
10
30
70
100
30
20
50
100
150
Operating Systems
30
20
50
100
150
30
20
50
100
150
25
25
50
25
25
50
25
25
50
25
25
50
50
50
Total 17
10
430
1100
22
Page 4 of 68
670
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 2nd
Semester:-4
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
30
20
50
100
150
Computer Organization
20
10
30
70
100
Computer Networks
30
20
50
100
150
Web Technology
30
20
50
100
150
30
20
50
100
150
20
10
30
70
100
25
25
50
25
25
50
25
25
50
25
25
50
50
50
Total 16
10
410
1050
21
Page 5 of 68
640
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 3rd
Semester:-5
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Multimedia Technologies
30
20
50
100
150
30
20
50
100
150
30
20
50
100
150
Artificial intelligence
30
20
50
100
150
30
20
50
100
150
Principles of Management
20
10
30
70
100
25
25
50
25
25
50
25
25
50
Microprocessors Lab
25
25
50
Aptitude Building I
100
100
01 Week
50
50
1200
24
Total 17
10
Page 6 of 68
535
665
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 3rd
Semester:-6
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Computer Graphics
30
20
50
100
150
Software Engineering
30
20
50
100
150
30
20
50
100
150
30
20
50
100
150
E-Business Applications
30
20
50
100
150
Engineering Economics
20
10
30
70
100
25
25
50
25
25
50
Project I
100
100
Aptitude Building II
100
100
Comprehensive Viva-Voce
50
50
Total 17
10
580
1200
24
Page 7 of 68
620
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 4th
Semester:-7
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Cloud Computing
30
20
50
100
150
30
20
50
100
150
Elective I
30
20
50
100
150
Open Elective
30
20
50
100
150
30
20
50
100
150
25
50
25
100
100
Seminar
50
50
Project II
50
50
100
Total 15
475
575
1050
21
(ii)
(iii)
(i)
(iii)
E governance
(ii)
(iv)
ERP
Page 8 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Year: 4th
Semester:-8
Period
S. Course
N.
No
Evaluation Scheme
Subject
L
Sessional Evaluation
CT
TA
TOTAL
Exam
ESE
Subject
Total
Credit
Theory Subjects
1
Business Intelligence
30
20
50
100
150
Elective II
30
20
50
100
150
Elective III
30
20
50
100
150
Elective IV
30
20
50
100
150
Campus to Corporate
20
10
30
70
100
50
200
50
1000
20
50
Project III
100
Comprehensive Viva-Voce
50
Total 14
430
100
570
Pool of Electives (for Elective II, Elective III, & Elective IV)
(i)
(ii)
LAMP Technologies
(iii)
(iv)
(v)
Theory of Computation
(vi)
Storage Networks
(vii)
(viii)
Computer Forensics
(ix)
Ethical Hacking
Page 9 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 10 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Lab 3.
Lab 4.
Lab 5.
Lab 6.
Lab 7.
Lab 8.
Lab 9.
Lab 10.
Lab 11.
Lab 12.
Lab 13.
Lab 14.
(a) WAP to perform simple arithmetic operations using different data types.
(b) WAP to show swap of two nos without using third variable.
(a) WAP to find the roots of a quadratic equation.
(b) WAP to check the number is odd or even and find the sum of all odd and all even
separately
(a) WAP to find out whether the given number is prime or not and find sum of all
prime up to N
(b) WAP to reverse a given number and check the palindrome status.
WAP to print corresponding days of a week using switch case.
WAP to find and generate the Armstrong number.
WAP to print pattern triangle like Floyds, Pascal, pyramid triangle.
WAP to interchange two values using pointers.
(a) WAP to interchange two values using call by value and call by reference.
(b) WAP to print factorial of a number using recursion & without using recursion.
WAP to print Fibonacci series. (a) Without using function, (b) using function, (c) using
recursion.
(a) WAP to print an array and find greatest/smallest element of an array.
(b) WAP to perform linear searching in an array.
(a) WAP to insert/ delete element from an array.
(b) WAP to sort the arrays element using Bubble sort.
WAP to perform the following string functions.
a. Strlen b. strcmp
c. strcpy
d. strcat
e. strlwr
f. strupr
Declare a suitable structure of a college and print the name and DOB of the students
have scored more than sixty percent marks in end semester exam
Declare a suitable structure for an organization and print all the names of employees
having salary more than Rs.1000.
Page 11 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 12 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
meters and cm and DB in feet and inches. Write a program that can read values for the
class objects and add 1 object OM with another object of DB.
b) Define a class to represent bank account. Include the following members:
Data members
1. Name of depositor.
2. Account number.
3. Type of account.
4. Balance amount in the account.
Member functions
1. To assign initial values.
2. To deposit an amount.
3. To withdraw an amount after checking the balance.
4. To display name and balance.
Write a main program to test the program.
Lab 9:
a) WAP to demonstrate static class data.
b) WAP to demonstrate the use of Public, Private and protected classes .
Lab 10:
a) WAP to illustrate the concept of call by reference.
b) WAP to illustrate the concept of unary operator overloading.
c) WAP to illustrate the concept of binary operator overloading.
Lab 11:
a) WAP to demonstrate the use of function overloading.
b) WAP using multiple inheritence for collecting employee details.
Lab 12:
a) WAP using function template to find maximum of two Data.
b) WAP to calculate factorial of given number using copy constructor.
Lab 13:
a) WAP to sort five float and integer numbers using template function(use bubble sort).
b) Demonstrate the use of different types of polymorphism.
Lab 14:
a) Write a function to read a matrix of size M * N from keyboard.
b) WAP to implement aggregation concept.
Page 14 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
Introduction: Concept of data structure, Types of data structures, Character String in C, Recursion, Structure,
Pointer, Dynamic Allocation, Algorithms, Algorithm analysis, Complexity of algorithms and Time space trade-off.
Arrays: Introduction, Single and multi-Dimensional Arrays, address calculation, application of arrays, Operations
defined: traversal, insertion and deletion.
Stacks: Stacks, Array representation of stack, Applications of stacks, Conversion of Infix to Prefix and Postfix
Expressions, Evaluation of postfix expression using stack.
UNIT 2
(8L)
Queue: Queue, Array representation and implementation of queues, Circular queues, Operations on Queue: Create
Add, Delete, and Full and Empty, De-Queue, Priority queues, Applications of Queues.
Linked Lists: Concept of linked list, Representation and implementation of singly linked list, Circular linked list,
doubly linked list, Operations on Linked lists, Concepts of header linked lists, applications of linked lists.
UNIT 3
(8L)
Trees: Basic terminologies of trees, Binary tree, Complete Binary tree, Extended Binary tree,
Representation of Binary tree, Binary tree traversal, Operations on Binary tree.
Binary Search Tree: Binary Search Tree (BST), Insertion and Deletion in BST, Complexity of Search
Algorithm, Path Length, AVL Trees, B-trees.
UNIT 4
(6L)
Graphs: Terminology & Representations, Graphs & Multi-graphs, Directed Graphs, Representations of
Graphs, Traversal, Connected Component and Spanning Trees, Minimum Cost Spanning Trees.
UNIT 5
(10L)
Searching & Hashing: linear search, binary search, Hash Table, Hash Functions, Collision Resolution
Strategies, Hash Table Implementation.
Sorting: Bubble sort, Insertion sort, Selection sort, Quick sort, Merge sort, Heap Sort.
File Handling: Introduction to file handling, Data and Information, File concepts, File organization, files
and streams, working with files.
SUGGESTED BOOKS
Text Books:
1. Data Structures Schaums Outline Series,Lipschutz, TMH.
2. Data Structures using C by A. M. Tenenbaum, Langsam, Moshe J. Augentem, PHI Pub.
Reference Books:
1. Fundamentals of Data Structures, Horowitz and Sahani, Galgotia Publication.
2. Data Structures and Program Design in C By Robert Kruse, PHI.
3. Data Structure and the Standard Template library Willam J. Collins, 2003, T.M.H.
Page 16 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 17 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 18 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 5
(9L)
I/O Management and Disk Scheduling: I/O Devices, Organization of I/O functions, Operating
System Design issues, I/O Buffering, Disk Scheduling (FCFS, SCAN, C-SCAN, SSTF), Disk
Caches.
Case Studies: LINUX / UNIX Operating System and Windows based operating system.
SUGGESTED BOOKS
Text Books:
1. Silberschatz, Galvin and Gagne, Operating Systems Concepts, Wiley.
2. D M Dhamdhere, Operating Systems : A Concept based Approach, 2nd Edition.
Reference Books:
1. Sibsankar Halder and Alex A Aravind, Operating Systems, Pearson Education.
2. Harvey M Dietel, An Introduction to Operating System, Pearson Education.
Page 19 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
PIT- 302 : Computer Based Numerical & Statistical Techniques Lab (Using C++)
LTP
0 02
Write Programs in C++ Language:
1. To deduce error envolved in polynomial equation.
2. To Find out the root of the Algebraic and Transcendental equations using numerical methods.
3. To implement Newtons Forward and Backward Interpolation formula.
4. To implement Gauss Forward, Bessels, Sterlings and Evertts Interpolation formula.
5. To implement Newtons Divided Difference and Langranges Interpolation formula.
6. To implement Numerical Differentiations.
7. To implement Numerical Integration using Trapezoidal, Simpson 1/3 and Simpson 3/8 rule.
8. To implement Least Square Method for curve fitting.
9. To draw frequency chart like histogram, frequency curve and pie-chart etc.
Page 20 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
10. To estimate regression equation from sampled data and evaluate values of standard deviation,
t-statistics, regression coefficient, value of R2 for atleast two independent variables.
Page 21 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 22 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 23 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 24 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
Web
Essentials:
Clients,
Servers,
and
Communication.
The
Internet-Basic
Internet
Protocols -The World Wide Web-HTTP request message-response message-Web Clients Web Servers-Case Study.
Markup Languages: XHTML. An Introduction to HTML History-Versions-Basic XHTML Syntax and SemanticsSome Fundamental HTML Elements-Relative URLs-Lists-tables-Frames-Forms-XML Creating HTML Documents
Case Study.
UNIT 2
(8L)
Style Sheets: CSS-Introduction to Cascading Style Sheets-Features-Core Syntax-Style Sheets and HTML Style Rle
Cascading and Inheritance-Text Properties-Box Model Normal Flow Box Layout-Beyond the Normal Flow-Other
Properties-Case Study. Client- Side Programming: The JavaScript Language-History and Versions Introduction
JavaScript in Perspective-Syntax-Variables and Data Types-Statements-Operators-Literals-Functions-ObjectsArrays-Built-in Objects-JavaScript Debuggers.
UNIT 3
(8L)
Host Objects: Browsers and the DOM-Introduction to the Document Object Model DOM History and LevelsIntrinsic Event Handling-Modifying Element Style-The Document Tree-DOM Event Handling-Accommodating
Noncompliant Browsers Properties of window-Case Study. Server-Side Programming: Java Servlets- Architecture Overview-A Servlet-Generating Dynamic Content-Life Cycle-Parameter Data-Sessions-Cookies- URL RewritingOther Capabilities-Data Storage Servlets and Concurrency-Case Study- Related Technologies.
UNIT 4
(8L)
Representing Web Data: XML-Documents and Vocabularies-Versions and Declaration-Namespaces JavaScript and
XML: Ajax-DOM based XML processing Event-oriented Parsing: SAX-Transforming XML Documents-Selecting
XMLData: XPATH-Templatebased Transformations: XSLT-Displaying XML Documents in Browsers-Case StudyRelated Technologies. Separating Programming and Presentation: JSP Technology Introduction-JSP and ServletsRunning JSP Applications Basic JSP-JavaBeans Classes and JSP-Tag Libraries and Files-Support for the ModelView-Controller Paradigm-Case Study-Related Technologies.
UNIT 5
(8L)
Web Services: JAX-RPC-Concepts-Writing a Java Web Service-Writing a Java Web Service Client-Describing
Web Services: WSDL- Representing Data Types: XML Schema- communicating Object Data: SOAP Related
Technologies-Software Installation-Storing Java Objects as Files-Databases and Java Servlets.
TEXT BOOK
1. Jeffrey C.Jackson, "Web Technologies--A Computer Science Perspective", Pearson Education, 2006.57
REFERENCES
1. Robert. W. Sebesta, "Programming the World Wide Web", Fourth Edition, Pearson Education, 2007.
2. Deitel, Deitel, Goldberg, "Internet & World Wide Web How To Program", Third Edition, Pearson Education,
2006.
3. Marty Hall and Larry Brown,Core Web Programming Second Edition, Volume I and II, Pearson Education,
2001.
4. Bates, Developing Web Applications, Wiley, 2006.
Page 25 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Data base Management Systems, Raghurama Krishnan, Johannes Gehrke, TATA McGrawHill 3 rdEdition.
Data base System Concepts, Silberschatz, Korth, McGraw hill, V edition.
Reference Books:
1. Data base Systems design, Implementation, and Management, Peter Rob & Carlos Coronel 7 thEdition.
2. Fundamentals of Database Systems, ElmasriNavate Pearson Education.
3. Introduction to Database Systems, C.J.Date Pearson Education.
Page 26 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 27 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
1.
2.
3.
4.
5.
6.
LTP
0 0 2
Create a simple HTML page for the home page of any shopping website using list, frame
table, div.
Use CSS in the page developed in practical 1 to change its font, background, images etc.
Write a program in java script to warn user if he enters numerical input greater than 4
digits.
Write a program in Java script to validate email address.
Write a java servlet program to demonstrate session management.
Creation of a XML document of 20 students of any university. Add their roll numbers,
marks obtained in 5 subjects, total and percentage and save this XML document at the
server.
Page 28 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
7. Write a program that takes students roll number as an input and returns the students
marks, total and percentage by taking the students information from the XML document.
8. Design a website using existing web services (Google map, weather forecast, market
information etc.) using AJAX.
Page 29 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
31) Find the average age of sailors for each rating level that has atleast two sailors.
32) Find the average age of sailors who are of voting age. For each rating level that has at least two sailors.3
33) Find those ratings for which the average age of sailors is the minimum overall ratings.
2. Database Schema for a customer-sale scenario
Customer(Cust id : integer, cust_name: string)
Item(item_id: integer, item_name: string, price: integer)
Sale(bill_no: integer, bill_date: date, cust_id: integer, item_id: integer, qty_sold: integer)
For the above schema, perform the following
1) Create the tables with the appropriate integrity constraints
2) Insert around 10 records in each of the tables
3) List all the bills for the current date with the customer names and item numbers
4) List the total Bill details with the quantity sold, price of the item and the final amount
5) List the details of the customer who have bought a product which has a price>200
6) Give a count of how many products have been bought by each customer
7) Give a list of products bought by a customer having cust_id as 5
8) List the item details which are sold as of today
9) Create a view which lists out the bill_no, bill_date, cust_id, item_id, price, qty_sold, amount
10) Create a view which lists the daily sales date wise for the last one week
3. Database Schema for a Student Library scenario
Student(Stud_no : integer, Stud_name: string)
Membership(Mem_no: integer, Stud_no: integer)
Book(book_no: integer, book_name:string, author: string)
Iss_rec(iss_no:integer, iss_date: date, Mem_no: integer, book_no: integer)
For the above schema, perform the following
1) Create the tables with the appropriate integrity constraints
2) Insert around 10 records in each of the tables
3) List all the student names with their membership numbers
4) List all the issues for the current date with student and Book names
5) List the details of students who borrowed book whose author is CJDATE
6) Give a count of how many books have been bought by each student
7) Give a list of books taken by student with stud_no as 5
8) List the book details which are issued as of today
9) Create a view which lists out the iss_no, iss _date, stud_name, book name
10) Create a view which lists the daily issues-date wise for the last one week
4. Database Schema for an Employee-pay scenario
Page 30 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Create a view which lists out the emp_name, department, basic, dedeuctions, netsalary
10) Create a view which lists the emp_name and his netsalary
5. Database Schema for a Video Library scenario
Customer(cust_no: integer,cust_name: string)
Membership(Mem_no: integer, cust_no: integer)
Cassette(cass_no:integer, cass_name:string, Language: String)
Iss_rec(iss_no: integer, iss_date: date, mem_no: integer, cass_no: integer)
For the above schema, perform the following
1) Create the tables with the appropriate integrity constraints
2) Insert around 10 records in each of the tables
3) List all the customer names with their membership numbers
4) List all the issues for the current date with the customer names and cassette names
5) List the details of the customer who has borrowed the cassette whose title is The Legend
6) Give a count of how many cassettes have been borrowed by each customer
7) Give a list of book which has been taken by the student with mem_no as 5
8) List the cassettes issues for today
9) Create a view which lists outs the iss_no, iss_date, cust_name, cass_name
10) Create a view which lists issues-date wise for the last one week
6. Database Schema for a student-Lab scenario
Student(stud_no: integer, stud_name: string, class: string)
Class(class: string, descrip: string)
Lab(mach_no: integer, Lab_no: integer, description: String)
Allotment(Stud_no: Integer, mach_no: integer, dayof week: string)
For the above schema, perform the following
Page 31 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
2.
3.
4.
5.
6.
7.
8.
Handling general purpose utilities- cal, date, echo, script, mailx, passwd, who, uname, tty, sty, cat, cp,rm,
mv, more, file, wc, od, cmp, comm, diff, lp, banner, dos2unix, and unix2dos, gzip and gunzip, zip and
unzip.
Use the cat command to create a file containing the following data. Call it mutable use tabs to separate the
fields 1425 ravi 15.65, 4320 ramu 26.27, 6830 sita 36.15, 1450 raju 21.86.
Write a shell script to compute the sum of number passed to it as argument on command line and display
the result.
Use Vi editor to create a file called myfile.txt which contain some text. Correct typing errors during
creation, Save the file & Logout of the file.
Implementation of various loop construct statements in unix.
Write a shell program to find out factorial of the given number.
Write shell script to perform integer arithmetic operations.
Write a shell script to find out whether the given number is prime number or not.
Page 32 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 33 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
SUGGESTED BOOKS
Text Books:
1. Fundamentals of Computer Algorithms, Ellis Horowitz, Satraj Sahni and Rajasekharam,
Galgotia publications pvt. Ltd.
2. Anany Levitin, Introduction to the Design and Analysis of Algorithm, Pearson Education
Asia,2003 3.
3. Algorithm Design: Foundations, Analysis and Internet examples, M.T.Goodrich and
R.Tomassia, Johnwiley and sons.
Reference Books:
1. T.H. Cormen, C.E. Leiserson, R.L. Rivest and C. Stein, Introduction to Algorithms, PHI
Pvt. Ltd., 20012.
2. Introduction to Design and Analysis of Algorithms A strategic approach, R.C.T.Lee,
S.S.Tseng, R.C.Chang and T.Tsai, McGraw Hill.
3. Design and Analysis of algorithms, Aho, Ullman and Hopcroft,Pearson education.
4. Algorithms Richard Johnson baugh and Marcus Schaefer, Pearson Education.
Page 34 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
J2SE: Concepts and Prerequisites: Data Types, Arrays, Dynamic Arrays, Type Casting, Classes and Objects,
Inheritance, Interfaces, Exception Handling, Multi-Threading.
J2EE Architecture: J2EE as a framework, Client Server Traditional model, Comparison amongst 2-tier, 3-tier and
N-tier architectures.
UNIT 2
(8L)
JDBC: Introduction, JDBC Architecture, Types of JDBC Drivers, The Connectivity Model, The java.sql package,
Navigating the Result Set objects contents, Manipulating records of a Result Set object through User Interface , The
JDBC Exception classes, Database Connectivity, Data Manipulation (using Prepared Statements, Joins,
Transactions, Stored Procedures), Data navigation.
UNIT 3
(8L)
Java Beans: The software component assembly model- The java beans development kit- developing beans
notable beans using info bus - Glasgow developments - Application Builder tool- JAR files-Introspection-Bound
Properties-Persistence-customizers - java beans API.
EJB: EJB architecture- EJB requirements design and implementation EJB session beans- EJB entity beans-EJB
Clients deployment tips, tricks and traps for building distributed and other systems implementation and future
directions of EJB-Variable in perl- perl control structures and operators functions and scope.
UNIT 4
(8L)
Java Servlet: Servlet overview, Brief origin and advantages over CGI, Writing small Servlet Programs,
Deployment Descriptor, Servlet Life Cycle, Sharing Information, Initializing a Servlet, Writing Service
Methods, Filtering Requests and Responses, Invoking Other Web Resources, Accessing the Web Context,
Maintaining Client State, Finalizing a Servlet, Session: Definition, Different ways to track sessions
UNIT 5
(8L)
JSP: Introduction to JSP, JSP processing, JSP Application Design, Tomcat Server, Implicit JSP objects, Conditional
Processing, Declaring variables and methods, Error Handling and Debugging, Sharing data between JSP pagesSharing Session and Application Data. Accessing a database from a JSP page, Application-specific Database Action,
Developing Java Beans in a JSP page, introduction to Struts framework.
SUGGESTED BOOKS
Text Books:
1. J. McGovern, R. Adatia,Y. Fain, 2003, J2EE 1.4 Bible, Wiley-dream tech India Pvt. Ltd, New Delhi.
2. H. Schildt, 2002, Java 2 Complete Reference, 5th Edition, Tata McGraw-Hill, New Delhi.
Reference Books:
1.
2.
3.
4.
5.
K. Moss, 1999, Java Servlets, Second edition, Tata McGraw Hill, New Delhi.
D. R. Callaway, 1999, Inside Servlets, Addison Wesley, Boston.
Joseph ONeil, 1998, Java Beans from the Ground Up, Tata McGraw Hill, New Delhi.
Tom Valesky, Enterprise JavaBeans, Addison Wesley.
Cay S Horstmann & Gary Cornell, Core Java Vol II Advanced Features, Addison Wesley
Page 35 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Reference Books:
1. Rajendra Akerkar, Introduction to Artificial Intelligence, Prentice-Hall of India, 2005.
2. Patrick Henry Winston, Artificial Intelligence, Pearson Education Inc., Third edition,
Page 36 of 68
2001.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Reference Books:
1. Software Requirements: Styles & Techniques published by Addison-Wesley Professional
2. Software Systems Requirements Engineering: In Practice published by McGrawHill/Osborne Media
3. Managing Software Requirements: A Use Case Approach, 2/e published by Pearson
4. Software Architecture: A Case Based Approach published by Pearson
2.
3.
4.
5.
Familiarization with LEX & development of the Scanner for the language
o Simulation of a Finite State Automata to recognize the tokens of various control
statements
o Simulation of a Finite State Automata to distinguish among Integers, Real Numbers, &
Number with Exponents
o Program in LEX tool to recognize the token & to return found for a C like language
Familiarization with YACC & development of a Parser
o Parsing of arithmetic and algebraic expression and equation
o Use of YACC tool to parse statements of C like language
Incorporation of action routines for generation of a specific intermediate code
Simulation of a desk-calculator
Generation of target machine code from intermediate code
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
1.
2.
3.
4.
5.
6.
7.
LTP
0 0 2
Write a program in Java to demonstrate the use of multithreading and exception handling.
Creation of a JavaBean which gives the converted value of Temperature (in degree
Celsius) into equivalent Fahrenheit
Creation of a simple Bean with a label which is a count of number of clicks. Then
create a BeanInfo class such that only the count is visible in the Property Window.
Creation of two Beans a) Keypad b) Display pad. After that integrate the two beans to
make it work as a calculator.
Write a servlet program to take two input from a HTML page and print its result on the
web page.
Development of dynamic website using JSP of an online Departmental Store. Create
database with User Information and Item information. The Item catalog should be
dynamically loaded from the database. The website should be user friendly and should
have the following pages:
i.
Home page
ii.
Registration and user login
iii. User profile page
iv.
Items catalog
v.
Shopping cart
vi.
Payment by credit card
vii.
Order confirmation
Implementation of currency converter program using JSP Struts Framework.
Page 39 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
(8L)
UNIT 2
(8L)
UNIT 3
(8L)
Design: Basic Concept of Software Design, Architectural Design, Low Level Design: Modularization,
Design Structure Charts, Pseudo Codes, Flow Charts, Coupling and Cohesion Measures, Design
Strategies: Function Oriented Design, Object Oriented Design, Top-Down and Bottom-Up Design.
Software Measurement and Metrics: Various Size Oriented Measures: Halesteads Software Science,
Function Point (FP) Based Measures, Cyclomatic Complexity Measures: Control Flow Graphs.
UNIT 4
(7L)
Software Reliability: Failure and Faults, Reliability Models: Basic Model, Logarithmic Poisson Model,
Calender time Component, Reliability Allocation. Coding: Top-Down and Bottom Up programming,
structured programming, Compliance with Design and Coding Standards.
Page 41 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 5
(9L)
Testing: Objectives, Testing Tools & Standards. Unit Testing, Integration Testing, Acceptance Testing,
Regression Testing, Top-Down and Bottom-Up Testing Strategies: Test Drivers and Test Stubs, Path
Testing, Structural Testing (White Box Testing), Functional Testing (Black Box Testing),
Maintenance: Corrective and Perfective Maintenance, Maintenance Process, Maintenance Models,
Maintenance Cost, Software Re-Engineering, Reverse Engineering. Constructive Cost Models
(COCOMO).
Software Quality Management: Software Quality Factors, Quality Assurance, Quality Standards,
Software Maintenance.
SUGGESTED BOOKS
Text Books:
1. R. S. Pressman, Software Engineering A practitioners approach, 3rd ed., McGraw Hill Int.
Ed., 1992.
2. K.K. Aggarwal & Yogesh Singh, Software Engineering, New Age International, 2001
3. Pankaj Jalote, Software Engineering, Wiley India
Reference Books:
1. Rajib Mall, Fundamentals of Software Engineering, PHI Publication, 3rd Edition.
2. Ian Sommerville, Software Engineering, Addison Wesley, 8th Edition.
3. James Peter, W Pedrycz, Software Engineering, John Wiley & Sons
Page 42 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
The Clr And The .Net Framework: The building Block of the .NET platform (CLR,CTS,CLS), the role of the
.NET base class libraries, , additional .NET Aware programming Languages, Understanding .Net Assembles,
Problems with classic COM Binaries, The role of the common intermediate language, The role of .NET type
metadata, The role of the assembly manifest, Compiling CIL to platform specific instruction. Building a simple file
test assembly, Cross Language Inheritance. Building the multi file assembly, Using the multi file assembly,
Understanding private assemblies, robing for private assemblies (The Basics), Private assemblies and XML
Configuration files, Probing for private assemblies (The details),Understanding Shared assembly, Understanding
Shared Names, Building a shared assembly, Understanding delay Signing, Installing/Removing shared assemblies,
Using a Shared assembly.
UNIT 4
(8L)
Application Development On .Net: Using the visual studio.Net IDE, key aspects of the VS.Net IDE, Documenting
source code via XML, Building Windows Applications, Event Driven Programming, Delegate, Event and its
association, Synchronous and asynchronous operation with delegate, User Defined events and delegates,ADO.NET
Architecture,.NET Framework Data Providers, Data set, Data reader, data adapter, Accessing Data with ADO.NET.
UNIT 5
(8L)
Web Based Application Development On .Net: Introduction to web form, Need of Web Application, Static and
Dynamic Page, Working of IIS and Browser, Differences between ASP and ASP.NET, understanding post back,
understanding page life cycle, State management, Server control form validation, Master pages, ASP.NET web
security, server control form validation, Programming Web Applications with Web Forms, Web service,
Programming Web Services.
SUGGESTED BOOKS
Text Books:
1. E. Balagurusamy, "Programming in C#", Tata McGraw-Hill, 2004. (Unit I, II)
2. J. Liberty, "Programming C#", 2nd ed., O'Reilly, 2002. (Unit III, IV, V)
Reference Books:
1.
2.
3.
4.
UNIT 1
Overview, Motivation (for Data Mining), Data Mining-Definition & Functionalities.
Data Warehousing: Overview, Definition, Delivery Process, Difference between Database
System and Data Warehouse, Multi Dimensional Data Model, Data Cubes, Stars, Snow Flakes,
Fact Constellations, Concept hierarchy, Process Architecture, 3 Tier Architecture, Data Marting.
ROLAP, MOLAP, HOLAP.
UNIT 2
(7L)
Data Pre-Processing: Data Cleaning: Missing Values, Noisy Data,(Binning, Clustering,
Regression, Inconsistent Data, Data Integration and Transformation.
Data Reduction: Data Cube Aggregation, Dimensionality reduction, Data Compression,
Numerosity Reduction, Clustering, Discretization and Concept hierarchy generation.
UNIT 3
(7L)
Page 43 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Supply Chain Management (SCM): Defining SCM, Basics of Internet-Enabled SCM, e-Supply
chain fusion, Managers roadmap for SCM.
UNIT 4
(5L)
E-Procurement: Purchasing versus procurement, Elements of Buy-Side e-Procurement solutions,
Elements of Sell-Side e-Procurement solutions, Managers roadmap for e-Procurement.
UNIT 5
(13L)
Knowledge-Tone Applications: Why knowledge applications and what is it?
Developing the e-Business Design: Challenges of e-Business strategy creation, Roadmap to
moving your company into e-Business.
Maturity Models: Five Maturity Levels, Characteristics of Maturity Levels, Key process areas.
Overview of E-business proposal, calculating ROI (return on investment).
SUGGESTED BOOKS:
1.
Ravi Kalakota and Marcia Robinson; e-Business- Roadmap for Success; AddisonWesley Longman Publishing Co., Inc, 2001
2.
H. Albert Napier, Philip J. Judd, Ollie Rivers, Stuart W. Wagner; Creating a Winning EBusiness; Thompson, Course Technology; Edition 2 , 2007.
3.
Greenstein and Feinman, E-Commerce, TMH
4.
Ravi Kalakota, Andrew Whinston, Frontiers of Electronic Commerce, Addision
Wesley
5.
Denieal Amor, The E-Business Revolution, Addision Wesley
Page 45 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
LTP
0 0 2
Write a Program in C# and display its Metadata, CIL and Manifest information using ildasm.exe tool.
Write a program in c# for create a object of class and constructor and destructor also.
Write a program for preprocessors(#if #else #elif #endif #define #undef #warning #error and #line)
Write a program for custom constructor and static constructor.
Write a program in c# pass reference type by value and reference type by reference.
Write a program in c# for create jagged array.
Write a program for string manipulation.
Write a program in C# Language to create Custom Namespaces.
Write a Program in C# Language to demonstrate read only property and Write only property.
To write a program in C# Language to demonstrate Hybrid Inheritance.
Write a program in C# Language to demonstrate the usage of Delegates.
To write a program in C# Language to demonstrate Interfaces inheritance.
To write a program in C# Language to demonstrate multi file assembly.
To write a program in C# Language to demonstrate private assembly.
To write a program in C# Language to demonstrate the public assembly.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 2
(10L)
Web-Based Application Types of Cloud Service Development Software as a Service
Platform as a Service Web Services On-Demand Computing Discovering Cloud Services
Development Services and Tools Amazon Ec2 Google App Engine IBM Clouds
UNIT 3
(10L)
Centralizing Email Communications Cloud Computing for the Community Collaborating on
Group Projects and Events Cloud Computing for the Corporation--Evaluating web mail
services--Evaluating web conference tools--Evaluating on line groupware--collaborating via
blogs and wikis
UNIT 4
(10L)
Understanding cloud storage--evaluating on linefile storage-- exploring on line book marking
services-- exploring on line photo editing applications--exploring photo sharing communities-controlling it with web based desktops. .
SUGGESTED BOOKS:
1. Michael Miller, Cloud Computing: Web-Based Applications That Change the Way You Work
and Collaborate Online, Que Publishing, August 2008.
2. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for
On-demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty
Limited, July 2008.
3. Anthony T Velte , Robert Elsenpeter Cloud Computing A Practical Approach , Tata
McGraw-Hill Education, 01-Jan-2009.
4. Lee Gilliam, Cloud Computing Principles, Systems and Applications , Springer, 2010.
UNIT 1
Introduction to security attacks, services and mechanism, introduction to cryptography.
Page 47 of 68
LTP
3 0 0
(8L)
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Conventional Encryption: Conventional encryption model, classical encryption techniquessubstitution ciphers and transposition ciphers, cryptanalysis, steganography,stream and block
ciphers.
Modern Block Ciphers: Block ciphers principals, Shannons theory of confusion anddiffusion,
fiestal structure, data encryption standard(DES), strength of DES, differentialand linear crypt
analysis of DES, block cipher modes of operations, triple DES, confidentiality using
conventional encryption, traffic confidentiality, key distribution,
UNIT 2
(8L)
Introduction to prime and relative prime numbers, finite field of the form GF(p), modular
arithmetic, Fermats and Eulers theorem, primality testing, Euclids Algorithm, Chinese
Remainder theorem, Principals of public key crypto systems, RSA algorithm, security of RSA,
key management, Diffie-Hellman key exchange algorithm, introductory idea of Elliptic curve
cryptography, Elgamel encryption.
UNIT 3
(8L)
Message Authentication and Hash Function: Authentication requirements, authentication
functions, message authentication code, hash functions, birthday attacks, security of hash
functions and MACS, MD5 message digest algorithm, Secure hash algorithm(SHA).Digital
Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof
of digital signature algorithm.
UNIT 4
(8L)
Authentication Applications: Kerberos and X.509, directory authentication service, electronic
mail security-pretty good privacy (PGP), S/MIME.
UNIT 5
(8L)
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining
security associations, key management.
Web Security: Secure socket layer and transport layer security, secure electronic transaction
(SET).
System Security: Intruders, Viruses and related threads, firewall design principals, trusted
systems.
SUGGESTED BOOKS:
1. William Stallings, Cryptography and Network Security: Principals and Practice, Prentice Hall, New
Jersy.
2. Johannes A. Buchmann, Introduction to Cryptography, Springer-Verlag.
3. Bruce Schiener, Applied Cryptography.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
0 0 2
1. Footprinting using footprinting tools (Open Source & Free)(ex-nslookup, ARIN,
Whois, Google Earth etc..).
2. Scanning for vulnerabilities using (Angry IP, HPing2, IPScanner, Global
Network Inventory Scanner, Net Tools Suite Pack.).
3. NetBIOS Enumeration Using NetView Tool, Nbtstat Enumeration Tool (Open
Source).
4. Steganography using tools: Tool: Merge Streams, Image Hide, Stealth Files,
Blindside, STools, Steghide, Steganos, Pretty Good Envelop, Stegdetect,.
5. Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.
6. How to Detect Trojans by using Netstat, fPort, TCPView, CurrPorts Tool,
Process Viewer.
7. Lan Scanner using look@LAN, wireshark.
8. Understanding DoS Attack Tools- Jolt2 , Bubonic.c, Land and LaTierra, Targa,
Nemesy Blast, Panther2, Crazy Pinger, Some Trouble, UDP Flood, FSMax.
9. Implementation of RSA in C using Linux.
10. Implementation of DES in C using Linux.
Page 49 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
(8L)
UNIT 2
(8L)
Overview of project planning, stepwise project planning, project selection, project scope identification,
project infrastructure identification, project characteristics, identification of project product and activities,
effort estimation, activity risks, resource allocation, review plan, lower level plan execution; selection of
appropriate project approach, build or buy, selection of methodologies, choice of process models,
structure versus speed of delivery, waterfall model, spiral model, software prototyping, incremental
delivery, agile methods, extreme programming, iterative process management, appropriate process model
selection.
UNIT 3
(8L)
Software effort estimation, problems with under and over estimation, basis for software estimation,
estimation techniques, bottom-up estimating, top-down and parametric models, expert judgment,
estimation by analogy, COCOMO13, function point analysis; activity planning, when to plan, project
schedules, sequencing and scheduling activities, network planning models, adding time dimension,
forward pass, backward pass, critical path identification, activity float, project shortening, critical activity
identification, activity on arrow; risk management, categories of risk, framework for risk, risk
identification, risk assessment, risk planning, risk evaluation, PERT, critical chain concepts.
UNIT 4
(8L)
UNIT 5
(8L)
Managing People, understanding behaviour, organization behaviour, selecting the right person for the job,
best method for instruction, motivation, Oldham-hackman job model, stress, health and safety; working in
teams, becoming a team, decision making, co-ordinating dependencies, dispersed and virtual teams,
communication of genres and plans, leadership; software quality, software quality in project planning,
importance of software quality, ISO 9126, product versus process quality management, quality
Page 51 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
management system, process capability models, techniques to help enhance software quality, testing,
quality plans.
SUGGESTED BOOKS:
1. Shtub, Bard, and Globerson,Project Management: Engineering, Technology, & Implementation, Prentice Hall
2. Bob Hughes, Mike Cotterell, Software Project Management, Tata McGraw Hill
3. Neal Whitten
, Managing Software Development Projects, Formula for Success, John Wiley & Sons
UNIT 1
(8L)
Network Design: Design Principles, Determining Requirements, Analysing the Existing Network,
Preparing the Preliminary Design, Completing the Final Design Development, Deploying the Network,
Monitoring and Redesigning, Maintaining, Design Documentation, Cisco PDIOO Model, Modular
Network Design, Hierarchical Network Design, The Cisco Enterprise Composite Network Model.
UNIT 2
(8L)
Router Design: Configuring a Router, Routing Protocols, Switching Design: Switching Types,
Layer 2 and 3 Switching, Multilayer Switching, Cisco Express Forwarding, Switching Security,
Multi-Protocol Label Switching (MPLS), MPLS Architecture and related protocols. IPv4 Routing
Design: IPv4 Address Design, Private and Public Addresses ,NAT, Subnet Masks, Hierarchical
IP Address Design, Deploying IPv6 in Campus Networks,
UNIT 3
(8L)
Wireless LAN Design: Wireless Technology Overview, Wireless Standards, Wireless Components,
Wireless Security, Wireless Security Issues, Wireless Threat Mitigation, Wireless Management, Wireless
Design Considerations, IEEE 802.11, Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh
Networks(WMNs), QoS Models: IntServ, DiffServ154, QoS Tools, Policing and Shaping, Congestion
Avoidance, Congestion Management, Link- Specific Tools, QoS Design Guidelines.
UNIT 4
(8L)
Optical Networks: Benefits of Optical Networks, Optical Network Drivers, Component
Applications, Design and Planning, Restoration, Network Management, WDM System, AllOptical Network, Optical Layer Services and Interfacing.
UNIT 5
(8L)
Network Security and Management Design: Hacking: Vulnerabilities, Threats:
Reconnaissance Attacks, Access Attacks, Information Disclosure Attacks, Denial of Service
Attacks, Threat Defence Secure Communication, Network Security Best Practices, SAFE
Campus Design.
ISO Network Management Standard: Protocols and Tools, SNMP, MIB, RMON, Cisco
NetFlow, Syslog, Network Management Strategy: SLCs and SLAs, IP Service-Level
Agreements, Content Networking Design.
Page 52 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
SUGGESTED BOOKS
Text Books:
1. Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals, Pearson Education, 2006.
2. Rajiv Ramaswami, Kumar N Sivarajan, Galen H Sasaki, Optical Networks, A Practical Perspective, 3 rd
Edition, Elsevier, 2010.
Reference Books:
1. Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks, Tata McGraw-Hill, 2000.
Open Elective
TIT-OE(1) : Management Information Systems
LTP
3 0 0
UNIT 1
(8L)
Definition of Management Information System - Structure of MIS - Information system for
decision making - The role of system analyst - Data base management system
UNIT 2
(8L)
Computes and Information Processing - Classification of computers - Main frames - Mini
Computers - workstations - micro computers - super computers - Personal Computers - Input
Devices - Computer mouse - touch screen - MICA - OCR - pen based input - digital scanners voice input devices - sensors - Output devices - video display terminals - printers - plotters voice output devices - Secondary storage - magnetic disk storage - magnetic tape storage optical disk storage.
UNIT 3
(8L)
System Analysis - System Planning and the mutual investigation - Information gathering MIS
Organisation - Top management - Data processing groups responsibility
UNIT 4
(8L)
Management and MIS - Strategic information system - MIS as competitive advantage implications for managers - MIS support for planning, organizing, operating, controlling an
knowledge work - specific function - finance - personnel - production - materials - marketing computer - hardware and software - Data representation in computers - Batch Processing Vs.
online processing.
UNIT 5
(8L)
Decision Support System - definition - examples of DSS - components - building DSS - Group
Decision Support System - GDSS tools - role of GDSS - Executive System - role developing
DSS - bene fits - examples.
SUGGESTED BOOKS
Page 53 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Text Books:
1. Management Information System - Gordan B. Davis
2. Sadagopan - Management Information Systems - Prentice-Hall of India
3. Mudrick & Ross - Management Information Systems - Prentice-Hall of India
Reference Books:
1. Rajagopal SP - Management Information System
2. Lawrence S. On/la - Introduction to Business Data
3. Davis - Computer Data Processing
4. Laudon & Laudon - Management Information Systems - Prentice-Hall Of India.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
SUGGESTED BOOKS:
1. Human Computer Interaction. ALAN DIX, JANET FINCAY, GRE GORYD, ABOWD,
RUSSELL BEALG, PEARSON.
2. Interaction Design PRECE, ROGERS, SHARPS. Wiley Dreamtech,
3. User Interface Design, Soren Lauesen , Pearson Education.
TIT-OE(3): E governance
LTP
3 0 0
UNIT 1
(8L)
UNIT 2
(8L)
UNIT 3
(8L)
E-Governance Infrastructure and Strategies: E-readiness: Digital System Infrastructure, Legal Infrastructural
Preparedness, Institutional Infrastructural Preparedness, Human Infrastructural Preparedness, Technological
Infrastructural Preparedness; Evolutionary Stages in E-Governance.
Public-Private Partnership (PPP) for E-Government: Introduction, Challenges of PPP, PPP scenario, dimensions
of PPP, issues constraining PPP, PPP proposed regulation
UNIT 4
(8L)
Page 55 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Change Management for E-Government and Government Data Centres(GDCs): Introduction, evolving change
management strategy, understanding change management, model of change management; complexity of GDCs,
elements of GDCs, Objectives, issues, outcomes of GDCs, virtualization and consolidation of GDCs, Architecture of
GDC, steps involved in designing a GDC, data centre management and monitoring, disaster recovery, data centre
retention and protection.
Secured Government Information System Architecture and Government Tele-centres: Introduction,
architecture types, process and overview of security requirements, security policy, security requirements, steps
involved in designing security architecture, determination of information domains; Local ICT environment in rural
and undeserved areas, organisational models, sustainability and impact, technologies used in tele-centres, issues in
scaling up of the system, strengthening of tele-centres.
UNIT 5
(8L)
Case Studies: Computer-aided Administration of Registration Department (CARD), Smart Nagarpalika, National
Reservoir Level and Capacity Monitoring System, Computerization in Andra Pradesh, Ekal Seva Kentra,
Sachivalaya Vahini, Bhoomi, IT in Judiciary, E-Khazana, Data warehousing in Tamil Nadu, PRAJA- rural e-seva,
E-Panchayat, E-governance in China, E-Governance initiative in USA; E-Governance in Brazil and Sri Lanka.
SUGGESTED BOOKS:
1. E-Governance: Concepts and Case Studies, C.S.R.Prabhu, Prentice-Hall of India Private
2. E-Gov 2.0: Policies, Processes and Technologies, Jaijit Bhattacharya, Tata McGraw Hill
TIT-OE(4): ERP
LTP
3 0 0
UNIT 1
(8L)
ERP Introduction, Benefits, and Structure: Conceptual Model of ERP, The Evolution of ERP,
The Structure of ERP.
UNIT 2
(8L)
Business Process Reengineering, Data ware Housing, Data Mining, Online Analytic Processing
(OLAP), Product Life Cycle Management(PLM),LAP, Supply chain Management.
UNIT 3
(8L)
ERP Marketplace Dynamics: Market Overview, Marketplace Dynamics, The Changing ERP
Market.
ERP- Functional Modules: Introduction, Functional Modules of ERP Software, Integration of
ERP, and Customer Relationship Applications.
UNIT 4
(8L)
ERP Implementation Basics, ERP Implementation Life Cycle, Role of SDLC/SSAD,
Consultants, Vendors and Employees,
UNIT 5
(8L)
ERP & E-Commerce, Future Directives- in ERP, ERP and Internet, Critical success and failure
factors, Integrating ERP into organizational culture.
SUGGESTED BOOKS:
Page 56 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Page 57 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
star and snowflake schema, introduction to business metrics and KPIs, creating cubes using
SSAS.
UNIT 5
(12L)
Basics of Enterprise Reporting: Introduction to enterprise reporting, concepts of dashboards,
balanced scorecards, introduction to SSRS Architecture, enterprise reporting using SSRS.
SUGGESTED BOOKS:
The courseware including PowerPoint and notes are available for the Elective. In addition,
following reference books can also be used:
1. Business Intelligence by David Loshin
2. Business intelligence for the enterprise by Mike Biere
3. Business intelligence roadmap by Larissa Terpeluk Moss, ShakuAtre
4. Successful Business Intelligence: Secrets to making Killer BI Applications by CindiHowson
5. Delivering business intelligence with Microsoft SQL server 2008 by Brain, Larson
6. Foundations of SQL Server 2005 Business Intelligence by Lynn Langit
7. Information dashboard design by Stephen Few
Page 58 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
System Technology: Execution Models: Basic Interaction models, messaging, CORBA, peer to
peer computing Security, trust and privacy, QoS and end-to-end performance, Web service
standards, Autonomic computing, Service connection technology Grid-based web services
UNIT 4
(8L)
Service-Oriented Semantic Computing: Semantic web Software agent Service discovery
Ontological engineering Service evolutionary approaches, Semantic service selection, Building
SOC application, Service Management
UNIT 5
(8L)
Service-Oriented Challenges & Applications: Security, Challenges & Extensions, Application
E-business and e-commerce M-commerce E-entertainment E-learning E-government E-health
SUGGESTED BOOKS:
1. Munindar P. Singh, Michael N Hunns; Service oriented Computing, Wiley 2005
2. Huang, J.; Kowalczyk, R.; Maamar; Service-Oriented Computing: Agents, Semantics, and
Engineering; Springer 2007.
3. Michael Rosen, Boris Lublinsky, Kevin T. Smith, Marc J. Balcer; Applied Soa: ServiceOriented Architecture And Design Strategies; Wiley India.
UNIT 1
(8L)
Introduction to Lamp, Linux operating system, Apache web server, Mysql database server, PHP scripting, purpose
of using Lamp, Lamp versus other solutions; installing linux, choosing the correct linux, hardware requirements,
installing fedora, pre-installation, type of installation, hard disk partitioning, boot loader selection, network
configuration, firewall configuration, package selection, package installation, bootable disk creation, post
installation setup.
UNIT 2
(8L)
Booting linux, initialization scripts, rc scripts, run level scripts, login process, exploring linux shell, understanding
bash, understanding linux filesystem: /bin, /boot, /dev, /etc, /home, /lib, /lost+found, /mnt, /opt, /proc, /root, /sbin,
Page 59 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
/tmp, /usr, /var; managing users and groups, /etc/passwd, /etc/group, linux passwords, user administration, group
administration, modifying users or groups, managing services, creating disk quotas, starting and stopping system
services, controlling access to services, managing software, source tarballs, source code vs binary packages, RPM
and RPM source packages, performing system backup and recovery, critical data, backup media, backing up your
system, system restoration.
UNIT 3
(8L)
Using TCP/IP, internet protocol, transmission control protocol, user datagram protocol, ports, addressing, configure
address, static IP, DHCP, network cards, hubs, switches, routers, routing switches, bridges, repeaters, kernel as a
firewall, using firewall to increase security, using DNS, DNs operation, /etc/resolv.conf file, /etc/hosts file; disabling
unwanted services, utilizing chkconfig, utilizing ntsysu, purpose of a service, staying up-to-date, using up2date, APT
package management, yum package management, controlling root access, creating firewall rules, monitoring
iptables log, using network monitoring tools: Nmap, Snort, Ping, Traceroute; understanding email, email protocols,
email transport agents, installing MTA, opening firewall ports for email server, monitoring logs, managing virtual
domains.
UNIT 4
(8L)
Apache web server, apache 1.3 vs apache 2.0, new features of apache 2.0, module enhancements, apache 1.3
features, apache 1.3 modules, installing apache web server, removing apache web server RPMs, apache installation
methods, apache directories, apache programs, understanding httpd.conf file, apache virtual host, enabling directory
listings, password protecting web directories, configuring cgi-bin directories, using .htaccess file for configuration;
understanding mysql, flat file vs relational databases, advantages and limitations of mysql, mysql versions, installing
mysql, common configuration directives, mysql server and client, editing configuration files, enhancing security,
mysql administration, performance and replication. purpose of PHP, PHP versions, installing PHP, configuration
options and extensions, compiling and installing PHP, apache configuration to handle PHP, PHP INI file.
UNIT 5
(8L)
Purpose of PHP, PHP versions, installing PHP, configuration options and extensions, compiling and installing PHP,
apache configuration to handle PHP, PHP INI file; setting up apache virtual host, preparing mysql database, testing
apache, PHP and mysql, scripting database connection, scripting data insertion, scripting data extraction and
formatting.
SUGGESTED BOOKS:
1. James Lee, Brent Ware, Open Source Development with LAMP, Addison-Wesley Professional.
2. Jason Gerner, Elizabeth Naramore, Professional LAMP, John Wiley & Sons.
3. Eric Rosebrock, Setting Up LAMP, Sybex Publishers.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 2
(9L)
Pipelining and Memory Hierarchy: Basic and Intermediate Concepts, Instruction Set
Principle; ILP: Basics, Exploiting ILP, Limits on ILP; Linear and Nonlinear Pipeline Processors;
Super Scalar and Super Pipeline Design; Memory Hierarchy Design: Advanced Optimization of
Cache Performance, Memory Technology and Optimization, Cache Coherence and
Synchronization Mechanisms.
UNIT 3
(8L)
Thread and Process Level Parallel Architecture: Introduction to MIMD Architecture,
Multithreaded Architectures, Distributed Memory MIMD Architectures, Shared Memory MIMD
Architecture, Clustering, Instruction Level Data Parallel Architecture, SIMD Architecture, Fine
Grained and Coarse Grained SIMD Architecture, Associative and Neural Architecture, Data
Parallel Pipelined and Systolic Architectures, Vector Architectures.
UNIT 4
(8L)
Parallel Computing model: Sequential model, need of alternative model, parallel computational
models such as PRAM, LMCC, Hypercube, Cube Connected Cycle, Butterfly, Perfect Shuffle
Computers, Tree model, Pyramid model, Fully Connected model, PRAM-CREW, EREW
Models.
UNIT 5
(9L)
Parallel Algorithms: PRAM Algorithms: Parallel Reduction, Prefix Sums, Preorder Tree
Traversal, Merging two Sorted lists; Matrix Multiplication: Row Column Oriented Algorithms,
Block Oriented Algorithms; Parallel Quicksort, Hyper Quicksort; Solving Linear Systems:
Gaussian Elimination, Jacobi Algorithm; Parallel Algorithm Design Strategies.
SUGGESTED BOOKS:
1. Kai Hwang, Advance Computer Architecture, TMH
2. Matthew, Beginning Linux Programming, SPD/WROX
3. Hennessy and Patterson, Computer Architecture: A Quantitative Approach, Elsevier
4. Dezso and Sima, Advanced Computer Architecture, Pearson
5. Quinn, Parallel Computing: Theory & Practice, TMH
6. Quinn, Parallel Programming in C with MPI and Open MP, TMH
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
surface features and atmospheres, resolution, sensors and satellite visual interpretation
techniques, basic elements, converging evidence, interpretation for terrain evaluation, spectral
properties of water bodies, introduction to digital data analysis.
UNIT 2
(6L)
Introduction to Photogrammetry: Principles and types of aerial photographs, stereoscopy, Map
Vs Mosaic, ground control, Parallax measurements for height determinations.
UNIT 3
(8L)
Geographical Information System: Introduction, GIS definition and terminology, components of
GIS, fundamental operations of GIS, A theoretical framework for GIS, Cartography and GIS.
GIS database: spatial and attribute data; conceptual models of spatial information, representation
of geographic information: point, line and area features and topology.
UNIT 4
(10L)
Raster and Vector data, Raster to Vector data conversion, map projection, Remote sensing data
as an input to GIS data., Attribute database: scale and source of inaccuracy; GIS functionality;
data storage and data retrieval through query, generalization, classification, containment search
within a spatial region.
Overlay: arithmetical, logical and conditional overlay, buffers, inters visibility, aggregation;
Network analysis.
UNIT 5
(8L)
Applications of GIS in planning and management of utility lines and in the field of
environmental engineering, geotechnical engineering, transportation engineering and water
resources engineering.
SUGGESTED BOOKS:
1. Lillesand, T.M., and Kieffer, R.M., 1987: Remote Sensing and Image Interpretation, John
Wiley.
2. Jensen, J.R. 2000: Remote Sensing of the Environment: An Earth resource Perspective.
Prentice Hall.
3. Geographic Information Systems: A Management Perspective, by Stan Arnoff, WDL
Publications.
4. Fundamentals of Spatial Information Systems by Robert laurini and Derek Thompson,
Academic Press.
5. Geographical Information Systems, Vo. I and II edited by Paul Longely, M.F. Goodchild,
et.al, John Wiley and Sons, Inc. 1999.
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
(7L)
Mathematical preliminaries, alphabets, strings, languages, states, transition, transition graph,
generalized transition graph, Deterministic Finite Automata, Non-Deterministic Finite Automata,
Non-Deterministic Finite Automata with transitions, minimization of DFA.
UNIT 2
(8L)
Conversions and Equivalence: Equivalence between NFA with and without transitions. NFA to
DFA conversion; Equivalence between two DFAs, Limitations of FSM; Application of finite
automata, Finite Automata with output- Moore & Melay machine and its conversion.
UNIT 3
(10L)
Regular Languages: Regular sets; Regular expressions, Ardens theorem, Construction of finite
Automata for a given regular expression, Pumping lemma for regular sets. Closure properties of
regular sets. Grammar Formalism: right linear and left linear grammars; Equivalence between
regular linear grammar and FA,
Context free grammar; Derivation trees, sentential forms. Ambiguity in context free grammars;
Normal forms: Chomsky normal form and Greibach normal form; Pumping Lemma for Context
Free Languages, Closure property of CFL.
UNIT 4
(7L)
Push Down Automata: Push down automata, definition; Acceptance of CFL, Acceptance by final
state and acceptance by empty state and its equivalence; Equivalence of CFL and PDA;
Introduction to DCFL and DPDA.
UNIT 5
(8L)
Turing Machine: Turing Machine, definition, model, Design of TM, Computable functions
Churchs hypothesis, Types of Turing machines: Universal Turing Machine, Halting problem,
Properties of recursive and recursively enumerable languages, unsolvable decision problem,
undecidability of Post correspondence problem, Church turing Thesis.
SUGGESTED BOOKS
Text Books:
1. Introduction to Automata Theory Language and Computation, Hopcroft H.E. and Ullman J.
D., Pearson Education.
2. Introduction to Languages and the Theory of Computation, J. C. Martin, 3rd edition, Tata
McGraw-Hill.
3. Formal Languages and Automata Theory, C.K.Nagpal, Oxford.
Reference Books:
1. Cohen, Introduction to Computer theory, Wiley India.
2. Elements of Theory of Computation, Lewis H.P. &Papadimitrou C.H. Pearson, PHI.
Page 63 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
UNIT 2
(9L)
UNIT 3
(8L)
UNIT 4
(8L)
Local Replication: Source and Target, Uses of Local Replicas, Data Consistency, Local Replication
Technologies, Restore and Restart Considerations, Creating Multiple Replicas, Management Interface.
Remote Replication: Modes of Remote Replication, Remote Replication Technologies, Network
Infrastructure, Concepts in Practice: EMC SRDF, EMC SAN Copy, and EMC Mirror View.
UNIT 5
(7L)
Storage Security and Management: Securing the Storage Infrastructure, Storage Security Framework,
Risk Triad, Storage Security Domains, Security Implementations in Storage Networking.
Managing the Storage Infrastructure: Monitoring the Storage Infrastructure, Storage Management
Activities, Storage Infrastructure Management Challenges, Developing an Ideal Solution
SUGGESTED BOOKS:
1. Storage Networks Explained -Ulf Troppen, Rainer Erkens, Wolfgang Mller (Wiley India Edition)
2. Information Storage and Management -G. Somasudaram EMC Education Services (Wiley India
Edition)
Page 64 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
(8L)
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and
Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code,
Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System
(IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion:
System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post attack
IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments,
Vulnerability Assessment, Types of Penetration Testing. Risk Management.
UNIT 2
(8L)
Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA,Digital
Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature
Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates. Data Encryption
Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie-Hellman key exchange, elliptic
curve cryptography.
UNIT 3
(8L)
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements,
Authentication Functions, Kerberos. Message Authentication codes , Message Digest Functions, MD5,
SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government
Access to Keys (GAK)
UNIT 4
(8L)
Trojans and Backdoors: Overt and Covert Channels, Working, Types (Remote Access Trojans, DataSending Trojans, Destructive Trojans, Trojans, Proxy Trojans, FTP Trojans, Security Software
Disablers).
Viruses and Worms: Characteristics, Working, Infection Phase, Attack Phase.
Sniffers: Definition, spoofing, Sniffing, Vulnerable Protocols, Types.
Phishing: Methods, Process, Attacks Types (Man-in-the-Middle Attacks, URL Obfuscation Attacks,
Hidden Attacks, Client-side Vulnerabilities, Deceptive Phishing, Malware-Based Phishing, DNS Based
Phishing, Content-Injection Phishing, Search Engine Phishing).
UNIT 5
(8L)
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer
Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals,
Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers),
Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System
Hacking Cycle.
SUGGESTED BOOKS:
1. William Stallings, Cryptography and Network Security: Principles and Practice Pearson
2. Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, Network Security Private communication in a public world TMH
3. Fourozon, Cryptography & Network Security TMH
Page 65 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
UNIT 1
UNIT 2
(8L)
Computer Forensics evidence and capture: Data recovery, evidence collection and data seizure,
duplication and preservation of digital evidence, computer image verification and authentication.
UNIT 3
(8L)
UNIT 4
(8L)
Performing Network Surveillance: Network forensics: Setting up the system, advanced network
surveillance. Attackers goals: ICMP covert channelling, TCP covert channelling, HTTP. Establishing
identity in cyberspace: Investigating IP address-MAC address-Tracing E-mails-E-mail addressUsernames-Nicknames and host names
UNIT 5
(8L)
Forensic tools and report generation: Recovery of Deleted files in windows and Unix, Analyzing
network traffic, sniffers, Ethical Hacking, Hardware forensic tools like Port scanning and vulnerability
assessment tools like Nmap , Netscan etc . Password recovery (tools like John the ripper, L0phtcrack, and
THC-Hydra), Mobile forensic tools and analysis of called data record Template for computer forensic
reports.
SUGGESTED BOOKS
Text Books:
1. Incident Response & Computer Forensics. Mandia, k., Prosise, c., Pepe, m. 2nd edition. Tata-McGraw
Hill, 2003.
2. Guide to Computer Forensics and Investigations, 2nd edition, Bill Nelson, Amelia Phillips, Frank
Enfinger, and Chris Steuart , Thomson Learning
3. John R. Vacca, Computer Forensics, Firewall Media, 2004.
References Books:
1. Digital Evidence and Computer Crime, 2nd Edition , Eoghan Casey , academic Press File System
Forensic Analysis by Brian Carrier , addition Wesley
2. Windows Forensic Analysis DVD Toolkit (Book with DVD-ROM),Harlan Carvey, syngress
Publication
Page 66 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
3 EnCE: The Official EnCase Certified Examiner Study Guide, 2nd Edition , Steve Bunting , sybex
Publication
4 Chad Steel, Windows Forensics, W iley India, 2006.
5 Majid Yar, Cybercrime and Society, Sage Publications, 2006.
6 Robert M Slade, Software Forensics, Tata McGrawHill, 2004.
UNIT 5
(8L)
Linux Hacking Linux Vulnerabilities, Scanning Tools, Scanning Tools, Linux Security Tools,
Advanced Intrusion Detection System, Linux Security Auditing Tool; Evading Firewalls, Intrusion
Page 67 of 68
Annexure 3
B.TECH Information Technology
STUDY EVALUATION SCHEME
Detection Systems, Intrusion Detection Tools, Penetration Testing Penetration Test vs Vulnerability
Test, Reliance on Checklists and Templates, Phases of Penetration Testing, Risk Analysis, Active
Reconnaissance.
SUGGESTED BOOKS:
1. Manish Kumar ; The Secret of Hacking ;Third Edition ; Publisher Leo Impact Security Services.
2. AnkitFadia ; An Unofficial Guide To Ethical Hacking 2nd Edition ; Macmillan India;2006
3. Eric Cole; Hackers Beware: The Ultimate Guide To Network Security; Publisher Sams
4. NiteshDhanjani, Billy Rios, Brett Brett; Hacking: The Next Generation, Publisher Shroff/o'reilly (2009)
5. Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness; Gray Hat Hacking: The Ethical Hacker's Handbook,
Publisher: Mcgraw-hill/osborne Media (Dec 2007)
Page 68 of 68