MCA Syllabus 2018
MCA Syllabus 2018
BIHAR UNIVERSITY
MUZAFFARPUR
SYLLABUS OF MCA COURSE
Text/Reference Books:
1. Fundamentals of computer : V.Rajaraman
2. The Essential Guide to computing: The Story of Information Technology, E.Garrison Walters, PHI, 2001.
3. Introduction to Computing System: From Bits to Gates to C and Beyond. Yale N. Patt and Sanjay J. Patel, Prentice Hall
India, 1999.
Text/Reference Books:
1. Information System : A Management Perspective, Alter S. Pearson Education 2000
2. Data Processing Schaum’s Outline Series: Martin M. Lipschuts,TMH 2001
3. Data Processing and Information Technology C.S. French, BPB Publication, 1996 .
Database: Concept, Comparative view, goals etc. Data Independence, Consistency, Security & Integrity. DBMS models:
Hierarchical, Relational and Network; Structured Query Language and Programming Interface; Database design and
architecture: DBMS Applications: ORACLE/DB2/Progress/any other; Introduction to Distributed Database, Concurrency
control and recovery, Assorted Topics in Database.
Unit 2
Process Concepts, Process State & Process Control Block, Process Scheduling. Scheduling Criteria, Scheduling Algorithms,
Multiple-Processor Scheduling, Real Time Scheduling, Threads Introduction, Multithreading Models, Example System –
Process Management in Linux.
Unit 3
The Critical Sections Problem, Semaphores, Classical Problem of Synchronization, Example System-Inter Process,
Communication in Linux, Deadlock Characterization, Methods for Handling Deadlocks, Deadlock Prevention, Deadlock
Avoidance, Deadlock Detection, Recovery from Deadlock, Combined Approach to Deadlock.
Unit 4
Storage Management, Logical versus Physical Address Space, Swapping, Contiguous Allocating, Paging, Segmentation,
Segmentation with Paging, Virtual Memory, Demand Paging, Performance of Demand Paging, Page Replacement, Page
Replacement Algorithms, Allocation of Frames, Thrashing, Demand Segmentation, Example System Memory Management in
Linux.
Unit 5
Disk Scheduling, Disk Management, Swap Space Management, Disk Reliability, Stable Storage Implementation, File
Concepts, Directory Structure, Protection File System in Linux.
Text Books: -
➢ Operating System Principles by Silberschatz A. and Peterson J.L. Wiley.
➢ Operating Systems by Dhamdhere, TMH.
References: -
➢ Operating Systems by Deitel, Deitel & Choffnes.
➢ Operating System by Stalling, Pearson.
Fundamentals of Data Transmission: Data Transmission System & Operations, Encoding, Standard Encoding Schemes,
Transmission Media, Magnetic Media, Twisted wire-pair, Co-axial Cables, Fibre Optics, Wireless Media-Ratio & Microwave
Transmission, Switching Message, Circuit & Packet Switching, Serial & Parallel Transmission – Asynchronous and
Synchronous Transmission.
The Data Link Layer: Need for Data Link Control, Service provided by the Data Link Layer. Frame Design Consideration. Flow
Control Mechanism. Data Link Error Control, Error Control in Stop-and-Stop Mechanism & Sliding Windows Mechanism,
Sequence Numbering. Piggybacking Acknowledgement. MAC layer& It’s Different Protocols.
IEEE 802.3 Ethernet: Contention Access, CSMA, CSMA/CD, Physical Topology of Ethernet, Ethernet Repeater, Types of
Ethernet.
Bridges & Switches: LAN Bridge, Transparent Bridges, Spanning Tree Algorithm, Ethernet Switches.
The Network layer: Network Layer Design Issue, Purpose of Network Layer, Functions of the Network Layer IP Address,
Classful and Classless IP Address, NAT.
Introduction to Internet Protocol: IPv4 & IPv6 Format, ARP, RARP, DHCP, ICMP.
Routing Algorithms: Static Routing, Dynamic Routing, Distance Vector Routing Algorithm, Router Information Protocol, Link
State Routing, OSPF Routing Protocol, Border Gateway Protocol, Congestion Control by Chock Packet, QoS, Leaky Bucket and
Token Bucket.
Introduction to Application Layer: Difference between TCP & UDP, Port Number, TCP Connection – Three ways
Handshaking, Connection Termination – Half Close, Half Open.
Congestion: Congestion Control Algorithms, General Principle of Congestion Control, Congestion Prevention Policies,
Congestion Control in Virtual Circuit Subnet & Datagram, Techniques for achieving good quality of service (QoS).
Introduction: Algorithm, Performance Evaluation of Algorithms, Space & Time Complexity, Nation of Optimality.
Divide & Conquer: Finding the Maximum & Minimum – Quick Sort – Selection – Stassen’s Matrix Multiplication, etc.
Greedy Algorithm: Knapsack Problem, (1 Knapsack, Fractional Knapsack), Activity Section Problem. Huffman’s Codes,
Minimum Spanning Tree, Kruskal’s Algorithm, Prim’s Algorithm, Dijkstra’s Algorithm, etc.
Dynamic Programming: Knapsack Problem DP Solution, Activity Selection Problem DP Solution, All Pairs Shortest Paths,
Travelling Salesman Problem.
Randomized Algorithms & Amortized Analysis: Basic ideas of Randomized Algorithms (Las Vegas & Monte Carlo types).
Simple examples (Randomized Quick Sort and it’s analysis, Min – Cut Algorithm and it’s Analysis), Amortized Analysis and its
significance ( Illustration through examples).
Graph Algorithms: Breadth First Search (BFS), Depth First Search (DFS), Strongly Connected Components, Euler Tour,
Minimum Spanning Tree, Kruskal’s Algorithm, Prim’s Algorithm, Single Source Shortest Path.
Reference Books:
➢ The Design & Analysis of Computer Algorithms by A.V.Aho, J.E.Hopcroft and J.D.Ullman, Pearson Edu
➢ Beginning Algorithms by Simen Harris, James Ross, Wiley India.
➢ Fundamentals of Computer Algorithms by E.Horowitz and S.Sahni, Galgotia.
➢ Algorithms byRichard Johansonbaugh and Marcus Schaefer, Pearson Algorithm.
➢ Algorithms – Introduction to Design and Analysis by S.Baase, Pearson Education.
➢ Algorithms and Compiexity by H.S.Wiif, PHI.
Software Standards & Software Models: SEI – Capability Maturity Model, ISO, OMG, CORBA, IEEE, ANSI, Linear Sequential
Model (Water Fall), Evolutionary model, Proto Typing Model, Spiral Model.
Software Project Management: Initial Requirement Analysis, System Modeling, Function Point Analysis, Project Scheduling
Gantt Chart, Project Estimation COCOMO, Project Control PERT, Risk Management, Software Team, Life Cycle Model
Selection.
Software Requirement Analysis: Functional Requirement, Non Functional Requirements, Requirement Gathering, Fact
Finding Methods, Requirement Verification & Validation, Requirement Specification (SRS).
Software Design: Design tools- UML, DFD, VTOC, HIPO, ERD, System Architecture Design, Object Oriented Design using UML
tools, Coupling & Cohesion, System structure/modular design, Data Design (ERD), Process Design, I/O Design, User Interface
Design, System Interface Design.
Software Testing: Concept of Software Testing, Testing Strategies (Black Box & White Box), Testing methods (Coverage
based Mutation Test), Test Cases (Test System), Alpha Test & Beta Test.
Software Quality Assurances: Software Reliability, Software Quality Standards, Software Quality Attributes.
Software Change Management: Software Configuration Item, Baseline, Software Change Implementation, Software Change
Control, Software Re-Engineering, Clean Room Software Engineering.
Practical: Lab Based UML tools, CASE tools & Project Management tools.
Reference Books:
➢ Rajib Mall, Fundamentals of Software Engineering, PHI
➢ Waman Jawadekar, Principle & Project in Software Engineering, TMH.
Introduction to Compilers: Compilers and Translators, The Phases of a Compiler, Compiler writing tools, The Lexical &
Syntactic Structure of a language, Operators, Assignment Statements and Parameter Translation.
Lexical Analysis: The role of the Lexical Analyzer, Specification of Tokens, Lexical Analysis tools.
Syntax Analysis: Role of Parser, CFG, Top-Down parsing, Bottom-up Parser, Operator-Precedence Parsing,, LR Parsers, The
Canonical Collection of LR (0) items, Constructing SLR, Canonical LR and LALR Parsing tables, Use of ambiguous grammars in
LR Parsing, An Automatic Parser generator, Implementation of LR Parsing tables and Constructing LALR sets of items.
System Directed Translation: Syntax tree, Bottom – Up evolution of S-Attributed definition, L – Attributed definition, Top-
Down translation, Bottom – Up evaluation of inherited attributed, Recursive Evaluators.
Type Checking: Static vs. Dynamic Checking, Type Expression, Type Checking, Type Equivalence, Type Conversion.
Symbol Tables: Structure of Symbol Table, Simple Symbol Tables (Linear Table Ordered List, Tree, Hash Table). Scoped
Symbol Table (Nested Lexical Scoping, One Table per Scope, One Table for all Scopes).
Error Detection & Recover: Errors, Lexical Phase errors, Syntactic-Phase Errors, Semantic Errors.
Code Optimization: Need for Optimization, Optimization of Basic blocks, Loops in flow graph, Optimizing Transformation
(Compile time evaluation, Common sub-expression elimination, Variable Propagation, Code Movement Optimization,
Strength Reduction, Dead Code Optimization, Loop Optimization), Local Optimization, Global Optimization, Computing
Global Data Flow Equation, Setting up data flow equation, Setting up data flow equations, Iterative Data flow Analysis.
Text Book:
➢ Compiler Principles Technique and Tools by Alfered V. Aho, Ravi Sethi, Jeffery D. Ullman, Pearson Education.
Reference Books:
➢ Modern Compiler Design by Dick Grune, E.Bal, Ceriel J.H. Jacobs and Koen G. Langendoen, Wiley Dreamtech.
Web Programming : Concept of JDBC (Java Database Connectivity), Working with SQL, Stored Procedure,
Security in Java, Class Loader, Byte Code Verification, Security Manager and Permission,Digital Signatures, Code
Signing, Encryption
Introduction to J2EE: Its advantage, Enterprise Architecture Types, Understanding EJB, its architecture, EJB Roles,
Benefits and limitations of Enterprise Beans, Session Beans: Stateful and Stateless Beans, Entity Beans, Beans Managed
Persistence, Container Managed Persistance.
Advanced Web Technology in J2EE: Understanding Directory Services and JNDI, Introduction to LDAP, LDAP
Operation, Working with LDAP Server, Introduction to Web Containers and Web Applications, Introduction to HTTP
Protocol, Web Application Life Cycle.
Creating Web Applications: Understanding Servlet programming, Its life cycle, Servlet Configuration,
Understanding Servlet sessions, Understanding of JSP and JSTL, JSP documents, Elements, tag extensions, tag
libraries, validation, translation time mechanism, translation-time classes, Understanding JavaServer Pages,
Standard Tag Library, tags in JSTL, core tag library, XML tag library, using Internationalization Actions.
Web Application Deployment and Authentication: Enterprise Application Development Process, Deploying Web
Application, Understanding CLASSPATH, Securing Web Applications, basic authentication with JAX-RPC example,
Client certification Authentication over HTTP/SSL.
Text/Reference Books:
1. Java Server Programming J2EE 1.4 Edition: Black Book ( DreamTech Press)
2. Core JavaTM Volume II: Cay S.Horstmann & Gary Cornell (Pearson)
3. J2EE 1.4 Bible: McGovern (Wiley India)
CS 402 : Cryptography and Network Security
Introduction: The OSI Security Architecture, Security attack, Security services, Security Mechanism, A Model for
Network Security.
Symmetric Cipher: Classical Encryption Techniques, Symmetric Cipher Model, Block Cipher Principles, DES,
Differential and Linear Cryptanalysis, Block Cipher Design Principle, The Euclidean Algorithm, Finite field of Form
GP(p), Advance Encryption Standard (AES), AES Cipher, Multiple Encryption and Triple DES, Stream Cipher and RC4,
Placement of Encryption Function, Traffic Confidentiality, Key Distribution, Random number generation.
Public Key Encryption and Hash function: Fermat’s & Euler’s Theorems, The Chinese Remainder Theorem, RSA
Algorithm, Deffie-Hellman Key Exchange, Elliptic Curve Cryptography, Message Authentication Code, Security of Hash
Functions and MAACs, Secure Hash algorithm, Whirlpool, HMAC, CMAC, Digital Signature.
Network Security Applications: Kerberos, X.509 Authentication Service, S/MIME, IP Security Architecture,
Encapsulating Security Payload, Secure Socket Layer (SSL), Transport Layer Security, Secure Electronic Transaction.
System Security: Intrusion Detection, Password Management, Virus Countermeasure, Denial of Service Attack,
Firewall design Principles, Trusted System
Fuzzy Logic : Basic concepts, fuzzy set theory, basic operation, fuzzification, defuzzification, neurofuzzy approach,
applications.
Evolutionary and Genetic Algorithm: Basic concepts of evolutionary computing, genetic operators, fitness function
and selection, genetic programming, other models of evolution and learning.
Rough Set Theory: basic Concept, indiscernibility relation, lower and upper approximation, decision systems based
on rough approximation, applications
Text/ Reference Books:
1. Jacek M. Zurada. Introduction to Artificial Neural Systems, jaico Publishers, 1992
2. S. Haykin. Neural Netowrks: A Comprehensive Foundation, Prentice Hall, 1999
3. P. S. Churchland and T. J. Sejnowski. The Computational Brain. MIT Press, 1992
4. A. M. Ibrahim Introduction to Applied Fuzzy Electronics, PHI, 2004
5. Z. Pawlak. Rough sets, Kluwer Academic Publishers, 1991
6. Genetic Algorithm in Search Optimization and Machine Learning, D. E. Goldberg, Pearson
Education, 1989
7. An Introduction to Genetic Algorithms, Melanie Mitchell, PHI, 1998
Graphics Techniques: Jag Free Images on a Raster CRT Interactive Graphics processor for Digital Logic Simulation
System, Interactive techniques for 3D shaded Graphics.
2-D Graphics: Drawing Elementary figures, Polygon Filling, Transformations, Windowing and clipping, Display file
segmentation, Interactive graphics: Interactive input techniques, Event handling, Input functions
Graphics Standards A 3D Models: Device Independence AI in Graphics Software, Implementation of Graphics Kernel
System (GKS)
Evaluation of Various 3D Models: Mathematical Preliminaries, Curves and Surfaces , Clipping, Hidden line and
surface removal, rendering, ComputerAnimation, 3D Shaded Computer Animation the use of 3D adstract Graphical
Types in Computer Graphics and Animation, 3D ReConstruction . A case Study, Real-Time Graphics.
Management Functions & Business Process: Sale and Order Processing, Finance & Budgeting, Human Resource
Management, Production Plan & Control, Marketing
Portfolio & IT Application: Portfolio Management Concept, Portfolio Management Method, Design & Implementation
of Portfolio Management, Tools & Techniques.
Enterprise Resource Plan (ERP) : Evolution of Enterprise Information System, Concept of ERP, Supply Chain
Management, Customer Relationship Management, ERP Design & Implementation, ERP Tools: SAP, iCUBE
Text / Reference Books:
1. K. C. Laudon & J. P. Laudon, Management Information System ( managing the digital
firm) PHI
2. Sadagopan S, Management Information System, TMH
802.11 MAC Fundamentals: Challenges for MAC, Access Mode, Contention Based access using DCF, Fragmentation and
reassembly, Frame Format, 802.11 graming in detail( DS bits, BSSID, RTS, CTS, Control frame, management frame),
Contation based data service, Frame processing and bridging, 802.11 to Ethernet
WEP: WEP cryptographic operations, WEP data processing, Problem with WEP, User Authentication with 802.Ix.
802.11i Robust security networks, TKIP and CCMP: Temporal key integrity protocol, Counter mode with CCB-MAC, Robust
security network operation
Physical Layer: Physical layer architecture, Radio Link, RF with 802.11, Frequency, GFSK, PLSP, DSSS, HR/DSSS. 802.11a and
802.11j (OFDM Phy), 802.11g(extended rate Phy), 802.11n: MIMO-OFDM
Security Architecture: Authentication and Access Point, Ensuring secrecy through encryption, selecting security protocols.
Site Planning and Project Management : Network Requirement, PHY layer selection and design, Planning placing AP, Using
Antennas to tailor Coverage.
802.11 Network analysis, 802.11 performance running
Text Books:
1. 802.11 Wireless Networks by Mathew S. Gost,SPD
Message Passing: Introduction Desirable features, Issues in IPC by message passing, synchronization, Buffering, Multi
datagram messages, encoding and decoding message data.
Remote Procedure Calls: Introduction, The RPC Model, Transparency of RPC, Implementing RPC mechanism, RPC message
server management, parameter – passing and call semantic, Communication protocols for RPC’s.
Distributed Shared Memory: Introduction, Architecture of DSM Systems Design and implementation, granularly, structure
of shared memory space consistency models, replacement strategy, Threashing
Resource Management: Desirable feature, Task assignment approach, Load-balancing approach, Load sharing approach.
Distributed File Systems: Intakes, Desirable features, File Models, File accessing models, file-sharing semantic, file- caching
schemes, file replication Fault tolerance, Automatic Transactions, Design principle
Text Books:
1. George Coulouris, Jean Dollimore and Tim Kindberg “Distributed System Concepts andDesign”, third Edition, Pearson
Education Asia
Reference Books:
1. 2002 Distributed Computing by Liu, Pearson Education
2. Distributed Computing by Hagit Attiya and Jennifer Weleh, Wiley India
3. Distributed Operating System: Concepts and Design by P. K. Sinha, PHI
4. Distributed Operating System by Tannenbaum, Pearson Education
Data Warehousing and Online analytical Processing (OLAP): Aggregation operations, models for data warehousing, star
schema fact and dimension tables, conceptualisation of data warehouse and multidimensional databases, Relationship
between warehouse and mining.
Data Mining And Primitives: Data preprocessing, data integration, data transformation, Definition and specification of a
generic data mining task. Description of Data mining query language with examples.
Association Analysis: Different methods for mining association rules in transaction based databases. Illustration of
confidence and support. Multidimensional and multilevel association rules. Classification of Association rules. Association
rule algorithms – A period and frequent pattern growth.
Classification and Prediction: Different classification algorithms. Use of genie index, decision tree induction, Bayesian
classification, neural network technique of back propagation, fuzzy set theory and genetic algorithms
Clustering: Partition based clustering, hierarchical clustering, model based clustering for continuous and Discrete data.
Scalabilty of clustering algorithms. Parallel approaches for clustering.
Web Mining: web usage mining, web content mining, web log attributes. Data mining issues in object oriented data bases,
spatial data bases and multimedia databases and text data bases.
Text Books:
1. Data Mining Concepts and Techniques by J. Han, M. kamber,Harcourt India
2. Data Mining: introductory and Advanced Topics, by M. Dunham, Pearson pub
3. Data Mining Techniques by A.K. Pujari, Universities Press
Performance Analysis : Introduction, SpeedUp, Super Linear Speedup and Efficiency, Arridahl’s Law, Gustafson Law,
Gustafson-Barsis’s Law, The Karp-Flatt Metric, The Isoefficiency Metric, Isoefiiciency Relation, Cost and Scalability.
Inter-Connection Networks: Tree, Diamond Network, Mesh, Linear Array, Ring, Star, Hypercube, Chordal ring, Cube-
connected-cycles,Pefect Shuffle network, ILLIAC IV, Torus, Butterfly, Mesh-of-tree, Pyramid, Generalized Hyperbus, Twisted
Cube Folded Hypercube, Incomplete Hypercube, Enhanced incomplete Hypercube, Cross Connected Cube, Bansyan
Hypercube
Parallel Computational Model : PRAM, CRCW, CREW EREW, Simulating CRCW on CREW &SREW, PRAM algorithms, P-
Complete problems.
Introduction to Parallel Algorithms: PVM,MPI Paradigms, Simple parallel programs in MPI/PVM environments, Parallel
algorithms on network, Addition of Matrices, Multiplication of Matrices, Systolic Array
CS 505 : .NET
Introduction : Introduction to .NET Architecture, Features of Visual Studio .NET
VB.NET FUNDAMENTALS : Introduction to .NET Framework – Controls – Menus and Dialog Boxes – Variables and Operators
– Decision Structures – Loops and Timers – Debugging – Trapping and Handling Errors.
VB.NET PROGRAMMING : Modules and Procedures – Arrays and Collections – Exploring Text Files and String Processing –
Automating Microsoft Office Applications – Deployment of VB.NET Applications.
VB.NET UI DESIGN AND DATABASE APPLICATIONS: Windows Forms – Graphics and Animation – Inheriting Forms and
Creating Base Clases – Working with Printers – ADO.NET – Data Grid Control.
VC++ FUNDAMENTALS : Windows Programming Fundamentals – Event Driven Programming – MFC Library Application
Framework – App Wizard – Class Wizard – Event Handling – Message Mapping – Device Context – Dialog Data Exchange and
Validation (DDX and DDV)
VC++ UI DESIGN AND DATABASE APPLICATIONS: Dialog Based Applications- Windows Common Controls – Using ActiveX
Controls – SDI and MDI applications – Document View Architecture – Splitter Windows – Serialization – Reading and Writing
Documents – ODBC – MFC Database Classes
TEXT BOOKS
1. Michael Halvorson, “ Visual Basic.NET”, Prentice Hall Of India, New Delhi, 2002
2. Beginning Visual C# 2005 By Karli Watson, Christian Negal, Wiely India
3. Microsoft Visual C#.NET- STEP by STEP by SHARP & JAGGER Microsoft / PHI
REFERENCE BOOKS:
1. Professional C# 2005 by, Christian Nagel, Bill Evgen, Wiely India
2. The Complete Reference C# 2.0 By Schildt, TMH
CS 506 : Colloquial
Section I: Reading
Select Short Stories: Three short stories from the book , “Added Values: The Life Stories of Indian Business Leaders”, by
PeterChurch; New Delhi
1. NR Narayana Murthy/ Infosys
2. Dr. Anand Deshpande/ Persistent Systems
3. Deepak Puri/ Moser/ Baer India
Section II Phonetics
Phonetic Symbols, identifying vowel and Consonant Sounds, syllable; Intonation
Text Books:
Church, Peter The Life Stories of Indian Business Leaders: Roli Books, New delhi
Hall, Richard h. Organisations-Structures, Processesand OutComes: PHI, New Delhi
Raman, M & S Sharma. Technical communication: OUP
Guffey. M. E. Business Communication: Process and Product: Thomson Learning, New York
References:
1. Balasubramaniam, T.A Textbook Of English Phonetics for Indian students. Macmillan India, Delhi
2. Mclearn, Stephen. Writing Essays and Report: A Student’s Guide: Viva Books, New Delhi
3. Burton, Robert N. Analysing Sentences: Longman, London
4. Wekker, H. and Haegeman, L. A Modern Course in English syntax: Croom Helm, London