0% found this document useful (0 votes)
74 views42 pages

Information Technology P.G. Syllabus

The document outlines the syllabus for the M.Sc. Information Technology program. It provides details on eligibility criteria, course objectives, scheme of examination including assessment breakdown and passing standards. The syllabus spans two semesters and covers industry relevant topics like data science, cloud computing, research and practical components.

Uploaded by

Grunesh Karande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views42 pages

Information Technology P.G. Syllabus

The document outlines the syllabus for the M.Sc. Information Technology program. It provides details on eligibility criteria, course objectives, scheme of examination including assessment breakdown and passing standards. The syllabus spans two semesters and covers industry relevant topics like data science, cloud computing, research and practical components.

Uploaded by

Grunesh Karande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

M.Sc.

Part I, Information Technology Syllabus

Janardan Bhagat Shikshan Prasarak Sanstha’s


CHANGU KANA THAKUR
ARTS, COMMERCE & SCIENCE COLLEGE,
NEW PANVEL (AUTONOMOUS)

Re-accredited ‘A+’ Grade by NAAC


‘College with Potential for Excellence’ Status Awarded by UGC
‘Best College Award’ by University of Mumbai

Program: M.Sc.
Revised Syllabus of M.Sc. Information Technology(Part-I)
Choice Based Credit & Grading System (60:40)
w.e.f. Academic Year 2020-2021

1
M.Sc. Part I, Information Technology Syllabus

Sr. No. Heading Particulars

1 Title of Course Information Technology


Eligibility for Admission a) Student securing minimum 45% marks at
the three years B.Sc. (IT) degree in
Information Technology of University of
Mumbai or any recognized university are
eligible.

OR

1. B.E. in IT with minimum 45% marks


2 2. B.E. in Electronics with minimum 45%
marks
3. B.E. in Electronics and Telecomm
minimum 45% marks.
4. B.E. in Computer with minimum 45%
marks
5. B.Sc. in Computer Science with
minimum 45% marks
6. B.Sc. Maths with minimum 45% marks
7. B.Sc. Physics with minimum 45% marks
8. B.Sc. Statistics with minimum 45%
marks
9. B.C.A. with minimum 45% marks

Passing marks 40%


3

4 Ordinances/Regulations (if any) -

5 No. of Semesters Two

6 Level P.G.

7 Pattern Semester (60:40)

8 Status Revised
To be implemented from 2020-2021
9
Academic year

2
M.Sc. Part I, Information Technology Syllabus

Preamble of the Syllabus:


The M.Sc. Information Technology programs are started with an aim to make the learners
employable and impart industry oriented training.

The main objectives of the course are:


 To think analytically, creatively and critically in developing robust, extensible and highly
maintainable technological solutions to simple and complex problems.
 To apply their knowledge and skills to be employed and excel in IT professional careers
and/or to continue their education in IT and/or related post graduate programs.
 To be capable of managing complex IT projects with consideration of the human,
financial and environmental factors.
 To work effectively as a part of a team to achieve a common stated goal.
 To adhere to the highest standards of ethics, including relevant industry and
organizational codes of conduct.
 To communicate effectively with a range of audiences both technical and non-technical.
 To develop an aptitude to engage in continuing professional development.

Objectives of the Course:

The new syllabus is aimed to achieve the objectives. The syllabus spanning three years covers the
industry relevant courses. The students will be ready for the jobs available in different fields like:

 Research in Computing  Big Data Analytics


 Data Science  Modern Networking
 Cloud Computing  Microservices Architecture
 Soft Computing Techniques  Image Processing
 Research in Computing Practical  Big Data Analytics Practical
 Data Science Practical  Modern Networking Practical
 Cloud Computing Practical  Microservices Architecture Practical
 Soft Computing Techniques Practical  Image Processing Practical

Course Outcome: By the end of the course, a student should develop the
Ability:

 Learners are able to use and apply current technical concepts and practices in the core
information technologies.
 Learners are able to apply knowledge of computing and mathematics appropriate to the
discipline.
 Learners are able to analyze a problem, and identify and define the computing
requirements appropriate to its solution.
 Learners are able to effectively integrate IT based solutions into the user environment.
 Learners are able to design, implement, and evaluate a computer based system, process,
component, or program to meet desired needs.

3
M.Sc. Part I, Information Technology Syllabus

Scheme of Examination
A) Internal Assessment: 40 % 40 Marks

Sr. No. Particular Marks


One periodical class test / online examination to be 20
01
conducted in the given semester Marks
One case study/ project with presentation based on curriculum to be
assessed by the teacher concerned
15
02 Presentation 10 Marks Marks
Written Document 05 Marks
Active participation in routine class instructional deliveries and overall
05
03 conduct as a responsible learner, mannerism and articulation and exhibit
Marks
of leadership qualities in organizing related academic activities

Question Paper Pattern for Class Test

Question No. Particular Marks


Match the Column / Fill in the Blanks / Multiple Choice
Q-1 Questions/ Answer in One or Two Lines (Concept based 10 Marks
Questions) ( 1 Marks / 2 Marks each)
Q-2 Answer in Brief (Attempt any Two of the Three)
10 Marks
(5 Marks each)

B) Semester End Examination: 60 % 60 Marks


 Duration: The examination shall be of 2 hours duration.
Theory question paper pattern

1. There shall be five questions each of 12 marks.


2. All questions shall be compulsory with internal options.
3. Question may be subdivided into sub-questions a, b, c… and the allocation of marks
depends on the weightage of the unit.

 Passing Standard
The learners to pass a course shall have to obtain a minimum of 40% marks in aggregate for each
course where the course consists of Internal Assessment and Semester End Examination. The
learners shall obtain minimum of 40% marks (i.e. 16 out of 40) in the Internal Assessment and
40% marks in Semester End Examination (i.e. 24 Out of 60) separately, to pass the course and
minimum of Grade D, wherever applicable, to pass a particular semester. A learner will be said to
have passed the course if the learner passes the Internal Assessment and Semester End
Examination together.

4
M.Sc. Part I, Information Technology Syllabus

Choice Based Credit Grading and Semester System (CBCGS)


M. Sc. Information Technology Syllabus
To be implemented from the Academic year 2020-2021

SEMESTER I

Course Code Course Nomenclature Credits

PIT1RIC Research in Computing 4

PIT1DSC Data Science 4


PIT1CLC Cloud Computing 4
PIT1SCT Soft Computing 4
Techniques
PIT1RCP Research in Computing 2
Practical

PIT1DSP Data Science Practical 2

PIT1CCP Cloud Computing 2


Practical
PIT1SCP Soft Computing 2
Techniques Practical

Total 24

5
M.Sc. Part I, Information Technology Syllabus

Choice Based Credit Grading and Semester System (CBCGS)


M. Sc. Information Technology Syllabus
To be implemented from the Academic year 2020-2021

SEMESTER II

Course Code Course Nomenclature Credits

PIT2BDA Big Data Analytics 4

PIT2MNW Modern Networking 4

PIT2MSA Microservices 4
Architecture
PIT2IGP Image Processing 4
PIT2BDP Big Data Analytics 2
Practical

PIT2MNP Modern Networking 2


Practical

PIT2MAP Microservices 2
Architecture Practical

PIT2IPP Image Processing Practical 2

Total 24

6
M.Sc. Part I, Information Technology Syllabus

Semester I

Course Code
Research in Computing
PIT1RIC
Objectives
 To be able to conduct business research with an understanding of all the latest theories.
 To develop the ability to explore research techniques used for solving any real world or innovate
problem.
Expected Learning Outcomes:
The learner will be able to:
1) Solve real world problems with scientific approach.
2) Develop analytical skills by applying scientific methods.
3) Recognize, understand and apply the language, theory and models of the field of business
Analytics.
4) Foster an ability to critically analyze, synthesize and solve complex unstructured business
problems
5) Understand and critically apply the concepts and methods of business analytic

Introduction:
I Role of Business Research, Information Systems and Knowledge Management, Theory 12
Building, Organization ethics and Issues
Beginning Stages of Research Process:
II Problem definition, Qualitative research tools, Secondary data research 12

Research Methods and Data Collection:


III
Survey research, communicating with respondents, Observation methods, Experimental 12
research
Measurement Concepts, Sampling and Field work:
IV
Levels of Scale measurement, attitude measurement, questionnaire design, sampling 12
designs and procedures, determination of sample size
Data Analysis and Presentation:
V Editing and Coding, Basic Data Analysis, Univariate Statistical Analysis and Bivariate
12
Statistical analysis and differences between two variables. Multivariate Statistical
Analysis.

Course Practical List


Code
PIT1RCP 10 Practical based on above syllabus, covering entire syllabus
1 1A) Write a program for obtaining descriptive statistics of data.
1B) Import data from different data sources (from Excel,csv, mysql,sql server, oracle to R/Python/Excel)
2 2A) Design a survey form for a given case study, collect the primary data and analyze it
2B) Perform suitable analysis of given secondary data
3 3A) Perform testing of hypothesis using one sample t-test.
3B) Perform testing of hypothesis using two sample t-test.
3C) Perform testing of hypothesis using paired t-test
4 4A) Perform testing of hypothesis using chi-squared goodness-of-fit test.
4B) Perform testing of hypothesis using chi-squared Test of Independence
5 5A) Perform testing of hypothesis using Z-test
6 6A) Perform testing of hypothesis using one-way ANOVA.
6B) Perform testing of hypothesis using two-way ANOVA.
6C) Perform testing of hypothesis using multivariate ANOVA (MANOVA).
7 7A) Perform the Random sampling for the given data and analyze it.
7B) Perform the Stratified sampling for the given data and analyze it.
8 8A) Compute different types of correlation.
9 9A) Perform linear regression for prediction.
9B) Perform polynomial regression for prediction.
10 10A) Perform multiple linear regression.
10B) Perform Logistic regression.

Reference Books:
1. Business Research Methods William G.Zikmund, B.J Babin, J.C. Carr,
Cengage 8e 2016 6 Atanu Adhikari, M.Griffin
2. Business Analytics Albright Winston Cengage 5e 2015
3. Research Methods for Business Students Fifth Edition Mark Saunders 2011
4. Multivariate Data Analysis Hair Pearson 7e 2014

8
M.Sc. Part I, Information Technology Syllabus

Course
Code Data Science
PIT1DSC
Objectives:
 Develop in depth understanding of the key technologies in data science and business analytics:
data mining, machine learning, visualization techniques, predictive modeling, and statistics.
 Practice problem analysis and decision-making. Gain practical, hands-on experience with
statistics programming languages and big data tools through coursework and applied research
experiences.
Expected Learning Outcomes
The learners will be able to
1) Recognize and analyze ethical issues in business related to intellectual property, data security,
integrity, and privacy.
2) Apply ethical practices in everyday business activities and make wellreasoned ethical business and
data management decisions.
3) Demonstrate knowledge of statistical data analysis techniques utilized in business decision making.
4) Apply principles of Data Science to the analysis of business problems.
5) Demonstrate use of team work, leadership skills, decision making and organization theory
Data Science Technology Stack: Rapid Information Factory Ecosystem, Data Science
Storage Tools, Data Lake, Data Vault, Data Warehouse Bus Matrix, Data Science
Processing Tools ,Spark, Mesos, Akka , Cassandra, Kafka, Elastic Search, R ,Scala,
Python, MQTT, The Future
I Layered Framework: Definition of Data Science Framework, CrossIndustry Standard
12
Process for Data Mining (CRISP-DM), Homogeneous Ontology for Recursive
Uniform Schema, The Top Layers of a Layered Framework, Layered Framework for
High-Level Data Science and Engineering
Business Layer: Business Layer, Engineering a Practical Business Layer
Utility Layer: Basic Utility Design, Engineering a Practical Utility Layer
Three Management Layers: Operational Management Layer, Processing-Stream
Definition and Management, Audit, Balance, and Control Layer, Balance, Control,
Yoke Solution, Cause-and-Effect, Analysis System, Functional Layer, Data Science
II
Process Retrieve Superstep : Data Lakes, Data Swamps, Training the Trainer Model, 12
Understanding the Business Dynamics of the Data Lake, Actionable Business
Knowledge from Data Lakes, Engineering a Practical Retrieve Superstep, Connecting
to Other Data
Sources.
Assess Superstep: Assess Superstep, Errors, Analysis of Data, Practical Actions,
III Engineering a Practical Assess Superstep, 1
12

Process Superstep : Data Vault, Time-Person-Object-Location-Event Data Vault, Data


Science Process, Data Science,
IV
Transform Superstep : Transform Superstep, Building a Data Warehouse, 12
Transforming
with Data Science, Hypothesis Testing, Overfitting and Underfitting, Precision-Recall,
Cross-Validation Test
M.Sc. Part I, Information Technology Syllabus

Transform Superstep: Univariate Analysis, Bivariate Analysis, Multivariate Analysis,


Linear Regression, Logistic Regression, Clustering Techniques, ANOVA, Principal
Component Analysis (PCA), Decision Trees, Support Vector Machines, Networks,
Clusters, and Grids, Data Mining, Pattern Recognition, Machine Learning, Bagging
12
Data,Random Forests, Computer Vision (CV) , Natural Language Processing (NLP),
Neural Networks, TensorFlow.
Organize and Report Supersteps : Organize Superstep, Report Superstep, Graphics,
Pictures, Showing the Difference

Course Code Practical List


PIT1DSP 10 Practical based on above syllabus, covering entire syllabus
1 Creating Data Model using Cassandra.
2 Conversion from different formats to HOURS format
3 Utilities and Auditing
4 Retrieving Data
5 Assessing Data
6 Processing Data
7 Transforming Data
8 Organising Data
9 Generating Reports
10 Data Visualisation with Power BI

Reference Books:

1. Practical Data Science Andreas François Vermeulen APress 2018

2. Principles of Data Science Sinan Ozdemir PACKT 2016

3. Data Science from Scratch Joel Grus O’Reilly 2015

4. Data Science from Scratch first Principle in python Joel Grus Shroff Publishers 2017

5. Experimental Design in Data science with Least Resources N C Das Shroff Publishers
2018

10
M.Sc. Part I, Information Technology Syllabus

Course Code Cloud Computing


PIT1CLC
Objectives:
 To learn how to use Cloud Services.
 To implement Virtualization.
 To implement Task Scheduling algorithms.
 Apply Map-Reduce concept to applications.
 To build Private Cloud.
 Broadly educate to know the impact of engineering on legal and societal issues involved.

Expected Learning Outcomes:


The learners will be able to
1) Analyze the Cloud computing setup with its vulnerabilities and applications using different
architectures.
2) Design different workflows according to requirements and apply map reduce programming model.
3) Apply and design suitable Virtualization concept, Cloud Resource Management and design scheduling
algorithms.
4) Create combinatorial auctions for cloud resources and design scheduling algorithms for computing
clouds
5) Assess cloud Storage systems and Cloud security, the risks involved, its impact and develop cloud
application

I Introduction to Cloud Computing: 12


Introduction, Historical developments,Building Cloud Computing Environments,
Principles of Parallel and Distributed Computing: Eras of Computing,
Parallel v/s distributed computing, Elements of Parallel Computing, Elements of
distributed computing, Technologies for distributed computing.
Virtualization: Introduction, Characteristics of virtualized environments,
Taxonomy of virtualization techniques, Virtualization and cloud computing,
Pros and cons of virtualization, Technology examples. Logical Network
Perimeter, Virtual Server, Cloud Storage Device, Cloud usage monitor,
Resource replication, Ready-made environment.
Cloud Computing Architecture: Introduction, Fundamental concepts and
models, Roles and boundaries, Cloud Characteristics, Cloud Delivery models,
II
Cloud Deployment models, Economics of the cloud, Open challenges.
Fundamental Cloud Security: Basics, Threat agents, Cloud security threats, 12
additional considerations.
Industrial Platforms and New Developments: Amazon Web Services, Google
App Engine, Microsoft Azure.
Specialized Cloud Mechanisms: Automated Scaling listener, Load Balancer,
SLA monitor, Pay-per-use monitor, Audit monitor, fail over system, Hypervisor,
III
Resource Centre, Multidevice broker, State Management Database.
Cloud Management Mechanisms: Remote administration system, Resource 12
Management System, SLA Management System, Billing Management System,
Cloud Security Mechanisms: Encryption, Hashing, Digital Signature, Public
Key Infrastructure (PKI), Identity and Access Management (IAM), Single Sign-
On (SSO), Cloud-Based Security Groups, Hardened Virtual Server Images

11
M.Sc. Part I, Information Technology Syllabus
Fundamental Cloud Architectures: Workload Distribution Architecture,
Resource Pooling Architecture, Dynamic Scalability Architecture, Elastic
IV
Resource Capacity Architecture, Service Load Balancing Architecture, Cloud
Bursting Architecture, Elastic Disk Provisioning Architecture, Redundant
Storage Architecture.
Advanced Cloud Architectures: Hypervisor Clustering Architecture, Load
12
Balanced Virtual Server Instances Architecture, Non-Disruptive Service
Relocation Architecture, Zero Downtime Architecture, Cloud Balancing
Architecture, Resource Reservation Architecture, Dynamic Failure Detection
and Recovery Architecture, Bare-Metal Provisioning Architecture, Rapid
Provisioning Architecture, Storage Workload Management Architecture
Cloud Delivery Model Considerations: Cloud Delivery Models: The Cloud
Provider Perspective, Cloud Delivery Models: The Cloud Consumer
V
Perspective,
Cost Metrics and Pricing Models: Business Cost Metrics, Cloud Usage Cost 12
Metrics, Cost Management Considerations,
Service Quality Metrics and SLAs: Service Quality Metrics, SLA Guidelines

Course Practical List


Code

PIT1CCP 10 Practical based on above syllabus, covering entire syllabus


1 Write a program for implementing Client Server communication model using TCP.
A) A client server based program using TCP to find if the number entered is prime.
B) A client server TCP based chatting application
2 Write a program for implementing Client Server communication model using UDP.
A) A client server based program using UDP to find if the number entered is even or odd.
B) A client server based program using UDP to find the factorial of the entered number
C) A program to implement simple calculator operations like addition, subtraction, multiplication and
division.
D) A program that finds the square, square root, cube and cube root of the entered number.
3 A multicast Socket example.
4 Write a program to show the object communication using RMI.
A) A RMI based application program to display current date and time.
B) A RMI based application program that converts digits to words, e.g. 123 will be converted to one
two three.
5 Show the implementation of web services.
6 Implement Xen virtualization and manage with Xen Center
7 Implement virtualization using VMWare ESXi Server and managing with vCenter
8 Implement Windows Hyper V virtualization
9 Develop application for Microsoft Azure.
10 Develop application for Google App Engine

Reference Books:

1) Mastering Cloud Computing Foundations and Applications Programming Rajkumar


Buyya, Christian Vecchiola, S. Thamarai Selvi Elsevier - 2013
2) Cloud Computing Concepts, Technology & Architecture Thomas Erl, Zaigham Mahmood,
and Ricardo Puttini Prentice Hall - 2013
3) Distributed and Cloud Computing, From Parallel Processing to the Internet of Things Kai Hwang, Jack
Dongarra, Geoffrey Fox MK Publishers -- 2012VMware and Microsoft Platform in the Virtual
Data center, 2006,Auerbach.
12
Course Code
Soft Computing Techniques
PIT1SCT
Objectives
 Soft computing concepts like fuzzy logic, neural networks and genetic algorithm, where Artificial Intelligence is
mother branch of all.
 All these techniques will be more effective to solve the problem efficiently

Expected Learning Outcomes:

The learners will be able to


1) Identify and describe soft computing techniques and their roles in building intelligent
machines.
2) Recognize the feasibility of applying a soft computing methodology for a particular problem
3) Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems
4) Apply genetic algorithms to combinatorial optimization problems
5) Evaluate and compare solutions by various soft computing approaches for a given problem.

Introduction of soft computing, soft computing vs. hard computing, various types of soft
I computing techniques, Fuzzy Computing, Neural Computing, Genetic Algorithms,
12
Associative Memory, Adaptive Resonance Theory, Classification, Clustering, Bayesian
Networks, Probabilistic reasoning, applications of soft computing.

Artificial Neural Network: Fundamental concept, Evolution of Neural Networks, Basic


Models, McCulloh-Pitts Neuron, Linear Separability, Hebb Network. Supervised Learning
Network: Perceptron Networks, Adaptive Linear Neuron, Multiple Adaptive Linear
II Neurons, Backpropagation Network, Radial Basis Function, Time Delay Network,
12
Functional Link Networks, Tree Neural Network. Associative Memory Networks: Training
algorithm for pattern Association, Autoassociative memory network,
hetroassociative memory network, bi-directional associative memory, Hopfield networks,
iterative autoassociative memory networks, temporal associative memory networks.

UnSupervised Learning Networks: Fixed weight competitive nets, Kohonen self- organizing
feature maps, learning vectors quantization, counter propogation networks, adaptive
resonance theory networks. Special Networks: Simulated annealing, Boltzman machine,
III Gaussian Machine, Cauchy Machine, Probabilistic neural net, cascade
12
correlation network, cognition network, neo-cognition network, cellular neural network,
optical neural network Third Generation Neural Networks: Spiking Neural networks,
convolutional neural networks, deep learning neural networks, extreme learning machine
model.

12
M.Sc. Part I, Information Technology Syllabus
Introduction to Fuzzy Logic, Classical Sets and Fuzzy sets: Classical sets, Fuzzy sets.
Classical Relations and Fuzzy Relations: Cartesian Product of relation, classical relation,
fuzzy relations, tolerance and equivalence relations, non-iterative fuzzy sets. Membership
IV
Function: features of the membership functions, fuzzification, methods of membership 12
value assignments. Defuzzification: Lambda-cuts for fuzzy sets, Lambda-cuts for fuzzy
relations, Defuzzification methods. Fuzzy Arithmetic and Fuzzy measures: fuzzy
arithmetic, fuzzy measures, measures of fuzziness, fuzzy integrals.
Fuzzy Rule base and Approximate reasoning: Fuzzy proportion, formation of rules,
decomposition of rules, aggregation of fuzzy rules, fuzzy reasoning, fuzzy inference
systems, Fuzzy logic control systems, control system design, architecture and operation of
FLC system, FLC system models and applications of FLC System. Genetic Algorithm:
Biological Background, Traditional optimization and search techniques, genetic algorithm
and search space, genetic algorithm vs. traditional algorithms, basic terminologies, simple
V
genetic algorithm, general genetic algorithm, operators in genetic algorithm, stopping 12
condition for genetic algorithm flow, constraints in genetic algorithm, problem solving
using genetic algorithm, the schema theorem, classification of genetic algorithm, Holland
classifier systems, genetic programming, advantages and limitations and applications of
genetic algorithm. Differential Evolution Algorithm, Hybrid soft computing techniques –
neuro – fuzzy hybrid, genetic neuro-hybrid systems, genetic fuzzy hybrid and fuzzy
genetic hybrid systems.

Course Practical List


Code
PIT1SCP 10 Practical based on above syllabus, covering entire syllabus
1 1A) Design a simple linear neural network model.
1B) Calculate the output of neural net using both binaryand bipolar sigmoidal function.
2 2A) Generate AND/NOT function using McCulloch-Pitts neural net.
2B) Generate XOR function using McCulloch-Pittsneural net.
3 3A) Write a program to implement Hebb’s rule.
3B) Write a program to implement of delta rule.
4 4A) Write a program for Back Propagation Algorithm.
4B) Write a program for error Backpropagationalgorithm.
5 5A) Write a program for Hopfield Network.
5B) Write a program for Radial Basis function.
6 6A) Kohonen Self organizing map.
6B) Adaptive resonance theory
7 7A) Write a program for Linear separation.
7B) Write a program for Hopfield network model for associative memory.
8 8A) Membership and Identity Operators | in, not in.
8B) Membership and Identity Operators is, is not.
9 9A) Find ratios using fuzzy logic.
9B) Solve Tipping problem using fuzzy logic
10 10A) Implementation of Simple genetic algorithm.
10B) Create two classes: City and Fitness using Geneticalgorithm.
Reference Books:
1. Artificial Intelligence and Soft Computing Anandita Battacharya Das SPD 3rd 2018
2. Principles of Soft computing S.N.Sivanandam S.N.Deepa Wiley 3 rd 2019
3. Neuro-Fuzzy Computing and Soft J.S.R.Jang, C.T.Sun and E.Mizutani Prentice Hall of India 2004
4. Neural Networks, Fuzzy Logic and Genetic Algorithms: Synthesis & Applications
S.Rajasekaran, G. A. Vijayalakshami Prentice Hall of India 2004
5. Fuzzy Logic with Engineering Applications Timothy J.Ross McGrawHill 1997 15
6. Genetic Algorithms: Search, Optimization and Machine Learning Davis E.Goldberg Addison
Wesley 1989
7. Introduction to AI and Expert System Dan W. Patterson Prentice Hall of India 2009
13
M.Sc. Part I, Information Technology Syllabus

Semester II

Course Code Big Data Analytics


PIT2BDA
Objectives:
 To provide an overview of an exciting growing field of big data analytics.
 To introduce the tools required to manage and analyze big data like Hadoop, NoSql MapReduce.
 To teach the fundamental techniques and principles in achieving big data analytics with scalability
and streaming capability.
 To enable students to have skills that will help them to solve complex realworld problems in for
decision support.

Expected Learning Outcomes:


The learners will be able to

1) Understand the key issues in big data management and its associated applications in
intelligent business and scientific computing.
2) Acquire fundamental enabling techniques and scalable algorithms like Hadoop, Map Reduce and NO
SQL in big data analytics.
3) Interpret business models and scientific computing paradigms, and apply software tools for big data
analytics.
4) Achieve adequate perspectives of big data analytics in various applications like recommender
systems, social media applications etc.

Introduction to Big Data Characteristics of Data, and Big Data


Evolution of Big Data, Definition of Big Data, Challenges with big data, Why Big
data? Data Warehouse environment, Traditional Business Intelligence versus Big
Data. State of Practice in Analytics,
Key roles for New Big Data Ecosystems, Examples of big Data
I 12
Analytics.
Big Data Analytics: Introduction to big data analytics, Classification of
Analytics, Challenges of Big Data, Importance of Big Data, Big Data
Technologies, Data Science, Responsibilities, Soft state eventual
consistency. Data Analytics Life Cycle
Analytical Theory and Methods Clustering and Associated Algorithms, Association
Rules, Apriori Algorithm, Candidate Rules, Applications of Association Rules,
II Validation and Testing, 12
Diagnostics, Regression, Linear Regression, Logistic Regression, Additional Regression
Models.
Analytical Theory and Methods Classification, Decision Trees, Naïve Bayes,
Diagnostics of Classifiers, Additional Classification Methods, Time Series Analysis,
Box Jenkins methodology, ARIMA Model, Additional methods. Text Analysis,
III 12
Steps, Text Analysis Example, Collecting Raw Text, Representing Text, Term
Frequency-Inverse Document Frequency (TFIDF), Categorizing Documents by
Topics, Determining Sentiments

14
M.Sc. Part I, Information Technology Syllabus
Data Product, Building Data Products at Scale with Hadoop Data Science Pipeline
and Hadoop Ecosystem, Operating System for Big Data, Concepts, Hadoop
Architecture, Working with Distributed file system, Working with Distributed
IV 12
Computation, Framework for Python and Hadoop Streaming, Hadoop Streaming,
MapReduce with Python, Advanced MapReduce. In-Memory Computing with Spark,
Spark Basics, Interactive Spark with PySpark, Writing Spark Applications,

V Distributed Analysis and Patterns,Computing with Keys, Design Patterns, Last-Mile


Analytics, Data Mining and Warehousing, Structured Data Queries with Hive, HBase, Data
12
Ingestion, Importing Relational data with Sqoop, Injesting stream data with flume.
Analytics with higher level APIs, Pig, Spark’s higher level APIs..

Course Practical List


Code
PIT2BDP 10 Practical based on above syllabus, covering entire syllabus
1 Install, configure and run Hadoop and HDFS ad explore HDFS
2 Implement word count / frequency programs using MapReduce
3 Implement an MapReduce program that processes a weather dataset
4 Implement an application that stores big data in Hbase / MongoDB and manipulate it using R / Python
5 Implement the program in practical 4 using Pig
6 Configure the Hive and implement the application in Hive.
7 Write a program to illustrate the working of Jaql.
8 Implement the following:
A Implement Decision tree classification techniques
B Implement SVM classification techniques
9 Solve the following:
A REGRESSION MODEL Import a data from web storage. Name the dataset and now do Logistic
Regression to find out relation between variables that are affecting the admission of a student in an
institute based on his or her GRE score, GPA obtained and rank of the student. Also check the model is fit
or not. require (foreign), require(MASS).
B MULTIPLE REGRESSION MODEL Apply multiple regressions, if data have a continuous independent
variable. Apply on above dataset.
10 Solve the Following:
A CLASSIFICATION MODEL a. Install relevant package for classification. b. Choose classifier for
classification problem. c. Evaluate the performance of classifier.
B CLUSTERING MODEL a. Clustering algorithms for unsupervised classification. b. Plot the cluster data
using R visualizations.

Reference Books:

1. Big Data and Analytics: Subhashini Chellappan Seema Acharya, Wiley, First
2. Data Analytics with Hadoop An Introduction for Data Scientists: Benjamin Bengfort
and Jenny Kim, O’Reilly, 2016
3. Big Data and Hadoop: V.K Jain, Khanna Publishing, First, 2018

15
M.Sc. Part I, Information Technology Syllabus

Course Code Modern Networking


PIT2MNW
Objectives
 To understand the state-of-the-art in network protocols, architectures and applications.
 Analyse existing network protocols and networks.
 Develop new protocols in networking
 To understand how networking research is done
 To investigate novel ideas in the area of Networking via term-long research projects.

Expected Learning Outcomes:


The learners will be able to

1) Demonstrate in-depth knowledge in the area of Computer Networking.


2) To demonstrate scholarship of knowledge through performing in a group to identify, formulate and
solve a problem related to Computer Networks
3) Prepare a technical document for the identified Networking System Conducting experiments to
analyze the identified research work in building Computer Networks

Modern Networking Elements of Modern Networking The Networking Ecosystem


,Example Network Architectures,Global Network Architecture,A Typical Network
Hierarchy Ethernet Applications of Ethernet Standards Ethernet Data Rates Wi-Fi
Applications of Wi-Fi,Standards Wi-Fi Data Rates 4G/5G Cellular First Generation
Second Generation, Third Generation Fourth Generation Fifth Generation, Cloud
Computing Cloud Computing Concepts The Benefits of Cloud Computing Cloud
Networking Cloud Storage, Internet of Things Things on the Internet of Things, Evolution
I
Layers of the Internet of Things, Network Convergence Unified Communications, 12
Requirements and Technology Types of Network and Internet Traffic,Elastic
Traffic,Inelastic Traffic, Real-Time Traffic Characteristics Demand: Big Data, Cloud
Computing, and Mobile TrafficBig Data Cloud Computing,,Mobile Traffic,
Requirements: QoS and QoE,,Quality of Service,Quality of Experience, Routing
Characteristics, Packet Forwarding, Congestion Control ,Effects of
Congestion,Congestion Control Techniques, SDN and NFV SoftwareDefined
Networking,Network Functions Virtualization Modern Networking Elements
Software-Defined Networks SDN: Background and Motivation, Evolving Network
II Requirements Demand Is Increasing,Supply Is IncreasingTraffic Patterns Are More
12
ComplexTraditional Network Architectures are Inadequate, The SDN Approach
Requirements SDN Architecture Characteristics of Software12 20 Defined Networking,

16
M.Sc. Part I, Information Technology Syllabus

SDN- and NFV-Related Standards StandardsDeveloping Organizations Industry Consortia


Open Development Initiatives, SDN Data Plane and OpenFlow SDN Data Plane, Data
Plane Functions Data Plane Protocols OpenFlow Logical Network Device Flow Table
Structure Flow Table Pipeline, The Use of Multiple Tables Group Table OpenFlow
Protocol, SDN Control Plane SDN Control Plane Architecture Control Plane Functions,
Southbound Interface Northbound InterfaceRouting, ITU-T Model, OpenDaylight
OpenDaylight Architecture OpenDaylight Helium, REST REST Constraints Example
REST API, Cooperation and Coordination Among Controllers, Centralized Versus
Distributed Controllers, HighAvailability Clusters Federated SDN Networks, Border
Gateway Protocol Routing and QoS Between Domains, Using BGP for QoS Management
IETF SDNi OpenDaylight SNDi SDN Application Plane SDN Application Plane
Architecture Northbound Interface Network Services Abstraction Layer Network
Applications, User Interface, Network Services Abstraction Layer Abstractions in SDN,
Frenetic Traffic Engineering PolicyCop Measurement and Monitoring Security
OpenDaylight DDoS Application Data Center Networking, Big Data over SDN Cloud
Networking over SDN Mobility and Wireless Information-Centric Networking CCNx,
Use of an Abstraction Layer
Virtualization, Network Functions Virtualization: Concepts and Architecture, Background
and Motivation for NFV, Virtual Machines The Virtual Machine Monitor, Architectural
Approaches Container Virtualization, NFV Concepts Simple Example of the Use of NFV,
NFV Principles High-Level NFV Framework, NFV Benefits and Requirements NFV
Benefits, NFV Requirements, NFV Reference Architecture NFV Management and
Orchestration, Reference Points Implementation, NFV Functionality, NFV
Infrastructure,Container Interface,Deployment of NFVI Containers,Logical Structure of
NFVI Domains,ComputeDomain, Hypervisor Domain,Infrastructure Network Domain,
III Virtualized Network Functions, VNF Interfaces,VNFC to VNFC Communication,VNF
12
Scaling, NFV Management and Orchestration, Virtualized Infrastructure Manager,Virtual
Network Function Manager,NFV Orchestrator, Repositories, Element Management,
OSS/BSS, NFV Use Cases Architectural Use Cases, Service-Oriented Use Cases, SDN
and NFV Network Virtualization, Virtual LANs ,The Use of Virtual LANs,Defining
VLANs, Communicating VLAN Membership,IEEE 802.1Q VLAN Standard, Nested
VLANs, OpenFlow VLAN Support, Virtual Private Networks, IPsec VPNs,MPLS VPNs,
Network Virtualization, Simplified Example, Network Virtualization Architecture,
Benefits of Network Virtualization, OpenDaylight’s Virtual Tenant Network, Software-
Defined Infrastructure,SoftwareDefined Storage, SDI Architecture
Defining and Supporting User Needs, Quality of Service, Background, QoS Architectural
Framework, Data Plane, Control Plane, Management Plane, Integrated Services
Architecture, ISA Approach ISA Components, ISA Services, Queuing Discipline,
Differentiated Services, Services, DiffServ Field, DiffServ Configuration and Operation,
Per-Hop Behavior, Default Forwarding PHB, ServiceLevel Agreements, IP Performance
Metrics, OpenFlow QoS Support, Queue Structures, Meters, QoE: User Quality of
Experience, Why QoE?,Online Video Content Delivery, Service Failures Due to
IV
Inadequate QoE Considerations QoE-Related Standardization Projects, Definition of 12
Quality of Experience, Definition of Quality, Definition of Experience Quality Formation
Process, Definition of Quality of Experience, QoE Strategies in Practice, The QoE/QoS
Layered Model Summarizing and Merging the ,QoE/QoS Layers, Factors Influencing
QoE, Measurements of QoE, Subjective Assessment, Objective Assessment, End-User
Device Analytics, Summarizing the QoE Measurement Methods, Applications of QoE
Network Design Implications of QoS and QoE Classification of QoE/ QoS Mapping
Models, Black-Box Media-Based QoS/QoE Mapping Models, GlassBox Parameter-Based

16
M.Sc. Part I, Information Technology Syllabus

QoS/QoE Mapping Models,Gray-Box QoS/QoE Mapping Models, Tips for QoS/QoE


Mapping Model Selection,IPOriented Parameter-Based QoS/QoE Mapping
Models,Network Layer QoE/QoS Mapping Models for Video Services, Application Layer
QoE/QoS Mapping Models for Video Services Actionable QoE over IP-Based Networks,
The System-Oriented Actionable QoE Solution, The Service-Oriented Actionable QoE
Solution, QoE Versus QoS Service Monitoring, QoS Monitoring Solutions, QoE
Monitoring Solutions, QoE-Based Network and Service Management, QoE-Based
Management of VoIP Calls, QoE-Based Host-Centric Vertical Handover, QoE-Based
Network-Centric Vertical Handover
Modern Network Architecture: Clouds and Fog, Cloud Computing, Basic Concepts,
Cloud Services, Software as a Service, Platform as a Service, Infrastructure as a Service,
Other Cloud Services, XaaS, Cloud Deployment Models, Public Cloud Private Cloud
Community Cloud, Hybrid Cloud, Cloud Architecture, NIST Cloud Computing Reference
Architecture,ITU-T Cloud Computing Reference Architecture, SDN and NFV, Service
Provider Perspective Private Cloud Perspective, ITU-T Cloud Computing Functional
Reference Architecture, The Internet of Things: Components The IoT Era Begins, The
Scope of the Internet of Things Components of IoT-Enabled Things, Sensors, Actuators,
V
Microcontrollers, Transceivers, RFID, The Internet of Things: Architecture and 12
Implementation, IoT Architecture,ITU-T IoT Reference Model, IoT World Forum
Reference Model, IoT Implementation, IoTivity, Cisco IoT System, ioBridge, Security
Security Requirements, SDN Security Threats to SDN, SoftwareDefined Security, NFV
Security, Attack Surfaces, ETSI Security Perspective, Security Techniques, Cloud
Security, Security Issues and Concerns, Cloud Security Risks and Countermeasures,
DataProtection in the Cloud, Cloud Securityas a Service, Addressing Cloud Computer
Security Concerns, IoT Security, The Patching Vulnerability, IoT Security and Privacy
Requirements Defined by ITU-TAn IoT Security Framework, Conclusion

Course Practical List


Code
PIT2MNP 10 Practical based on above syllabus, covering entire syllabus
1 Configure IP SLA Tracking and Path Control Topology
2 Using the AS_PATH Attribute
3 Configuring IBGP and EBGP Sessions, Local Preference, and MED
4 Secure the Management Plane
5 Configure and Verify Path Control Using PBR
6 IP Service Level Agreements and Remote SPAN in a Campus Environment
7 Inter-VLAN Routing
8 Simulating MPLS environment
9 Simulating VRF
10 Simulating SDN with • OpenDaylight SDN Controller with the Mininet Network Emulator • OFNet SDN
network emulator
11 Simulating OpenFlow Using MININET

Reference Books:

1. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud William
Stallings AddisonWesley
2. Network Functions Virtualization (NFV) with a Touch of SDN Rajendra Chayapathi
Syed Farrukh Hassan AddisonWesley

17
M.Sc. Part I, Information Technology Syllabus

Course Code
Microservice Architecture
PIT2MSA
Objectives
 Gain a thorough understanding of the philosophy and architecture of Web applications using ASP.NET
Core MVC;
 Gain a practical understanding of.NET Core;
 Acquire a working knowledge of Web application development using ASP.NET Core MVC 6 and
Visual Studio Persist data with XML Serialization and ADO.NET with SQL Server Create HTTP
services using ASP.NET Core Web API;
 Deploy ASP.NET Core MVC applications to the Windows Azure cloud.

Expected Learning Outcomes:


The learners will be able to

1) Develop web applications using Model View Control. Create MVC Models and write code that
implements business logic within Model methods, properties, and events.
2) Create Views in an MVC application that display and edit data and interact with Models and
Controllers..
3) Gaining a thorough understanding of the philosophy and architecture of .NET
4) Core Understanding packages, met packages and frameworks
5) Acquiring a working knowledge of the .NET programming model

Microservices: Understanding Microservices, Adopting Microservices, The Microservices


I Way. Microservices Value Proposition: Deriving Business Value, defining a Goal-
Oriented, Layered Approach, Applying the Goal-Oriented, Layered Approach. Designing 12
Microservice Systems: The Systems Approach to Microservices, A Microservices Design
Process, Establishing a Foundation: Goals and Principles, Platforms, Culture.
Service Design: Microservice Boundaries, API design for Microservices, Data and
Microservices, Distributed Transactions and Sagas, Asynchronous Message-Passing and
II Microservices, dealing with Dependencies, System Design and Operations: Independent
Deployability, More Servers, Docker and Microservices, Role of Service Discovery, Need 12
for an API Gateway, Monitoring and Alerting. Adopting Microservices in Practice:
Solution Architecture Guidance, Organizational Guidance, Culture Guidance, Tools and
Process Guidance, Services Guidance.
Building Microservices with ASP.NET Core: Introduction, Installing .NET Core, Building
a Console App, Building ASP.NET Core App. Delivering Continuously: Introduction to
III Docker, Continuous integration with Wercker, Continuous Integration with Circle CI,
Deploying to Dicker Hub. Building Microservice with ASP.NET Core: Microservice, 12
Team Service, API First Development, Test First Controller, Creating a CI pipeline,
Integration Testing, Running the team service Docker Image. Backing Services:
Microservices Ecosystems, Building the location Service, Enhancing Team Service.
Creating Data Service: Choosing a Data Store, Building a Postgres Repository, Databases
are Backing Services, Integration Testing Real Repositories, Exercise the Data
IV Service.Event Sourcing and CQRS: Event Sourcing, CQRS pattern, Event Sourcing and
CQRS, Running the samples. Building an ASP.NET Core Web Application: ASP.NET 12
Core Basics, Building Cloud-Native Web Applications. Service Discovery: Cloud Native
Factors, Netflix Eureka, Discovering and Advertising ASP.NET Core Services. DNS and
Platform Supported Discovery.
Configuring Microservice Ecosystems: Using Environment Variables with Docker, Using
V Spring Cloud Config Server, Configuring Microservices with etcd, Securing Applications
and Microservices: Security in the Cloud, Securing ASP.NET Core Web Apps, Securing 12
ASP.NET Core Microservices. Building Real-Time Apps and Services: Real-Time
Applications Defined, Websockets in the Cloud, Using a Cloud Messaging Provider,
M.Sc. Part II, Information Technology Syllabus

Building the Proximity Monitor. Putting It All Together: Identifying and Fixing Anti-
Patterns, Continuing the Debate over Composite Microservices, The Future.

Course Practical List


Code
PIT2MAP 10 Practical based on above syllabus, covering entire syllabus
1 Building APT.NET Core MVC Application
2 Building ASP.NET Core REST API.
3 Working with Docker, Docker Commands, Docker Images and Containers.
4 Installing software packages on Docker, Working with Docker Volumes and Networks.
5 Working with Docker Swarm.
6 Working with Circle CI for continuous integration.
7 Creating Microservice with ASP.NET Core.
8 Working with Kubernetes.
9 Creating Backing Service with ASP.NET Core.
10 Building real-time Microservice with ASP.NET Core.

Reference Books:

1) Building Microservices with ASP.NET Core ,Kevin Hoffman ,O’Reilly


2 ) Building Microservices: Designing Fine-Grained Systems, Sam Newman ,O’Reilly
3) Production-ready Microservices, Susan J. Fowler, O’Reilly
M.Sc. Part II, Information Technology Syllabus

Course Code Image Processing


PIT2IGP
Objectives:
 Review the fundamental concepts of a digital image processing system.
 Analyze images in the frequency domain using various transforms.
 Evaluate the techniques for image enhancement and image restoration.
 Categorize various compression techniques.
 Interpret Image compression standards. Interpret image segmentation and representation techniques.

Expected Learning Outcomes:


The learners will be able to

1) Understand the relevant aspects of digital image representation and their practical implications.
2) Have the ability to design pointwise intensity transformations to meet stated specifications.
3) Understand 2-D convolution, the 2-D DFT, and have the abitilty to design systems using these
concepts.
4) Have a command of basic image restoration techniques.
5) Understand the role of alternative color spaces, and the design requirements leading to choices of
color space.
.
Introduction: Digital Image Processing, Origins of Digital Image Processing,
Applications and Examples of Digital Image Processing, Fundamental Steps in Digital
Image Processing, Components of an Image Processing System, Digital Image
Fundamentals: Elements of Visual Perception, Light and the Electromagnetic Spectrum,
Image Sensing and Acquisition, Image Sampling and Quantization, Basic Relationships
I Between Pixels, Basic Mathematical Tools Used in Digital Image Processing, Intensity 12
Transformations and Spatial Filtering: Basics, Basic Intensity Transformation Functions,
Basic Intensity Transformation Functions, Histogram Processing, Fundamentals of
Spatial Filtering, Smoothing (Lowpass) Spatial Filters, Sharpening (Highpass) Spatial
Filters, Highpass, Bandreject, and Bandpass Filters from Lowpass Filters, Combining
Spatial Enhancement Methods, Using Fuzzy Techniques for Intensity Transformations
and Spatial Filtering
Filtering in the Frequency Domain: Background, Preliminary Concepts, Sampling and
II the Fourier Transform of Sampled Functions, The Discrete Fourier Transform of One 12
Variable, Extensions to Functions of Two Variables, Properties of the 2-D DFT and
IDFT, Basics of Filtering in the Frequency Domain, Image Smoothing Using Lowpass

Frequency Domain Filters, Image Sharpening Using Highpass Filters, Selective


Filtering, Fast Fourier Transform Image Restoration and Reconstruction: A Model of the
Image Degradation/Restoration Process, Noise Models, Restoration in the Presence of
Noise Only ---- Spatial Filtering, Periodic Noise Reduction Using Frequency Domain
Filtering, Linear, Position-Invariant Degradations, Estimating the Degradation Function,
Inverse Filtering, Minimum Mean Square Error (Wiener) Filtering, Constrained Least
Squares Filtering, Geometric Mean Filter, Image Reconstruction from Projections
M.Sc. Part II, Information Technology Syllabus
Wavelet and Other Image Transforms: Preliminaries, Matrix-based Transforms,
Correlation, Basis Functions in the Time-Frequency Plane, Basis Images, Fourier-
Related Transforms, Walsh-Hadamard Transforms, Slant Transform, Haar Transform,
Wavelet Transforms Color Image Processing: Color Fundamentals, Color Models,
III Pseudocolor Image Processing, Full-Color Image Processing, Color Transformations, 12
Color Image Smoothing and Sharpening, Using Color in Image Segmentation, Noise in
Color Images, Color Image Compression. Image Compression and Watermarking:
Fundamentals, Huffman Coding, Golomb Coding, Arithmetic Coding, LZW Coding,
Run-length Coding, Symbol-based Coding, 8 Bit-plane Coding, Block Transform
Coding, Predictive Coding, Wavelet Coding, Digital Image Watermarking,
Morphological Image Processing: Preliminaries, Erosion and Dilation, Opening and
Closing, The Hit-or-Miss Transform, Morphological Algorithms, Morphological
Reconstruction¸ Morphological Operations on Binary Images, Grayscale Morphology
IV Image Segmentation I: Edge Detection, Thresholding, and Region Detection: 12
Fundamentals, Thresholding, Segmentation by Region Growing and by Region Splitting
and Merging, Region Segmentation Using Clustering and Superpixels, Region
Segmentation Using Graph Cuts, Segmentation Using Morphological Watersheds, Use
of Motion in Segmentation
Image Segmentation II: Active Contours: Snakes and Level Sets: Background, Image
Segmentation Using Snakes, Segmentation Using Level Sets. Feature Extraction:
V Background, Boundary Preprocessing, Boundary Feature Descriptors, Region Feature 12
Descriptors, Principal Components as Feature Descriptors, Whole-Image Features,
Scale-Invariant Feature Transform (SIFT)
Course Practical List
Code
PIT2IPP 10 Practical based on above syllabus, covering entire syllabus
1 a Program to calculate number of samples required for an image.
b Program to study the effects of reducing the spatial resolution of a digital image.
c Program to study the effects of varying the number of intensity levels in a digital image
d Program to perform image averaging (image addition) for noise reduction.
e Program to compare images using subtraction for enhancing the difference between images.

f Image Registration
2 Intensity transformation and Spatial Filtering
IMAGE ENHANCEMENT
a Basic Intensity Transformation functions
i. Program to perform Image negation
ii. Program to perform threshold on an image.
iii. Program to perform Log transformation
iv. Power-law transformations
v. Piecewise linear transformations
a. Contrast Stretching
b. Gray-level slicing with and without background.
c. Bit-plane slicing
b Program to plot the histogram of an image and categorise 2. Program to apply histogram equalization.
c Write a program to perform convolution and correlation.
d Write a program to apply smoothing and sharpening filters on grayscale and color images
a) Low Pass
b) High Pass
Note: Use all kernels mentioned in the reference book
3 Filtering in Frequency Domain
M.Sc. Part II, Information Technology Syllabus
a) Program to apply Discrete Fourier Transform on an image
b) Program to apply Low pass and High pass filters in frequency domain
c) Program to apply Laplacian filter in frequency domain
d) Note: All other filters can be applied, studied and compared with filters in spatial domain.
e) Program for high frequency emphasis filtering, high boost and homomorphic filtering.
4 Image Denoising
i. Program to denoise using spatial mean, median and adaptive mean filtering
ii. ii. Program for Image deblurring using inverse, Weiner filters
5 Color Image Processing
i. Program to read a color image and segment into RGB planes , histogram of color image
ii. Program for converting from one color model to another model iii. Program to apply false
colouring(pseudo) on a gray scale image
6 Fourier Related Transforms
Program to compute Discrete Cosine Transforms, Walsh -Hadamard Transforms, Haar Transform ,
Wavelet
7 Image compression
Program to apply compression and decompression algorithm on an image (Arithmetic, Huffman and
LZW coding techniques.
8 Morphological Image Processing
i. Program to apply erosion, dilation, opening, closing
ii. Program for detecting boundary of an image
iii. Program to apply Hit-or-Miss transform
iv. Program to apply morphological gradient on an image
v. Program to apply Top-Hat/Bottom-hat Transformations
9 Image Segmentation
i. Program for Edge detection using
a. Sobel, Prewitt, Marr-Hildreth and Canny
ii. Illustrate Watershed segmentation algorithm
iii. Any more to be included(to be consulted)
10 Feature Extraction
i. Apply Principal components for image description
ii. Apply Harris-Stephens corner detector algorithm

Reference Books:

1) Digital Image Processing, Gonzalez and Woods, Pearson/Prentice Hall

2) Fundamentals of Digital Image Processing, A K. Jain, PHI

3) The Image Processing Handbook, J. C. Russ, CRC


M.Sc. Part II, Information Technology Syllabus

Janardan Bhagat Shikshan Prasarak Sanstha’s


CHANGU KANA THAKUR
ARTS, COMMERCE & SCIENCE COLLEGE,
NEW PANVEL (AUTONOMOUS)

Re-accredited ‘A+’ Grade by NAAC


‘College with Potential for Excellence’ Status Awarded by UGC
‘Best College Award’ by University of Mumbai

Program: M.Sc
Revised Syllabus of M.Sc. Information Technology
Choice Based Credit & Grading System (60:40)
w.e.f. Academic Year 2019-2020

1
M.Sc. Part II, Information Technology Syllabus

Sr. No. Heading Particulars

1 Title of Course Information Technology


Eligibility for Admission a) Semester III

A learner shall be allowed to keep term for


Semester III notwithstanding that he / she
may not have appeared for Semester I and /
or Semester II Examination/s or failed in
one or more courses at Semester I and / or
Semester II.

b) Semester IV

1. A learner shall be allowed to keep term


2 for Semester IV irrespective of number of
courses of failure in Semester III. However
learner has to pass each course of Semester
I and Semester II in order to appear for
Semester IV.

2. A learner can appear for Semester IV


Examination but the result of Semester IV
shall be kept in abeyance until the learner
passes each of Semester I, Semester II and
Semester III.

Passing marks 40%


3

4 Ordinances/Regulations (if any)

5 No. of Semesters Two

6 Level P.G.

7 Pattern Semester (60:40)

8 Status Revised
To be implemented from 2020-2021
9
Academic year

2
M.Sc. Part II, Information Technology Syllabus

Preamble of the Syllabus:


 The subject of Information Technology is one of the important application tool which can
be applied to different areas in teaching, training and learning which is considered to be
important in terms of human resource development, Information Processing and Decision
Making which enhances the development of a Nation.
 Information Technology as an application science is studied to be applied for other areas,
right from Mathematics to other basic sciences, applied sciences, social sciences and each
and every aspect of human life.
 The main aim of the course is to focus on the technological tools and concepts available
and how they can be applied to the developmental processes.
 The various concepts include Simulation, Mobile Computing, Networking, Aritificial
Intelligence, Distributed Computing, Multimedia, Data warehousing, Data mining,
Digital Image Processing, Digital Signal Processing, Speech Recognition, Software
Architecture and so on.
 Information Technology Experts are very much required right from academic institutions,
Research and Development to Industries both Public and Private Sectors.The course has
been divided in to four semesters. The programme has a total 16 theory papers, and four
in each semester.
 The programme is designed to provide students a focused elaborate training in
Information Technology concepts and tools as well as exposing them to the advanced
fields. In addition to theoretical knowledge, significant emphasis has been given to
provide hands on experience to the students in the frontier areas of Information
Technology.
 A multidisciplinary approach has been employed to provide best leverage to students to
enable them move into advanced and frontier areas of interdisciplinary research in the
future.

Objectives of the Course:

The new syllabus is aimed to achieve the objectives. The syllabus spanning two years covers the
industry relevant courses. The students will be ready for the jobs available in different fields like:

 Embedded Systems Programming  Database Analyst


 Software Testing  Virtualization
 Networking  IT Service Desk
 Cloud Management  Security
 Image Processing  Mobile Computing
 Artificial Intelligence  Ethical hacking

Course Outcome: By the end of the course, a student should develop the
Ability:

 Learners are able to get the knowledge and ability to develop creative solutions on the basis
of technology-oriented syllabus.
 Learners are able to develop skills to learn new technology.

3
M.Sc. Part II, Information Technology Syllabus

 Learners are able to apply theory and software development concepts to construct
computing-based solutions.
 Learners are able to Design and develop computer programs/computer-based systems in
the areas related to algorithms, networking, cloud computing, Artificial Intelligence, Mobile
applications, etc.

Scheme of Examination
A) Internal Assessment: 40 % 40 Marks

Sr. No. Particular Marks


One periodical class test / online examination to be 20
01
conducted in the given semester Marks
One case study/ project with presentation based on curriculum to be
assessed by the teacher concerned
15
02 Presentation 10 Marks Marks
Written Document 05 Marks
Active participation in routine class instructional deliveries and overall
05
03 conduct as a responsible learner, mannerism and articulation and exhibit
Marks
of leadership qualities in organizing related academic activities

Question Paper Pattern for Class Test

Question No. Particular Marks


Match the Column / Fill in the Blanks / Multiple Choice
Q-1 Questions/ Answer in One or Two Lines (Concept based 10 Marks
Questions) ( 1 Marks / 2 Marks each)
Q-2 Answer in Brief (Attempt any Two of the Three)
10 Marks
(5 Marks each)

B) Semester End Examination: 60 % 60 Marks


 Duration: The examination shall be of 2 hours duration.
Theory question paper pattern

1. There shall be five questions each of 12 marks.


2. All questions shall be compulsory with internal options.
3. Question may be subdivided into sub-questions a, b, c… and the allocation of marks
depends on the weightage of the unit.

 Passing Standard
The learners to pass a course shall have to obtain a minimum of 40% marks in aggregate for each

4
M.Sc. Part II, Information Technology Syllabus

course where the course consists of Internal Assessment and Semester End Examination. The
learners shall obtain minimum of 40% marks (i.e. 16 out of 40) in the Internal Assessment and
40% marks in Semester End Examination (i.e. 24 Out of 60) separately, to pass the course and
minimum of Grade D, wherever applicable, to pass a particular semester. A learner will be said to
have passed the course if the learner passes the Internal Assessment and Semester End
Examination together.
Choice Based Credit Grading and Semester System (CBCGS)
M. Sc. Information Technology Syllabus
To be implemented from the Academic year 2019-2020
SEMESTER III
Course Course Lectures Cred Practical Hours Credits Total
Code Nomenclature its Course Credits
PIT3EMS Embedded 60 4 PIT3ESP 60 2 6
Systems
PIT3ISM Information 60 4 PIT3ISP 60 2 6
Security
Management
Elective 1 60 4 Elective 1 60 2 6
PIT3VIR Virtualization PIT3VIP
PIT3ANN Artificial Neural PIT3ANP
Networks
Elective 2 60 4 Elective 2 60 2 6
PIT3DIP Digital Image PIT3DPP
Processing
PIT3ETH Ethical Hacking PIT3EHP
Total 24

Choice Based Credit Grading and Semester System (CBCGS)


M. Sc. Information Technology Syllabus
To be implemented from the Academic year 2019-2020
SEMESTER IV

Course Course Lectures Cred Practical Hours Credits Total


Code Nomenclature its Course Credits
PIT4ARI Artificial 60 4 4
Intelligence
PIT4IIM IT Infrastructure 60 4 4
Management
Elective 1 60 4 Elective 1 60 2 6
PIT4INS Intelligent PIT4ISP
Systems
PIT4RTE Real Time PIT4RTP
Embedded

5
M.Sc. Part II, Information Technology Syllabus

Systems
PIT4COF Computer PIT4CFP
Forensics
Elective 2 60 4 Elective 2 60 2 6
PIT4DEC Design of PIT4DEP
Embedded
Control Systems
PIT4AIP Advanced Image PIT4APP
Processing
PIT4CLM Cloud PIT4CMP
Management
PIT4PRO Project 2 PIT4PRP 2 4
Total 24

Semester III

Course Code
Embedded system
PIT3EMS
Objectives
The objective of this course is to have Skills in analysis, organisation and planning in the fields of electronics,
information technology and embedded systems. Skills in oral and written communication of analysis,
development and evaluation in the field of embedded systems.
Expected Learning Outcomes:
1) To be able to design, describe, validate and optimize embedded electronic systems in
different industrial application areas.
2) To be able to define hardware and software communication and control requirements.
3) To acquire knowledge of and be able to use tools for the development and debugging of
programs implemented on microcontrollers and DSPs.
4) To design electronic circuits for the processing of information in communications and
control systems.
5) To acquire knowledge of sensor properties and apply these in the design of Electronic
systems which integrate measurement and actuation in different industrial production
contexts.
Introduction
What is an Embedded System, Embedded System Vs, General Computing System.
The Typical Embedded System
Core of Embedded System, Memory, Sensors and Actuators, Communication Interface,
I
Embedded Firmware. 12
Characteristic and quality attributes of Embedded System
Characteristics of an Embedded System, Quality Attributes of Embedded System.
Embedded product development life cycle
What is EDLC, Why EDLC? Objectives of EDLC, Different Phases of EDLC.
Hardware Software Co-design and Program Modelling
Fundamental Issues in Hardware Software Co-Design, Computational Models in
II
Embedded Design, Introduction to Unified Modelling Language (UML), Hardware 12
Software Trade-offs.
Embedded Hardware design and development

6
M.Sc. Part II, Information Technology Syllabus

Analog Electronic Components, Digital Electronic Components, Electronic design


Automation (EDA) Tools, The PCB Layout design.
Embedded Firmware design and development
Embedded Firmware Design Approaches, Embedded Firmware Development Languages
Real Time Operating System(RTOS)
Operating System Basics, Types of Operating Systems, Device Drivers, How to choose an
RTOS
Memories and Memory Subsystem
Introduction, Classifying Memory,A general Memory Interface, ROM Overview, Static
III RAM Overview, Dynamic RAM Overview, Chip Organization, A SRAM Design, A
12
DRAM Design, The DRAM Memory Interface, The Memory Map, Memory Subsystem
Architecture, Basic Concepts of Caching, Design a cache system, Dynamic Memory
Allocation, Testing Memories.
Programming Concept and Embedded Programming in C/C++ and Java
Software programming in Assembly Language (ALP) and in High-level Language ‘C’., C
IV program Elements: Header and Source Files and Pre-processor Directives, Program
12
Elements: Macros and Functions, Program Elements: Types, Data Structures, Modifiers,
Statements, Loops and Pointers, Object-Oriented Programming, Embedded Programming
in C++, Embedded Programming in Java.
Trends in the Embedded Industry
Processor trends in Embedded System, Embedded OS Trends, Development Language
V
Trends, Introduction of PIC Family of Microcontrollers, Introduction of ARM Family of 12
Microcontrollers,
Introduction of AVR Family of Microcontrollers.

Course Practical List


Code
1 (Compulsory) Study of hardware components
1. 8051 Microcontroller
2. Resistors (color code, types)
3. Capacitors
4. ADC, DAC
5. Operational Amplifiers
6. Transistors, Diode, Crystal Oscillator
7. Types of Relays
PIT3ESP 8. Sensors
9. Actuator
10. Types of connectors
2 WAP to blink an LED
3 WAP block transfer of data
4 WAP to serial data interface
5 WAP for the keypad and LCD interface
6 Implement mouse driver program using MSDOS interrupt
7 WAP to implement ADC0808 with 8051 microcontroller
8 WAP to simulate elevator functions
9 WAP to interface stepper motor controller
10 WAP to simulate traffic signals

Reference Books:

7
M.Sc. Part II, Information Technology Syllabus

1) Introduction to embedded systems, Shibu K. V, 2nd Edition, Tata McGraw-Hill


2) Embedded Systems Architecture, Programming and Design, Raj Kamal, 2nd
Edition, Tata McGraw-Hill.
3) Embedded Systems: A Contemporary Design Tool, James K. Peckol, 1st edition.

Course
Code Information Security Management
PIT3ISM
Objectives: Information Security Management is the study of identification of an organization's assets
(including people, buildings, machines, systems and information assets), followed by the development,
documentation, and implementation of policies and procedures for protecting these assets.
Expected Learning Outcomes
1) Risk management will make the students able to identify potential problems before they occur so that
risk-handling activities may be planned and invoked as needed across the life of the product or project
to mitigate adverse impacts on achieving objectives.
2) Students will be able to provide a basic level of security, independent of external requirements so that
they can maintain the uninterrupted operation of the IT organisation.
3) It will make learners aware of key management which is the process of administering or managing
cryptographic keys for a cryptosystem.
4) It will make learners aware of the risks or threats to the success of the plan and test the controls in
place to determine whether or not those risks are acceptable.
5) Students will know the basic process of identifying, preserving, analyzing and presenting the digital
evidence in such a manner that the evidences are legally acceptable

Security Risk Assessment and Management: Introduction to Security Risk


I Management. Reactive and proactive approaches to risk management. Risk assessment,
12
quantitative and qualitative approaches and asset classification - Security Assurance
Approaches: Introduction to OCTAVE and COBIT approaches.
Security Management of IT Systems: Network security management. Firewalls, IDS
and IPSconfiguration management. Web and wireless security management. General
server configuration guidelines and maintenance. Information Security Management
II
Information classification. Access control models, role-based and lattice models. 12
Mandatory and discretionary access controls. Linux and Windows case studies. Technical
controls, for authentication and confidentiality. Password management and key
management for users. Case study: Kerberos.
Key Management in Organizations: Public-key Infrastructure. PKI 12
Applications, secure email case study(S/ MIME or PGP). Issues in public-key
III
certificate issue and lifecycle management - Management of IT Security 12
Infrastructure; Computer security log management, malware handling and
vulnerability management programs. Specifying and enforcing security policies.
Auditing and Business continuity Planning: Introduction to information security audit
IV
and principles of audit. Business continuity planning and disaster recovery. Case study: 12
9/11 tragedy. Backup and recovery techniques for applications and storage.
Computer forensics: techniques and tools. Audit Tools: NESSUS and NMAP.
V Information Security Standards and Compliance: Overview of ISO 17799 Standard. 12
Legal and Ethical issues.

8
M.Sc. Part II, Information Technology Syllabus

Course Practical List


Code
1. Working with Sniffers for monitoring network communication (Ethereal)
2. Using open SSL for web server - browser communication
3. Using GNU PGP
4. Performance evaluation of various cryptographic algorithms
5. Using IP TABLES on Linux and setting the filtering rules
6. Configuring S/MIME for e-mail communication
PIT3ISP 7. Understanding the buffer overflow and format string attacks
8. Using NMAP for ports monitoring
9. Implementation of proxy based security protocols in C or C++ with features like
confidentiality, integrity and authentication
10. Socket programming
11. Exposure to Client Server concept using TCP/IP, blowfish, Pretty Good Privacy.

Reference Books:

1) IT Security and Risk Management(Main reference) ,Slay, J. and Koronios, A.,Wiley


2) Incident Response and Computer forensics., Chris Prosise and Kevin Mandia, McGraw-
Hill

3) Information Systems Security-Security Management, Metrics, Frameworks and Best


Practices, Nina Godbole Wiley
4) Information Security Policies, Procedures, and Standards: Guidelines for Effective
Information Security Management (Paperback) 1st edition Auerbach, 2001.

9
M.Sc. Part II, Information Technology Syllabus

Course Code Virtualization


PIT3VIR
Objectives: Objective of this course is to make learner aware of digital dominance, businesses and
individuals are now shifting their focus on working virtually instead of physically and Keeping up with the
trends in virtualization

Expected Learning Outcomes:


1. Learners should be able to understand Use virtual machines of public cloud platform.
2. Learners should be able to understand Virtual machines and Implementation of virtual machines.
3. Learners should be able to understand virtualization and various ways of using virtualization.
4. Learners should be able to understand Implementation of private cloud platform using virtualization.
5. Learners should be able to understand Blade servers.

OVERVIEW OF VIRTUALIZATION
Basics of Virtualization - Virtualization Types – Desktop Virtualization –
I
NetworkVirtualization – Server and Machine Virtualization – Storage
Virtualization – System-level or Operating Virtualization – Application
12
Virtualization- Virtualization Advantages – Virtual Machine Basics – Taxonomy
of Virtual machines - Process Virtual Machines – System Virtual Machines –
Hypervisor - Key Concepts
SERVER CONSOLIDATION
Hardware Virtualization – Virtual Hardware Overview - Sever Virtualization –
II 12
Physicaland Logical Partitioning - Types of Server Virtualization – Business
cases for SeverVirtualization – Uses of Virtual server Consolidation – Planning
for Development-Selecting server Virtualization Platform
NETWORK VIRTUALIZATION
Design of Scalable Enterprise Networks - Virtualizing the Campus
III
WAN Design – WAN Architecture - WAN Virtualization - Virtual Enterprise
Transport Virtualization– VLANs and Scalability - Theory Network Device
Virtualization Layer 2 - VLANs Layer 3 VRF 12
Instances Layer 2 - VFIs Virtual Firewall Contexts Network Device
Virtualization - Data-Path Virtualization Layer 2: 802.1q
- Trunking Generic Routing Encapsulation - IPsecL2TPv3 Label Switched Paths
- Control-Plane Virtualization–Routing Protocols- VRF - Aware Routing Multi-
Topology Routing
VIRTUALIZING STORAGE
SCSI- Speaking SCSI- Using SCSI buses – Fiber Channel – Fiber Channel
IV
Cables –Fiber Channel Hardware Devices – iSCSI Architecture – Securing
iSCSI – SAN backupand recovery techniques – RAID – SNIA Shared Storage
12
Model – Classical Storage Model – SNIA Shared Storage Model – Host based
Architecture – Storage based architecture – Network based Architecture – Fault
tolerance to SAN – PerformingBackups – Virtual tape libraries.
Blades and Virtualization — Building Blocks for Next- Generation Data
Centers,Evolution of Computing Technology-Setting the Stage,Evolution of
V
Blade and Virtualization Technologies,Blade Architecture,Assessing Needs — 12
Blade System Hardware Considerations

10
M.Sc. Part II, Information Technology Syllabus

Course Practical List


Code

1. Implement vmwareESXi for server virtualization

2. Implement XEN for server virtualization

3. Implement Hyper-V server virtualization

4. Manage vmwareESXi with vCentre server


PIT3VIP
5. Manage xen server Xen center.

6. Understanding blade server with cisco UCS/HP eva simulator

7. Implement vlan concept with L2/L3 switches/nexus virtual switching

8. Simulating SAN with navisphere/netapps

Reference Books:

1) Mastering_VMware_vSphere_5.5, Sybex Publication.


2) Configuring Windows Server Virtualization, Microsoft Press.
3) Citrix.XenServer.6.0.Administration.Essential.Guide, Feb.2007, Packtpub.
4) Blade.Servers.and.Virtualization, Wiley.
5) Virtualization: A Beginner’s Guide.
6) Professional Xen Virtualization, William von Hagen, January, 2008,Wrox
publication.
7) Virtualization: From the Desktop to the Enterprise, Chris Wolf , Erick M.halter,
2005. APress.
8) VMware and Microsoft Platform in the Virtual Data center, 2006,Auerbach.
9) Network virtualization, Kumar reddyvictor Moreno, July, 2006,Cisco press

Course Code
Ethical Hacking
PIT3ETH
Objectives
The main objective and aim of this study is to let students know about what is ethical hacking and how they
can take advantage of it to prevent from fraud regarding their hacking situations.
Expected Learning Outcomes:
1) It prepares students to handle information security with more simplicity.
2) It provides knowledge in advanced Hacking concepts – hacking Mobile devices & smart
phones, writing Virus codes, Corporate Espionage, exploit writing & Reverse Engineering.
3) It evaluates the security of and identifies the vulnerabilities in systems, networks or system
infrastructure.

11
M.Sc. Part II, Information Technology Syllabus

I Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks,


12
Enumeration
II System Hacking, Trojans and Backdoors, Viruses and Worms, Sniffing
12
III Social Engineering, Denial of Service, Session Hijacking, Hacking Webservers
12
IV Hacking Web Applications, SQL Injection, Hacking Wireless Networks, Hacking Mobile
12
Platforms
V Evading IDS, Firewalls and Honeypots, Buffer Overflows, Cryptography, Penetration
12
Testing

Course Practical List


Code
1. Using the tools for whois, traceroute, email tracking, google hacking.
2. Using the tools for scanning network, IP fragmentation, war dialing countermeasures, SSL
Proxy, Censorship circumvention.
3. Using NETBIOS Enumeration tool, SNMP Enumeration tool, LINUX/ UNIX.enumeration
tools, NTP Enumeration tool, DNS analyzing and enumeration tool.
4. Using System Hacking tools.
5. Study of backdoors and Trojan tools
PIT3EHP 6. Study of sniffing tools
7. Study of Denial of Service attack tools
8. Study of Hijacking tools
9. Study of webserver attack tools.
10. Study of SQL injection and Web server tools
11. Study of wireless hacking tools
12. Using cryptanalysis tool.
13. Study of different security tools.

Reference Books:

1) Ethical Hacking Review Guide, Kimberly Graves, Wiley Publishing


2) Ethical Hacking, Ankit Fadia, 2nd Edition, Macmillan India Ltd, 2006
3) Insider Computer Fraud, Kenneth C.Brancik, 2008, Auerbach Publications Taylor
& Francis Group

12
M.Sc. Part II, Information Technology Syllabus

Semester IV
Course Code Artificial Intelligence
PIT4ARI
Objectives: The basic objective of AI is to enable computers to perform intellectual tasks such as decision
making, problem solving, perception, understanding human communication.
Expected Learning Outcomes:

1) Students will able to Demonstrate knowledge of the building blocks of AI as presented in terms of
intelligent agents.
2) Analyze and formalize the problem as a state space, graph, design heuristics and select amongst
different search or game based techniques to solve them.
3) Develop intelligent algorithms for constraint satisfaction problems and also design intelligent systems
for Game Playing.
4) Attain the capability to represent various real life problem domains using logic based techniques and
use this to perform inference or planning.
5) Formulate and solve problems with uncertain information using Bayesian approaches.

Introduction: AI, Components of AI, History of AI, Salient Points, Knowledge and
Knowledge Based Systems, AI in Future, Applications.
Logic and Computation: Classical Concepts, Computational Logic, FOL, Symbol
I Tableau, Resolution, Unification, Predicate Calculus in Problem Solving, Model Logic, 12
Temporal Logic.
Heuristic Search: Search-Based Problems, Informed Search, Water Jug Problem, TSP,
Branch and Bound Method, TSP Algorithm.
Game Playing: AND/OR Graph, Minimax Problem, Alpha-Beta Search, Puzzle
Solving, AI versus Control Robot.
Knowledge Representation: Structure of an RBS, Merit, Demerit and Applicability of
RBS, Semantic Nets, Frames, Conceptual Graphs, Conceptual Dependency, Scripts.
II 12
Automated Reasoning: Default Logic, Problem for Default Reasoning, Closed World
Assumption, Predicate Completion, Circumscription, Default Reasoning, Model Based
Reasoning, Case Based Reasoning, Reasoning Models, Multimodels, Multimodal
Reasoning.
Probabilistic Reasoning: Bayes Theorem, Bayesian Network, Dempster and Shafer
Theory of Evidence, Confidence Factor, Probabilistic Logic.
III Knowledge Acquisition: Knowledge Acquisition process, Automatic Knowledge 12
Acquisition, Machine Learning, Induction, Analogical Reasoning, Explanation-Based
Learning, Inductive Learning, Knowledge Acquisition Tools.
Planning: Necessity of planning, Planning Agents, Planning generating schemes, Non-
hierarchical planning, Hierarchical planning, Script-based planning, Oppurtunistic
planning, Algorithm for planning, planning representation with STRIPS an example.
IV 12
Constraint Satisfaction Problem: Constraints and Satisfiabillity, Basic search
strategies for solving CSP, Representation of CSP problem, Examples of constraint
satisfaction problem.
Knowledge-Based Systems: Structure of an Expert System, Expert Systems in different
Areas, Expert System Shells, Comparison of Expert Systems, Comparative View,
V Ingredients of Knowledge-Based Systems, Web-based Expert Systems. 12
Prolog: Prolog programming features, Syntax, Syntax of Rules, LIST, Structure, Some
Solutions using TURBO PROLOG.

13
M.Sc. Part II, Information Technology Syllabus

Reference Books:

Artificial Intelligence, R.B.Mishra, EEE, PHI


Artificial Intelligence & Soft Computing for Beginners, Anandita Das Bhattacharjee, SPD
Artificial Intelligence, E.Rich and K.Knight, 2002, TMH
Artificial Intelligence: A Modern Approach, S.Russel, P.Norvig, 2002, Pearson Education

Course Code IT Infrastructure Management


PIT4IIM
Objectives
To make the students aware about core management of essential operation components, such as policies,
processes, equipment, data, human resources, and external contacts, for overall effectiveness .

Expected Learning Outcomes:


1) Students will gain knowledge on development of service concepts in preparation for the selection of
services to be provided.
2) Students will be able to design profitable services that provides high level of quality to satisfy the
business needs.
3) Students will be able to identify any potential risk and provide measures to overcome its impact on
other services and business.
4) Students will become familiar with IT service operations used to ensure that the required IT services
are delivered efficiently and effectively as per the service level agreements to the business users and
customers.
5) Students will learn about continuously improving the service quality after the service the service have
been put into operation.

Introduction: The four perspectives (attributes) of IT service management, benefits of IT


service management, business and IT alignment, What is ITIL?, What are services?,
Service Management as a practice,The concept of Good Practice, Concept of a Service,
Concept of Service Management, Functions and Processes, The process model and the
characteristics of processes.
The Service Lifecycle: Mapping the Concepts of ITIL to the Service Lifecycle, How does
I the Service Lifecycle work?
12
Service Strategy: Objectives, Creating Service Value, Service Packages and Service Level
Packages, Service Strategy Processes, Service Portfolio Management, Financial
Management, Demand Management, Service Strategy Summary, Interfaces with the
Service Design Phase, Interfaces with the Service Transition Phase, Interfaces with the
Service Operation Phase, Interfaces with the Continual Service Improvement Phase,
Service Strategy Service Scenario, Overall Service Strategy, Service Portfolio
Management Considerations, Financial Management Considerations
Service Design: Objectives, Major Concepts, Five Major Aspects of Service Design, Service
Design Packages, Service Design Processes, Service Level Management, Supplier
II Management, Service Catalogue Management, Capacity Management, Availability
12
Management, IT Service Continuity Management, Information Security Management, Service
Design Scenario, Service Level Management Considerations, Capacity Management
Considerations, Availability Management Considerations, Information Security Management

14
M.Sc. Part II, Information Technology Syllabus

Considerations, Service Catalogue Management Considerations, ITSCM Considerations,


Supplier Management Considerations

Service Transition: Objectives, Service Transition Processes, Knowledge Management,


Service Asset and Configuration Management, Change Management, Release and
III Deployment Management, Service Validation and Testing, Service Transition Summary,
12
Service Transition Scenario, Knowledge Management Considerations, Service Asset and
Configuration Management Considerations, Change Management Considerations, Release
and Deployment Management Considerations, Service Validation and Testing Considerations
Service Operation: Objectives, Major Concepts, Service Operation Functions, The Service
Desk, Technical Management, IT Operations Management, Application Management, Service
IV
Operation Processes, Event Management, Incident Management, Problem Management, 12
Request Fulfillment, Access Management, Service Operation Summary, Service Operation
Scenario, Functions, Processes
Continual Service Improvement: Objectives, Major Concepts Continual Service
Improvement Processes, Service Level Management, Service Measurement and Reporting ,
V
CSI (7 Step) Improvement Process, Continual Service Improvement Summary, Continual 12
Service Improvement Scenario, Service Level Management Service Measurement and
Reporting, CSI Process

Reference Books:

1. ITIL V3 Foundation Complete Certification Kit


2. Foundations of IT Service Management - The Unofficial ITIL® v3 Foundations
Course Brady Orand ,2nd Edition
3. ITILv3 Foundation Exam, The Study Guide , Arjen de Jong Axel Kolthof ,Mike
Pieper Ruby Tjassing Annelies van der Veen Tieneke Verheijen Van Harren.

Course Code
Computer Forensics
PIT4COF
Objectives
The main objective of studying computer forensics is to train students about the science of cyber security,
digital and computer forensics and other advanced technologies and tools.
Expected Learning Outcomes:
1) Interpret and appropriately apply the laws and procedures associated with identifying,
acquiring, examining and presenting digital evidence.
2) Create a method for gathering, assessing and applying new and existing legislation and
industry trends specific to the practice of digital forensics.
3) Adhere to the ethical standards of the profession and apply those standards to all aspects of
the study and practice of digital forensics.
4) Using the scientific process, apply the principles of effective digital forensics investigation
techniques.
5) Identify the culture of white-collar crime and the methods used by white-collar criminals
and employ this knowledge to guide economic crime investigations.

I Computer Forensics and Investigation Processes, Understanding Computing Investigations,


The Investigator's Office and Laboratory, Data Acquisitions. 12

15
M.Sc. Part II, Information Technology Syllabus

II Processing Crime and Incident Scenes, Working with Windows and DOS Systems, Current
Computer Forensics Tools. 12
III Macintosh and Linux Boot Processes and File Systems, Computer Forensics Analysis,
Recovering Graphics Files. 12
IV Virtual Machines, Network Forensics, and Live Acquisitions, E-mail Investigations, Cell
Phone and Mobile Device Forensics 12
V Report Writing for High-Tech Investigations, Expert Testimony in High-Tech Investigations,
Ethics and High-Tech Investigations. 12

Course Practical List


Code
1. File System Analysis using The Sleuth Kit
2. Using Windows forensics tools
3. Using Data acquisition tools
4. Using file recovery tools
5. Using Forensic Toolkit (FTK)
6. Forensic Investigation using EnCase
PIT4CFP 7. Using Steganography tools
8. Using Password Cracking tools
9. Using Log Capturing and Analysis tools
10. Using Traffic capturing and Analysis tools
11. Using Wireless forensics tools
12. Using Web attack detection tools
13. Using Email forensics tools
14. Using Mobile Forensics software tools
15. Writing report using FTK

Reference Books:

1) Guide to Computer Forensics and Investigations, Bell Nelson, Amelia Phillips,


Christopher Steuart, 4th Edition, Cengage Learning
2) Computer Forensics A Pocket Guide, Nathan Clarke, I.T G.vernance Publishing
3) Computer Forensics: Computer Crime Scene Investigation, John R. Vacca, 2nd
Edition, Charles River Media

Course Code Cloud Management


PIT4CLM
Objectives: To make the learners familiar with the software and technologies designed for operating and
monitoring applications, data and services residing in the cloud. Cloud management tools help ensure cloud
computing-based resources are working optimally and properly interacting with users and other service.

Expected Learning Outcomes:


1) Learners should be able to understand virtualized data centers.
2) Learners should be able to understand storage network designs.
3) Learners should be able to understand system center 2012.
4) Learners should be able to understand different components of system center 2012.
5) Learners should be able to understand different cloud management platforms.

16
M.Sc. Part II, Information Technology Syllabus

Virtualized Data Center Architecture: Cloud infrastructures; public, private, hybrid.


Service provider interfaces; Saas, Paas, Iaas. VDC environments; concept, planning and
I 12
design, business continuity and disaster recovery principles. Managing VDC and cloud
environments and infrastructures.
Storage Network Design: Architecture of storage, analysis and planning. Storage
network design considerations; NAS and FC SANs, hybrid storage networking
technologies (iSCSI, FCIP, FCoE), design for storage virtualization in cloud computing,
host system design considerations IP-SAN: Introduction, iSCSI—components of iSCSI,
II 12
iSCSI host connectivity, topologies for iSCSI connectivity, iSCSI discovery, iSCSI
names, iSCSI session, iSCSI PDU, ordering and numbering, iSCSI security and error
handling, FCIP—FCIP topology,FCIP performance and security, iFCP—iFCP
topology, iFCP addressing architecture.
Cloud Management: System Center 2012 and Cloud OS, Provisioning Infrastructure:
Provisioning Infrastructure with Virtual Machine Designing, Planning and
III Implementing. Managing Hyper-V Environment with VMM 2012. Provisioning 12
self-service with AppController, AppController essentials, Managing Private, Public,
Hybrid clouds. AppController cmdlets.
Managing and maintaining with Configuration Manager 2012, Design, Planning,
Implementation, Administration, Distributing Applications, Updates, Deploying
IV 12
Operating Systems, Asset Management and reporting. Backup and recovery with Data
Protection Manager. Design, Planning, Implementation and Administration.
Implementing Monitoring: Real-time monitoring with Operations Manager, Proactive
monitoring with Advisor, Operations Design, Planning, Implementation, Administration,
Monitoring, Alerting, Operations and Security reporting.Building private clouds:
V 12
Standardisation with service manager, Service Manager 2012: Design, Planning,
Implementing, Incident Tracking, Automation with orchestrator, System Orchestrator
2012: Design, Planning,Implementing. Windows Azure Pack.
Course Practical List
Code
1) Managing Hyper –V environment with SCVVM 2012
2) Provisioning Self-service with AppController
3) Managing Private Cloud with AppController
4) Using Data Protection Manager for Backup and Recovery
5) Using Operations Manager for real-time monitoring
PIT4CMP
6) Using Advisor for proactive monitoring
7) Using Service Manager to standardize
8) Using Orchestrator for automation
9) Implementing Windows Azure Pack
10) Using Configuration Manager 2012 for managing and maintaining

Reference Books:

1) Introducing Microsoft System Center 2012, Technical Overview,Mitch Tulloch,


Symon Perriman,Microsoft.

2) Microsft System Center 2012 Unleashed Chris Amaris, Rand Morimoto, Pete
Handley,David E. Ross, Technical Edit by Yardeni,Pearson Education.

17
M.Sc. Part II, Information Technology Syllabus

3) The.Official.VCP5.Certification.Guide, Aug.2012,VMware.Press.

4) VCAP5-DCD Official Cert Guide VMware.Press.

5) Automating vSphere with VMware vCenter Orchestrator.

6) VMware Private Cloud Computing with vCloud Director.

7) Managing and optimizing VMWare VSphere deployment.

8) Storage Networks: The Complete Reference, Robert Spalding.

9) Storage Networking Protocol, James Long.

Course Code Project


PIT4PRO

18

You might also like