0% found this document useful (0 votes)
5K views79 pages

Final TYBScIT Syllabus Semester-V Semester-VI 2024-2025

Uploaded by

ponneshn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views79 pages

Final TYBScIT Syllabus Semester-V Semester-VI 2024-2025

Uploaded by

ponneshn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

AC________________________

UNIVERSITY OF MUMBAI

Syllabus for T.Y.B.Sc.


Programme: B.Sc.
Subject: Information Technology

(Choice Based Credit System)

(with effect from the academic year 2024 – 2025)


Semester – 5
Course Code Course Type Course Title Credits
USIT501 Skill Enhancement Course Software Project Development 2
USIT502 Skill Enhancement Course Internet of Things: Theory and Practice 2
USIT503 Skill Enhancement Course Advanced Web Development 2
USIT504 Discipline Specific Elective Artificial Intelligence and Applications
2
USIT505 (Any One) Linux Server Administration
USIT506 Discipline Specific Elective Advanced Java Technologies
2
USIT507 (Any One) Emerging Technologies
Skill Enhancement Course
USIT5P1 Project Dissertation 2
Practical
Skill Enhancement Course
USIT5P2 Internet of Things: Theory and Practice Practical 2
Practical
Skill Enhancement Course
USIT5P3 Advanced Web Development Practical 2
Practical
USIT5P4 Discipline Specific Elective Artificial Intelligence and Applications Practical
2
USIT5P5 Practical (Any One)* Linux Server Administration Practical
USIT5P6 Discipline Specific Elective Advanced Java Technologies Practical
2
USIT5P7 Practical (Any One)* Emerging Technologies Practical
Total Credits 20
(All the practical mentioned in the syllabi are compulsory as per the courses chosen)
Semester – 6
Course Code Course Type Course Title Credits
USIT601 Skill Enhancement Course Software Testing and Quality Assurance 2
USIT602 Skill Enhancement Course Information Security 2
USIT603 Skill Enhancement Course Business Intelligence and Data Analytics 2
USIT604 Discipline Specific Elective Fundamentals of GIS
2
USIT605 (Any One) Enterprise Network Design
USIT606 Discipline Specific Elective IT Infrastructure Management
2
USIT607 (Any One) IT Act and Cyber Laws
USIT6P1 Skill Enhancement Course Project Implementation 2
Practical
USIT6P2 Skill Enhancement Course Information Security Practical 2
Practical
USIT6P3 Skill Enhancement Course Business Intelligence and Data Analytics Practical 2
Practical
USIT6P4 Discipline Specific Elective Fundamentals of GIS Practical
2
USIT6P5 Practical (Any One)* Enterprise Network Design Practical
Skill Enhancement Course
USIT6P6 Android Programming Practical 2
Practical
Total Credits 20

*The choice of Practical course is based on the theory Course. For Semester V, USIT504, USIT505, USIT506 and
USIT507, the practical courses are USIT5P4, USIT5P5 USIT5P6, USIT5P7. For Semester VI, USIT604, USIT605
the practical courses are USIT6P4, USIT6P5 respectively. Practical Course USIT6P6 is compulsory.
Semester-V
Software Project Development
B. Sc. (Information Technology) Semester – V
Course Name: Software Project Development Course Code: USIT501
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
● Understanding on the need for Software Project Management.
● Understanding the basic steps of project evaluation, planning.
● Understanding the basic steps of activity planning, risk management.
● Understanding the basic steps of controlling cost, managing contracts, managing people.
● Understanding how to work in team, maintaining quality and successfully closing the project.

Unit Details Lectures


Introduction to Software Project Management: Introduction, Why is Software
Project Management Important? What is a Project? Software Projects versus Other
Types of Project, Contract Management and Technical Project Management,
Activities Covered by Software Project Management, Plans, Methods and
Methodologies, Some Ways of Categorizing Software Projects, Project Charter,
Stakeholders, Setting Objectives, The Business Case, Project Success and Failure,
What is Management? Management Control, Project Management Life Cycle,
Traditional versus Modern Project Management Practices.
Project Evaluation and Programme Management: Introduction, Business Case,
Project Portfolio Management, Evaluation of Individual Projects, Cost–benefit
I 12
Evaluation Techniques, Risk Evaluation, Programme Management, Managing the
Allocation of Resources within Programmes, Strategic Programme Management,
Creating a Programme, Aids to Programme Management, Some Reservations
about Programme Management, Benefits Management.
An Overview of Project Planning: Introduction to Step Wise Project Planning,
Step 0: Select Project, Step 1: Identify Project Scope and Objectives, Step 2:
Identify Project Infrastructure, Step 3: Analyse Project Characteristics, Step 4:
Identify Project Products and Activities, Step 5: Estimate Effort for Each Activity,
Step 6: Identify Activity Risks, Step 7: Allocate Resources, Step 8:
Review/Publicize Plan, Steps 9 and 10: Execute Plan/Lower Levels of Planning
Selection of an Appropriate Project Approach: Introduction, Build or Buy?
Choosing Methodologies and Technologies, Software Processes and Process
Models, Choice of Process Models, Structure versus Speed of Delivery, The
Waterfall Model, The Spiral Model, Software Prototyping, Other Ways of
Categorizing Prototypes, Incremental Delivery, Atern/Dynamic Systems
Development Method, Rapid Application Development, Agile Methods, Extreme
Programming (XP), Scrum, Lean Software Development, Managing Iterative
Processes, Selecting the Most Appropriate Process Model.

II Software Effort Estimation: Introduction, Where are the Estimates Done? 12


Problems with Over- and Under-Estimates, The Basis for Software Estimating,
Software Effort Estimation Techniques, Bottom-up Estimating, The Top-down
Approach and Parametric Models, Expert Judgement, Estimating by Analogy,
Albrecht Function Point
Analysis, Function Points Mark II, COSMIC Full Function Points, COCOMO II:
A Parametric Productivity Model, Cost Estimation,
Staffing Pattern, Effect of Schedule Compression, Capers Jones Estimating Rules
of Thumb.
Activity Planning: Introduction, Objectives of Activity Planning, When to Plan,
Project Schedules, Projects and Activities, Sequencing and Scheduling Activities,
Network Planning Models, Formulating a Network Model, Adding the Time
Dimension, The Forward Pass, Backward Pass, Identifying the Critical Path,
Activity Float, Shortening the Project Duration, Identifying Critical Activities,
Activity-on-Arrow Networks.
Risk Management: Introduction, Risk, Categories of Risk, Risk Management
III Approaches, A Framework for Dealing with Risk, Risk Identification, Risk 12
Assessment, Risk Planning, Risk Management, Evaluating Risks to the Schedule,
Boehm’s Top 10 Risks and Counter Measures, Applying the PERT Technique,
Monte Carlo Simulation, Critical Chain Concepts.
Resource Allocation: Introduction, Nature of Resources, Identifying Resource
Requirements, Scheduling Resources, Creating Critical Paths, Counting the Cost,
Being Specific, Publishing the Resource Schedule, Cost Schedules, Scheduling
Sequence.
Monitoring and Control: Introduction, Creating the Framework, Collecting the
Data, Review, Visualizing Progress, Cost Monitoring, Earned Value Analysis,
Prioritizing Monitoring, Getting the Project Back to Target, Change Control,
Software Configuration Management (SCM).
Managing Contracts: Introduction, Types of Contract, Stages in Contract
IV Placement, Typical Terms of a Contract, Contract Management, Acceptance. 12
Managing People in Software Environments: Introduction, Understanding
Behaviour, Organizational Behaviour: A Background, Selecting the Right Person
for the Job, Instruction in the Best Methods, Motivation, The Oldham–Hackman
Job Characteristics Model, Stress, Stress Management, Health and Safety, Some
Ethical and Professional Concerns.
Working in Teams: Introduction, becoming a Team, Decision Making,
Organization and Team Structures, Coordination Dependencies, Dispersed and
Virtual Teams, Communication Genres, Communication Plans, Leadership.
Software Quality: Introduction, The Place of Software Quality in Project
Planning, Importance of Software Quality, Defining Software Quality, Software
V Quality Models, ISO 9126, Product and Process Metrics, Product versus Process 12
Quality Management, Quality Management Systems, Process Capability Models,
Techniques to Help Enhance Software Quality, Testing, Software Reliability,
Quality Plans.
Project Closeout: Introduction, Reasons for Project Closure, Project Closure
Process, Performing a Financial Closure, Project Closeout Report.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Software Project Bob Hughes, Mike TMH 6th 2018
Management Cotterell, Rajib Mall
2. Project Management and Shailesh Mehta SPD 1st 2017
Tools & Technologies – An
overview
3. Software Project Walker Royce Pearson 2005
Management

Course Outcome:
After completing the course, the learner will be able to:
CO1: Describe the basic concepts of software project management with its life cycle
CO2: Apply project estimation and evaluation techniques to real world problem
CO3: Apply Key project management system techniques like PERT, CRM
CO4: Identify project risk, monitor and track project deadlines
CO5: Work in teams to evaluate the different modes of communication among people.
Internet of Things: Theory and Practice
B. Sc. (Information Technology) Semester – V
Course Name: Internet of Things: Theory and Practice Course Code: USIT502
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objectives:
 To understand the concept of the Internet of Things and its impact on technology
 To learn about the design principles of connected devices for a seamless user experience
 To delve into the workings of the internet and its communication protocols
 To explore different techniques of prototyping embedded devices and their physical design
 To gain knowledge about various business models and funding options for Internet of Things startups.

Unit Details Lectures


The Internet of Things: An Overview : The Flavour of the Internet of Things, The
“Internet” of “Things”, The Technology of the Internet of Things, Enchanted Objects,
Who is Making the Internet of Things?
Design Principles for Connected Devices: Calm and Ambient Technology, Magic as
Metaphor, Privacy, Keeping Secrets, Whose Data Is It Anyway? Web Thinking for
Connected Devices, Small Pieces, Loosely Joined, First-Class Citizens On The Internet,
I Graceful Degradation, Affordances. 12
Internet Principles: Internet Communications: An Overview, IP, TCP, The IP Protocol
Suite (TCP/IP), UDP, IP Addresses, DNS, Static IP Address Assignment,
Dynamic IP Address Assignment, IPv6, MAC Addresses, TCP and UDP Ports, An
Example: HTTP Ports, Other Common Ports, Application Layer Protocols, HTTP,
HTTPS: Encrypted HTTP, Other Application Layer Protocols.
Thinking About Prototyping: Sketching, Familiarity, Costs versus Ease of Prototyping,
Prototypes and Production, Changing Embedded Platform, Physical Prototypes and Mass
Personalisation, Climbing into the Cloud, Open Source versus Closed Source, Why Closed?
Why Open? Mixing Open and Closed Source, Closed Source for Mass Market Projects,
Tapping into the Community.
II 12
Prototyping Embedded Devices: Electronics, Sensors, Actuators, Scaling Up the
Electronics, Embedded Computing Basics, Microcontrollers, System-on-Chips, Choosing
Your Platform, Arduino, Developing on the Arduino, Some Notes on the Hardware,
Openness, Raspberry Pi, Cases and Extension Boards, Developing on the Raspberry Pi,
Some Notes on the Hardware, Openness.
Prototyping the Physical Design: Preparation, Sketch, Iterate, and Explore, Nondigital
Methods, Laser Cutting, Choosing a Laser Cutter, Software, Hinges and Joints, 3D Printing,
III Types of 3D Printing, Software, CNC Milling, Repurposing/Recycling. 12
Prototyping Online Components: Getting Started with an API, Mashing Up APIs,
Scraping, Legalities, Writing a New API, Clockodillo, Security,
Implementing the API, Using Curl to Test, Going Further, Real-Time Reactions, Polling,
Comet, Other Protocols, MQ Telemetry Transport, Extensible Messaging and Presence
Protocol, Constrained Application Protocol.
Techniques for Writing Embedded Code: Memory Management, Types of Memory,
Making the Most of Your RAM, Performance and Battery Life, Libraries,
Debugging,
Business Models: A Short History of Business Models, Space and Time, From Craft to
IV 12
Mass Production, The Long Tail of the Internet, Learning from History, The Business
Model Canvas, Who Is the Business Model For? Models, Make Thing, Sell Thing,
Subscriptions, Customisation, Be a Key Resource, Provide Infrastructure: Sensor
Networks, Take a Percentage, Funding an Internet of Things Startup, Hobby Projects and
Open Source, Venture Capital, Government Funding, Crowdfunding, Lean Startups.
Moving to Manufacture: What Are You Producing? Designing Kits, Designing Printed
circuit boards, Software Choices, The Design Process, Manufacturing Printed Circuit
Boards, Etching Boards, Milling Boards. Assembly, Testing, Mass-Producing the Case and
Other Fixtures, Certification, Costs, Scaling Up Software, Deployment, Correctness and
V Maintainability, Security, Performance, User Community. 12
Ethics: Characterizing the Internet of Things, Privacy, Control, Disrupting Control,
Crowdsourcing, Environment, Physical Thing, Electronics, Internet Service, Solutions, The
Internet of Things as Part of the Solution, Cautious Optimism, The Open Internet of Things
Definition.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Designing the Internet of Things Adrian McEwen, WILEY First 2014
Hakim Cassimally
2. Internet of Things – Architecture and Design Raj Kamal McGraw Hill First 2017
3. Getting Started with the Internet of Things Cuno Pfister O’Reilly Sixth 2018
4. Getting Started with Raspberry Pi Matt Richardson SPD Third 2016
and Shawn Wallace

Course Outcomes:
Upon completion of the course, students will be able to:
CO1. Explain the concept of the Internet of Things and its applications in real-life scenarios.
CO2. Apply design principles to create user-friendly and connected devices.
CO3. Understand the communication protocols of the internet and design efficient web-connected devices.
CO4. Prototype embedded devices and create their physical design using various tools and techniques.
CO5. Understand the business models and funding options available for startups in the Internet of Things domain
and apply them to real-life scenarios.
Advanced Web Development

B. Sc. (Information Technology) Semester – V


Course Name: Advanced Web Development Course Code: USIT503
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● Understand .NET Fundamentals: Gain a comprehensive understanding of the .NET framework, including
its languages (C#), the Common Language Runtime, and the .NET Class Library.
● Learn the fundamentals of the C# language, covering variables, data types, conditional logic, loops, methods,
and advanced topics like object-based manipulation.
● Develop skills in writing code for ASP.NET applications, utilizing server controls, handling events, and
configuring applications. Understand various form controls, validation techniques, and navigation
concepts. Handling error handling, debugging, and exception handling techniques in ASP.NET.
● Learn about state management on both client and server sides, including view state, transferring
information between pages, and working with cookies.
● Gain expertise in ADO.NET components, data providers, SQL commands, and queries.
● Understand the data provider model, direct data access, and disconnected data access.
● Learn to work with data source controls and integrate with Microsoft Azure Database.

Unit Details Lectures


.NET Technology and Framework, C#, VB, and the .NET Languages, The Common
Language Runtime, The .NET Class Library. The C# Language: C# Language Basics,
Variables and Data Types, Variable Operations, Object-Based Manipulation,
I Conditional Logic, Loops, Methods. Types, Objects, and Namespaces: The Basics
12
About Classes, Building a Basic Class, Value Types and Reference Types,
Understanding Namespaces and Assemblies, Advanced Class Programming.
ASP.NET Web Forms, Writing Code, Using the Code-Behind Class, Adding Event
Handlers, Understanding the Anatomy of an ASP.NET Application, Introducing
Server Controls, Using the Page Class, Using Application Events, Configuring an
ASP.NET Application. Form Controls: Stepping Up to Web Controls, Web Control
Classes, List Controls, Table Controls, Web Control Events and AutoPostBack,
II Validation, Understanding Validation, Using the Validation Controls, Rich Controls,
12
The Calendar, The AdRotator, Pages with Multiple Views, User Controls and
Graphics, User Controls, Dynamic Graphics, The Chart Control, Website Navigation:
Site Maps, URL Mapping and Routing, The SiteMapPath Control, The TreeView
Control, The Menu Control.
Tracing, Error Handling, Debugging, Exception Handling, User defined Exceptions,
Page Tracing, Client and Server side state management, View State, Transferring
III Information Between Pages, Cookies- creation, retrieval, reading, Types of Cookies,
12
Using Master Pages and Content Pages
ADO.NET Components, Data Providers, SQL Basic command and queries,
Understanding the Data Provider Model, Using Direct Data Access, Using
IV Disconnected Data Access. Working with Data Source Controls, Data Controls: 12
GridView, DetailsView and FormView.
Understanding Security Requirements, Introduction to Authentication and
Authorization
NuGet package manager for .NET and Visual Studio- Installation, Basics, framework,
V 12
Bootstrap basics, Structure of the Page, Typography, Forms
Ajax- Using Partial Refreshes, Using Progress Notification, Implementing Timed
Refreshes, Working with the ASP.NET AJAX Control Toolkit.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Beginning Visual C# 2010 K. Watson, C. Nagel, J.H Wrox 2010
Padderson (Wiley)
2. Murach’s ASP.NET 4.6 Mary Delamater and Anne SPD Sixth 2016
Web Programming in Bohem
C#2015
3. ASP.NET 4.0 J. Kanjilal Tata 2011
programming McGraw
Hill
4. Programming ML.NET Dino Esposito, Francesco Paperback
Esposito
5. Ajax : A Beginner's Guide Steven Holzner Paperback 2017

6 Introducing Bootstrap 4 Jörg Krause Apress 2016

Web reference:
NuGet package :- https://learn.microsoft.com/en-us/nuget/quickstart/install-and-use-a-package-in-
visual-studio
Course Outcome:
After completing the course, the learner will be able to:
CO1: Learner will explore the foundations of .NET Development, .NET Ecosystem, C# and
Fundamental Concepts
CO2: Comprehensive Understanding and Practical Application using controls.
CO3: ASP.NET Web Development Essentials: Tracing, Debugging, and State Management
Techniques
CO4: Mastering Data Access in ASP.NET: ADO.NET Essentials and Azure Integration
CO5: Securing ASP.NET Applications: Authentication, Authorization, and Advanced Techniques
with Ajax and Bootstrap
Artificial Intelligence and Applications
B. Sc. (Information Technology) Semester – V
Course Name: Artificial Intelligence and Applications Course Code: USIT504
(Elective 1)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Pre-requisites:
1. Proficiency in at least one programming language such as C++, Python or Java.
2. Knowledge of fundamental data structures (arrays, linked lists, stacks, queues, trees, graphs) and their
algorithms.
3. Understanding of discrete mathematics, linear algebra, probability and statistics.
4. Familiarity with logical reasoning.

Course Objectives:
 To understand the fundamental concepts and history of Artificial Intelligence, including the current state of the
field and its foundational principles.
 To develop proficiency in problem-solving techniques using various search algorithms, both uninformed and
informed, and apply heuristic functions effectively.
 To gain knowledge and skills in adversarial search, including strategies for games, optimal decision-making, and
dealing with uncertainty in partially observable environments.
 To master logical reasoning and inference methods, including propositional and first-order logic, and apply them
to knowledge representation and problem-solving tasks.
 To explore advanced topics such as planning algorithms, including classical planning and multi-agent planning,
as well as generative AI techniques and their applications.

Unit Details Lectures


Introduction: What is Artificial Intelligence? Foundations of AI, History, the
state of art AI today.
I Intelligent Agents: Agents and Environment, Good Behaviour, Nature of 12
Environment, Structure of Agents.
Solving Problems by Searching: Problem Solving Agents, Searching for
Solutions, Uninformed Search, Informed Search Strategies, Heuristic Functions.
II Beyond Classical Search: Local Search Algorithms, Searching with Non- 12
Deterministic Action, Searching with Partial Observations, Online Search Agents
and Unknown Environments.
Adversarial Search: Games, Optimal Decisions in Games, Alpha-Beta Pruning,
Stochastic Games, Partially Observable Games.
III Logical Agents: Knowledge Base Agents, The Wumpus World, Propositional 12
Logic, Propositional Theorem Proving.
Probabilistic Reasoning: Uncertainty, Conditional Probability, Bayes Theorem.
First Order Logic: Need For First Order Logic, Difference between Propositional
and First Order Logic, Knowledge Engineering in First Order Logic.
Inference in First Order Logic: Unification and Lifting, Forward and Backward
IV Chaining, Resolution. 12
Artificial Neural Network: Architecture of ANN, Merits and Demerits of ANN,
Types of ANN.
V Planning: Definition of Classical Planning, Algorithms for Planning as State 12
Space Search, Planning Graphs, Other Classical Planning Approaches, Analysis
of Planning Approaches, Time, Schedules and Resources, Hierarchical Planning,
Planning and Acting in Nondeterministic Domains, Multiagent Planning.
Generative AI: What is Generative AI? Types of Generative AI

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Artificial Intelligence: A Stuart Russel and Peter Pearson Third 2015
Modern Approach Norvig
2. A First Course in Artificial Deepak Khemani TMH First 2017
Intelligence
3. Artificial Intelligence: A Rahul Deva Shroff First 2018
Rational Approach Publisher
4. Artificial Intelligence Elaine Rich, Kevin TMH Third 2009
Knight and
Shivashankar Nair
5. Artificial Intelligence & Soft Anandita Das SPD First 2013
Computing for Beginners Bhattacharjee
6. Artificial Intelligence & David M. Patel GD First 2023
Generative AI for Beginners: The Publishing
Complete Guide

Course Outcomes:
After completing the course, the learner will be able to:
CO1: Articulate the historical development and current trends in Artificial Intelligence, demonstrating a
comprehensive understanding of its foundations and principles.
CO2: Demonstrate proficiency in implementing and analyzing various search algorithms, utilizing both
uninformed and informed strategies to solve complex problems efficiently.
CO3: Apply adversarial search techniques to decision-making in competitive environments, including games,
and effectively manage uncertainty and partial observability.
CO4: Demonstrate competency in logical reasoning and inference, utilizing propositional and first-order logic
to represent and solve real-world problems in AI applications.
CO5: Gain practical experience in planning algorithms and generative AI techniques, enabling them to design
and implement AI systems capable of planning actions and generating novel content autonomously.
Linux Server Administration
B. Sc. (Information Technology) Semester – V
Course Name: Linux Server Administration Course Code: USIT505
(Elective-I)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To gain a deep understanding of various Linux distributions.
● To be able to install, configure, and optimize for specific server roles.
● To develop expertise in securing Linux servers from unauthorized access, attacks, and vulnerabilities.
● To acquire the skills to monitor server performance, identify bottlenecks, and optimize resource
utilization.
● To understand Bash scripting language to automate repetitive tasks and server management processes.

Unit Details Lectures


Getting Started
Starting with Linux , Duties of the System Administrator, Installing Red Hat
Enterprise Linux Server
Working with Users, Groups, and Permissions: Managing Users and
Groups, Commands for User Management, Managing Passwords, Modifying
and Deleting User Accounts, Configuration Files, Creating Groups, Using
Graphical Tools for User, and Group Management, Managing Permissions, the
I Role of Ownership, Basic Permissions: Read, Write, and Execute, Advanced 12
Permissions, Working with Access Control Lists, Setting Default Permissions
with umask, Working with Attributes.
Gaining Privileges, Console Access, Installing and Managing Software
YUM: Checking for and updating Packages, Packages and Package Groups,
Configuring Yum and Yum Repositories, Yum Plug-ins, Additional resources
Packagekit: Updating packages with software update, Using Add/Remove
Software, Packagekit Architecture, Additional Resources
Configuring and Managing Storage: Understanding Partitions and Logical
Volumes, Creating Partitions, Creating File Systems, File Systems Overview,
Creating File Systems, Changing File System Properties, Checking the File
System Integrity, Mounting File Systems Automatically Through fstab,
Working with Logical Volumes, Creating Logical Volumes, Resizing Logical
Volumes, Working with Snapshots, Replacing Failing Storage Devices,
II 12
Creating Swap Space, Working with Encrypted Volumes
Networking, Network Manager: The Network Manager Daemon,
Interacting with Network Manager, Establishing Connections
Network Interfaces: Network Configuration Files, Interface Configuration
files, Interface Control Scripts, Static routes and the default gateway,
Configuring static routes in ifcfg files, Network function files, ETHTool.
Infrastructure Services: Services and Daemons- Configuring the default
runlevel, Configuring the Services, Running Services, Additional Resources.
Configuring Authentication- Configuring System Authentication, Using and
Caching credentials with SSSD.
OpenSSH- The SSH Protocol, Configuring OpenSSH, Using OpenSSH
certificate authentication, OpenSSH clients, More than a Secure Shell,
Additional Resources
TigerVNC- VNC servers, sharing an existing Desktop, Using a VNC Viewer,
Additional Resources
Servers:
DHCP Servers: Why Use DHCP? Configuring DHCPv4 server, Configuring
DHCPv4 Client.
III DNS Servers – Introduction to DNS, BIND 12
Web Servers – The Apache HTTP server
Mail Servers – Email Protocols, Email Program Classification, Mail
Transport Agents, Mail Delivery Agents, Mail User Agents, Additional
Resources
File Servers – Samba, FTP
Monitoring and Automation
System Monitoring Tools – Viewing System Processes, Viewing Memory
Usage, Viewing CPU Usage, Viewing Block Devices and Filesystems,
Viewing Hardware Information, Monitoring Performance with NET-SNMP,
Additional Resources
IV 12
Viewing and Managing Log Files – Installing rsyslog, Locating Log files,
Basic Configuration of rsyslog, working with queues in rsyslog, configuring
rsyslog on a logging server, using rsyslog modules, debugging rsyslog,
Managing Log files in graphical environment
Automating System Tasks – Cron and Anacron, At and Batch
Securing Server with iptables: Understanding Firewalls, Setting Up a
Firewall with system-config-firewall, Allowing Services, Trusted Interfaces,
Masquerading, Configuration Files, Setting Up a Firewall with iptables,
Tables, Chains, and Rules, Composition of Rule, Configuration Example,
Advanced iptables Configuration, Configuring Logging, The Limit Module,
Configuring NAT
Setting Up Cryptographic Services: Introducing SSL, Proof of Authenticity:
The Certificate Authority, Managing Certificates with OpenSSL, creating a
Signing Request, Working with GNU Privacy Guard, Creating GPG Keys,
V Key Transfer, Managing GPG Keys, Encrypting Files with GPG, GPG 12
Signing, Signing RPM Files
Introducing Bash Shell Scripting
Introduction, Elements of a Good Shell Script, Executing the Script, Working
with Variables and Input, Understanding Variables, Variables, Subshells, and
Sourcing, Working with Script Arguments, Asking for Input, Using Command
Substitution, Substitution Operators, Changing Variable Content with Pattern
Matching, Performing Calculations, Using Control Structures, Using
if...then...else, Using case, Using while, Using until, Using for, Configuring
booting with GRUB
Books and References:
Sr. Title Author/s Publisher Edition Year
No.
1 Red Hat Enterprise Linux 6 Red Hat Red Hat Content First 2021
Deployment Guide Services
2. Linux Bible Christopher Wiley Tenth 2020
Negus
3. Red hat Linux Terry Wiley Third 2005
Networking and System Collings and
Administration Kurt Wall
4. Red Hat Enterprise Sander van Sybex First 2013
Linux6 Administration Vugt
5. Linux Administration: A Wale TMH Eighth 2020
Beginner's Guide Soyinka

Course Outcome:
After completing the course, the learner will be able to:
CO1: Demonstrate a comprehensive understanding of various Linux distributions, packages and
proficiency in developing effective access control lists to manage users and group accounts.
CO2: Acquire the ability to manage storage and partitions, and develop efficiency in configuring
network and infrastructure services.
CO3: Implement different servers with their server configuration roles and parameters.
CO4: Analyze system logs to identify potential problems and security incidents.
CO5: Develop expertise in implementing security measures like firewalls, access controls,
password policies, and encryption to protect the system and ability to write scripts to automate
tasks
Advanced Java Technologies

B. Sc. (Information Technology) Semester – V


Course Name: Advanced Java Technologies Course Code: USIT506
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
 To understand the concept of and develop applications using servlets and database
connectivity.
 To develop applications that can handle cookies, sessions and file operations.
 To understand the concept of and design applications using Java server pages.
 To understand the concept of and design applications using Enterprise Java Beans.
 To understand the concepts of persistence, Hibernate and develop JPA applications,
Hibernate applications.

Unit Details Lectures


Understanding Java EE: What is an Enterprise Application? What is java
enterprise edition? Java EE Technologies, Java EE evolution, Glassfish server
Java EE Architecture, Server and Containers: Types of System Architecture,
Java EE Server, Java EE Containers.
Introduction to Java Servlets: The Need for Dynamic Content, Java Servlet
Technology, Why Servlets? What can Servlets do?
I 12
Servlet API and Lifecycle: Java Servlet API, The Servlet Skeleton, The
Servlet Life Cycle, A Simple Welcome Servlet
Working with Servlets: Getting Started, Using Annotations Instead of
Deployment Descriptor.
Working with Databases: What Is JDBC? JDBC Architecture, Accessing
Database, The Servlet GUI and Database Example.
Request Dispatcher: Resquestdispatcher Interface, Methods of
Requestdispatcher, Requestdispatcher Application.
COOKIES: Kinds of Cookies, Where Cookies Are Used? Creating Cookies,
Using Servlet, Dynamically Changing the Colors of A Page
SESSION: What Are Sessions? Lifecycle of HttpSession, Session Tracking
II With Servlet API, A Servlet Session Example 12
Working with Files: Uploading Files, Creating an Upload File Application,
Downloading Files, Creating a Download File Application.
Working with Non-Blocking I/O: Creating a Non- Blocking Read
Application, Creating The Web Application, Creating Java Class, Creating
Servlets, Retrieving The File, Creating index.jsp
Introduction To Java Server Pages: Why use Java Server Pages?
III 12
Disadvantages Of JSP, JSP v\s Servlets, Life Cycle of a JSP Page, How does a
JSP function? How does JSP execute? About Java Server Pages Getting Started
With Java Server Pages: Comments, JSPDocument, JSPElements, JSP GUI
Example.
Action Elements: Including other Files, Forwarding JSP Page to Another Page,
Passing Parameters for other Actions, Loading a Java bean.
Implicit Objects, Scope and El Expressions: Implicit Objects, Character
Quoting Conventions, Unified Expression Language [UnifiedEl], Expression
Language.
Java Server Pages Standard Tag Libraries: What is wrong in using JSP
Scriptlet Tags? How JSTL Fixes JSP Scriptlet's Short comings? Disadvantages
Of JSTL, Tag Libraries.
Introduction To Enterprise Javabeans: Enterprise Bean Architecture, Benefits
of Enterprise Bean, Types of Enterprise Bean, Accessing Enterprise Beans,
Enterprise Bean Application, Packaging Enterprise Beans
Working with Session Beans: When to use Session Beans? Types of Session
Beans, Remote and Local Interfaces, Accessing Interfaces, Lifecycle of
Enterprise Beans, Packaging Enterprise Beans, Example of Stateful Session
Bean, Example of Stateless Session Bean, Example of Singleton Session Beans.
IV Working with Message Driven Beans: Lifecycle of a Message Driven Bean, 12
Uses of Message Driven Beans, The Message Driven Beans Example.
Interceptors: Request and Interceptor, Defining An Interceptor, AroundInvoke
Method, Applying Interceptor, Adding An Interceptor To An Enterprise Bean,
Build and Run the Web Application.
Java Naming and Directory Interface: What is Naming Service? What is
Directory Service? What is Java Naming and Directory interface? Basic Lookup,
JNDI Namespace in Java EE, Resources and JNDI, Datasource Resource
Definition in Java EE.
Persistence, Object/Relational Mapping And JPA: What is Persistence?
Persistence in Java, Current Persistence Standards in Java, Why another
Persistence Standards? Object/Relational Mapping.
Introduction to Java Persistence API: The Java Persistence API, JPA, ORM,
Database and the Application, Architecture of JPA, How JPA Works? JPA
Specifications.
Writing JPA Application: Application Requirement Specifications, Software
Requirements, The Application Development Approach, Creating Database and
Tables in Mysql, creating a Web Application, Adding the Required
Library Files, creating a Javabean Class, Creating Persistence Unit
V 12
[Persistence.Xml], Creating JSP’s, The JPA Application Structure, Running the
JPA Application.
Introduction to Hibernate: What is Hibernate? Why Hibernate? Hibernate,
Database and The Application, Components of Hibernate,
Architecture of Hibernate, How Hibernate Works?
Writing Hibernate Application: Application Requirement Specifications,
Software Requirements, The Application Development Approach, Creating
Database and Tables in Mysql, Creating a Web Application, Adding the Required
Library Files, Creating a Java bean Class, Creating Hibernate Configuration File,
Adding a Mapping Class, Creating JSP’s, Running The Hibernate Application.
Books and References:
Sr. No. Title Author/s Publisher Edition Year
1. Java EE 7 For Beginners Sharanam Shah, SPD First 2017
Vaishali Shah
2. Java EE 8 Cookbook Elder Moraes Packt First 2018
3. Advanced Java Programming Uttam Kumar Roy Oxford First 2015
Press
4. Java EE 8 Application David R. Packt First 2017
Development Heffelfinger
5. Java EE 7 Essentials Arun Gupta O'Reilly First 2013

Course Outcome:
After completing the course, the learner will be able to:
CO1: Proficiently understand and apply servlets and database connectivity concepts to develop
dynamic web applications.
CO2: Demonstrate the ability to develop applications capable of managing cookies, sessions, and
performing file operations effectively.
CO3: Proficient in understanding and designing applications using Java Server Pages (JSP),
enabling dynamic and interactive web content creation.
CO4: Adept at comprehending and designing applications utilizing Enterprise Java Beans (EJB),
facilitating the development of scalable and distributed enterprise-level applications.
CO5: Possess a thorough understanding of persistence concepts, Hibernate framework, and the
ability to develop Java Persistence API (JPA) and Hibernate applications proficiently.
Emerging Technologies

B. Sc. (Information Technology) Semester – V


Course Name: Emerging Technologies Course Code: USIT507
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
 To gain a comprehensive understanding of Big Data, develop insights into NoSQL
databases, their history, advantages, and differences from SQL databases.
 To have an in-depth understanding of MongoDB's data modeling techniques, and to be
proficient in using the MongoDB shell.
 To have a comprehensive understanding of MongoDB's storage engine and indexing
mechanisms, be able to identify and address limitations in MongoDB deployments.
 To gain a comprehensive understanding of the evolution and advantages of SSD,
exploring technologies such as TimesTen, Redis etc, while also mastering jQuery for
efficient DOM traversal and manipulation.
 To understand and apply JSON grammar, syntax, and data types; create, parse, and persist
JSON objects and arrays; compare JSON with XML for data interchange.
Unit Details Lectures
Big Data: Getting Started, Big Data, Facts About Big Data, Big Data Sources,
Three Vs of Big Data, Volume, Variety, Velocity, Usage of Big Data, Visibility,
Discover and Analyze Information, Segmentation and Customizations, Aiding
Decision Making, Innovation, Big Data Challenges, Policies and Procedures,
Access to Data, Technology and Techniques, Legacy Systems and Big Data,
Structure of Big Data, Data Storage, Data Processing, Big Data Technologies
I NoSQL: SQL, NoSQL, Definition, A Brief History of NoSQL, ACID vs. BASE, 12
CAP Theorem (Brewer’s Theorem), The BASE, NoSQL Advantages and
Disadvantages, Advantages of NoSQL, Disadvantages of NoSQL, SQL vs.
NoSQL Databases, Categories of NoSQL Databases
Introducing MongoDB: History, MongoDB Design Philosophy, Speed,
Scalability, and Agility, Non-Relational Approach, JSON-Based Document Store,
Performance vs. Features, Running the Database Anywhere, SQL Comparison
The MongoDB Data Model: The Data Model, JSON and BSON, The Identifier
(_id), Capped Collection, Polymorphic Schemas, Object- Oriented Programming,
Schema Evolution
Using MongoDB Shell: Basic Querying, Create and Insert, Explicitly Creating
II Collections, Inserting Documents Using Loop, Inserting by Explicitly Specifying 12
_id, Update, Delete, Read, Using Indexes, Stepping Beyond the Basics, Using
Conditional Operators, Regular Expressions, MapReduce, aggregate(),Designing
an Application’s Data Model, Relational Data Modeling and Normalization,
MongoDB Document Data Model Approach
MongoDB Architecture: Core Processes, mongod, mongo, mongos, MongoDB
Tools, Standalone Deployment, Replication, Master/Slave Replication, Replica
Set, Implementing Advanced Clustering with Replica Sets, Sharding, Sharding
Components, Data Distribution Process, Data Balancing Process, Operations,
Implementing Sharding, Controlling Collection Distribution (Tag-Based
Sharding),Points to Remember When Importing Data in a Sharded Environment,
Monitoring for Sharding, Monitoring the Config Servers, Production
Cluster Architecture, Scenario 1,Scenario 2,Scenario 3,Scenario 4
MongoDB Storage Engine: Data Storage Engine, Data File (Relevant for
MMAPv1), Namespace (.ns File), Data File (Relevant for WiredTiger), Reads and
Writes, How Data Is Written Using Journaling, GridFS – The MongoDB File
System, The Rationale of GridFS, GridFSunder the Hood, Using GridFS,
Indexing, Types of Indexes, Behaviors and Limitations
MongoDB Use Cases: Use Case 1 -Performance Monitoring, Schema Design,
Operations, Sharding, Managing the Data, Use Case 2 – Social Networking,
Schema Design, Operations, Sharding
MongoDB Limitations: MongoDB Space Is Too Large (Applicable for
MMAPv1), Memory Issues (Applicable for Storage Engine MMAPv1), 32-bit vs.
III 64-bit, BSON Documents, Namespaces Limits, Indexes Limit, Capped 12
Collections Limit - Maximum Number of Documents in a Capped Collection,
Sharding Limitations, Shard Early to Avoid Any Issues, Shard Key Can’t Be
Updated, Shard Collection Limit, Select the Correct Shard Key, Security
Limitations, No Authentication by Default, Traffi c to and from MongoDB Isn’t
Encrypted, Write and Read Limitations, Case-Sensitive Queries, Type-Sensitive
Fields, No JOIN, Transactions, MongoDB Not Applicable Range
MongoDB Best Practices: Deployment, Hardware Suggestions from the
MongoDB Site, Few Points to be Noted, Coding, Application Response Time
Optimization, Data Safety, Administration, Replication Lag, Sharding,
Monitoring
The End of Disk? SSD and In-Memory Databases: The End of Disk?, Solid
State Disk, The Economics of Disk, SSD-Enabled Databases, In-Memory
IV Databases, TimesTen, Redis, SAP HANA, VoltDB, Oracle 12c “in-Memory 12
Database, Berkeley Analytics Data Stack and Spark, Spark Architecture
jQuery: Introduction, Traversing the DOM, DOM Manipulation with jQuery,
Events, Ajax with jQuery, jQuery Plug-ins, jQuery Image Slider
JSON: Introduction, JSON Grammar, JSON Values, JSON Tokens, Syntax,
JSON vs XML, Data Types, Objects, Arrays, Creating JSON, JSON Object,
V Parsing JSON, Persisting JSON, Data Interchange, JSON PHP, JSON HTML, 12
JSONP

Books and References:

Sr. No. Title Author/s Publisher Edition Year

1. Practical MongoDB Shakuntala Gupta dward Apress First 2015


NavinSabharwal
2. Beginning jQuery Jack Franklin Apress Second 2017
Russ Ferguson
3. Next Generation Guy Harrison Apress First 2015
Databases
4. Beginning JSON Ben Smith Apress First 2015
5. Mastering MongoDB Marko Aleksendric, Arek Packt First 2015
Borucki, Leandro Domingues

Course Outcome:
After completing the course, the learner will be able to:
CO1: Understand and articulate the foundational concepts and practical applications of
Big Data, and compare and contrast SQL and NoSQL databases.
CO2: Design and implement effective MongoDB data models utilizing JSON, BSON,
and various schema strategies; efficiently perform data operations using the MongoDB
shell.
CO3: Understand and utilize MongoDB's storage engine, journaling, and GridFS file
system; effectively design and implement MongoDB use cases.
CO4: Evaluate the benefits and implications of transitioning from traditional disk storage
to SSD and in-memory databases, proficiently use technologies like TimesTen, Redis,
etc., and effectively utilize jQuery for DOM manipulation.
CO5: Understanding of JSON, including its grammar, syntax, and data types, and be able
to create, parse, and persist JSON objects and arrays. They will also learn to compare
JSON with XML for data interchange and effectively use JSON in various web
development contexts.
Internet of Things: Theory and Practice Practical
B. Sc. (Information Technology) Semester – V
Course Name: Internet of Things: Theory and Practice Practical Course Code: USIT5P2

Periods per week (1 Period is 50 minutes) 3


Credits 2
Hours Marks
Evaluation System Practical Examination 2 50
Internal -- --

Practical No Details
0 Starting Raspbian OS, Familiarizing with Raspberry Pi Components and interface,
Connecting to ethernet, Monitor, USB.
1 Displaying different LED patterns with Raspberry Pi.

2 Displaying Time over 4-Digit 7-Segment Display using Raspberry Pi

3 Interfacing 16X2 LCD with Raspberry Pi to display different messages.

4 Raspberry Pi Based Oscilloscope

5 Controlling Raspberry Pi with WhatsApp.

6 Fingerprint Sensor interfacing with Raspberry Pi

7 Raspberry Pi GPS Module Interfacing

8 IoT based Web Controlled Home Automation using Raspberry Pi

9 Interfacing Pi Camera with Raspberry Pi

10 Interfacing Raspberry Pi with RFID.

11 Installing Windows 10 IoT Core on Raspberry Pi (Demo Practical)

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Designing the Internet of Adrian McEwen, WILEY First 2014
Things Hakim Cassimally
2. Official Raspberry Pi Gareth Halfacre Raspberry First 2018
Beginner's Guide Pi Press
3. Programming the Raspberry by Simon Monk McGraw Third 2021
Pi Hill
4. Getting Started with Matt Richardson and SPD Third 2016
Raspberry Pi Shawn Wallace
Advanced Web Development Practical

B. Sc. (Information Technology) Semester – V


Course Name: Advanced Web Development Practical Course Code: USIT5P3
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Write the program for the following:
a. Create an application to print on screen the output of adding, subtracting, multiplying and
dividing two numbers entered by the user in C#.
b. Create an application to print Floyd’s triangle till n rows in C#.
c. Create an application to demonstrate following operations i. Generate Fibonacci series. ii. Test
for prime numbers.

2. Write the program for the following:


a. Create a simple application to demonstrate the concepts boxing and unboxing.
b. Create a simple application to perform addition and subtraction using delegate.
c. Create a simple application to demonstrate use of the concepts of interfaces.

3. Write the program for the following:


a. Create a simple web page with various server controls to demonstrate setting and use of their
properties. (Example : AutoPostBack)
b. Create a simple application to demonstrate your vacation using calendar control.
c. Demonstrate the use of Treeview operations on the web form.

4. Write the program for the following:


a. Create a Registration form to demonstrate use of various Validation controls.
b. Create Web Form to demonstrate use of Adrotator Control.
c. Create Web Form to demonstrate use User Controls

5. Write the program for the following:


a. Create Web Form to demonstrate use of Website Navigation controls.
b. Create a web application to demonstrate use of Master Page and content page.
c. Create a web application to demonstrate various states of ASP.NET Pages.

6. Write the program for the following:


a. Create a web application for inserting and deleting records from a database.
b. Create a web application to display Using Disconnected Data Access and Databinding using
GridView.
7. Write the program for the following:
a. Create a web application to demonstrate the use of different types of Cookies.
b. Create a web application to demonstrate Form Security and Windows Security with proper
Authentication and Authorization properties.

8. Write the program for the following:


a. Create a web application for inserting and deleting records from a database. (Using Execute-
Non Query).
b. Create a web application for user defined exception handling.

9. Write the program for the following:


a. Create a web application to demonstrate use of GridView button column and GridView events
along with paging and sorting.
b. Create a web application to demonstrate data binding using DetailsView and FormView
Control.

10. Write the program for the following:


a. Create a web application to demonstrate JS Bootstrap Button.
b. Create a web application to demonstrate use of various Ajax controls.
c. Create a web application to demonstrate Installation and use of NuGet package.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Beginning Visual C# 2010 K. Watson, C. Nagel, J.H Wrox 2010
Padderson, J.D. Reid, (Wiley)
M.Skinner
2. Murach’s ASP.NET 4.6 Mary Delamater and Anne SPD Sixth 2016
Web Programming in Bohem
C#2015
3. ASP.NET 4.0 J. Kanjilal Tata 2011
programming McGrawH
ill
4. Programming ML.NET Dino Paperback
Esposito (Author), Frances
co Esposito (Author)
5. Ajax : A Beginner's Guide Steven Holzner Paperback 2017

6 Introducing Bootstrap 4 By Jörg Krause Apress 2016


Artificial Intelligence and Applications Practical
B. Sc. (Information Technology) Semester – V
Course Name: Artificial Intelligence and Applications Practical Course Code: USIT5P4
(Elective I)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Write programs for the following:
a. Implement depth first search algorithm.
b. Implement breadth first search algorithm.

2. Write programs for the following:


a. Simulate 4-Queen / N-Queen problem.
b. Solve tower of Hanoi problem.

3. Write programs for the following:


a. Implement alpha beta search.
b. Implement hill climbing problem.

4. Write programs for the following:


a. Implement A* algorithm.
b. Solve water jug problem.

5. Write programs for the following:


a. Simulate tic – tac – toe game using min-max algorithm.
b. Shuffle deck of cards.

6. Write program for the following:


a. Design an application to simulate number puzzle problem.

7. Write program for the following:


a. Solve constraint satisfaction problem.

8. Write programs for the following:


a. Derive the expressions based on Associative Law.
b. Derive the expressions based on Distributive Law.

9. Write program for the following:


a. Derive the predicate. (for e.g.: Sachin is batsman, batsman is cricketer)
- > Sachin is Cricketer
10. Write program for the following:
a. Write a program which contains three predicates: male, female, parent. Make rules for
following family relations: father, mother, grandfather, grandmother, brother, sister, uncle,
aunt, nephew and niece, cousin. Question: i. Draw Family Tree. ii. Define: Clauses, Facts,
Predicates and Rules with conjunction and disjunction

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Artificial Intelligence: A Stuart Russel and Pearson Third 2015
Modern Approach Peter Norvig
2. A First Course in Artificial Deepak Khemani TMH First 2017
Intelligence
3. Artificial Intelligence: A Rahul Deva Shroff First 2018
Rational Approach Publisher
4. Artificial Intelligence Elaine Rich, Kevin TMH Third 2009
Knight and
Shivashankar Nair
5. Artificial Intelligence & Soft Anandita Das SPD First 2013
Computing for Beginners Bhattacharjee
Essentials of Linux Server Administration Practical
B. Sc. (Information Technology) Semester – V
Course Name: Essentials of Linux Server Administration Practical Course Code: USIT5P5
(Elective-I)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Mark
s
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
0. Installation of RHEL6.x
1. Working with Users, Groups, and Permissions
a. Creating and Managing Users
b. Creating and Managing Groups
c. Using Permissions and Advanced Permissions

2. Working with Console, RPM, and Yum


a. Managing Console and Gaining Privileges
b. Working with RPM
c. Working with Yum

3. Working with Storage, Network and Infrastructure services


a. Configuring and Managing Storage
b. Connecting to the Network
c. Configuring and enabling Infrastructure services
d. Configuring OpenSSH

4. Configuring Server for File Sharing


a. Configuring NFS Server and Client
b. Configuring Samba
c. Configuring FTP

5. Configuring DHCP, DNS, Web and Mail Servers


a. Configuring DHCP server
b. Configuring DNS server
c. Configuring Web server
d. Configuring Mail server

6. Configuring Monitoring and Automation tools


a. Configuring System Monitoring tools
b. Configuring rsyslog
c. Configuring cron, anacron, At and Batch Utility
7. Firewall and Cryptographic services
a. Securing Server with iptables
b. Setting Up Cryptographic Services

8. Write the program for the following:


a. Programs on Shell scripting
b. Shell scripts to automate or monitor tasks/processes

9. Perform Daily System Administration tasks


a. Managing Processes
b. Working with Storage Devices and Links
c. Working with repository

10. Configuring selinux


a. Working with selinux

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1 Red Hat Enterprise Sander van Sybex First 2013
. Linux6 Administration Vugt
2 Red Hat Enterprise Linux 6 Red Hat Red Hat First 2021
. Deployment Guide Content
Services
3 Red hat Linux Terry Collings Wiley Third 2005
. Networking and System and
Administration Kurt Wall
4 Linux Administration: A Wale Soyinka TMH Eighth 2020
. Beginner's Guide
5 RedHat certified System William Emero Second 2012
. Administrator Maning Publishing
Advanced Java Technologies Practical
B. Sc. (Information Technology) Semester – V
Course Name: Advanced Java Technologies Practical Course Code: USIT5P6
(Elective-II)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Implement the following Simple Servlet applications.
a. Create a simple calculator application using servlet.
b. Create a servlet for a login page. If the username and password are correct then it says
message “Hello <username>” else a message “login failed”
c. Create a registration servlet in Java using JDBC. Accept the details such as Username,
Password, Email, and Country from the user using HTML Form and store the registration
details in the database.

2. Implement the following Servlet applications with Cookies and Sessions.


a. Using Request Dispatcher Interface create a Servlet which will validate the password entered
by the user, if the user has entered "Servlet" as password, then he will be forwarded to
Welcome Servlet else the user will stay on the index.html page and an error message will be
displayed.
b. Create a servlet that uses Cookies to store the number of times a user has visited servlet.
c. Create a servlet demonstrating the use of session creation and destruction. Also check whether
the user has visited this page first time or has visited earlier also using sessions.

3. Implement the Servlet IO and File applications.


a. Create a Servlet application to upload and download a file.
b. Develop Simple Servlet Question Answer Application using Database.
c. Create simple Servlet application to demonstrate Non-Blocking Read Operation.

4. Implement the following JSP applications.


a. Develop a simple JSP application to display values obtained from the use of intrinsic objects
of various types.
b. Develop a simple JSP application to pass values from one page to another with
validations. (Name-txt, age-txt, hobbies-checkbox, email-txt, gender-radio button).
c. Create a registration and login JSP application to register and authenticate the user based
on username and password using JDBC.

5. Implement the following JSP JSTL and EL Applications.


a. Create an html page with fields, eno, name, age, desg, salary. Now on submit this data to
a JSP page which will update the employee table of database with matching eno.
b. Create a JSP page to demonstrate the use of Expression language.
c. Create a JSP application to demonstrate the use of JSTL.

6. Implement the following EJB Applications.


a. Create a Currency Converter application using EJB.
b. Develop a Simple Room Reservation System Application Using EJB.
c. Develop simple shopping cart application using EJB [Stateful Session Bean].

7. Implement the following EJB applications with different types of Beans.


a. Develop simple EJB application to demonstrate Servlet Hit count using Singleton Session
Beans.
b. Develop simple visitor Statistics application using Message Driven Bean [Stateless Session
Bean].
c. Develop simple Marks Entry Application to demonstrate accessing Database using EJB.

8. Implement the following JPA applications.


a. Develop a simple Inventory Application Using JPA.
b. Develop a Guestbook Application Using JPA.
c. Create simple JPA application to store and retrieve Book details.

9. Implement the following JPA applications with ORM and Hibernate.


a. Develop a JPA Application to demonstrate use of ORM associations.
b. Develop a Hibernate application to store Feedback of Website Visitor in MySQL
Database.
c. Develop a Hibernate application to store and retrieve employee details in MySQL
Database.

10. Implement the following Hibernate applications.


a. Develop an application to demonstrate Hibernate One- To -One Mapping Using
Annotation.
b. Develop Hibernate application to enter and retrieve course details with ORM
Mapping.
c. Develop a five page web application site using any two or three Java EE
Technologies.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Java EE 7 For Beginners Sharanam Shah, SPD First 2017
Vaishali Shah
2. Java EE 8 Cookbook Elder Moraes Packt First 2018
3. Advanced Java Programming Uttam Kumar Roy Oxford First 2015
Press
4. Java EE 8 Application David R. Packt First 2017
Development Heffelfinger
5. Java EE 7 Essentials Arun Gupta O'Reilly First 2013
Emerging Technologies Practical

B. Sc. (Information Technology) Semester – V


Course Name: Emerging Technologies Practical Course Code: USIT5P7
(Elective-II)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. MongoDB Basics
a. Write a MongoDB query to create and drop database.
b. Write a MongoDB query to create, display and drop collection
c. Write a MongoDB query to insert, query, update and delete a document.

2. Simple Queries with MongoDB

3. Implementing Aggregation
a. Write a MongoDB query to use sum, avg, min and max expression.
b. Write a MongoDB query to use push and addToSet expression.
c. Write a MongoDB query to use first and last expression.

4. Replication, Backup and Restore


a. Write a MongoDB query to create Replica of existing database.
b. Write a MongoDB query to create a backup of existing database.
c. Write a MongoDB query to restore database from the backup.

5. Java and MongoDB


a. Connecting Java with MongoDB and inserting, retrieving, updating and deleting.

6. PHP and MongoDB


a. Connecting PHP with MongoDB and inserting, retrieving, updating and deleting.

7. Python and MongoDB


a. Connecting Python with MongoDB and inserting, retrieving, updating and deleting.
8. Programs on Basic jQuery
a. jQuery Basic, jQuery Events
b. jQuery Selectors, jQuery Hide and Show effects
c. jQuery fading effects, jQuery Sliding effects

9. jQuery Advanced
a. jQuery Animation effects, jQuery Chaining
b. jQuery Callback, jQuery Get and Set Contents
c. jQuery Insert Content, jQuery Remove Elements and Attribute

10. JSON & Mongo DB


a. Creating JSON
b. Parsing JSON
c. Persisting JSON
d. Export MongoDB to JSON.
e. Write a MongoDB query to delete JSON object from MongoDB.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Practical MongoDB Shakuntala Gupta Apress First 2015
Edward Navin
Sabharwal
2. Beginning jQuery Jack Franklin
3. Russ Ferguson Apress Second 2017
4. Next Generation Databases Guy Harrison Apress First 2015
5. Beginning JSON Ben Smith Apress First 2015
Semester –VI
Software Testing and Quality Assurance

B. Sc. (Information Technology) Semester – VI


Course Name: Software Testing and Quality Assurance Course Code: USIT601
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
 To understand the effective testing techniques for ensuring high quality software.
 To become familiar with quality assurance metrics and comprehend test tool capabilities.
 To become proficient in test project planning, test case and data design, testing operations.
 To understand the challenges and solutions related to software test automation.
 To understand the taxonomy of testing tools.

Unit Details Lectures


Introduction to Quality: Historical Perspective of Quality, What is Quality? (Is
it a fact or perception?), Definitions of Quality, Core Components of Quality,
Quality View, Financial Aspect of Quality, Customers, Suppliers and Processes,
Total Quality Management (TQM), Quality Principles of Total Quality
Management, Quality Management Through Statistical Process Control, Quality
Management Through Cultural Changes, Continual (Continuous) Improvement
Cycle, Quality in Different Areas, Benchmarking and Metrics, Problem Solving
Techniques, Problem Solving Software Tools.
I 12
Software Quality: Introduction, Constraints of Software Product Quality
Assessment, Customer is a King, Quality and Productivity Relationship,
Requirements of a Product, Organisation Culture, Characteristics of Software,
Software Development Process, Types of Products, Schemes of Criticality
Definitions, Problematic Areas of Software Development Life Cycle, Software
Quality Management, Why Software Has Defects? Processes Related to
Software Quality, Quality Management System Structure, Pillars of Quality
Management System, Important Aspects of Quality Management.
Fundamentals of testing: Introduction, Necessity of testing, What is testing?
Fundamental test process, The psychology of testing, Historical Perspective of
Testing, Definitions of Testing, Approaches to Testing, Testing During
Development Life Cycle, Requirement Traceability Matrix, Essentials of
Software Testing, Workbench, Important Features of Testing Process,
Misconceptions About Testing, Principles of Software Testing, Salient Features
II of Good Testing, Test Policy, Test Strategy or Test Approach, Test Planning, 12
Testing Process and Number of Defects Found in Testing, Test Team Efficiency,
Mutation Testing, Challenges in Testing, Test Team Approach, Process Problems
Faced by Testing, Cost Aspect of Testing, Establishing Testing Policy, Methods,
Structured Approach to Testing, Categories of Defect, Defect, Error, or Mistake
in Software, Developing Test Strategy, Developing Testing Methodologies (Test
Plan), Testing Process, Attitude Towards Testing (Common People Issues),
Test Methodologies/Approaches, People Challenges in Software Testing,
Raising Management Awareness for Testing, Skills Required by Tester, Testing
throughout the software life cycle, Software development models, Test
levels, Test types, the targets of testing, Maintenance testing.
Unit Testing: Boundary Value Testing: Normal Boundary Value Testing,
Robust Boundary Value Testing, Worst-Case Boundary Value Testing, Special
Value Testing, Examples, Random Testing, Guidelines for Boundary Value
Testing,
Equivalence Class Testing: Equivalence Classes, Traditional Equivalence Class
Testing, Improved Equivalence Class Testing, Edge Testing, Guidelines and
III Observations. 12
Decision Table–Based Testing: Decision Tables, Decision Table Techniques,
Cause-and-Effect Graphing, Guidelines and Observations,
Path Testing: Program Graphs, DD-Paths, Test Coverage Metrics, Basis Path
Testing, Guidelines and Observations,
Data Flow Testing: Define/Use Testing, Slice-Based Testing, Program Slicing
Tools.
Software Verification and Validation: Introduction, Verification, Verification
Workbench, Methods of Verification, Types of reviews on the basis of Stage
Phase, Entities involved in verification, Reviews in testing lifecycle, Coverage
in Verification, Concerns of Verification, Validation, Validation Workbench,
Levels of Validation, Coverage in Validation, Acceptance Testing, Management
IV of Verification and Validation, Software development verification and validation 12
activities.
V-test Model: Introduction, V-model for software, testing during Proposal
stage, Testing during requirement stage, Testing during test planning phase,
Testing during design phase, Testing during coding, VV Model, Critical Roles
and Responsibilities.
Levels of Testing: Introduction, Proposal Testing, Requirement Testing, Design
Testing, Code Review, Unit Testing, Module Testing, Integration Testing, Big-
Bang Testing, Sandwich Testing, Critical Path First, Sub System Testing, System
Testing, Testing Stages.
Testing Tools: Introduction, Features of Test tools, Guidelines for selecting a
tool, Tool and skills of a tester, Static Testing tools, Dynamic Testing tools,
V Advantages of using Tools, Disadvantages of Using Tools, When to use 12
Automated Test tools, Testing Using Automated Tools, Difficulties while
introducing new tools.
Taxonomy of testing tools: Functional/Regression testing tools, Source code
testing tools, Performance testing tools, Java testing tools, Embedded software
testing tools, Network protocol testing tools, Configuration management /Bug
tracking tools, Testing management tools. How to select a testing tools?

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Software Testing and William E. Lewis CRC Third 2016
Continuous Quality Press
Improvement
2. Software Testing: Principles, M. G. Limaye TMH 2017
Techniques
and Tools
3. Foundations of Software Testing Dorothy Graham, Cengage 3rd
Erik van Veenendaal, Learning
Isabel Evans, Rex
Black
4. Software Testing: A Paul C. Jorgenson CRC 4th 2017
Craftsman’s Approach Press
5. Software Testing Tools Dr.K. V. K. K. Prasad. Dreamtech
Press

Course Outcome:
After completing the course, the learner will be able to:
CO1: Learners understand various software testing methods.
CO2: Learners can identify defects and manage those defects for improvement in quality.
CO3: Learners analyze and comprehend the use of modern software testing tools and procedures
for their projects testing.
CO4: Understand and apply methods for verifying and validating software to ensure it meets
requirements and functions correctly.
CO5: Gain comprehensive knowledge of various testing levels and methodologies to ensure
thorough software quality assurance from requirements to system testing stages.
Information Security
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Course Code: USIT602
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of Information protection
● To learn current best practices in storage capacity
● To understand the fundamental security aspects of network devices and learn techniques
for hardening network devices against attacks.
● To familiarize Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
● To understand the security considerations for virtual machines and security aspects of
cloud computing

Unit Details Lectures


Information Security Overview: The Importance of Information
Protection, The Evolution of Information Security, Justifying Security
Investment, Security Methodology, How to Build a Security Program, The
Impossible Job, The Weakest Link, Strategy and Tactics, Business
I 12
Processes vs. Technical Controls.
Risk Analysis: Threat Definition, Types of Attacks, Risk Analysis, Secure
Design Principles: The CIA Triad and Other Models, Defense Models,
Zones of Trust, Best Practices for Network Defense.
Authentication and Authorization: Authentication, Authorization
Encryption: A Brief History of Encryption, Symmetric-Key
Cryptography, Public Key Cryptography, Public Key Infrastructure.
Storage Security: Storage Security Evolution, Modern Storage Security,
II Risk Remediation, Best Practices. 12
Database Security: General Database Security Concepts, Understanding
Database Security Layers, Understanding Database- Level Security,
Using Application Security, Database Backup and Recovery, Keeping
Your Servers Up to Date, Database Auditing and Monitoring.
Secure Network Design: Introduction to Secure Network Design,
Performance, Availability, Security.
Network Device Security: Switch and Router Basics, Network
Hardening.
III Firewalls: Overview, The Evolution of Firewalls, Core Firewall 12
Functions, Additional Firewall Capabilities, Firewall Design.
Wireless Network Security: Radio Frequency Security Basics, Data-
Link Layer Wireless Security Features, Flaws, and Threats, Wireless
Vulnerabilities and Mitigations, Wireless Network Hardening Practices
and Recommendations, Wireless Intrusion Detection and Prevention,
Wireless Network Positioning and Secure Gateways.
Intrusion Detection and Prevention Systems: IDS Concepts, IDS Types
and Detection Models, IDS Features, IDS Deployment Considerations,
Security Information and Event Management (SIEM). Voice over IP
(VoIP) and PBX Security: Background, VoIP Components, VoIP
IV Vulnerabilities and Countermeasures, PBX, TEM: Telecom Expense 12
Management.
Operating System Security Models: Operating System Models, Classic
Security Models, Reference Monitor, Trustworthy Computing,
International Standards for Operating System Security.
Virtual Machines and Cloud Computing: Virtual Machines, Cloud
Computing.
Secure Application Design: Secure Development Lifecycle, Application
Security Practices, Web Application Security, Client Application
V 12
Security, Remote Administration Security.
Physical Security: Classification of Assets, Physical Vulnerability
Assessment, Choosing Site Location for Security,
Securing Assets: Locks and Entry Controls, Physical Intrusion Detection.

Books and References:


Sr. Title Author/s Publisher Edition Year
No.
1. The Complete Reference: Mark Rhodes- McGraw- Second 2013
Information Security Ousley Hill
2. Essential Cybersecurity Josiah Dykstra O’Reilly Fifth 2017
Science
3. Principles of Computer Wm.Arthur McGraw Second 2010
Security: CompTIA Conklin, Greg Hill
Security+ and Beyond White

Course Outcome:
After completing the course, the learner will be able to:
CO1: Understanding the importance of information protection.
CO2: Comprehending the evolution of information security.
CO3: Utilize established methodologies for implementing and managing security
CO4: Analysing Intrusion Detection and Prevention Systems, Voice over IP(VoIP) and PBX
security
CO5: Understanding the security considerations for virtual machines and security aspects of
cloud computing
Business Intelligence and Data Analytics
B. Sc. (Information Technology) Semester – VI
Course Name: Business Intelligence and Data Analytics Course Code: USIT603
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25
Course Objective:
● To understand the importance of business intelligence in facilitating effective and timely
decision-making processes within organizations.
● Explore different classes of mathematical models and their applications in various decision-
making scenarios.
● Understand the concept of classification problems and their applications in various
domains.
● Study relational marketing models and their application in building and maintaining
customer relationships.
● Study different types of organizational culture, including hierarchical, clan, adhocracy and
market cultures.

Unit Details Lectures


Business intelligence: Effective and timely decisions, Data, information and
knowledge, The role of mathematical models, Business intelligence
architectures, Ethics and business intelligence Decision support systems:
I 12
Definition of system, Representation of the decision-making process,
Evolution of information systems, Definition of decision support system,
Development of a decision support system
Mathematical models for decision making: Structure of mathematical
models, Development of a model, Classes of models Data mining: Definition
II of data mining, Representation of input data, Data mining process, Analysis 12
methodologies Data preparation: Data validation, Data transformation, Data
reduction
Classification: Classification problems, Evaluation of classification models,
Bayesian methods, Logistic regression, Neural networks, Support vector
III 12
machines Clustering: Clustering methods, Partition methods, Hierarchical
methods, Evaluation of clustering models
Management Information System (MIS): Classification and Quality of
IV Information, Marketing models: Relational marketing, Sales force 12
management, Logistic and production models: Supply chain optimization,
Optimization models for logistics planning, Revenue management systems.
Data envelopment analysis, The CCR model, Identification of good operating
practices
Knowledge Management Metrics, Organizational Culture-Types and analysis,
Organizational maturity model, Artificial Intelligence and Expert Systems:
V Concepts and Definitions of Artificial Intelligence, Artificial Intelligence 12
Versus Natural Intelligence, Machine Learning- Data Distribution, Machine
Learning Process, Tools, TensorFlow

Books and References:


Sr. Title Author/s Publisher Edition Year
No.
1. Business Intelligence: Carlo Vercellis Wiley First 2009
Data Mining and
Optimization for Decision
Making
2. Fundamental of Business Grossmann W, Springer F First 2015
Intelligence Rinderle-Ma
3. Decision support and Efraim Turban, Pearson Ninth 2011
Business Intelligence Ramesh Sharda,
Systems Dursun Delen
4. Machine learning Saikat Dutt Pearson
Subramanian
Chandramouli
Course Outcome:
After completing the course, the learner will be able to:
CO1: Learners can explore the concepts of Strategic Decision Support and Harnessing Data
for Informed Business Decisions
CO2: Application used for Data-Driven Mathematical Models and Data Mining for Informed
Decision Making
CO3: Managing data through Advanced Data Analysis Techniques: Classification,
Clustering, and Model Evaluation
CO4: Analyzing Strategic Information Management: Enhancing Decision-Making Across
Marketing, Logistics, and Production
CO5: Fact findings using Strategic Organizational Intelligence: Bridging Gaps, Cultivating
Knowledge, and Embracing Artificial Intelligence
Fundamentals of GIS
B. Sc. (Information Technology) Semester – VI
Course Name: Fundamentals of GIS Course Code: USIT604
(Elective-I)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hour Marks
s
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
● To understand the principles of Geographical Information System
● To learn Data Management and Processing Systems Hardware and Software Trends
● To understand Spatial Referencing and Positioning
● To understand the Classification of analytical GIS Capabilities
● To understand Data visualization and its strategies
Unit Details Lectures
A Gentle Introduction to GIS: The nature of GIS: Some fundamental
observations, Defining GIS, GISystems, GIScience and GIApplications,
Spatial data and Geoinformation.
The real world and representations of it: Models and modelling, Maps,
Databases, Spatial databases and spatial analysis Geographic Information
and Spatial Database Models and Representations of the real world
I Geographic Phenomena: Defining geographic phenomena, types of 12
geographic phenomena, Geographic fields, Geographic objects, Boundaries
Computer Representations of Geographic Information: Regular
tessellations, irregular tessellations, Vector representations, Topology and
Spatial relationships, Scale and Resolution, Representation of Geographic
fields, Representation of Geographic objects Organizing and Managing
Spatial Data The Temporal Dimension
Data Management and Processing Systems, Hardware and Software
Trends
Geographic Information Systems: GIS Software, GIS Architecture and
functionality, Spatial Data Infrastructure (SDI)
Stages of Spatial Data handling: Spatial data handling and preparation,
Spatial Data Storage and maintenance, Spatial Query and Analysis, Spatial
II 12
Data Presentation.
Database management Systems: Reasons for using a DBMS, Alternatives
for data management, The relational data model, Querying the relational
database.
GIS and Spatial Databases: Linking GIS and DBMS, Spatial database
functionality.
Spatial Referencing and Positioning
III Spatial Referencing: Reference surfaces for mapping, Coordinate 12
Systems, Map Projections, Coordinate Transformations
Satellite-based Positioning: Absolute positioning, Errors in absolute
positioning, Relative positioning, Network positioning, code versus phase
measurements, Positioning technology Data Entry and Preparation
Spatial Data Input: Direct spatial data capture, Indirect spatial data
capture, Obtaining spatial data elsewhere
Data Quality: Accuracy and Positioning, Positional accuracy, Attribute
accuracy, temporal accuracy, Lineage, Completeness, Logical consistency
Data Preparation: Data checks and repairs, Combining data from multiple
sources
Point Data Transformation: Interpolating discrete data, Interpolating
continuous data
Spatial Data Analysis: Classification of analytical GIS Capabilities
Retrieval, classification and measurement: Measurement, Spatial selection
queries, Classification
Overlay functions: Vector overlay operators, Raster overlay operators
Neighbourhood functions: Proximity computations, Computation of
IV 12
diffusion, Flow computation, Raster based surface analysis
Analysis: Network analysis, interpolation, terrain modeling GIS and
Application models: GPS, Open GIS Standards, GIS Applications and
Advances Error Propagation in spatial data processing: How Errors
propagate, Quantifying error propagation
Data Visualization: GIS and Maps, The Visualization Process
Visualization Strategies: Present or explore? The cartographic toolbox:
What kind of data do I have? How can I map my data? How to map? How
V 12
to map qualitative data, How to map quantitative data, How to map the
terrain elevation, How to map time series Map Cosmetics, Map
Dissemination

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Principles of Editors: Otto The Fourth 2009
Geographic Huisman and Rolf International
Information Systems- A. Institute of
An Introductory Text Geoinformation
Book Science and
Earth
Observation
2. Principles of P.A Burrough and Oxford Third 1999
Geographic R.A.McDonnell University
Information Systems Press
3. Introduction to Chang Kang-tsung McGrawHill 2013
Geographic (Karl), 7th
Information Systems
Course Outcome:
After completing the course, the learner will be able to:
CO1: Understanding the importance of Geographical Information System
CO2: Comprehending the Data Management and Processing Systems.
CO3: Understanding Spatial Referencing and Positioning
CO4: Analysing GIS capabilities
CO5: Understanding Data visualization
Enterprise Network Design

B. Sc. (Information Technology) Semester – VI


Course Name: Enterprise Network Design Course Code: USIT605
(Elective-I)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
 To understand and apply network design principles, including architectures, lifecycle, and high
availability protocols.
 To master enterprise LAN and data center design, focusing on Ethernet rules, storage, and data
center infrastructure.
 To explore wireless LAN technologies, including design considerations, security, and quality of
scalable networks.
 To develop an IPv4 addressing plan for a hierarchical network infrastructure
 To develop Internet Protocol design, security management, and integrating security mechanisms
into network infrastructure.

Unit Details Lectures


General Network Design: Network Design Methodology, Architectures for the
Enterprise, Borderless Networks Architecture, Collaboration and Video
Architecture, Data Center and Virtualization Architecture, Design Lifecycle:
Plan, Build, Manage Plan Phase Build Phase Manage Phase Prepare, Plan,
Design, Implement, Operate, and Optimize Phases Prepare Phase Plan Phase
Design Phase Implement Phase Operate Phase Optimize Phase Summary of
PPDIOO Phases Project Deliverables Design Methodology Identifying
Customer Design Requirements Characterizing the Existing Network Steps in
Gathering Information Network Audit Tools Network Checklist Designing the
Network Topology and Solutions Top-Down Approach Pilot and Prototype
Tests Design Document
I Network Design Models: Hierarchical Network Models Benefits of the 12
Hierarchical Model, Hierarchical Network Design, Core Layer, Distribution
Layer, Access Layer, Hierarchical Model Examples, Hub-and-Spoke, Design
Collapsed Core, Design Enterprise Architecture Model, Enterprise Campus
Module, Enterprise Edge Area, E-Commerce Module, Internet Connectivity
Module, VPN/Remote Access, Enterprise WAN, Service Provider Edge
Module, Remote Modules, Enterprise Branch Module, Enterprise Data Center
Module, Enterprise Teleworker Module, High Availability Network Services,
Workstation-to-Router Redundancy and LAN, High Availability Protocols,
ARP Explicit Configuration, RDP, RIP, HSRP, VRRP, GLBP, Server
Redundancy, Route Redundancy, Load Balancing, Increasing Availability, Link
Media Redundancy
Enterprise LAN Design: LAN Media, Ethernet Design Rules, 100Mbps Fast
II 12
Ethernet Design Rules, Gigabit Ethernet Design Rules, 1000BASE-LX Long-
Wavelength Gigabit Ethernet, 1000BASE-SX Short-Wavelength Gigabit
Ethernet, 1000BASE-CX Gigabit Ethernet over Coaxial Cable, 1000BASE-T
Gigabit Ethernet over UTP 86, 10 Gigabit Ethernet Design Rules, 10GE Media
Types, EtherChannel, Comparison of Campus Media LAN Hardware,
Repeaters, Hubs, Bridges, Switches, Routers, Layer 3 Switches, Campus LAN
Design and Best Practices Best Practices for Hierarchical Layers, Access Layer
Best Practices, Distribution Layer Best Practices, Core Layer Best Practices,
STP Design Considerations, STP Toolkit, PortFast
UplinkFast, BackboneFast, Loop Guard, Root Guard, BPDU Guard, BPDU
Filter, VLAN and Trunk Considerations, Unidirectional Link Detection
(UDLD) Protocol, Large-Building LANs, Enterprise Campus LANs, Edge
Distribution, Medium-Size LANs, Small and Remote Site LANs, Server Farm
Module, Server Connectivity Options, Enterprise Data Center Infrastructure,
Campus LAN QoS Considerations, Multicast Traffic Considerations, CGMP,
IGMP Snooping.
Data Center Design: Enterprise DC Architecture, Data Center Foundation
Components, Data Center Topology Components, Data Center Network
Programmability, SDN, Controllers, APIs, ACI, Challenges in the DC, Data
Center Facility Aspects, Data Center Space, Data Center Power, Data Center
Cooling, Data Center Heat, Data Center Cabling, Enterprise DC Infrastructure,
Data Center Storage, Data Center Reference Architecture, Defining the DC
Access Layer, Defining the DC Aggregation Layer, Defining the DC Core
Layer, Security in the DC, Fabric Extenders, Virtualization Overview,
Challenges, Defining Virtualization and Benefits, Virtualization Risks, Types
of Virtualization, Virtualization Technologies, VSS, VRF, vPC, Device
Contexts, Server Virtualization, Server Scaling, Virtual Switching, Network
Virtualization Design Considerations, Access Control, Path Isolation, Services
Edge, Data Center Interconnect, DCI Use Cases, DCI Transport Options, DCI
L2 Considerations, Load Balancing in the DC, Application Load Balancing,
Network Load Balancing.

Wireless LAN Design: Wireless LAN Technologies, WLAN Standards, ISM


and UNII Frequencies, Summary of WLAN Standards, Service Set Identifier,
WLAN Layer 2 Access Method, WLAN Security, Unauthorized Access,
WLAN Security Design Approach, IEEE 802.1X-2001 Port-Based
Authentication, Dynamic WEP Keys and LEAP, Controlling WLAN Access to
Servers, WLAN Authentication, Authentication Options, WLAN Controller
Components, WLC Interface Types, AP Controller Equipment Scaling,
Roaming and Mobility Groups, Intracontroller Roaming, Layer 2 Intercontroller
III 12
Roaming, Layer 3 Intercontroller Roaming, Mobility Groups, WLAN Design,
Controller Redundancy Design: Deterministic vs. Dynamic, N+1 WLC
Redundancy, N+N WLC Redundancy, N+N+1 WLC Redundancy, Radio
Management and Radio Groups, RF Groups, RF Site Survey, Using EoIP
Tunnels for Guest Services, Wireless Mesh for Outdoor Wireless, Mesh Design
Recommendations, Campus Design Considerations, Power over Ethernet (PoE),
Wireless and Quality of Service (QoS), Branch Design Considerations, Local
MAC, REAP, Hybrid REAP, Branch Office Controller Options
WAN Technologies and the Enterprise Edge: WAN and Enterprise Edge
Overview, Definition of WAN, WAN Edge Module, Enterprise
Edge Modules, WAN Transport Technologies, ISDN, ISDN BRI Service, ISDN
PRI Service, Digital Subscriber Line, Cable, Wireless, Frame Relay, Time-
Division Multiplexing, Metro Ethernet, SONET/SDH, Multiprotocol Label
Switching (MPLS), Dark Fiber, Dense Wavelength-Division Multiplexing,
Ordering WAN Technology and Contracts, WAN and Edge Design
Methodologies, Response Time, Throughput, Reliability, Bandwidth
Considerations, WAN Link Categories, Optimizing Bandwidth Using QoS,
Queuing, Traffic Shaping and Policing, Classification, Congestion
Management, Priority Queuing, Custom Queuing, Weighted Fair Queuing,
Class-Based Weighted Fair Queuing, Low-Latency Queuing, Traffic Shaping
and Policing, Link Efficiency, Window Size, DMZ Connectivity, Segmenting
DMZs, DMZ Services, Internet Connectivity, Centralized Internet (Branch) vs.
Direct Internet (Branch), High Availability for the Internet Edge, VPN Network
Design.
WAN Design
Traditional WAN Technologies Hub-and-Spoke Topology
Full-Mesh Topology Partial-Mesh Topology Point-to-Point Topology Remote
Site Connectivity
Enterprise VPN vs. Service Provider VPN Enterprise Managed VPN: IPsec
IPsec Direct Encapsulation Generic Routing Encapsulation IPsec DMVPN
IPsec Virtual Tunnel Interface Design GETVPN Service Provider–Managed
Offerings ,Metro Ethernet Service Provider VPNs: L2 vs. L3 ,Virtual Private
Wire Services VPWS L2 VPN Considerations ,Virtual Private LAN Services
VPLS L2 VPN Considerations ,MPLS, MPLS Layer 3 Design Overview MPLS
L3 VPN Considerations ,VPN Benefits WAN Backup Design WAN Backup
over the Internet Enterprise WAN Architecture Cisco Enterprise MAN/WAN
Enterprise WAN/MAN Architecture Comparison ,Enterprise WAN
Components Comparing Hardware and Software Enterprise Branch
Architecture Branch Design Branch Connectivity Redundancy for Branches
Single WAN Carrier vs. Dual WAN Carriers Single MPLS Carrier Site ,Dual
MPLS Carriers Hybrid WAN: L3 VPN with IPsec VPN ,Internet for Branches
Flat Layer 2 vs. Collapsed Core ,Enterprise Branch Profiles Small Branch
Design Medium Branch Design Large Branch Design Enterprise Teleworker
Design ,ISRs for Teleworkers
Internet Protocol Version 4 Design,IPv4 Header ToS IPv4 Fragmentation IPv4
Addressing ,IPv4 Address Classes Class A Addresses Class B Addresses ,Class
C Addresses Class D Addresses Class E Addresses ,IPv4 Address Types IPv4
Private Addresses NAT ,IPv4 Address Subnets Mask Nomenclature IP Address
Subnet Design Example Determining the Network Portion of an IP Address
Variable-Length Subnet Masks, Loopback Addresses IP Telephony Networks
IV ,IPv4 Addressing Design Goal of IPv4 Address Design , Plan for Future Use of 12
IPv4 Addresses , Performing Route Summarization , Plan for a
Hierarchical IP Address Network , Private and Public IP Address and NAT
Guidelines , Steps for Creating an IPv4 Address Plan
Case Study: IP Address Subnet Allocation , Address Assignment and Name
Resolution , Recommended Practices of IP Address Assignment , BOOTP
DHCP DNS , Internet Protocol Version 6 Design, IPv6 Header IPv6 Address
Representation IPv4-Compatible IPv6 Addresses IPv6 Prefix Representation
IPv6 Address Scope Types and Address Allocations IPv6 Address Allocations
IPv6 Unicast Address Global Unicast Addresses Link-Local Addresses , Unique
Local IPv6 Address Global Aggregatable IPv6 Address , IPv4-Compatible IPv6
Address IPv6 Anycast Addresses , IPv6 Multicast Addresses IPv6 Mechanisms
ICMPv6 , IPv6 Neighbor Discovery Protocol IPv6 Name Resolution , Path
MTU Discovery IPv6 Address-Assignment Strategies , Manual Configuration
SLAAC of Link-Local Address , SLAAC of Globally Unique IPv6 Address
DHCPv6 , DHCPv6 Lite IPv6 Security IPv6 Routing Protocols
RIPng OSPFv3 , BGP4 Multiprotocol Extensions (MP-BGP) for IPv6 , IPv6
Addressing Design , Planning for Addressing with IPv6 , Route Summarization
with IPv6 IPv6 Private Addressing
IPv6 for the Enterprise IPv6 Address Allocation , Partly Linked IPv4
Address into IPv6, Whole IPv4 Address Linked into IPv6
IPv6 Addresses Allocated Per Location and/or Type , IPv4-to-IPv6 Transition
Mechanisms and Deployment Models , Dual-Stack Mechanism IPv6 over IPv4
Tunnels , Protocol Translation Mechanisms IPv6 Deployment Models , Dual-
Stack Model Hybrid Model Service Block Model ,IPv6 Deployment Model
Comparison IPv6 Comparison with IPv4 ,OSPF, BGP, Route Manipulation, and
IP Multicast,OSPFv2 OSPFv2 Metric OSPFv2 Adjacencies and Hello Timers ,
OSPFv2 Areas OSPF Area Design Considerations OSPF Router Types OSPF
DRs LSA Types Autonomous System External Path Types OSPF Stub Area
Types Stub Areas Totally Stubby Areas , NSSAs Virtual Links OSPFv2 Router
Authentication , OSPFv2 Summary OSPFv3 OSPFv3 Changes from OSPFv2,
OSPFv3 Areas and Router Types OSPFv3 LSAs OSPFv3 Summary
BGP BGP Neighbors eBGP iBGP Route Reflectors Confederations BGP
Administrative Distance, BGP Attributes, Weight, and the BGP Decision
Process
BGP Path Attributes Next-Hop Attribute Local Preference Attribute Origin
Attribute Autonomous System Path Attribute
MED Attribute Community Attribute Atomic Aggregate and Aggregator
Attributes Weight BGP Decision Process, BGP Summary, Route Manipulation
PBR Route Summarization
Route Redistribution Default Metric OSPF Redistribution Route Filtering
Transit Traffic Routing Protocols on the Hierarchical Network Infrastructure IP
Multicast Review, Multicast Addresses Layer 3 to Layer 2 Mapping IGMP,
IGMPv1 IGMPv2 IGMPv3 CGMP IGMP Snooping, Sparse Versus Dense
Multicast Multicast Source and Shared
Trees PIM PIM-SM PIM DR Auto-RP PIMv2 Bootstrap Router, DVMRP IPv6
Multicast Addresses

Managing Security : Network Security Overview Security Legislation Security


Threats Reconnaissance and Port Scanning Vulnerability Scanners
V Unauthorized Access Security Risks Targets Loss of Availability 12
Integrity Violations and Confidentiality Breaches , Security Policy and Process
Security Policy Defined , Basic Approach of a Security Policy Purpose of
Security Policies, Security Policy Components Risk Assessment , Risk Index
Continuous Security Integrating Security Mechanisms into Network Design
Trust and Identity Management , Trust Domains of Trust Identity Passwords
Tokens Certificates , Network Access Control Secure Services Encryption
Fundamentals Encryption Keys VPN Protocols , Transmission Confidentiality
Data Integrity Threat Defense , Physical Security Infrastructure Protection
Security Management Solutions Security Solution Network Security Platforms
, Trust and Identity Technologies Firewall Fundamentals , Types of Firewalls
Next-Gen Firewalls NAT Placement , Firewall Guidelines Firewall ACLs ,
Identity and Access Control Deployments Detecting and Mitigating Threats
IPS/IDS Fundamentals IPS/IDS Guidelines , Threat Detection and Mitigation
Technologies , Threat-Detection and Threat-Mitigation Solutions , FirePOWER
IPS Security Management Applications , Security Platform Solutions Security
Management Network Integrating Security into Network Devices IOS Security,
ISR G2 Security Hardware Options Securing the Enterprise, Implementing
Security in the Campus Implementing Security in the Data Center Implementing
Security in the Enterprise Edge Network Management Protocols, Simple
Network Management Protocol SNMP Components, MIB SNMP Message
Versions SNMPv1 SNMPv2 SNMPv3, Other Network Management
Technologies RMON, RMON2 NetFlow Compared to RMON and SNMP, CDP
LLDP Syslog

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. CCDA200-310Official ANTHONY BRUNO, CCIE Cisco Press
Cert Guide No. 2738
STEVE JORDAN, CCIE No.
11293
2. Network Warrior Gary A Donabue O Reilly 2nd 2011

Course Outcome:
After completing the course, the learner will be able to:
CO1: understand the working of Network design models
CO2: describe Enterprise LAN Design, and data center design.
CO3: remember and describe various WAN technologies .
CO4: Successfully implement route summarization to optimize routing table size and efficiently
utilize IPv4 address space within the network.
C O 5 : understand Internet Protocol and describe how to manage security.
IT Infrastructure Management
B. Sc (Information Technology) Semester – VI
Course Name: IT Infrastructure Management Course Code: USIT606
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objectives:

1. Understand the fundamentals of IT service management and the ITIL 4 framework.


2. Explore the various management practices in ITIL, including general management, service
management, and technical management.
3. Develop an understanding of driving stakeholder value and creating value for stakeholders.
4. Gain knowledge of creating, delivering, and supporting services within the ITIL service
value system.
5. Explore the concept of High-Velocity IT and the importance of continual improvement.

Unit Details Lectures


Introduction: IT service management in the modern world, About ITIL 4, The
structure and benefits of the ITIL 4 framework.
Key concepts of service management : Value and value co-creation,
Organizations, service providers, service consumers, and other stakeholders,
Products and services, Service relationships, Value: outcomes, costs, and risks.
I The four dimensions of service management: Organizations and people, 12
Information and technology, Partners and suppliers, Value streams and processes,
External factors.
The ITIL service value system : Service value system overview, Opportunity,
demand, and value, The ITIL guiding principles, Governance, Service value chain,
Continual improvement.
ITIL management practices: General management practices, Service
II 12
management practices, Technical management practices.
Drive Stakeholder Value: Introduction, The customer journey, Step 1: Explore,
III Step 2: Engage, Step 3: Offer, Step 4: Agree, Step 5: Onboard, Step 6: Co-create, 12
Step 7: Realize.
Create, Delivery and Support (CDS): Service value system key concepts and
challenges, Using a shift-left approach, Plan and manage resources in the service
value system, The use and value of technology across the service value system.
IV Value streams for new services: Reviewing service value chains and service 12
value streams, ITIL practices and value streams for new services, Change
enablement, Service design and software development and management, Service
validation and testing, Release management and deployment management
Value streams for user support: ITIL practices and value streams for user
support, Service desk, Incident management, Problem management, Knowledge
management, Service level management and Monitoring and event management.
How to create, deliver and support services
High-Velocity IT : Introduction, Key concepts, culture, techniques,
V 12
Continual improvement.

Books and References:


Sr. No. Title Author/s Publisher Editio Year
n
1. ITIL Foundation 4 Edition Roman Jouravlev, TSO, 2 2019
Akashay Anand, et. al AXELOS
2. ITIL 4 High-Velocity IT Akashay Anand, Dan TSO, 1 2020
Ashby, et. al AXELOS

3. ITIL 4 Create, Delivery and Claire Agutter AXELOS 1 2021


Support (CDS)
4. ITIL 4 Drive Stakeholder Roman Jouravlev, Pavel TSO, 1 2020
Value Demin, et. al AXELOS
5. ITIL 4 Direct, Plan and Akashay Anand, TSO, 1 2020
Improve Mauricio Corona, et. al AXELOS

Course Outcomes:
CO 1: Apply the principles and concepts of ITIL 4 to enhance IT service management practices.
CO 2: Demonstrate proficiency in implementing ITIL management practices.
CO 3: Successfully drive stakeholder value and engage in value co-creation.
CO 4: Develop the skills to create, deliver, and support services within the ITIL service value
system.
CO 5: Understand the principles and techniques of High-Velocity IT and foster a culture of
continual improvement.
IT act and Cyber Law
B. Sc. (Information Technology) Semester – VI
Course Name: IT act and Cyber Law Course Code: USIT607
(Elective-II)
Periods per week (1 Period is 50 minutes) 5
Credits 2
Hours Marks
Evaluation System Theory Examination 2½ 75
Internal -- 25

Course Objective:
 To understand the legal framework for arrests without warrant, penalties, adjudication,
and appeals in cybercrime cases under the IT Act, 2000.
 To explore the formation, validity, and jurisdictional issues of contracts in the digital and
cyber world.
 To examine legal strategies and protections against cyber-squatting and copyright
infringement in the digital realm.
 To analyze the challenges of e-commerce taxation and understand the role of digital
signatures, certifying authorities, and e-governance in the digital economy.
 To compare the Indian Evidence Act of 1872 with the IT Act of 2000 and explore
protections for cyber consumers in India.

Unit Details Lectures


Power of Arrest Without Warrant Under the IT Act, 2000: A Critique,
Crimes of this Millennium, Section 80 of the IT Act, 2000 – A Weapon or a
Farce? Forgetting the Line Between Cognizable and Non-Cognizable Offences,
Necessity of Arrest without Warrant from Any Place, Public or Otherwise,
Check and Balances Against Arbitrary Arrests, Arrest for “About to Commit”
an Offence Under the IT Act: A Tribute to Draco, Arrest, But NO Punishment!
Cyber Crime and Criminal Justice: Penalties, Adjudication and Appeals
I Under the IT Act,2000: Concept of “Cyber Crime “ and the IT Act , 2000, 12
Hacking, Teenage Web Vandals, Cyber Fraud and Cyber Cheating, Virus on
the Internet, Defamation, Harassment and Email Abuse, Cyber Pornography,
Other IT Act Offences, Monetary Penalties, Adjudication and Appeals Under
IT Act , 2000, Network Service Providers, Jurisdiction and Cyber Crime,
Nature of Cyber Criminality, Strategies to Tackle Cyber Crime and Trends,
Criminal Justice in India and Implications on Cyber Crime.
Contracts in the Infotech World: Contracts in the Infotech World, Click-
Wrap and Shrink-Wrap Contract: Status under the Indian Contract Act, 1872,
Contract Formation Under the Indian Contract Act, 1872, Contract Formation
on the Internet, Terms and Conditions of Contracts.
Jurisdiction in the Cyber World: Questioning the Jurisdiction and Validity
II of the Present Law of Jurisdiction, Civil Law of Jurisdiction in India, Cause of 12
Action, Jurisdiction and the Information Technology Act,2000, Foreign
Judgements in India, Place of Cause of Action in Contractual and IPR Disputes,
Exclusion Clauses in Contracts, Abuse of Exclusion Clauses, Objection of Lack
of Jurisdiction, Misuse of the Law of Jurisdiction, Legal Principles on
Jurisdiction in the United State of America, Jurisdiction Disputes w.r.t. the
Internet in the United State of America.
Battling Cyber Squatters and Copyright Protection in the Cyber World:
Concept of Domain Name and Reply to Cyber Squatters, Meta-Tagging,
Legislative and Other Innovative Moves Against Cyber Squatting, The Battle
Between Freedom and Control on the Internet, Works in Which Copyright
Subsists and meaning of Copyright, Copyright Ownership and Assignment,
License of Copyright, Copyright Terms and Respect for Foreign Works,
III 12
Copyright Infringement, Remedies and Offences, Copyright Protection of
Content on the Internet; Copyright Notice, Disclaimer and Acknowledgement,
Downloading for Viewing Content on the Internet, Hyper-Linking and
Framing, Liability of ISPs for Copyright Violation in the Cyber World: Legal
Developments in the US, Napster and its Cousins: A Revolution on the Internet
but a Crisis for Copyright Owners, Computer Software Piracy.
E-Commerce Taxation: Real Problems in the Virtual World: A Tug of War
on the Concept of „Permanent Establishment‟, Finding the PE in Cross Border
E-Commerce, The United Nations Model Tax Treaty, The Law of Double
Taxation Avoidance Agreements and Taxable Jurisdiction Over Non-
Residents, Under the Income Tax Act, 1961, Tax Agents of Non-Residents
under the Income Tax Act,1961 and the Relevance to E-Commerce, Source
IV versus Residence and Classification between Business Income and Royalty, 12
The Impact of the Internet on Customer Duties, Taxation Policies in India: At
a Glance.
Digital Signature, Certifying Authorities and E-Governance: Digital
Signatures, Digital Signature Certificate, Certifying Authorities and Liability
in the Event of Digital Signature Compromise, E-Governance in India: A
Warning to Babudom!
The Indian Evidence Act of 1872 v. Information Technology Act, 2000:
Status of Electronic Records as Evidence, Proof and Management of Electronic
Records; Relevancy, Admissibility and Probative Value of E-Evidence,
Proving Digital Signatures, Proof of Electronic Agreements, Proving
Electronic Messages, Other Amendments in the Indian Evidence Act by the IT
Act, Amendments to the Bankers Books Evidence Act, 1891 and Reserve Bank
of India Act, 1934.
Protection of Cyber Consumers in India: Are Cyber Consumers Covered
V 12
Under the Consumer Protection Act? Goods and Services, Consumer
Complaint, Defect in Goods and Deficiency in Services, Restrictive and Unfair
Trade Practices, Instances of Unfair Trade Practices, Reliefs Under CPA,
Beware Consumers, Consumer Foras, Jurisdiction and Implications on cyber
Consumers in India, Applicability of CPA to Manufacturers, Distributors,
Retailers and Service Providers Based in Foreign Lands Whose Goods are Sold
or Services Provided to a Consumer in India. Amendments in Indian IT Act
2000.

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Cyber Law Simplified VivekSood TMH First 2001
Education
2. Cybersecurity Law Jeff Kossef Wiley First 2017
3. Cyber Law Pavan Duggal Universal Third 2023
4. Cyber Crimes & Law Santosh Kumar Whitesmann’s First 2024
5. Information Technology & Krishna Pal Malik Allahabad Second 2023
Cyber Law

Course Outcome:
After completing the course, the learner will be able to:
CO1: Gain a detailed understanding of the legal procedures and enforcement mechanisms for
cybercrimes, including arrest without warrant, penalties, adjudication, and appeals under the IT
Act, 2000.
CO2: understand the legal principles governing digital contracts and jurisdictional challenges
in the cyber world.
CO3: Equipped with knowledge of legal remedies and strategies to combat cyber squatting and
protect copyrights in the digital world.
CO4: Understand the complexities of e-commerce taxation and the significance of digital
signatures, certifying authorities, and e-governance in modern digital transactions.
CO5: Comprehend the interplay between the Indian Evidence Act of 1872 and the Information
Technology Act of 2000, and gain insights into the legal safeguards for cyber consumers in
India.
Information Security Practical
B. Sc. (Information Technology) Semester – VI
Course Name: Information Security Practical Course Code: USIT6P2
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hour Marks
s
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Configure Routers:
a. OSPF MD5 authentication.
b. NTP.
c. to log messages to the syslog server.

2. Configure AAA Authentication


a. Configure a local user account on Router and configure authenticate on the console
and vty lines using local AAA
b. Verify local AAA authentication from the Router console and the PC-A client

3. Configuring Extended ACLs


a. Configure, Apply and Verify an Extended Numbered ACL

4. Configure IP ACLs to Mitigate Attacks and IPV6 ACLs


a. Verify connectivity among devices before firewall configuration.
b. Use ACLs to ensure remote access to the routers is available only from
management station PC-C.
c. Configure ACLs on to mitigate attacks.
d. Configuring IPv6 ACLs

5. Configuring a Zone-Based Policy Firewall

6. Configure IOS Intrusion Prevention System (IPS) Using the CLI


a. Enable IOS IPS.
b. Modify an IPS signature.

7. Layer 2 Security
a. Assign the Central switch as the root bridge.
b. Secure spanning-tree parameters to prevent STP manipulation attacks.
c. Enable port security to prevent CAM table overflow attacks.

8. Layer 2 VLAN Security


9. Configure and Verify a Site-to-Site IPsec VPN Using CLI

10. Configuring ASA Basic Settings and Firewall Using CLI


a. Configure basic ASA settings and interface security levels using CLI
b. Configure routing, address translation, and inspection policy using CLI
c. Configure DHCP, AAA, and SSH
d. Configure a DMZ, Static NAT, and ACLs

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1 Essential Cybersecurity Josiah Dykstra O’Reilly Fifth 2017
Science
2 Principles of Computer Wm.Arthur McGraw Second 2010
Security: CompTIA Conklin, Greg Hill
Security+ and Beyond White
3 The Complete Reference: Mark Rhodes- McGraw- 2nd 2013
Information Security Ousley Hill
Business Intelligence and Data Analytics Practical

B. Sc. (Information Technology) Semester – VI


Course Name: Business Intelligence and Data Analytics Practical Course Code: USIT6P3
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Perform the analysis for the following:
a. Import the data warehouse data in Microsoft Excel and create the Pivot table and Pivot
Chart.
b. Import the cube in Microsoft Excel and create the Pivot table and Pivot Chart to perform data
analysis.

2. Apply the what – if Analysis for data visualization. Design and generate necessary reports
based on the data warehouse data. Use Excel.

3. Perform the data classification using classification algorithm using R/Python.

4. Perform the data clustering using clustering algorithm using R/Python.

5. Perform the Linear regression on the given data warehouse data using R/Python.

6. Perform the logistic regression on the given data warehouse data using R/Python.

7. Write a Python program to read data from a CSV file, perform simple data analysis, and
generate basic insights. (Use Pandas is a Python library).

8. Perform data visualization


a. Perform data visualization using Python on any sales data.
b. Perform data visualization using PowerBI on any sales data.

9. Create the Data staging area for the selected database using SQL.

10. Create the cube with suitable dimension and fact tables based on ROLAP, MOLAP and
HOLAP model.

Sr. No. E-references


1. https://www.tutorialspoint.com
2. https://www.excel-easy.com
3. https://dl.ebooksworld.ir/motoman/Packt.Practical.Business.Intelligence.www.EBooksWorl
d.ir.pdf
Fundamentals of GIS Practical
B. Sc. (Information Technology) Semester – VI
Course Name: Fundamentals of GIS Practical Course Code: USIT6P4
(Elective-I)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Familiarizing Quantum GIS: Installation of QGIS, datasets for both Vector
and Raster data, Maps.

2. Creating and Managing Vector Data: Adding vector layers, setting properties, formatting,
calculating line lengths and statistics

3. Exploring and Managing Raster data: Adding raster layers, raster styling and analysis, raster
mosaicking and clipping

4. Making a Map, Working with Attributes, Importing Spreadsheets or CSV files Using Plugins,
Searching and Downloading OpenStreetMap Data

5. Working with attributes, terrain Data

6. Working with Projections and WMS Data

7. Georeferencing Topo Sheets and Scanned Maps


Georeferencing Aerial Imagery
Digitizing Map Data

8. Managing Data Tables and Saptial data Sets: Table joins, spatial joins, points in polygon
analysis, performing spatial queries

9. Advanced GIS Operations 1: Nearest Neighbor Analysis, Sampling Raster Data using Points
or Polygons, Interpolating Point Data

10. Advance GIS Operations 2: Batch Processing using Processing Framework


Automating Complex Workflows using Processing Modeler
Automating Map Creation with Print Composer Atlas
Validating Map data
Books and References:
Sr. Title Author/s Publisher Edition Year
No.
1. Principles of Editors: Otto The Fourth 2009
Geographic Huisman and Rolf International
Information Systems- A. Institute of
An Introductory Text Geoinformation
Book Science and
Earth
Observation
2. Principles of P.A Burrough and Oxford Third 1999
Geographic R.A.McDonnell University
Information Systems Press
3. Introduction to Chang Kang- McGrawHill 2013
Geographic tsung 7th
Information Systems (Karl),
Enterprise Network Design Practical

B. Sc. (Information Technology) Semester – VI


Course Name: Enterprise Network Design Practical Course Code: USIT6P5(Elective II)
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hou Marks
rs
Evaluation System Practical Examination 2½ 50
Internal -- --

List of Practical
1. Configuring OSPF – I
a. Single-Area OSPF Link Costs and Interface Priorities
b. Multi-Area OSPF with Stub Areas and Authentication

2. Configuring OSPF – II
a. OSPF Virtual Links and Area Summarization
b. OSPF over Frame Relay

3. Redistribution and Administrative Distances


a. Redistribution Between RIP and OSPF
b. Manipulating Administrative Distances

4. BGP
a. Configuring BGP with Default Routing
b. Using the AS_PATH Attribute
c. BGP Route Reflectors and Route Filters

5. IPv6
a. Configuring OSPF for IPv6
b. Configuring 6to4 Tunnels

6. VLANs and EtherChannel


a. Static VLANS, VLAN Trunking, and VTP Domains and Modes
b. Configuring EtherChannel

7. Spanning Tree Protocol


a. Spanning Tree Protocol (STP) Default Behavior
b. Modifying Default Spanning Tree Behavior
8. VLAN and Spanning Tree
a. Per-VLAN Spanning Tree Behavior
b. Multiple Spanning Tree

9. Internal VLAN Routing


a. Inter-VLAN Routing with an External Router
b. Inter-VLAN Routing with an Internal Route Processor

10. Configure NAT Services

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. CCDA200-310Official ANTHONY BRUNO, Cisco
Cert Guide CCIE No. 2738 Press
STEVE JORDAN,
CCIE No. 11293
2. Network Warrior Gary A Donabue O Reilly 2nd 2011
Android Programming Practical
B. Sc (Information Technology) Semester – VI
Course Name: Android Programming Practical Course Code: USIT6P6
Periods per week (1 Period is 50 minutes) 3
Credits 2
Hours Marks
Practical Examination 2½ 50
Evaluation System
Internal -- 20

Practical Details
No
0 Introduction to Android, Introduction to Android Studio IDE, Application Fundamentals:
Creating a Project, Android Components, Activities, Services, Content Providers, Broadcast
Receivers, Interface overview, Creating Android Virtual device, USB debugging mode, Android
Application Overview. Simple “Hello World” program.

1 Programming Resources
Android Resources: (Color, Theme, String, Drawable, Dimension, Image),

2 Programming Activities and fragments


Activity Life Cycle, Activity methods, Multiple Activities, Life Cycle of fragments and multiple
fragments.

3 Programs related to different Layouts


Coordinate, Linear, Relative, Table, Absolute, Frame, List View, Grid View.

4 Programming UI elements
AppBar, Fragments, UI Components

5 Programming menus, dialog, dialog fragments

6 Programs on Intents, Events, Listeners and Adapters


The Android Intent Class, Using Events and Event Listeners

7 Programs on Services, notification and broadcast receivers

8 a. Database Programming with SQLite


b. Programming Network Communications and Services (JSON)

9 Programming threads, handles and asynchronized programs

10 a. Programming Media API and Telephone API


b. Programming Security and permissions
Books and References:
Sr. No. Title Author/s Publisher Edition Year
1. Android Programming for John Horton Packt Third 2021
Beginners
2. Head First Android Development Dawn Griffiths, David O'Reilly Second 2017
Griffiths
3. Android System Programming Roger Ye Packt First 2017
4. Fundamentals of Android App Sujit Kumar Mishra BPB First 2020
Development
Evaluation Scheme:
1. Internal Evaluation (25 Marks).
i. Test: 1 Class test of 20 marks. (Can be taken online)
Q Attempt any four of the following: 20
a.
b.
c.
d.
e.
f.

ii. 5 marks: Active participation in the class, overall conduct, attendance.

2. External Examination: (75 marks)


All questions are compulsory
Q1 (Based on Unit 1) Attempt any three of the following: 15
a.
b.
c.
d.
e.
f.

Q2 (Based on Unit 2) Attempt any three of the following: 15


Q3 (Based on Unit 3) Attempt any three of the following: 15
Q4 (Based on Unit 4) Attempt any three of the following: 15
Q5 (Based on Unit 5) Attempt any three of the following: 15

3. Practical Exam: 50 marks

A Certified copy journal is essential to appear for the practical examination.

1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5

OR

1. Practical Question 40
2. Journal 5
3. Viva Voce 5
Project Dissertation Semester V and
Project Implementation Semester VI
Chapter 1 to 4 should be submitted in Semester V in spiral binding. These chapter have also to be included in
Semester VI report. Semester VI report has to be hard bound with golden embossing. Students will be evaluated
based on the dissertation in semester V and dissertation and viva voce in Semester VI.

I. OBJECTIVES
Describe the Systems Development Life Cycle (SDLC).
Evaluate systems requirements.
Complete a problem definition.
Evaluate a problem definition.
Determine how to collect information to determine requirements.
Perform and evaluate feasibility studies like cost-benefit analysis, technical feasibility, time feasibility
and Operational feasibility for the project.
Work on data collection methods for fact finding.
Construct and evaluate data flow diagrams.
Construct and evaluate data dictionaries.
Evaluate methods of process description to include structured English, decision tables and decision trees.
Evaluate alternative tools for the analysis process.
Create and evaluate such alternative graphical tools as systems flow charts and state transition diagrams.
Decide the S/W requirement specifications and H/W requirement specifications.
Plan the systems design phase of the SDLC.
Distinguish between logical and physical design requirements.
Design and evaluate system outputs.
Design and evaluate systems inputs.
Design and evaluate validity checks for input data.
Design and evaluate user interfaces for input.
Design and evaluate file structures to include the use of indexes.
Estimate storage requirements.
Explain the various file update processes based on the standard file organizations.
Decide various data structures.
Construct and evaluate entity-relationship (ER) diagrams for RDBMS related projects.
Perform normalization for the unnormalized tables for RDBMS related projects
Decide the various processing systems to include distributed, client/server, online and others.
Perform project cost estimates using various techniques.
Schedule projects using both GANTT and PERT charts.
Perform coding for the project.
Documentation requirements and prepare and evaluate systems documentation.
Perform various systems testing techniques/strategies to include the phases of testing.
Systems implementation and its key problems.
Generate various reports.
Be able to prepare and evaluate a final report.
Brief the maintenance procedures and the role of configuration management in operations.
To decide the future scope and further enhancement of the system.
Plan for several appendices to be placed in support with the project report documentation.
Decide the various processing systems to include distributed, client/server, online and others.
Perform project cost estimates using various techniques.
Schedule projects using both GANTT and PERT charts.
Perform coding for the project.
Documentation requirements and prepare and evaluate systems documentation.
Perform various systems testing techniques/strategies to include the phases of testing.
Systems implementation and its key problems.
Generate various reports.
Be able to prepare and evaluate a final report.
Brief the maintenance procedures and the role of configuration management in operations.
To decide the future scope and further enhancement of the system.
Plan for several appendices to be placed in support with the project report documentation.
Work effectively as an individual or as a team member to produce correct, efficient, well organized
and documented programs in a reasonable time.
Recognize problems that are amenable to computer solutions, and knowledge of the tool necessary for
solving such problems.
Develop of the ability to assess the implications of work performed.
Get good exposure and command in one or more application areas and on the software
Develop quality software using the software engineering principles
Develop of the ability to communicate effectively.

II. Type of the Project


The majority of the students are expected to work on a real-life project preferably in some industry/ Research and
Development Laboratories/Educational Institution/Software Company.
Students are encouraged to work in the areas listed below. However, it is not mandatory for a student to work on
a real-life project. The student can formulate a project problem with the help of her/his Guide and submit the
project proposal of the same. Approval of the project proposal is mandatory. If approved, the student can
commence working on it, and complete it. Use the latest versions of the software packages for the development
of the project.
.

IV. Introduction
The project report should be documented with scientific approach to the solution of the problem that the students
have sought to address. The project report should be prepared in order to solve the problem in a methodical and
professional manner, making due references to appropriate techniques, technologies and professional standards.
The student should start the documentation process from the first phase of software development so that one can
easily identify the issues to be focused upon in the ultimate project report. The student should also include the
details from the project diary, in which they will record the progress of their project throughout the course.
The project report should contain enough details to enable examiners to evaluate the work. The important points
should be highlighted in the body of the report, with details often referred to appendices.
1.1 PROJECT REPORT:
Title Page
Original Copy of the Approved Proforma of the Project Proposal
Certificate of Authenticated work
Role and Responsibility Form
Abstract
Acknowledgement
Table of Contents
Table of Figures
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Objectives
1.3 Purpose, Scope, and Applicability
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
1.5 Organisation of Report

CHAPTER 2: SURVEY OF TECHNOLOGIES

CHAPTER 3: REQUIREMENTS AND ANALYSIS


3.1 Problem Definition
3.2 Requirements Specification
3.3 Planning and Scheduling
3.4 Software and Hardware Requirements
3.5 Preliminary Product Description
3.6 Conceptual Models

CHAPTER 4: SYSTEM DESIGN


4.1 Basic Modules
4.2 Data Design
4.2.1 Schema Design
4.2.2 Data Integrity and Constraints
4.3 Procedural Design
4.3.1 Logic Diagrams
4.3.2 Data Structures
4.3.3 Algorithms Design
4.4 User interface design
4.5 Security Issues
4.6 Test Cases Design
The documentation should use tools like star UML, Visuo for windows, Rational Rose for design
as part of Software Project Management Practical Course. The documentation should be spiral
bound for semester V and the entire documentation should be hard bound during semester VI.

CHAPTER 5: IMPLEMENTATION AND TESTING


5.1 Implementation Approaches
5.2 Coding Details and Code Efficiency
5.2.1 Code Efficiency
5.3 Testing Approach
5.3.1 Unit Testing
5.3.2 Integrated Testing
5.3.3 Beta Testing
5.4 Modifications and Improvements
5.5 Test Cases

CHAPTER 6: RESULTS AND DISCUSSION


6.1 Test Reports
6.2 User Documentation

CHAPTER 7: CONCLUSIONS
7.1 Conclusion
7.1.1 Significance of the System
7.2 Limitations of the System
7.3 Future Scope of the Project

REFERENCES

GLOSSARY

APPENDIX A

APPENDIX B
V. EXPLANATION OF CONTENTS
Title Page
Sample format of Title page is given in Appendix 1 of this block. Students should follow the given format.

Original Copy of the Approved Proforma of the Project Proposal


Sample Proforma of Project Proposal is given in Appendix 2 of this block. Students should follow the
given format.

Certificate of Authenticated work


Sample format of Certificate of Authenticated work is given in Appendix 3 of this block.
Students should follow the given format.

Role and Responsibility Form


Sample format for Role and Responsibility Form is given in Appendix 4 of this block.
Students should follow the given format.

Abstract
This should be one/two short paragraphs (100-150 words total), summarising the project work. It is
important that this is not just a re-statement of the original project outline. A suggested flow is background,
project aims and main achievements. From the abstract, a reader should be able to ascertain if the project
is of interest to them and, it should present results of which they may wish to know more details.

Acknowledgements:
This should express student‟s gratitude to those who have helped in the preparation of project.

Table of Contents:
The table of contents gives the readers a view of the detailed structure of the
report. The students would need to provide section and subsection headings with associated pages. The
formatting details of these sections and subsections are given below. Table of Figures: List of all Figures,
Tables, Graphs, Charts etc. along with their page numbers in a table of figures.

Chapter 1: Introduction
The introduction has several parts as given below:
Background: A description of the background and context of the project and its relation to work already
done in the area. Summarise existing work in the area concerned with the project work.
Objectives: Concise statement of the aims and objectives of the project. Define exactly what is going to
be done in the project; the objectives should be about 30 /40 words.
Purpose, Scope and Applicability: The description of Purpose, Scope, and Applicability are given below:
 Purpose: Description of the topic of the project that answers questions on why this project is being done.
How the project could improve the system its significance and theoretical framework.
 Scope: A brief overview of the methodology, assumptions and limitations. The students should answer
the question: What are the main issues being covered in the project? What are the main functions of the
project?
 Applicability: The student should explain the direct and indirect applications of their work. Briefly
discuss how this project will serve the computer world and people.
 Achievements: Explain what knowledge the student achieved after the completion of the work. What
contributions has the project made to the chosen area? Goals achieved - describes the degree to which the
findings support the original objectives laid out by the project. The goals may be partially or fully
achieved, or exceeded.
 Organisation of Report: Summarizing the remaining chapters of the project report, in effect, giving the
reader an overview of what is to come in the project report.

Chapter 2: Survey of Technologies


In this chapter Survey of Technologies should demonstrate the students awareness and
understanding of Available Technologies related to the topic of the project. The student should give the
detail of all the related technologies that are necessary to complete the project. The should describe the
technologies available in the chosen area and present a comparative study of all those Available
Technologies. Explain why the student selected the one technology for the completion of the objectives
of the project.

Chapter 3: Requirements and Analysis


Problem Definition: Define the problem on which the students are working in the project.
Provide details of the overall problem and then divide the problem in to sub-problems. Define each sub-
problem clearly.
Requirements Specification: In this phase the student should define the requirements of the system,
independent of how these requirements will be accomplished. The Requirements Specification describes
the things in the system and the actions that can be done on these things.Identify the operation and
problems of the existing system.
Planning and Scheduling: Planning and scheduling is a complicated part of software
development. Planning, for our purposes, can be thought of as determining all the small tasks that must be
carried out in order to accomplish the goal. Planning also takes into account, rules, known as constraints,
which, control when certain tasks can or cannot happen. Scheduling can be thought of as determining
whether adequate resources are available to carry out the plan. The student should show the Gantt chart
and Program Evaluation Review Technique (PERT).
Software and Hardware Requirements: Define the details of all the software and hardware needed for the
development and implementation of the project.
• Hardware Requirement: In this section, the equipment, graphics card, numeric co-processor, mouse,
disk capacity, RAM capacity etc. necessary to run the software must be noted.
• Software Requirements: In this section, the operating system, the compiler, testing tools, linker, and
the libraries etc. necessary to compile, link and install the software must be listed.
Preliminary Product Description: Identify the requirements and objectives of the new system. Define the
functions and operation of the application/system the students are developing as project.
Conceptual Models: The student should understand the problem domain and produce a model of the
system, which describes operations that can be performed on the system, and the allowable sequences of
those operations. Conceptual Models could consist of complete Data Flow Diagrams, ER diagrams,
Object-oriented diagrams, System Flowcharts etc.
Chapter 4: System Design
Describes desired features and operations in detail, including screen layouts, business rules, process
diagrams, pseudocode and other documentation.
Basic Modules: The students should follow the divide and conquer theory, so divide the overall problem
into more manageable parts and develop each part or module separately. When all modules are ready, the
student should integrate all the modules into one system. In this phase, the student should briefly describe
all the modules and the functionality of these modules.
Data Design: Data design will consist of how data is organised, managed and manipulated.
• Schema Design: Define the structure and explanation of schemas used in the project.
• Data Integrity and Constraints: Define and explain all the validity checks and constraints provided to
maintain data integrity.
Procedural Design: Procedural design is a systematic way for developing algorithms or
procedurals.
• Logic Diagrams: Define the systematical flow of procedure that improves its comprehensionand helps
the programmer during implementation. e.g., Control Flow Chart, Process Diagrams etc.
• Data Structures: Create and define the data structure used in procedures.
• Algorithms Design: With proper explanations of input data, output data, logic of processes, design and
explain the working of algorithms.
User Interface Design: Define user, task, environment analysis and how to map those
requirements in order to develop a “User Interface”. Describe the external and internal
components and the architecture of user interface. Show some rough pictorial views of the user interface
and its components.
Security Issues: Discuss Real-time considerations and Security issues related to the project and explain
how the student intends avoiding those security problems. What are the security policy plans and
architecture?
Test Cases Design: Define test cases, which will provide easy detection of errors and mistakes with in a
minimum period of time and with the least effort. Explain the different conditions in which the students
wish to ensure the correct working of the project.

Chapter 5: Implementation and Testing


Implementation Approaches: Define the plan of implementation, and the standards the students have used
in the implementation. Coding Details and Code Efficiency: Students not need include full source code,
instead, include only the important codes (algorithms, applets code, forms code etc). The program code
should contain comments needed for explaining the work a piece of code does. Comments may be needed
to explain why it does it, or, why it does a particular way. The student can explain the function of the code
with a shot of the output screen of that program code.
• Code Efficiency: The student should explain how the code is efficient and how the students have
handled code optimisation.
Testing Approach: Testing should be according to the scheme presented in the system design chapter and
should follow some suitable model – e.g., category partition, state machine-based. Both functional testing
and user-acceptance testing are appropriate. Explain the approach of testing.
 Unit Testing: Unit testing deals with testing a unit or module as a whole. This would test the interaction of
many functions but, do confine the test within one module.
 Integrated Testing: Brings all the modules together into a special testing environment, then checks
for errors, bugs and interoperability. It deals with tests for the entire application. Application limits and
features are tested here.
Modifications and Improvements: Once the students finish the testing they are bound to be faced with
bugs, errors and they will need to modify your source code to improve the system. Define what
modification are implemented in the system and how it improved the system.

Chapter 6: Results and Discussion


Test Reports: Explain the test results and reports based on the test cases, which should show that the
project is capable of facing any problematic situation and that it works fine in different conditions. Take
the different sample inputs and show the outputs.
User Documentation: Define the working of the software; explain its different functions,
components with screen shots. The user document should provide all the details of the product in such a
way that any user reading the manual, is able to understand the working and functionality of the document.

Chapter 7: Conclusions
Conclusion: The conclusions can be summarised in a fairly short chapter (2 or 3 pages). This chapter
brings together many of the points that would have made in the other chapters. Limitations of the System:
Explain the limitations encountered during the testing of the project that the students were not able to
modify. List the criticisms accepted during the demonstrations of the project.
Future Scope of the Project describes two things: firstly, new areas of investigation prompted by
developments in this project, and secondly, parts of the current work that was not completed due to time
constraints and/or problems encountered.

REFERENCES
It is very important that the students acknowledge the work of others that they have used or adapted in
their own work, or that provides the essential background or context to the project.
The use of references is the standard way to do this. Please follow the given standard for the references
for books, journals, and online material. The citation is mandatory in both the reports.
E.g:
Linhares, A., & Brum, P. (2007). Understanding our understanding of strategic scenarios: What role do
chunks play? Cognitive Science, 31(6), 989-1007.
https://doi.org/doi:10.1080/03640210701703725
Lipson, Charles (2011). Cite right : A quick guide to citation styles; MLA, APA, Chicago, the sciences,
professions, and more (2nd ed.). Chicago [u.a.]: University of Chicago Press. p. 187.
ISBN 9780226484648.
Elaine Ritchie, J Knite. (2001). Artificial Intelligence, Chapter 2 ,p.p 23 - 44. Tata McGrawHill.

GLOSSARY
If you the students any acronyms, abbreviations, symbols, or uncommon terms in the project report then
their meaning should be explained where they first occur. If they go on to use any of them extensively
then it is helpful to list them in this section and define the meaning.
APPENDICES
These may be provided to include further details of results, mathematical derivations, certain
illustrative parts of the program code (e.g., class interfaces), user documentation etc.
In particular, if there are technical details of the work done that might be useful to others who wish to
build on this work, but that are not sufficiently important to the project as a whole to justify being
discussed in the main body of the project, then they should be included as appendices.

VI. SUMMARY
Project development usually involves an engineering approach to the design and development of a
software system that fulfils a practical need. Projects also often form an important focus for discussion at
interviews with future employers as they provide a detailed example of what the students are capable of
achieving. In this course the students can choose your project topic from the lists given in Unit 4:
Category-wise Problem Definition.

VII. FURTHER READINGS


1. Modern Systems Analysis and Design; Jeffrey A. Hoffer, Joey F. George, Joseph,S. Valacich;
Pearson Education; Third Edition; 2002.
2. ISO/IEC 12207: Software Life Cycle Process
(http://www.software.org/quagmire/descriptions/iso-iec12207.asp).
3. IEEE 1063: Software User Documentation (http://ieeexplore.ieee.org).
4. ISO/IEC: 18019: Guidelines for the Design and Preparation of User Documentation for
Application Software.
5. http://www.sce.carleton.ca/squall.
6. http://en.tldp.org/HOWTO/Software-Release-Practice-HOWTO/documentation.html.
7. http://www.sei.cmu.edu/cmm/
PROFORMA FOR THE APPROVAL PROJECT PROPOSAL
(Note:All entries of the proforma of approval should be filled up with appropriate and
complete information. Incomplete proforma of approval in any respect will be summarily rejected.)
PNR No.: …………………… Rollno: ___________

1. Name of the Student


__________________________________________________________________
2. Title of the Project
__________________________________________________________________
3. Name of the Guide

4. Teaching experience of the Guide ____________________________________

5. Is this your first submission? Yes No

Signature of the Student Signature of the Guide

Date: ………………… Date: …………………….


Signature of the Coordinator
Date: …………………
(All the text in the report should be in times new roman)

TITLE OF THE PROJECT


(NOT EXCEEDING 2 LINES, 24 BOLD, ALL CAPS)
A Project Report (12 Bold)
Submitted in partial fulfillment of the
Requirements for the award of the Degree of (size-12)
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)
(14 BOLD, CAPS)
By(12 Bold)

Name of The Student (size-15, title case)


Seat Number (size-15)
Under the esteemed guidance of (13 bold)
Mr./Mrs. Name of The Guide (15 bold, title case)
Designation (14 Bold, title case)
COLLEGE LOGO
DEPARTMENT OF INFORMATION TECHNOLOGY(12 BOLD, CAPS)
COLLEGE NAME (14 BOLD, CAPS)
(Affiliated to University of Mumbai) (12, Title case, bold, italic)
CITY, PIN CODE(12 bold, CAPS)
MAHARASHTRA (12 bold, CAPS)
YEAR (12 bold)

COLLEGE NAME (14 BOLD, CAPS)


(Affiliated to University of Mumbai) (13, bold, italic)
CITY-MAHARASHTRA-PINCODE(13 bold, CAPS)
DEPARTMENT OF INFORMATION TECHNOLOGY (14 BOLD, CAPS)
College Logo

CERTIFICATE (14 BOLD, CAPS, underlined, centered)

This is to certify that the project entitled, "Title of The Project ", is bonafied work of NAME OF
THE STUDENT bearing Seat.No: (NUMBER) submitted in partial fulfillment of the requirements
for the award of degree of BACHELOR OF SCIENCE in INFORMATION TECHNOLOGY from
University of Mumbai. (12, times new roman, justified)

Internal Guide (12 bold) Coordinator

(Don‟t write names of lecturers or HOD)

External Examiner

Date: College Seal


COMPANY CERTIFICATE (if applicable)

(Project Abstract page format)


Abstract (20bold, caps, centered)
Content (12, justified)

Note: Entire document should be with 1.5


line spacing and all paragraphs should start with 1 tab space.

ACKNOWLEDGEMENT
(20, BOLD, ALL CAPS, CENTERED)
The acknowledgement should be in times new roman, 12 font with 1.5 line spacing, justified.

(Declaration page format)

DECLARATION (20 bold, centered, allcaps)


Content (12, justified)
I hereby declare that the project entitled, “Title of the Project” done at place where the project is
done, has not been in any case duplicated to submit to any other university for the award of any degree.
To the best of my knowledge other than me, no one has submitted to any other university.
The project is done in partial fulfillment of the requirements for the award of degree of BACHELOR
OF SCIENCE (INFORMATION TECHNOLOGY) to be submitted as final semester
project as part of our curriculum.

Name and Signature of the Student


TABLE OF CONTENTS (20 bold, caps, centered)
Should be generated automatically using word processing
software.

List of Tables (20 bold, centered, Title Case)


Should be generated automatically using word processing
software.

List of Figures (20 bold, centered, Title Case)


Should be generated automatically using word processing
software.

** The plagiarism should be maintained as per the UGC guidelines.

** NOTE ABOUT PROJECT VIVA VOCE:


Student may be asked to write code for problem during VIVA to demonstrate his coding capabilities and
he/she may be asked to write any segment of coding used in the in the project.
The project can be done in group of at most four students. However, the length and depth of the project
should be justified for the projects done in group. A big project can be modularised and different modules
can be assigned as separate project to different students.

Marks Distribution:
Semester V: 50 Marks
Documentation: 50 marks

Semester VI: 150 Marks


Documentation: 50 Marks:
Implementation and Viva Voce: 100 Marks
Evaluation Scheme:
1. Internal Evaluation (25 Marks).
i. Test: 1 Class test of 20 marks. (Can be taken online)
Q Attempt any four of the following: 20
a.
b.
c.
d.
e.
f.
ii. 5 marks: Active participation in the class, overall conduct, attendance.

2. External Examination: (75 marks)


All questions are compulsory
Q1 (Based on Unit 1) Attempt any three of the following: 15
a.
b.
c.
d.
e.
f.

Q2 (Based on Unit 2) Attempt any three of the following: 15


Q3 (Based on Unit 3) Attempt any three of the following: 15
Q4 (Based on Unit 4) Attempt any three of the following: 15
Q5 (Based on Unit 5) Attempt any three of the following: 15

3. Practical Exam: 50 marks

A Certified copy journal is essential to appear for the practical examination.

1. Practical Question 1 20
2. Practical Question 2 20
3. Journal 5
4. Viva Voce 5

OR

1. Practical Question 40
2. Journal 5
3. Viva Voce 5

You might also like