IT1 Syllabus
IT1 Syllabus
SEMESTER I
Preamble: The students are expected to learn fundamentals of mathematical concepts used to design
and analyse network and security protocols. These concepts will help them to develop network and
security models and analyse them before being used in various applications.
Course Outcomes: After the completion of the course the student will be able to
CO 2 Apply the fundamental mathematical concepts in Asymmetric- Key cryptography (Level : Apply)
CO 5 Solve statistics such as the mean and variance of common probability distributions (Level : Apply)
CO 6 Solve queueing theory problems along with the stochastic processes techniques useful for
modelling queueing systems and queueing networks (Level : Apply)
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √ √ √
CO 2 √ √ √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √ √ √ √
CO 6 √ √ √ √ √ √
INFORMATION TECHNOLOGY-IT1
Assessment Pattern
Apply 100%
Analyse 0%
Evaluate 0%
Create 0%
Mark distribution
The project shall be done individually. Group projects are not permitted. The test paper shall
include a minimum of 80% of the syllabus.
End Semester Examination Pattern: The End-Semester Examination shall be conducted by the
University. There shall be two parts; Part A and Part B. Part A shall contain five (numerical) questions
(such questions shall be useful in the testing of knowledge, skills, comprehension, application,
analysis, synthesis, evaluation, and understanding of the students), with one question from each
module, having five marks for each question. Students shall answer all questions. Part B shall contain
seven questions (such questions shall be useful in the testing of overall achievement and maturity of
the students in a course, through long answer questions relating to theoretical/practical knowledge,
derivations, problem-solving, and quantitative evaluation), with at least one question from each
module, of which, the student shall answer any five. Each question shall carry seven marks
INFORMATION TECHNOLOGY-IT1
MODEL QUESTION PAPER FOR END-SEMESTER EXAMINATION
3. In a given connected weighted graph G, suppose there exists an edge es whose weight is smaller than
that of any other in G. Prove that every shortest spanning tree in G must contain es.
(5 Marks)
4. Let X and Y be independent random variables, each havingan exponential distribution with parameter
a. Find the density function of Z = X + Y. (5 marks)
5. Consider a small post office in a village where on the average 70 customers arrive according to a
Poisson process during a day. Let us assume that the service times are exponentially distributed with
rate 10 clients per hour and the office operates 10 hours daily. Find the mean queue length, and the
probability that the number of waiting customer is greater than 2. What is the mean waiting time and
the probability that the waiting time is greater than 20 minutes?
(5 Marks)
6. a. Find the particular and general solutions to the equation 21x + 14y = 35 (4 Marks)
b. Using the Euclidean algorithm, find the Greatest Common Divisor of the following pairs of
integers:
a. 88 and 220
7. a. Use the trial division algorithm to find the factors of 1233 (3 Marks)
9. a. In a graph G let 𝑝1 and 𝑝2 be two different paths between two givenvertices. Prove that 𝑝1 ⊕ 𝑝2 is
(2 Marks)
10. Let X be the continuous random variable with density function 𝑓 defined by
0 𝑓𝑜𝑟 𝑥 < 1
𝑓 (𝑥 ) = { 1
𝑓𝑜𝑟 𝑥 ≥ 1
𝑥2
11. Let X and Y be independent random variables, each having an exponential distribution with parameter
a. Find the density function. (7 Marks)
12. 14. Traffic to a message switching centre for one of the outgoing communication lines arrives in a
random pattern at an average rate of 240 messages per minute. The line has a transmission rate of 800
characters per second. The message length distribution (including control characters) is approximately
exponential with an average length of 176 characters. Calculate the principal statistical measures of
system performance assuming that a very large number of message buffers are provided. What is the
probability that 10 or more messages are waiting to be transmitted?
(7 marks)
INFORMATION TECHNOLOGY-IT1
SYLLABUS
Greatest common divisor- GCD, Euclidean algorithm Fundamental theorem of arithmetic, Linear Diophantine
Equations, Integer arithmetic, Modular arithmetic, Matrices, Linear congruences, Algebraic structures, GF(2n)
Fields
Prime numbers, Fermat’s and Euler’s Theorem, Generating Primes, Primality Testing: Deterministic
algorithms, Probabilistic algorithms, Quadratic Congruences- Quadratic Residues, The Legendre Symbol,
Quadratic Reciprocity, The Jacobi Symbol, Factorization: Factorization methods- Trial division method, Fermat
method, Pollard p-1 method, Pollard Rho method, Exponentiation and Logarithm: Square-and -multiply
algorithm, Discrete Logarithm, Solution to modular logarithm using Discrete Logs
What is a Graph? Application of Graphs, Finite and Infinite Graphs, Incidence and Degree, Isolated Vertex,
Pendant Vertex, and Null Graph. PATHS AND CIRCUITS – Isomorphism, Subgraphs, Walks, Paths, and
Circuits, Connected Graphs, Disconnected Graphs, and Components, Euler Graphs, Operations on Graphs,
More on Euler Graphs, Hamiltonian Paths and Circuits, The Travelling Salesman Problem, Trees And
Fundamental Circuits – Trees, Properties of Trees, Pendant Vertices in a Tree, Distance and Centers in a Tree,
Rooted and Binary Trees, On Counting Trees, Spanning Trees, Fundamental Circuits, Finding All Spanning
Trees of a Graph, Spanning Trees in a Weighted Graph.
The Concept of a Random Variable – Introduction, Distribution and Density Functions, Specific Random
Variables, Conditional Distributions, Asymptotic Approximations for Binomial Random Variable, Functions of
One Random Variable - The Random Variable g(x), The Distribution of g(x), Mean and Variance, Moments,
Characteristic Functions, Two Random Variables - Bivariate Distributions, One Function of Two Random
Variables, Two Functions of Two Random Variables, Joint Moments, Joint Characteristic Functions,
Conditional Distributions, Conditional Expected Values.
General concepts, Arrival pattern, service pattern, Queue Disciplines, FIFO Queuing systems, M/M/1, M/M/c,
M/M/∞, M/G/1, M/M/m/m Markov models, non-Markov models, Network queues, Burke’s theorem, Jackson’s
theorem.
Reference Books
1. Behrouz A. Fourouzan, Debdeep Mukhopadhyay “ Cryptography and Network Security”, Second Edition,
Tata McGrawHill Education
2. Thomas Koshy, “Elementary Number Theory with Applications” Second Edition, Elsevier Science, 2007
3. Judith L. Gersting, “Mathematical Structures for Computer Science - Discrete Mathematics and Its
Applications”, 7e, W. H. Freeman and Company, 2014
4. Ralph P. Grimaldi, “Discrete and Combinatorial Mathematics”, 5th edition, Pearson, 2018
5. Arnold O. Allen, “Probability, Statistics, and Queuing Theory with Computer Science Applications”,
Elsevier Inc, 1990
6. eth H. Rosen, “Elementary Number Theory and its Applications” Addison-Wesley Publishing
Company,1986
INFORMATION TECHNOLOGY-IT1
7. Nitis Mukhopadhyay, “Probability and Statistical Inference”, Library of Congress Cataloging-in-
Publication Data, Marcel Dekker, Inc. 2000
8. Gary Haggard, John Schlipf, Sue Whitesides, “Discrete Mathematics for Computer Science”, Thomson
Brooks/Cole, 2006.
9. K.S. Trivedi, “Probability and Statistics with Reliability, Queueing and Computer Science Applications”,
John Wiley and Sons, 2nd edition, 2002.
10. J.F. Shortle, J.M. Thompson, D. Gross and C.M. Harris, Fundamentals of Queueing Theory, 5th Edition,
Wiley, 2018
COURSE PLAN
3.7 Spanning Trees, Fundamental Circuits, Finding All Spanning Trees of a 2 Hours
Graph, Spanning Trees in a Weighted Graph
4 Random Variables and Distributions
4.1 The Concept of a Random Variable – Introduction, Distribution and 1 Hour
Density Functions, Specific Random Variables
4.2 Conditional Distributions, Asymptotic Approximations for Binomial 1 Hour
Random Variable
4.3 Functions of One Random Variable - The Random Variable g(x) 1 Hour
4.4 The Distribution of g(x) 1 Hour
4.5 Mean and Variance, Moments, Characteristic Functions 1 Hour
4.6 Two Random Variables - Bivariate Distributions 1 Hour
4.7 One Function of Two Random Variables, Two Functions of Two 1 Hour
Random Variables
4.8 Joint Moments, Joint Characteristic Functions, Conditional 1 Hour
Distributions, Conditional Expected Values
5 Queuing Models
5.1 General concepts, Arrival pattern, service pattern 1 Hour
5.2 Queue Disciplines, FIFO Queuing systems 1 Hour
5.3 M/M/1, M/M/c 1 Hour
5.4 M/M/∞, M/G/1 1 Hour
5.5 M/M/m/m and other Markov models, 1 Hour
5.6 Non-Markov models 1 Hour
5.7 Network queues. 1 Hour
5.8 Burke’s theorem, Jackson’s theorem 1 Hour
CODE COURSE NAME CATEGORY L T P CREDIT
ADVANCED COMPUTER ION TECHNOLOGY-IT1
INPFROORGMRAATM
221TIT001 3 0 0 3
NETWORKS CORE 1
Preamble: The students are expected to understand and analyze the protocols used in various
layers of the network stack.
Course Outcomes: After the completion of the course the student will be able to
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2: An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor’s program
PO4: An ability to apply stream knowledge to design or develop solutions for real-world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
PO6: An ability to engage in life-long learning for the design and development related to the
stream-related problems taking into consideration sustainability, societal, ethical and
environmental aspects
PO7: An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
INFORMATION TECHNOLOGY-IT1
Mapping of course outcomes with program outcomes
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
CO 6
Assessment Pattern
Apply 80
Analyse 20
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
The project shall be done individually. Group projects are not permitted. The test paper
shallinclude a minimum of 80% of the syllabus.
End Semester Examination Pattern:
There shall be two parts; Part A and Part B. Part A shall contain five (numerical) questions
(such questions shall be useful in the testing of knowledge, skills, comprehension,
application, analysis, synthesis, evaluation, and understanding of the students), with one
question from each module, having five marks for each question. Students shall answer all
questions. Part B shall contain seven questions (such questions shall be useful in the testing
of overall achievement and maturity of the students in a course, through long answer
questions relating to theoretical/practical knowledge, derivations, problem-solving, and
quantitative evaluation), with at least one question frIoNmFO
eaR
chMm
AoTdIO
ulN
e, T
oE
fC
wHhiN
chO, LthOeGstYu-dIeTn1t
shall answer any five. Each question shall carry seven marks.
2. When an HTTP server initiates a close() at its end of a connection, it must then wait in TCP
state FIN WAIT 2 for the client to close the other end. What mechanism within
the TCP protocol could help an HTTP server deal with non-cooperative or poorly
implemented clients that don’t close from their end?
1. Assuming that loss occurs during the first slow-start and that the file transfer is long
enough, obtain the duration of the second slow-start and the number of packets transmitted
during it.
2.Derive the packet throughput if the TCP receiver returns a cumulative ACK for every bth
packet.
1. What is MPLS?
3.How do routers that use reverse path multicasting learn about the location of group
members?
2. For a time-slotted network, where the slots are small compared with the packet lengths,
consider the following variation of slotted Aloha. When a node has a packet to transmit, it
begins transmission at the beginning of a slot. If there was no collision in the first slot, then it
has captured the next X − 1 slots, where X is the packet transmission time and all other
stations will defer. If there was a collision in the first slot, then the node makes a randomized
retransmission attempt (as in slotted Aloha) and continues to do so until it succeeds. All nodes
will know of the end of transmission of this packet when they sense the channel idle again. If
slotted Aloha with an adaptive protocol were to yield a throughput of η when the packet
length is equal to the slot length, what would be the throughput of this network? Note the
similarities with the CSMA/CD protocol.
INFORMATION TECHNOLOGY-IT1
3. Show that for unslotted CSMA/CD, the maximum interval of time over which a
transmitting node can hear a collision is 2β, where β is the propagation delay.
1. Show that the final parity check in a horizontal and vertical parity check code, if taken as
the modulo 2 sum of all the data bits, is equal to the modulo 2 sum of the horizontal parity
checks and also equal to the modulo 2 sum of the vertical parity checks.
1. What is the difference between persistent HTTP with pipelining and persistent HTTP
without pipelining? Which of the two is used by HTTP/1.1?
2. How does TCP prevent a fast transmitter from flooding a slow receiver that has
limited storage?
11. What is MPLS? What are the advantages of MPLS routing over conventional routing?
Computer Networks and Internet – Network edge, network core, Delay, loss, and throughput
in packet-switched networks, protocol layers, and their service model. Application Layer –
Principles of network applications – network application architectures, process
communication, Web and HTTP, FTP, Email – SMTP, MIME, POP3, IMAP, DNS, Custom
application protocols (WSDL, SOAP), Generic application protocol (REST), Overlay
networks – routing overlays, Peer-to-peer applications(P2P file distribution, BitTorrent,
distributed hash tables), content distribution networks
Internet’s adaptive window protocol TCP: slow start and congestion avoidance, receiver
buffer and cumulative ACKs, packet loss recovery and congestion control, single connection:
analysis with buffer overflow (analysis of slow start phase, short transfer throughput, slow
start: evolution after buffer overflow, analysis of the congestion avoidance phase, congestion
avoidance: evolution after buffer overflow, congestion avoidance: timeout based recovery),
Stochastic model for a wide area TCP connection, TCP with Explicit Feedback (RED and
ECN), Stream control transmission protocol, datagram congestion control
Introduction, datagram networks and virtual circuits, Internet Protocol: Forwarding, IPv4 and
IPv6 addressing, Routing algorithms, Routing in the Internet – RIPng, Changes in OSPF to
support IPv6, BGP multiprotocol extensions for IPv6,Multicast forwarding and routing
information, basic multicast forwarding paradigms, Consequences of TRPF, Multicast trees,
reverse path multicasting, Multicast routing protocols: distance vector multicast routing
protocol and tunneling, Core based trees, protocol independent multicast, Traffic Engineering
– ECMP, Modifying path costs, routing IP flows, service-based routing, dynamic traffic
engineering, routing extensions for traffic engineering, MPLS
Introduction to the link layer, Error detection –single parity checks, horizontal and vertical
parity checks, parity check codes, cyclic redundancy checks, Error correction techniques –
Hamming codes, binary convolutional codes, Reed Solomon codes, Low-density parity-check
codes, Multi-access communication: Stability, maximum throughput, and delay analysis
using Markov chain - slotted multi-access and the ALOHA system, unslotted ALOHA,
CSMA slotted ALOHA, CSMA unslotted ALOHA. Switched LANs, Link virtualization, data
center networking
Reference Books
Course Plan
No. of
No Topic Lectures
(40) Hours
1 Introduction 7 Hours
Computer Networks and Internet – network edge, network core,
1.1 delay, loss, and throughput in packet switched networks, 1
protocol layers and their service model.
PROGRAM
221TIT002 TOPICS IN SECURITY 3 0 0 3
CORE 2
Preamble: This course is intended for students to have a deeper knowledge of selected topics in
network security, system security, and cryptography. The first two modules of the course cover
the Symmetric-key and Asymmetric-key cryptosystems in depth. The third module deals with
Cryptographic schemes that provide Integrity and Authentication.The fourth module discusses
the practical applications of security schemes in computer networks and network applications.
The last module deals with Operating system security and database system security.
Course Outcomes:
After the completion of the course, the student will be able to:
Contrast modern hash functions, MACs, and Digital Signature Schemes and their
CO 3
security strength, and apply them in appropriate contexts.(Level: Apply)
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √
INFORMATION TECHNOLOGY-IT1
CO 2 √ √ √ √
CO 3 √ √ √ √
CO 4 √ √ √ √ √ √
CO 5 √ √ √ √ √ √
Assessment Pattern
Apply 80%
Analyze 20%
Evaluate 0%
Create 0%
Mark distribution
The project shall be done individually. Group projects are not permitted. The test paper shall
include a minimum of 80% of the syllabus.
The End-Semester Examination shall be conducted by the University. There shall be two parts;
Part A and Part B. Part A shall contain five(numerical) questions (such questions shall be useful
in the testing of knowledge, skills, comprehension, application, analysis, synthesis, evaluation,
and understanding of the students), with one question from each module, having five marks for
each question. Students shall answer all questions. Part B shall contain seven questions (such
questions shall be useful in the testing of overall achievement and maturity of the students in a
course, through long answer questions relating to theoretical/practical knowledge, derivations,
problem-solving, and quantitative evaluation), with at least one question from each module, of
which, the student shall answer any five. Each question shall carry seven marks.
1. Suppose that two parties Alice and Bob wish to set up a common secret key between
themselves using the Diffie-Hellman key exchange technique. They agree on 7 as the
modulus and 3 as the primitive root. Alice chooses 2 and Bob chooses 5 as their
respective secrets. Find the secret key that will be established between Alice and Bob.
2. Prove that Pedersen Commitment Scheme satisfies binding property and hiding property.
3. Show how the AES block cipher can be used to build a 128-bit hash function. Comment
on its security
INFORMATION TECHNOLOGY-IT1
4. Describe any five of the major cloud-specific security threats, and countermeasures for
them.
5. Compare the security provided by Fence registers and Base/Bound registers in Operating
Systems.
PART B
6. Let the following state matrix be input to the MixColumn transformation of AES (Values
are in hexadecimal form). Find the resultant state matrix.
63 𝐸𝐵 9𝐹 𝐴0
2𝐹
� 93 92 𝐶0 �
𝐴𝐹 𝐶7 𝐴𝐵 30
𝐴2 20 𝐶𝐵 2𝐵
7. Suppose Alice and Bob use El-Gamal Cryptosystem with a common prime q = 71 and a
primitive root α = 7.
(a) If Bob has public key YB = 3 and Alice chose the random integer k = 2, what is the
ciphertext corresponding to the plaintext M = 30?
(b) If Alice now chooses a different value of k so that the encoding of M = 30 is C =
(59, C2), what is the integer C2?
8. Describe the requirements of an ideal hash function. Consider the following hash
function. Messages are in the form of a sequence ofnumbers in Zn (M = (a1, a2, …, at)).
The hash value h is calculated asℎ(𝑀) = ∑𝑡𝑖𝑖=1 𝑎𝑖𝑖 for some predefined value n. What
requirements of an ideal hash function are satisfied by h? Justify your answer.
9. Consider the following threats to Web security and describe how each one is countered
by a particular feature of TLS.
(a) Brute-Force Cryptanalysis attack: An exhaustive search of the key space for a
conventional encryption algorithm.
(b) Replay attack: TLS handshake messages replayed
(c) Man-in-the-Middle attack: An attacker interposes during the key exchange, acting
as the client to the server and as the server to the client.
(d) Password sniffing: Passwords in HTTP or other application traffic are
eavesdropped.
(e) IP spoofing: Uses forged IP addresses to fool a host into accepting bogus data.
(f) IP hijacking: An active, authenticated connection between two hosts is disrupted
and the attacker takes the place of one of the hosts.
(g) SYN flooding: An attacker sends TCP SYN messages to request a connection but
does not respond to the final message to establish the connection fully. The
attacked TCP module typically leaves the “half-open connection” around for a
few minutes. Repeated TCP SYN can clog the TCP module.
INFORMATION TECHNOLOGY-IT1
10. Consider two Operating Systems OS1 and OS2. OS1 has all its security features
implemented as part of the kernel. OS2 has all its security features implemented in a
‘Security Kernel’ (which is isolated from the rest of the kernel). Compare and contrast the
two Operating System implementations with respect to security.
11. Explain the steps in the signing process and verification process for the El-Gamal digital
signature scheme. For implementing the El-Gamal digital signature scheme between
them, Alice and Bob select a common prime q = 19 and a primitive root α = 10. Compute
Alice’s key pairs. Suppose Alice wants to sign a message with the hash value m = 14.
Explain how the signing and verification steps are done in this case at Alice’s side and
Bob’s side respectively.
12. Alice and Bob use an Elliptic Curve Cryptosystem with parameters E11(1, 6) and G = (2,
7). Bob’s private key is nB = 7.Find Bob’s public key.
***
Syllabus
Security Goals and Attacks threatening them, Symmetric-key Cryptography v/s Asymmetric-key
(Public-key) Cryptography, Block cipher v/s Stream Cipher, Cryptanalysis, AES Mathematical
Background, AES, XTS-AES mode of operation, Format Preserving Encryption, Symmetric-key
Management and Distribution - KDC, Distribution using Asymmetric-key cryptosystems, Diffie-
Hellman Key Exchange Protocol – Anonymous and Ephemeral (with Mathematical
Background).
Cryptographic hash functions, Secure Hash Function - SHA3, Message Authentication Codes –
HMAC, CMAC, Digital Signatures - El-Gamal Digital Signature, Schnorr Digital Signature,
DSA, RSA-PSS.
INFORMATION TECHNOLOGY-IT1
IP Security – ESP, Security Association, TLS overview, HTTPS, SSH, Network Access Control –
Elements, Enforcement methods, EAP, Cloud Security – Elements, Risks, and Countermeasures,
Data protection, Cloud Security as a Service.
Security features in OS, Security in the design of OS, Rootkit, Access Control - Role-based and
Procedure oriented, Security requirements of Databases, Reliability and Integrity, Database
Disclosure.
Reference Books
1. Cryptography and Network Security, Principles and Practice, William Stallings, 7th Edition
Course Plan
No. of Lectures
No Topic
(40 Hours)
1.3 AES 2
3.6 DSA 1
3.7 RSA-PSS 1
ADVANCED LABORATORY
221L1T100 0 0 2 1
NETWORKING LAB 1
Preamble: This course will cover different experiments on advanced network programming
and will provide the students with an environment to work on network simulation tools. This
helps students to develop and implement protocols and evaluate their performance.
Course Outcomes: After the completion of the course, the student will be able to
CO 1 Implement various network protocols for LAN and Internet (Level: Apply)
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 ✓ ✓
✓ ✓
CO 2 ✓ ✓ ✓ ✓
✓
CO 3 ✓ ✓ ✓
✓ ✓
CO 4 ✓ ✓ ✓
✓ ✓
INFORMATION TECHNOLOGY-IT1
CIE: 100%
Attendance : 10%
Reference Books
SEMESTER I
PROGRAM ELECTIVE I
INFORMATION TECHNOLOGY-IT1
CODE COURSE NAME CATEGORY L T P CREDIT
NETWORK ROUTING PROGRAM
221EIT100 3 0 0 3
PROTOCOLS ELECTIVE I
Preamble: The students are expected to understand the architectures and routing protocols
used in different types of networks
Course Outcomes: After the completion of the course the student will be able to
Bloom’s
CO
Course Outcome (CO) Category
No.
Level
Apply shortest path and widest path routing algorithms in Level 3:
CO 1
communication network routing. Apply
Level 4 :
CO 2 Design single and multi-commodity network flow problems
Analyze
Level 2 :
CO 3 Describe IP routing protocols & the routing protocols used in PSTN
Understand
Explain the routing protocols used in high-speed and mobile Level 2 :
CO 4
networks Understand
Level 3:
CO 5 Apply the routing protocols for ad hoc networks
Apply
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2: An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor’s program
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
PO6: An ability to engage in life-long learning for the design and development related to the
stream related problems taking into considerationINsFuOstaRinMaA
biTliItO
y,NsoTcE
ieC
taH
l, N
etO
hiLcO
al G
anYd-IT1
environmental aspects
PO7: An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Apply 80
Analyse 20
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
Evaluation shall only be based on application, analysis or design based questions (for both
internal and end semester examinations).
Continuous Internal Evaluation: 40 marks
INFORMATION TECHNOLOGY-IT1
i. Preparing a review article based on peer reviewed original publications (minimum 10
publications shall be referred) : 15 marks
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
Part A will contain 5 numerical/short answer questions with 1 question from each module,
having 5 marks for each question. Students should answer all questions. Part B will contain 7
questions (such questions shall be useful in the testing of overall achievement and maturity of
the students in a course, through long answer questions relating to theoretical/practical
knowledge, derivations, problem solving and quantitative evaluation), with minimum one
question from each module of which student should answer any five. Each question can carry
7 marks
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly.
For example if the average end semester mark % for a core course is 40, then the maximum
eligible mark % for an elective course is 40+20 = 60 %.
1. In what ways, are the Bellman-Ford algorithm and the distance vector algorithm different?
2. Develop a specialized k-shortest paths algorithm, given that a path cannot consist of more
than two links.
3.What is the difference between minimum hop routing and shortest path routing?
1. Consider a four-node ring network where nodes are connected as follows: 1-2-3-4-1.
Assume that demand volume between 1 and 3 is 25, between 2 and 4 is 30, and between 2
and 3 is 10. Capacity on each link is 50.
(a) Formulate an optimization problem in which the goal is to maximize free capacity
availability. Determine the optimal INfFloOwRMATfIoO
r N TEtC
hiH
s NOLO
obGjeYcti
-IvTe1.
(b) Formulate an optimization problem in which the goal is to load balance the network.
Determine the optimal flow for this objective.
2.Consider a four-node network in which nodes are numbered 1, 2, 3, 4. All nodes are
directly connected to each other except that there is no link between nodes 1 and 2. Link
capacities are given as follows: 30 on link 1-3, 5 on link 1-4, 15 on link 2-3, 10 on link 2-4,
and 10 on link 3-4. Demand volumes are given to be 15 for pair 1:2, 20 for pair 1:3, and 10
for pair 2:3.
Formulate the load balancing optimization problem, and determine the optimal solution.
1. Why do some routing protocols message identification at above the transport layer while
some other do so directly over the IP layer?
2.For a given IP address, how would you find out its home AS number?
1. Describe deflection routing? Explain how buffers can reduce deflection probability
1. What are the main differences between shortest path routing and widest path routing?
2. Explain the basic principle behind a path vector protocol through a simple illustration
3. What is crankback?
6. Consider the network topology given below: Assume that the links have the following
bandwidth: 1-2: 1, 1-4: 1, 2-3: 2, 2-4: 2, 3-4: 1, 3-5: 1, 3-6: 4-5: 2; 4-6: 3; 5-6: 2.
Determine the widest paths from node 6 to all the other nodes.
11. Describe the routing algorithms used for large sized packet radio networks
12. What are the different optimization techniques used in dynamic source routing
protocol? INFORMATION TECHNOLOGY-IT1
Syllabus
Module I (7 Hours)
Module II (8 Hours)
Path vector routing protocol: Basic principle, link failure case, path vector with path caching,
node failure case, Network flow modeling: Single commodity network flow, Multi
commodity network flow: Three node example, general formulation, IP routing: IGRP –
packet formats, computing composite metric, EIGRP, Route redistribution, IS-IS – Key
features, comparison with OSPF.
Module IV (8 Hours)
High Speed Networks -Routing in optical networks-The optical layer, Node Designs,
Network design and operation, Optical layer cost tradeoffs, Routing in ATM networks-ATM
address structure, ATM Routing, PNNI protocol, Routing in the PLANET network and
Deflection Routing. MOBILE NETWORKS - Routing in Cellular Mobile Radio
communication networks, Mobile Network Architecture. Mobility and Routing in Cellular
Digital Packet Data (CDPD) network, Packet Radio Routing- DARPA packet radio network,
Routing algorithms for small, medium and large sized packet radio networks.
3. William Stallings, “ISDN & Broadband ISDN with Frame Relay & ATM”, PHI, ND,
2004.
4. Behrouz A Forouzan, “Data Communications and Networking”, 3rd Edition, TMH, 2004
5. William Stallings, “High Speed Networks TCP/IP and ATM Design Principles”, Prentice
HallInternational, 1998.
6. Mohammad Ilyas, “The Handbook of Ad hoc Wireless Networks”, CRC Press, 2002
7. Vijay K.Garg, “Wireless Network Evolution: 2G to 3G”, Pearson Education, ND, 2003.
Publishers,1998.
9. SumitKasera and Pankaj sethi, “ATM Networks”, TMH Publishing Co. Ltd, ND,2001.
Course Plan
No. of
No Topic Lectures (40
Hours)
1 Network Routing : Basics and Foundations 7 Hours
1.1 Router architecture, Network topology architecture, Network
management architecture, Public switched telephone network 1
(PSTN)
1.2 Routing algorithms : Shortest path and widest path – Bellman
ford algorithm and distance vector approach (centralised view, 1
distributed view)
1.3 Dijkstra’s algorithm – centralised and distributed approach 1
1.4 Comparison of the Bellman–Ford Algorithm and Dijkstra’s
1
Algorithm
1.5 Shortest Path Computation with Candidate Path Caching 1
1.6 Widest Path Computation with Candidate Path Caching 1
1.7 Widest path algorithm, k-shortest path algorithm 1
2 Network flow modeling& IP routing 8 Hours
2.1 Path vector routing protocol : Basic principle, link failure case,
1
path vector with path caching, node failure case
2.2 Network flow modeling: Single commodity network flow 1
2.3 Multi commodity network flow: Three node example, general
2
formulation
2.4 IP routing : IGRP – packet formats, computing composite
2
metric, EIGRP, Route redistribution INFORMATION TE CHNOLOGY-IT1
2.5 IP routing : IGRP – packet formats, computing composite
1
metric, EIGRP, Route redistribution
2.6 IS-IS – Key features, comparison with OSPF 1
3 Internet routing architecture & Routing in the PSTN 7 Hours
3.1 Internet routing architecture – current architectural view of the
1
Internet, Allocation of IP prefixes and AS number
3.2
Policy based routing, Implications of traffic engineering, 2
Internet routing instabilities
3.2 Routing in the PSTN – Hierarchical routing, limitations of
2
hierarchical routing, Dynamic routing
3.3 Real time network routing, Dynamic routing and its relation to
other routing - dynamic routing and link state protocol, Path
2
Selection in Dynamic Routing in Telephone Networks and IP
Routing
4 High speed and Mobile Network Routing 9 Hours
4.1 HIGH SPEED NETWORKS -Routing in optical networks-The
optical layer, Node Designs, Network design and operation, 1
Optical layer cost tradeoffs
Preamble: The students are expected to understand the basic concepts of wireless
communication, ad hoc networks, and sensor networks
Course Outcomes: After the completion of the course the student will be able to
Bloom's
CO Category
Course Outcomes (CO)
No. Level
Identify the characteristics of wireless communication systems and Level2:
CO 1
cellular systems Understand
Level 2:
CO 2 Explain the operation of wireless internet
Understand
Level4:
CO 3 Analyze the MAC and routing protocols used in ad hoc networks
Analyse
Level 2:
CO 4 Explain the transport and security protocols for ad hoc networks
Understand
Level 2:
CO 5 Explain the fundamental concepts of wireless sensor networks
Understand
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2: An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor program
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
INFORMATION TECHNOLOGY-IT1
PO6: An ability to engage in life-long learning for the design and development related to the
stream related problems taking into consideration sustainability, societal, ethical and
environmental aspects
PO7: An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Apply 80
Analyse 20
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
Part A will contain 5 numerical/short answer questions with 1 question from each module,
having 5 marks for each question. Students should answer all questions. Part B will contain 7
questions (such questions shall be useful in the testing of overall achievement and maturity of
the students in a course, through long answer questions relating to theoretical/practical
knowledge, derivations, problem solving and quantitative evaluation), with minimum one
question from each module of which student should answer any five. Each question can carry
7 marks
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly.
For example if the average end semester mark % for a core course is 40, then the maximum
eligible mark % for an elective course is 40+20 = 60 %.
1. Illustrate with necessary expressions how frequency reuse helps in increasing cellular
capacity
1. What are the network security requirements for mobile ad hoc networks?
1. What are the issues and challenges in designing wireless sensor networks?
2. Define localization
5. Write the properties and the main design challenges of data dissemination protocols in
a wireless sensor network.
6. “In practice fast fading only occurs for very low data rate (communications)”. Justify.
8. Consider the network given below. Here ‘S’ is source node and ‘D’ is
target node. Illustrate the process of route discovery, route reply, data
delivery and route caching using DSR.
12. Compare the data gathering methods used in wireless sensor networks
Syllabus
local area networks, Bluetooth and personal area networks, The Cellular Concept: Frequency
reuse, channel assignment and handoff strategies, Interference and system capacity, trunking
and grade of service, Improving coverage and capacity in cellular systems, Signal
Propagation – path loss of radio signals, additional signal propagation effects, multipath
propagation. Spread spectrum – Direct sequence spread spectrum, Frequency-hopping spread
spectrum, Medium access control – motivation for a specialized MAC, SDMA, FDMA,
TDMA
Wireless Internet – introduction, Mobile IP, TCP in wireless domain, Wireless Application
Protocol – model, protocol stack. Ad hoc wireless networks – introduction, issues in ad hoc
wireless networks, MAC protocols for ad hoc wireless networks – introduction, issues in
designing a MAC protocol for ad hoc wireless networks, classification of MAC protocols.
MAC Protocols – MACAW, Distributed packet reservation multiple access protocol,
distributed priority scheduling and medium access in ad hoc networks, multi-channel CSMA
MAC protocol
Module IV: Transport and Security protocols for ad hoc wireless networks (8 Hours)
Transport layer – design issues, classification of transport layer solutions, TCP over ad hoc
wireless networks – Feedback based TCP, TCP with explicit link failure notification, TCP
Bus, Ad hoc TCP, Split TCP, Application controlled transport protocol, ad hoc transport
INFORMATION TECHNOLOGY-IT1
protocol, Security in Ad hoc wireless networks, network security requirements, issues and
challenges in security provisioning, network security attacks
Reference Books
2. C. Siva Ram Murthy, B.S. Manoj, “Ad hoc Wireless Networks: Architectures and
Protocols”, Pearson Education
Preamble: The syllabus is designed with the view of preparing the students capable of
understanding the security aspects of cloud computing. The students will get to know about the
cloud architecture, vulnerabilities and threats occurring in various cloud systems and methods to
secure the same.
Analyse the security issues and challenges faced in a given cloud environment
CO 4
and implement appropriate security measures(Cognitive level: Apply)
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization
of the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor program
INFORMATION TECHNOLOGY-IT1
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
PO6: An ability to engage in life-long learning for the design and development related to
the stream related problems taking into consideration sustainability, societal, ethical
and environmental aspects
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
INFORMATION TECHNOLOGY-IT1
Assessment Pattern
Apply 100%
Analyse
Evaluate
Create
Mark distribution
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
1. Demonstrate how you will a Configure a VM instance using virtual box in your local
machine and allocate CPU, memory and storage space as per a specified requirement.
2. Illustrate the steps to perform VM migration.
3. A degree of caution is advised when launching a server virtualization. Clarify this
statement by stating the drawbacks of the same.
1. With the help of examples, differentiate between SaaS, PaaS and IaaS?
2. To meet the requirements of a single organization, which one out of the private, public
and hybrid cloud providers, is recommended? Why?
3. How will you classify massive systems? Explain.
1. Given an e-healthcare application deployed in cloud. Identify the challenges faced and
the security objectives to be achieved.
2. How is security provided to data at various stages in the context of the cloud?
3. How virtualization supports disaster recovery?
INFORMATION TECHNOLOGY-IT1
Name:
221EIT002
PART A
4. Among openNebula and openStack, which is suited best for enterprise cloud
(5)
computing?
5. Why is it harder to establish security in the cloud? (5)
(5x5=25)
Part B
(Answer any five questions. Each question carries 7 marks)
6. (7)
How is memory virtualization implemented? Provide necessary examples
and diagrams wherever necessary.
7. (7)
Illustrate the steps to perform live VM migration.
INFORMATION TECHNOLOGY-IT1
8. (7)
Depict the cloud architecture. Explain the same with the help of an example
application.
9. (7)
Explain PaaS model for cloud computing. With a neat diagram, write about
Google App Engine for PaaS applications.
10. (7)
Consider a restaurant application on the cloud that has serverless apps
connecting to a backend NoSQL database. There are two types of users in
the application - manager (who manages the catalog) and customer (who
views the catalog). There are separate serverless functions for the users.
During development, you need to create a set of roles that can define what
operations are permitted on the NoSQL database by the serverless
functions. In addition, the entire application and the data should be secured.
Propose solutions for the following.
a) What permissions are required for the role assigned to manager function?
11. (7)
Explain Security Architecture Design in cloud.
12. (7)
Explain the life cycle of Secure software Development (SecSDLC).
INFORMATION TECHNOLOGY-IT1
Syllabus
Module I:
Module II: Introduction to Cloud Computing: System Models for Distributed and Cloud
Computing - NIST Cloud Computing Reference Architecture - Features of Cloud Computing –
Cloud Services – IaaS, PaaS, SaaS – Cloud service Providers – Public, Private and Hybrid
Clouds.
Module III: Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture
Development – Design Challenges - Inter Cloud Resource Management – Resource Provisioning
and Platform Deployment – Global Exchange of Cloud Resources.
Module IV: Parallel and Distributed Programming Paradigms – Map Reduce, Hadoop
Library from Apache – Mapping Applications - Programming Support – EC2, Google App
Engine, Amazon AWS - Cloud Software Environments - Eucalyptus, Open Nebula, OpenStack.
Reference Books
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things”, 1sted. ,Morgan Kaufmann Publishers.
7. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005.
8. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing –
A Business Perspective on Technology and Applications”, Springer, 2010.
No. of Lectures
No Topic
(40)
Network Virtualization
1.8 1 hour
Preamble: The students are expected to understand the basic concepts of Ethical Hacking
and Penetration testing.
Course Outcomes: After the completion of the course the student will be able to
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2:An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3:An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor’s program
PO4:An ability to apply stream knowledge to design or develop solutions for real-world
problems by following the standards
PO5:An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tools to model, analyze and solve practical engineering problems.
PO6:An ability to engage in lifelong learning for the design and development related to the
stream-related problems taking into consideration sustainability, societal, ethical, and
environmental aspects
PO7:An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
Mapping of course outcomes with program outcomes
PO 1 PO 2 PO 3 PO 4 INFORMA5TION P
PO TOEC6HNOLP
OOG7Y-IT1
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Apply 80
Analyse 20
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
The evaluation shall only be based on application, analysis or design-based questions (for both
internal and end-semester examinations).
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
Course-based task/test paper questions shall be useful in the testing of knowledge, skills,
comprehension, application, analysis, synthesis, evaluation, and understanding of the students.
Part A will contain 5 numerical/short answer questions with 1 question from each module,
having 5 marks for each question. Students should answer all questions. Part B will contain 7
questions (such questions shall be useful in the testing of overall achievement and maturity of
the students in a course, through long answer questions relating to theoretical/practical
knowledge, derivations, problem-solving and quantitative evaluation), with a minimum of one
question from each module of which student should answer any five. Each question can carry
7 marks
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40, then the maximum
eligible mark % for an elective course is 40+20 = 60 %.
Model Question Paper INFORMATION TECHNOLOGY-IT1
6. Being an expert in hacking, you are asked to analyze the free, open-source software
beingused to run FTP services on a server. You noticed that there is an excessive
numberoffgets() and gets() on the source code. These C++ functions do not check
bounds. Whatkind of attack is this program susceptible to? Comment on your
recommendation toprevent this attack.
7. Explain the type of attack facedby the stack data structure. Also, explain the uses of
two pointers used in a stack.
8. Illustrate how SQL injection attacks are done by attackers.
9. Discuss some architecture strategies for fraud prevention with respect to computer
network-enabled system
10. Explain IT infrastructure.
11. An attacker uses a distributed group of computers to shut down a single machine or
network making it inaccessible to its intended users? Explain the attack with the help
of a neatdiagram. What are the ways to prevent this attack?
12. Illustrate the process involved in understanding the inherent risk profile of a business
with relevant tables and assumptions
Syllabus INFORMATION TECHNOLOGY-IT1
Module I: (8 Hours)
Introduction: CIA Triads, Hacking Impact, The Hacker Framework: Planning the test, Sound
operations,Reconnaissance, Enumeration, Vulnerability Analysis, Exploitation,Final
Analysis, and Deliverable.Integration Information Security Models: Computer Security,
NetworkSecurity, Service Security, Application Security.Security Architecture Information
Security Program: The Process ofInformation Security, Component Parts of Information
SecurityProgram, Risk Analysis, and Ethical Hacking.
Module V: (8 Hours)
Reference Books
1. Hacking: The Art of Exploitation Jon Erikson 2nd edition
2. The Basics of Hacking and Penetration Testing Patrick Engebretson 2nd edition
Syllabus and Course Plan(For 3 credit courses, the content can be for 40 hrs, and for 2
credit courses, the content can be for 26 hrs. The audit course in the third semester can have
content for 30 hours).
No. of
No Topic Lectures
(40 Hours)
1 Module 1 8 Hours
1.1 Introduction: CIA Triads, Hacking Impact. 2
The Hacker Framework: Planning the test, Sound Operations,
Reconnaissance, Enumeration, Vulnerability Analysis,
1.2 2
Exploitation,
Final Analysis, and Deliverable.
Integration Information Security Models: Computer Security,
1.3 Network 2
Security, Service Security, Application Security
Security Architecture Information Security Program: The
Process of
1.4 2
Information Security, Component Parts of Information
SecurityProgram, Risk Analysis, and Ethical Hacking
2 Module 2 9 Hours
The Business Perspective: Business Objectives, Security Policy,
2.1 2
Previous Test Result
Business Challenges Planning for a Controlled Attack: Inherent
2.2 2
Limitations Imposed Limitations,
Timing Everything, Attack Type,
2.3 1
Source Point, Required Knowledge, Multi-Phased Attack
2.4 Teamingand Attack Structure, Engagement Planner, 2
The Right SecurityConsultant, The Tester, Logistics,
2.5 2
Intermediates, Law Enforcement.
3 Module 3 7 Hours
3.1 Preparing for a Hack: Technical Preparation, 1
3.2 Managing theEngagement 2
3.3 Reconnaissance: Social Engineering 2
Physical Security, and Internet
3.4 2
Reconnaissance.
4 Module 4 8 Hours
4.1 Enumeration: Enumeration Techniques, Soft Objective, 1
4.2 LookingAround or Attack, Elements of Enumeration. 2
Preparing for the Next Phase Exploitation: Intuitive Testing,
4.3 INFORMATION TECHNOLOGY-IT1
2
Evasion,
Threads and Groups, Operating Systems,
4.4 Password Crackers, Rootkits,Applications 2
4.5 Wardialing, Network, Services and Areas of Concern. 1
5 Module 5 8 Hours
Deliverable: The Deliverable, The Document, Overall Structure,
5.1 2
Aligning Findings
Presentation Integration: Integrating the Results, Integration
5.2 2
Summary
5.3 Mitigation, Defense Planning 2
5.4 Incident Management, Security Policy 2
INFORMATION TECHNOLOGY-IT1
CODE COURSE NAME CATEGORY L T P CREDIT
SOFTWARE DEFINED PROGRAM
221EIT004 3 0 0 3
NETWORKS ELECTIVE 1
Preamble: The modern computer network has evolved into a complex beast that is
challenging to manage and that struggles to scale to the requirements of some of today’s
environments. SDN represents a new approach that attempts to address these weaknesses of
the current paradigm. This course introduces a highly scalable and centralized network
control SDN architecture introduced that is better suited to the extremely large networks
prevalent in today’s mega scale data centers.
Course Outcomes: After the completion of the course the student will be able to
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2: An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor program
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
INFORMATION TECHNOLOGY-IT1
PO6: An ability to engage in life-long learning for the design and development related to the
stream related problems taking into consideration sustainability, societal, ethical and
environmental aspects
PO7: An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Apply 70%-80%
Analyse 20%-30%
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
ii) Course based task / Seminar/ Data collection and interpretation : 15 marks
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly.
For example, if the average end semester mark % for a core course is 40, then the maximum
eligible mark % for an elective course is 40+20 = 60 %.
2. What are the new requirements emerging from the technological advances taking place
now in data center environments. How it is changing the traditional switching
architecture?
1. What are the functionalities of a SDN controller? Demonstrate the working of SDN
Controller.
2. Explain how an SDN devices communicate. Illustrate the working using a software
switch. How it is different from a hardware switch?
1. “Open SDN is often depicted as a single controller responsible for overseeing the
operation of the entire network”, What is its main disadvantage? What are the alternative
solutions available to over this disadvantage?
1. What are the demands of Data centers on the capacity of network components? Suggest
two the methods to overcome these demands.
2. Explain the stateless transport tunnelling. How is it used for network virtualization?
2. What are the characteristics of a campus network? Demonstrate how SDN can be applied
to on a campus network.
QP CODE:
Reg No:
Name: PAGES : 2
PART A
8. Demonstrate the communication between the controller and the device using (7)
OpenFlow protocol.
9. Using a Suitable example, explain SDN implemented via hypervisor-based (7)
overlay technology.
10. What is multipath routing? What are the technologies are available in order to (7)
achieve multipath routing?
11. From a data center's perspective, how is multitenancy achieved in SDN via (7)
Overlays, Open SDN and SDN via APIs?
12. How is SDN applied to service providers and carrier networks? Give an (7)
example.
Syllabus
Reference Books
Course Plan
No. of
No Topic Lectures
40 Hours
1 Why SDN? (9 Hours)
Introduction - Basic Packet-Switching Terminology, Historical
1.1 2 Hours
background, The Modern Data Center, traditional Switch Architecture
Autonomous and Dynamic Forwarding Tables, Can We Increase the
1.2 2 Hours
Packet- Forwarding IQ, Open Source and Technological Shifts
Evolutioann of Switches and Control Planes, Cost, SDN Implications
1.3 2 Hours
forResearch d Innovation,DataCenter Innovation, Data Center Needs
Genesis of SDN – TheEvolution of Networking Technology,
1.4 1 Hour
Forerunners of SDN
1,5 Software DefinedNetworking is Born Sustaining SDN Interoperability 1 Hour
Open-Source Contributions, LegacyMechanisms Evolve Toward SDN,
1.6 1 Hour
Network Virtualization
2 How SDN Works?(7 Hours)
2.1 Fundamental Characteristics of SDN,SDN Operation, SDN Devices 2 hours
INFORMATION TECHNOLOGY-IT1
2.2 SDNController 2 Hours
2.3 SDN Applications, Alternate SDN Methods 1 Hour
2.4 OpenFlow Overview, Basics,Additions, Limitations. 2 Hours
3 Alternative Definitions of SDN(8 Hours)
3.1 Potential Drawbacks ofOpen SDN, SDN via APIs 2 Hours
3.2 SDN via Hypervisor-Based Overlays 2 Hours
3.3 SDN via Opening Up the Device 2 Hours
3.4 Network Functions Virtualization, Alternatives Overlap and Ranking 2 Hours
4 SDN in Data Centers(8 Hours)
Data Center Definition, Data CenterDemands, Tunneling Technologies
4.1 2 Hours
for the Data Center
4.2 Path Technologies inthe Data Center 1 Hour
4.3 Ethernet Fabrics in the Data Center 2 Hours
4.4 SDN Use Cases in the Data Center 1 Hour
Comparison of OpenSDN, Overlays and APIs in the Data Center, Real-
4.5 2 Hours
World Data CenterImplementations.
5 Application of SDN(8 Hours)
Implementations SDN in Other Environments - Wide Area
5.1 2 Hours
Networks,Service Provider and Carrier Networks
5.2 Campus Networks,HospitalityNetworks,MobileNetworks, 2 Hours
In-Line, NetworkFunctions,OpticalNetworks,SDN vs. P2P/Overlay
5.3 2 Hours
NetworksPlayers in the SDN Eco-system
SDN Applications - Application Types, Using Floodlight for Training
Purposes, A Simple Reactive Java Application, Controller
5.4 2 Hours
Considerations, Network Device Considerations, Offloading Flows in
the Data Center, Access Control for the Campus
CODE COURSE NAME CATEGORY L T P CREDIT
INTRUSION DETECTION AND IP
NRFO
OGRR
MA TION TECHNOLOGY-IT1
AM
221EIT005 3 0 0 3
PREVENTION SYSTEMS ELECTIVE I
Preamble: The students are expected to understand the intrusion detection tools and techniques in
order to provide security in a network.
Course Outcomes: After the completion of the course, the student will be able to
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2: An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3: An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor program
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
PO6: An ability to engage in life-long learning for the design and development related to the
stream related problems taking into consideration sustainability, societal, ethical and
environmental aspects
PO7: An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
INFORMATION TECHNOLOGY-IT1
Mapping of course outcomes with program outcomes
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Understand 50 %
Apply 30 %
Analyse 20 %
Evaluate
Create
Mark distribution
Total ESE
CIE ESE
Marks Duration
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
QP CODE:
Reg No:
Name: PAGES : 4
PART A
Syllabus
Module 1: Introduction
Network Attacks: Attack taxonomies, Probes, Privilege Escalation Attacks, Denial of Service
and distributed Denial of service attacks, Worms attack, Routing attacks Detection approaches
– Anomaly detection -Misuse detection - specification based detection – hybrid detection
Module 2: TCP/IP
Data Collection for Host-Based IDSs- Audit Logs, System Call Sequences Data Collection for
Network-Based IDSs- SNMP, Packets, Limitations of Network -Based IDSs, Data Collection
for Application- Based IDSs, Data Collection for Application -Integrated IDSs, Hybrid Data
Collection
Writing TCPdump filters, Introduction to Snort Rules, Snort Rules -Part II, Detection of
Intelligent Gathering
Mitnick attack, Architectural issues, Organizational issues, Automated and manual response,
Business case for Intrusion Detection, Future directions
Reference Books
1. Ali A. Ghorbani, Wei Lu, “Network Intrusion Detection and Prevention: Concepts and
Techniques”, Springer, 2010
2. Stephen Northcutt, Judy Novak, “Network Intrusion Detection and Prevention”, New
Riders Publishing , 2002
3. Carl Enrolf, Eugene Schultz, Jim Mellander, “Intrusion detection and Prevention”,
McGraw Hill, 2004 INFORMATION TECHNOLOGY-IT1
3. Paul E. Proctor, “The Practical Intrusion Detection Handbook “,Prentice Hall , 2001.
4. Ankit Fadia and Mnu Zacharia, “Intrusion Alert”, Vikas Publishing house Pvt., Ltd, 2007.
Course Plan
Topic No. of
No
Lectures (40 )
1 Module 1: Introduction 6 Hours
Network Attacks: Attack taxonomies, Probes, Privilege Escalation
1.1 2 Hour
Attacks,
Denial of Service and distributed Denial of service attacks, Worms
1.2 2 Hour
attack, Routing attacks
Detection approaches – Anomaly detection -Misuse detection -
1.3 2 Hours
specification based detection – hybrid detection
2 Module 2: TCP/IP 10 Hours
2.1 IP concepts, Introduction to TCPdump and TCP 2 Hour
2.2 Fragmentation, ICMP 2 Hours
2.3 Stimulus and Response, DNS 2 Hours
2.4 Packet Dissection using TCPdump, Examining IP header fields 2 Hours
2.5 Examining embedded protocol Header fields, Real world Analysis 2 Hours
3 Module 3: Data Collection 8 Hours
Data Collection for Host-Based IDSs- Audit Logs, System Call
3.1 2 Hour
Sequences
Data Collection for Network-Based IDSs- SNMP, Packets,
3.2 2 Hour
Limitations of Network -Based IDSs
3.3 Data Collection for Application- Based IDSs 2 Hour
Data Collection for Application -Integrated IDSs, Hybrid Data
3.4 2 Hours
Collection
4 Module 4: Filters/Rules for Network 8 Hours
4.1 Writing TCPdump filters 2 Hours
4.2 Introduction to Snort Rules 2 Hours
4.3 Snort Rules -Part II 2 Hours
SEMESTER I
PROGRAM ELECTIVE II
INFORMATION TECHNOLOGY-IT1
CODE COURSE NAME CATEGORY L T P CREDIT
WEB TECHNOLOGIES AND PROGRAM
221EIT006 3 0 0 3
WEB SECURITIES ELECTIVE 2
Preamble: This course helps the learner to understand the fundamental ideas of Web
Application Development using HTML5, CSS3, JavaScript and detailed knowledge about
server-side programming using PHP and Frameworks.
Course Outcomes: After the completion of the course the student will be able to:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 ✓ ✓ ✓ ✓ ✓ ✓ ✓
CO 2 ✓ ✓ ✓ ✓ ✓ ✓ ✓
CO 3 ✓ ✓ ✓ ✓ ✓ ✓ ✓
CO 4 ✓ ✓ ✓ ✓ ✓ ✓ ✓
CO 5 ✓ ✓ ✓ ✓ ✓ ✓ ✓
Assessment Pattern
Total ESE
CIE ESE
Marks Duration
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly. For example if the average end semester mark % for
a core course is 40, then the maximum eligible mark % for an elective course is 40+20 = 60
%.
INFORMATION TECHNOLOGY-IT1
Syllabus
Module – 1 (8 hours)
Module – 2 (8 hours)
Module: 3 (7 hours)
Module: 4 (8 hours)
Database Applications: PHP with MySQL – mysql interface – MySQLi interface – Object
Oriented Version of MySQLi
Module: 5 (8 hours)
5. Write JavaScript code that will create an Object with a property named color having a
String value of red
7. What is the purpose of the HTML title attribute (not element)? Describe a scenario in
which this attribute might be particularly helpful to a Web site user
8. Assume that you are adding JavaScript code to an HTML document that contains a
form with a submit button. You did not modify any of the HTML or add an event
listener for the click event on this button, and yet the button stopped working after
you added your code to the document. Give at least two possible explanations.
9. Contrast the IE6 and DOM approaches to modifying an intrinsic event attribute,
giving at least one advantage of each approach over the other.
13. Describe in a detailed way different types of Web oriented data encoding techniques
.
INFORMATION TECHNOLOGY-IT1
Syllabus and Course Plan
No Topic No. of
Lectures
Module – 1 (8 hours)
2. Brian P Hogan, ―HTML5 and CSS3: Develop with Tomorrow's Standards Today‖,
Pragmatic Bookshelf, 2010.
4. Paco Hope, Ben Walther, ―Web Security Testing Cookbook: Systematic Techniques
to Find Problems Fast‖, O'REILLY media, 2009.
INFORMATION TECHNOLOGY-IT1
CODE COURSE NAME CATEGORY L T P CREDIT
Preamble: The syllabus is designed with the view of preparing the students capable of
understanding different architectures, protocols, and security aspects of Internet of Things.
The students will get to know about the IoT Architectures, protocols and security systems, and
methods to secure the same.
Identify Data link layer, network layer and transport layer protocols for IoT.
CO 2
(Cognitive level: Apply)
Analyze the security issues and challenges in IoT, choose Security and Privacy
CO5 algorithms, and implement appropriate security measures
(Cognitive level: Apply)
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO4: An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5: An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyze and solve practical engineering problems.
PO6: An ability to engage in life-long learning for the design and development related to
the stream related problems taking into consideration sustainability, societal, ethical
and environmental aspects
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO5
INFORMATION TECHNOLOGY-IT1
Assessment Pattern
Apply 100%
Analyse
Evaluate
Create
Mark distribution
Evaluation shall only be based on application, analysis or design based questions (for both internal
and end semester examinations).
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
Course based task/test paper questions shall be useful in the testing of knowledge, skills,
comprehension, application, analysis, synthesis, evaluation and understanding of the students.
221EIT007
PART A
1. Explain any two challenges and its solution to implement smart charging of (5)
vehicles.
2. In which scenario, users can opt 6LoWPAN and RPL? Find suitable (5)
application.
3. Why HTTP is not suitable for IoT applications? (5)
4. What is the basic difference between the IoT network and Wireless Sensor (5)
Network?
5. Why Light weight cryptographic algorithms are used to establish security in (5)
IoT? (5x5=25)
Part B
(Answer any five questions. Each question carries 7 marks)
6. (7)
Develop a physical design.for smart parking in IoT systems
INFORMATION TECHNOLOGY-IT1
7. (7)
Depict the IoT reference architecture. Explain the same with the help of neat
diagram.
8. (7)
Illustrate the role of data protocol MQTT and CoAP in IoT.
9. (7)
In which scenario users can opt WiFi, Bluetooth and Zigbee? Find suitable
application.
10. (7)
How IOT deployment is done in Raspberry Pi /Arduino/Equivalent
platform? Provide necessary examples and diagrams wherever necessary
11. (7)
Describe the technologies that enable IoT .How to create a new mote using
cooja simulator?
12. (7)
Explain the Homomorphic Encryption Schemes and Key Agreement in IoT
security.
Syllabus
Architectural approach towards the future Internet of Things- Definitions and Functional
Requirements, Possible Architecture for the Future Internet of Things.Characteristics of IoT -
Challenges and Issues - Physical Design of IoT, Logical Design of IoT , Software Design-
Control Units,IoT Functional Blocks.IETF Architecture for IoT, IoT Reference Architecture.
Examples of IoT infrastructure,
IoT Data Link Layer & Network Layer Protocols PHY/MAC Layer (3GPP MTC, IEEE 802.11,
IEEE 802.15), Wireless HART, Z Wave, WiFi, Bluetooth Low Energy, Zigbee Smart Energy,
Network Layer-IPv4,IPv6, 6LoWPAN, DHCP, ICMP, RPL, CORPL, CARP, IoT Transport
Layer Protocols: -TCP, MPTCP, UDP, DCCP, TLS, DTLS
Module III:
Module IV:
Technologies behind IoT,Four pillars of IoT paradigm, - RFID, Wireless Sensor Networks,
SCADA (Supervisory Control and Data Acquisition), M2M - IoT Enabling Technologies -
BigData Analytics, Cloud Computing, Embedded Systems.
Programming the microcontroller for IoT:-Working principles of sensors – IoT deployment for
Raspberry Pi /Arduino/Equivalent platform – Reading from Sensors, Communication:
Connecting microcontroller with mobile devices –communication through Bluetooth, wifi, and
USB - Contiki OS- Cooja Simulator.
Module V:
Security and Privacy in the IoT, Security Issues in the IoT, Security Mechanisms -Traditional vs
Lightweight security- Symmetric-key LWC Algorithms- Public-key (Asymmetric) LWC
Algorithms- Lightweight Cryptographic Hash Functions. Homomorphic Encryption Schemes,
Key Agreement, Distribution, and Security Bootstrapping.Case studies: IoT for smart cities,
health care, agriculture, smart meters.M2M, Web of things, Cellular IoT, Industrial IoT, Industry
4.0,IoT standards.
No. of Lectures
No Topic
(40)
3 IoT protocols- Session Layer, Application Layer and Service Layer(8 hours)
5
Security and Privacy in the IoT(8 hours)
Reference Books
1. Simone Cirani, Gianluigi Ferrari, Marco Picone, Luca Veltri. Internet of Things:
Architectures, Protocols and Standards, 1st edition, Wiley Publications, 2019.
2. Bahga, Arshdeep, and Vijay Madisetti. Internet of Things: A hands-on approach, 1st
edition,University press, 2014
3. Dr. Ovidiu Vermesan, Dr Peter Friess, Internet of Things: Converging Technologies for
Smart Environments and Integrated Ecosystems, River Publishers, 2013
4. Vermesan, Ovidiu, and Peter Friess, eds. Internet of things-from research and innovation
to market deployment, 1st edition, Aalborg: River publishers, 2014.
5. Tsiatsis, Vlasios, Tsiatsis, Vlasios, Stamatis Karnouskos, Jan Holler, David Boyle, and
Catherine Mulligan, Internet of Things: technologies and applications for a new age of
intelligence, 2nd edition, Academic Press, 2018.
INFORMATION TECHNOLOGY-IT1
PROGRAM
221EIT008 STORAGE MANAGEMENT
ELECTIVE 3 0 0 3
AND SECURITY
2
Preamble: This course aims at introducing the students to the various storage architectures, their
management, and security aspects.
Course Outcomes: After the completion of the course, the student will be able to
CO Bloom's Category
Course Outcome (CO)
No. Level
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
INFORMATION TECHNOLOGY-IT1
CO 4
CO 5
Assessment Pattern
BL 2: Understand 60 %
BL 3: Apply 40 %
BL 4: Analyze
BL 5: Evaluate
BL 6: Create
Mark distribution
Continuous
End Semester
Total Internal
Examination ESE Duration
Marks Evaluation
(ESE)
(CIE)
Each student shall prepare the review article based on peer reviewed publications (refer
minimum 10 original publications). The test paper shall include a minimum of 80% of the
syllabus.
There shall be two parts; Part A and Part B. Part A shall contain five (numerical) questions (such
questions shall be useful in the testing of knowledge, skills, comprehension, application,
analysis, synthesis, evaluation, and understanding of the students), with one question from each
module, having five marks for each question. Students shall answer all questions. Part B shall
contain seven questions (such questions shall be useful in the testing of overall achievement and
maturity of the students in a course, through long answer questions relating to
theoretical/practical knowledge, derivations, problem-solving, and quantitative evaluation), with
at least one question from each module, of which, the student shall answer any five. Each
question shall carry seven marks.
INFORMATION TECHNOLOGY-IT1
Max.Marks: 60
Duration: 2½ Hours,
Syllabus
Reference Books
1. EMC Education Services” Information Storage and Management: Storing, Managing and
Protecting Digital Information”, John Wiley & Sons, 2010
3. lohnChirillo, ScottBaul“ Storage Security: Protecting SANs, NAS and DAS”, Wiley,
2003
Course Plan
No. of
Sl. No. Topic Lectures
NETWORK
PROGRAM
221EIT009 PROGRAMMING AND 3 0 0 3
ELECTIVE 2
MANAGEMENT
Preamble: This course is intended for students to develop the necessary skills for creating robust
and scalable network applications and to impart basic knowledge for managing networks.
Course Outcomes: After the completion of the course, the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
INFORMATION TECHNOLOGY-IT1
CO 4
CO 5
Assessment Pattern
BL 2: Understand 60 %
BL 3: Apply 40 %
BL 4: Analyze
BL 5: Evaluate
BL 6: Create
Mark distribution
Each student shall prepare the review article based on peer reviewed publications (refer
minimum 10 original publications). The test paper shall include a minimum of 80% of the
syllabus.
There shall be two parts; Part A and Part B. Part A shall contain five (numerical) questions (such
questions shall be useful in the testing of knowledge, skills, comprehension, application,
analysis, synthesis, evaluation, and understanding of the students), with one question from each
module, having five marks for each question. Students shall answer all questions. Part B shall
contain seven questions (such questions shall be useful in the testing of overall achievement and
maturity of the students in a course, through long answer questions relating to
theoretical/practical knowledge, derivations, problem-solving, and quantitative evaluation), with
at least one question from each module, of which, the student shall answer any five. Each
question shall carry seven marks.
INFORMATION TECHNOLOGY-IT1
Max.Marks: 60
Duration: 2½ Hours,
Syllabus
TCP Echo Server – TCP Echo Client – POSIX Signal handling – Server with
multiple clients – boundary conditions: Server process Crashes, Server host
Crashes, Server Crashes and reboots, Server Shutdown – I/O multiplexing – I/O 9 Hours
Models – select function – shutdown function – TCP echo Server (with
multiplexing) – poll function – TCP echo Client (with Multiplexing). Socket
options – getsocket and setsocket functions – generic socket options – IP socket
options – ICMP socket options – TCP socket options.
Elementary UDP sockets – UDP echo Server – UDP echo Client – Multiplexing
TCP and UDP sockets – Domain name system – gethostbyname function – Ipv6
support in DNS – gethostbyaddr function – getservbyname and getservbyport 8 Hours
functions, Elementary SCTP sockets, interface models, functions for bind,
connect, address mapping and shutdown.
Reference Books
2. SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, William Stallings, 3/e, Addison
Wesley, 1998
3. Internetworking with TCP/IP Vol. II: Design, Implementation, and Internals, Douglas E
Comer, David L Stevens, 3/e, Pearson, 2015
4. Network Management: Principles and Practice, Mani Subramanian, 2/e, Pearson, 2010
Course Plan
No. of
Sl. No. Topic
Lectures
2.1 TCP Echo Server – TCP Echo Client – POSIX Signal handling – 2
Server with multiple clients
– shutdown function
2.4 TCP echo Server (with multiplexing) – poll function – TCP echo 1
Client (with Multiplexing)
3.1 Elementary UDP sockets – UDP echo Server – UDP echo Client 2
4.3 raw sockets – raw socket creation – raw socket output – raw socket 2
input
PROGRAM
221EIT010 NETWORK FORENSICS 3 0 0 3
ELECTIVE 2
Preamble: This course is intended for students to have sound technical knowledge in basic and
advanced topics in network forensics including the application of traffic acquisition software,
packet and flow traffic analysis, statistical traffic protocols network tunneling strategies, and
malware evolution trends.
Course Outcomes: After the completion of the course, the student will be able to
PO
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
7
CO 1
CO 2
INFORMATION TECHNOLOGY-IT1
CO 3
CO 4
CO 5
Assessment Pattern
BL 2: Understand 60 %
BL 3: Apply 20 %
BL 4: Analyze 20 %
BL 5: Evaluate
BL 6: Create
Mark distribution
Continuous
End Semester
Total Internal
Examination ESE Duration
Marks Evaluation
(ESE)
(CIE)
Each student shall prepare the review article based on peer reviewed publications (refer
minimum 10 original publications). The test paper shall include a minimum of 80% of the
syllabus.
There shall be two parts; Part A and Part B. Part A shall contain 5 (numerical) questions (such
questions shall be useful in the testing of knowledge, skills, comprehension, application,
analysis, synthesis, evaluation, and understanding of the students), with one question from each
module, having 5 marks for each question. Students shall answer all questions. Part B shall
contain 7 questions (such questions shall be useful in the testing of overall achievement and
maturity of the students in a course, through long answer questions relating to
theoretical/practical knowledge, derivations, problem-solving, and quantitative evaluation), with
at least one question from each module, of which, the student shall answer any five. Each
question shall carry 7 marks.
INFORMATION TECHNOLOGY-IT1
Max.Marks: 60
Duration: 2½ Hours,
5. What happens in TLS protocol implementation when a client contacts a server for
communication?
7. What are protocol analyzers? Explain the options in Wireshark for packet filtering.
8. What is network flow monitoring? Compare the features of Netflow, sFlow and IPFIX
for monitoring network traffic.
11. Explain protocol awareness and behavioural analysis in network intrusion detection.
12. Explain the features of libpcap and WinPcap for acquiring network evidence.
INFORMATION TECHNOLOGY-IT1
Syllabus
Reference Books
2. Computer Forensics: Computer Crime Scene Investigation, John R Vacca, Jones &
Bartlett Learning, LLC, 3/e, 2010
No. of
Sl. No. Topic
Lectures
3.4 Common attacks: Sniffing, Rogue wireless access points, Evil twin, 2
WEP cracking, Locating wireless devices
Preamble: The course aims to impart advanced concepts on complex networks and game
theory. Using these mathematical concepts, the course aims to enable students to model
research problems related to the Internet.
Course Outcomes: After the completion of the course the student will be able to
Bloom's
CONo. Course Outcomes (CO) Category
Level
CO 1 Explain the evolution of random networks based on graph Level2:
theoretical concepts. Understand
CO 2 Interpret the nature of scale-free networks based on Barabasi- Level 2:
Albert model. Understand
CO 3 Analyse the robustness of the network using complexity theory Level4:
Analyse
CO 4 Calculate Nash Equilibrium of Normal form and Extensive Level 3:
form games Apply
CO 5 Model problems related to internet pricing, congestion control, Level4:
and cyber security using game theoretical concepts. Analyse
Outcomes are the attributes that are to be demonstrated by a graduate after completing the
course.
PO2:An ability to communicate effectively, write and present technical reports on complex
engineering activities by interacting with the engineering fraternity and with society at
large.
PO3:An ability to demonstrate a degree of mastery over the area as per the specialization of
the program. The mastery should be at a level higher than the requirements in the
appropriate bachelor program
PO4:An ability to apply stream knowledge to design or develop solutions for real world
problems by following the standards
PO5:An ability to identify, select and apply appropriate techniques, resources and state-of-
the-art tool to model, analyse and solve practical engineering problems.
INFORMATION TECHNOLOGY-IT1
PO6:An ability to engage in life-long learning for the design and development related to the
stream related problems taking into consideration sustainability, societal, ethical and
environmental aspects
PO7:An ability to develop cognitive load management skills related to project management
and finance which focus on Entrepreneurship and Industry relevance.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 - - ✓ - - - -
CO 2 - - ✓ - - - -
CO 3 ✓ ✓ ✓ ✓ - - ✓
CO 4 - - ✓ - - - -
CO 5 ✓ ✓ ✓ ✓ ✓ ✓ ✓
Assessment Pattern
Understand 40%
Apply 40%
Analyse 20%
Evaluate
Create
INFORMATION TECHNOLOGY-IT1
Mark distribution
ii. Course based task / Seminar/ Data collection and interpretation : 15 marks
The end semester examination will be conducted by the respective College. There will be
two parts; Part A and Part B. Part A will contain 5 numerical/short answer questions with 1
question from each module, having 5 marks for each question (such questions shall be useful
in the testing of knowledge, skills, comprehension, application, analysis, synthesis, evaluation
and understanding of the students). Students should answer all questions. Part B will contain
7 questions (such questions shall be useful in the testing of overall achievement and maturity
of the students in a course, through long answer questions relating to theoretical/practical
knowledge, derivations, problem solving and quantitative evaluation), with minimum one
question from each module of which student should answer any five. Each question can carry
7 marks.
Note: The marks obtained for the ESE for an elective course shall not exceed 20% over the
average ESE mark % for the core courses. ESE marks awarded to a student for each elective
course shall be normalized accordingly. For example, if the average end semester mark % for
a core course is 40, then the maximum eligible mark % for an elective course is 40+20 = 60
%.
INFORMATION TECHNOLOGY-IT1
Course Level Assessment Questions
1. Explain the evolution of random network and the emergence of giant component.
2. “Mitigation of Cascaded attacks can be done using Lazarus effect” Do you agree with
this statement? Substantiate your answer with example analysis.
1. Model congestion control problem using game theory. Investigate on the existence
and uniqueness of Nash Equilibrium in the model.
2. Using a game theoretical model of DDoS attack in a computer network, Investigate on
the effect of having firewall as the countermeasure.
INFORMATION TECHNOLOGY-IT1
Model Question Paper
QP CODE:
Reg No:
Name: _
IT12022-PE2 (F)
PART A
1. Compare the structure of random network and real network based on cluster
size distribution.
PART B
11. Analyze the Nash equilibrium of advertising game from the perspectives of
normal form game and extensive form game..
12. Explain the modelling of DDoS attack using game theory. Explore the
possibility of solving the problem as a non-zero-sum game.
Syllabus
Relevant Concepts From Graph Theory - Undirected, directed, signed, weighted and
spatial networks,Paths, connected components ,Directed Acyclic Graphs, Bipartite graphs
Max-flow/min-cut, Clustering coefficients.
Power Laws and Scale-Free Networks, Discrete Formalism, Continuum Formalism, Hubs,
The Meaning of Scale-Free, Universality, Ultra-Small Property, The Role of the Degree
Exponent.
Games in Normal Form, Dominant Strategies, Nash Equilibrium, Randomization and Mixed
Strategies. Sequentiality, Extensive Form Games, and Backward Induction
Module 5: Game Theoretical Modelling (9 Hours)
Example games and analysis, application of game theory in internet pricing, congestion
control and cyber security
INFORMATION TECHNOLOGY-IT1
Reference Books
1. A-L. Barabási , Network Science,Cambridge University Press 2016, Available
online:http://barabasi.com/networksciencebook/
2. M.E.J. Newman, Networks - An introduction , Oxford Univ Press, 2010.
3. D. Easley and J. Kleinberg, Networks, Crowds and Markets , Cambridge Univ Press.
4. R. Cohen and S. Havlin, Complex Networks - Structure, Robustness and Function ,
Cambridge Univ Press, 2010.
5. Frank Kelly, Mathematical Modeling of the Internet, Proc. Fourth International
Congress on Industrial and Applied mathematics, Edinburgh, 1999.
6. Frank Kelly, Models for a Self Managed Internet, Philosophical Transactions of the
Royal Society A358, pp. 2335-2348, 2000
7. A Brief Introduction to the Basics of Game Theory-Matthew O. Jackson, Stanford
University
8. Algorithms, Games, and the Internet, Christos H. Papadimitriou,University of
California, Berkeley,[email protected]
9. A Game-Theoretic Framework for Congestion Control in General Topology
Networks, Tansu Alpcan, Tamer Basar (alpcan, tbasar)@control.csl.uiuc.edu
10. Wu, Q., Shiva, S., Roy, S., Ellis, C. and Datla, V., 2010, April. On modeling and
simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
In Proceedings of the 2010 spring simulation multiconference (pp. 1-8).