Você está na página 1de 8

EC1351 DIGITAL COMMUNICATION 3 1 0 100 AIM To introduce the basic concepts of Digital Communication modulation to baseband, passband modulation

and to give an exposure to error control coding and finally to discuss about the spread spectrum modulation schemes. OBJECTIVES To study pulse modulation and discuss the process of sampling, quantization and coding that are fundamental to the digital transmission of analog signals. To learn baseband pulse transmission, which deals with the transmission of pulse-amplitude, modulated signals in their baseband form. To learn error control coding which encompasses techniques for the encoding and decoding of digital data streams for their reliable transmission over noisy channels. UNIT I PULSE MODULATION 9 Sampling process PAM- other forms of pulse modulation Bandwidth Noise trade off Quantization PCM- Noise considerations in PCM Systems-TDM- Digital multiplexers-Virtues, Limitation and modification of PCM-Delta modulation Linear prediction differential pulse code modulation Adaptive Delta Modulation. UNIT II BASEBAND PULSE TRANSMISSION 9 Matched Filter- Error Rate due to noise Intersymbol Interference- Nyquists criterion for Distortionless Base band Binary Transmission- Correlative level coding Baseb and M-ary PAM transmission Adaptive Equalization Eye patterns UNIT III PASSBAND DATA TRANSMISSION 9 Introduction Pass band Transmission model- Generation, Detection, Signal space diagram, bit error probability and Power spectra of BPSK, QPSK, FSK and MSK schemes Differential phase shift keying Comparison of Digital modulation systems using a single carrier Carrier and symbol synchronization. UNIT IV ERROR CONTROL CODING 9 Discrete memoryless channels Linear block codes - Cyclic codes - Convolutional codes Maximum likelihood decoding of convolutional codes-Viterbi Algorithm, Trellis coded Modulation, Turbo codes. UNIT V SPREAD SPECTRUM MODULATION 9 Pseudo- noise sequences a notion of spread spectrum Direct sequence spread spectrum with coherent binary phase shift keying Signal space Dimensionality and processing gain Probability of error Frequency hop spread spectrum Maximum length and Gold codes. TUTORIAL 15 TOTAL : 60

TEXT BOOKS 1. Simon Haykins, Communication Systems John Wiley, 4th Edition, 2001 REFERENCES 1. Sam K.Shanmugam Analog & Digital Communication John Wiley. 2. John G.Proakis, Digital Communication McGraw Hill 3rd Edition, 1995 3. Taub & Schilling , Principles of Digital Communication Tata McGraw-Hill 28th reprint, 2003 4. Bernard's

UNIT I DIGITAL COMMUNICATION SYSTEM 8 Introduction to Analog Pulse Communication Systems Digital Communication Systems Functional description, Channel classification, Performance Measure; Geometric representation of Signals, Bandwidth , Mathematical Models of Communication Channel. UNIT II BASEBAND FORMATTING TECHNIQUES 10 Sampling Impulse sampling, Natural Sampling, Sampler Implementation; Quantisation Uniform and Non-uniform; Encoding Techniques for Analog Sources- Temporal waveform encoding, Spectral waveform encoding, Model-based encoding, Comparison of speech encoding methods. UNIT III BASEBAND CODING TECHNIQUES 9 Error Control Codes - Block Codes , Convolutional Codes, Concept of Error Free Communication; Classification of line codes, desirable characteristics and power spectra of line codes. UNIT IV BASEBAND RECEPTION TECHNIQUES 9 Noise in Communication Systems; Receiving Filter Correlator type, Matched Filter type; Equalising Filter - Signal and system design for ISI elimination, Implementation, Eye Pattern analysis; Synchronisation; Detector Maximum Likelihood Detector, Error Probability, Figure-of-Merit for Digital Detection. UNIT V BANDPASS SIGNAL TRANSMISSION AND RECEPTION 9 Memory less modulation methods - Representation and Spectral characteristics, ASK, PSK, QAM, QPSK, FSK; Bandpass receiving filter, Error performance Coherent and Non-coherent detection systems. TOTAL= 45 PERIODS TEXT BOOKS: 1. Amitabha Bhattacharya, Digital Communications, Tata McGraw Hill, 2006. 2. Simon Haykin, Digital Communications, John Wiley, 2006. REFERENCES: 1. John.G. Proakis, Fundamentals of Communication Systems, Pearson Education, 2006. 2. Michael. B. Purrsley, Introduction to Digital Communication, Pearson Education, 2006. 3. Bernard Sklar, Digital Communication, 2nd Edition, Paerson Education, 2006 4. Herbert Taub & Donald L Schilling Principles of Communication Systems ( 3rd Edition ) Tata McGraw Hill, 2008. 5. Leon W. Couch, Digital and Analog Communication Systems, 6th Edition, Pearson

Education, 2001.

DIGITAL COMMUNICATION DC503

Digital PAM, binary PAM formats, line coding, bandlimited digital PAM systems, Nyquist pulse shaping, equalization, synchronization techniques, bit and frame synchronization. Coded pulse modulation, voice digitization rate (VDR) of PCM, DPCM, DM, ADM, CVSD, log PCM, their performance comparison, VDR reduction by speech coding, VOCODERS, noise performance of PCM and DM, Digital multiplexes. AT & T and CCITT hierarchies, quasi-synchronous multiplexes.

Digital CW modulation, BPSK, DPSK, DEPSK, QPSK, M ary PSK, QASK, BFSK, Doubinary encoding, QPR coherent and non-coherent systems, error probabilities in PSK, DPSK, FSK, QPSK, 16 QAM, MSK, QPR and bit.

Matched correlation and optimum filters and symbol error rate.

Spread Spectrum techniques: DS, CDMA, FH, PN sequence, Power requirement, PNsequence code, and Walsh s code.

ISDN & Value added communication system simulation & Analysis using MATLAB & Simulink Application using communication toolboxes.

Books : 1. Digital Communication. By Haykins Mc Graw Hill Int Edition. 2. Modern Digital & Analog Communication . By B P Lathi,. Willey Eatern Ltd. 2000. 3. Communication. Systems by A B Carlson, Tata Mc Graw Hill, 2000.

INFORMATION THEORY AND CODING DC 552

Information theory: Marginal , joint and conditional entropy, information rate ,mutual information, channel capacity of various channels , Cascaded channels , repetition of signals

Shannon s theorem, Shannon Hartley theorem, BW-S/N ratio trade off, continuous channel, negative entropy.

Coding : Irreducibility, separatibility, coding efficiency , source encoding, Shannon- Fano code, Huffman code, Data compression.

Channel encoding minimum distance, error detection and correction, FEC and ARQ, block code, convolutional codes, cyclic codes, signal error correction, multiple error correction, Burst error correction, Cryptography, Encryption, Decryption.

Books: 1. Information theory : F.M Reza, McGraw Hill 2. Digital and Analog Communication Systems: K.Sam Shanmugam, John Wiley 3. Communication Systems : Analog and Digital : Singh & Sapre, TMH, 1995. 4. Digital Communication: B. Sklar, Pearson Education Asia.

ELECTIVE III:2. DATA COMPRESSION AND CRYPTOGRAPHY


DC612

Internet and Communication Protocol, A brief history of Internet OSI TCPIP, the need for tunneling and encryption keys, Tunneling , Internet Protocol security.

Deterring Needs The evaluation of security assessments, assessing needs in house , the management role, web access question. Containers network bulneralility detection , penetration testing internal security needs.

Structured query language security and other specialties.

Trends in Internet crime , Denial of service attack, tools, that works for and agmust the Network, IP Spoofing attade the Telnet hole, Language vulnerabilities . Other Java and Active X, Unix root control , Trojan Hares.

Virtual private network , Fire walls and disaster recovery planning , Security tools.

Different encryption & decryption algorithm concept of private & Public keys.

Books : 1. Introduction to cryptography- H Delfs H. Knebl 2002 Springer. 2. Introduction to cryptography J.A. Buchamann 2001 Springer. 3. Information Security & Cryptography ICISC 2001, K Kim Ed 2002 vo. 2288 Springer. 4. Understanding data comm.. & networks Shay Vikas Thomas Pub. 5. Information security & Cryptography ICISC 2000 by D. Won. Vol 2015 ec. 2001 Springer (lect notes).

CRYPTOGRAPHY AND NETWORK SECURITY 3 1 0 100

AIM To understand the principles of encryption algorithms; conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and application level security mechanisms. OBJECTIVES To know the methods of conventional encryption. To understand the concepts of public key encryption and number theory To understand authentication and Hash functions. To know the network security tools and applications. To understand the system level security used. UNIT I INTRODUCTION 10 OSI Security Architecture - Classical Encryption techniques Cipher Principles Data Encryption Standard Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES AES Cipher Triple DES Placement of Encryption Function Traffic Confidentiality UNIT II PUBLIC KEY CRYPTOGRAPHY 10 Key Management - Diffie-Hellman key Exchange Elliptic Curve Architecture and Cryptography - Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key Cryptography and RSA. UNIT III AUTHENTICATION AND HASH FUNCTION 9 Authentication requirements Authentication functions Message Authentication Codes Hash Functions Security of Hash Functions and MACs MD5 message Digest algorithm - Secure Hash Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature Standard UNIT IV NETWORK SECURITY 8 Authentication Applications: Kerberos X.509 Authentication Service Electronic Mail Security PGP S/MIME - IP Security Web Security. UNIT V SYSTEM LEVEL SECURITY 8 Intrusion detection password management Viruses and related Threats Virus Counter measures Firewall Design Principles Trusted Systems. TUTORIAL 15 TOTAL : 60 TEXT BOOK 1. William Stallings, Cryptography And Network Security Principles and Practices, Prentice Hall of India, Third Edition, 2003. REFERENCES 1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003. 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2001. 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third Edition, Pearson Education, 2003.

Digital Communication Ebook, notes and presentations covering full semester syllabus
The topics covered in the attachments are: UNIT I PULSE MODULATION: Sampling process PAM- other forms of pulse modulation Bandwidth Noise trade off Quantization PCM- Noise considerations in PCM Systems-TDM- Digital multiplexers-Virtues, Limitation and modification of PCM-Delta modulation Linear prediction differential pulse code modulation Adaptive Delta Modulation. UNIT II BASEBAND PULSE TRANSMISSION: Matched Filter- Error Rate due to noise Intersymbol Interference- Nyquists criterion for Distortionless Base band Binary Transmission- Correlative level coding Baseb and M-ary PAM transmission Adaptive Equalization Eye patterns UNIT III PASSBAND DATA TRANSMISSION: Introduction Pass band Transmission model- Generation, Detection, Signal space diagram, bit error probability and Power spectra of BPSK, QPSK, FSK and MSK schemes Differential phase shift keying Comparison of Digital modulation systems using a single carrier Carrier and symbol synchronization. UNIT IV ERROR CONTROL CODING: Discrete memoryless channels Linear block codes - Cyclic codes - Convolutional codes Maximum likelihood decoding of convolutional codes-Viterbi Algorithm, Trellis coded Modulation, Turbo codes. UNIT V SPREAD SPECTRUM MODULATION: Pseudo- noise sequences a notion of spread spectrum Direct sequence spread spectrum with coherent binary phase shift keying Signal space Dimensionality and processing gain Probability of error Frequency hop spread spectrum Maximum length and Gold codes. Read more: Digital Communication Ebook, notes and presentations covering full semester syllabus - | FaaDoOEngineers.com http://www.faadooengineers.com/threads/351-Digital-Communication-Ebook-notesand-presentations-covering-full-semester-syllabus#ixzz1snPothto

Class 1. Fundamentals of network security. Slides part 1, and part 2. Handouts part 1, and part 2 . Extra reading: Voydock and Kent, 1983. Class 2 and 3. Secure channels via encryption. Slides, and handout. Read book sections: 1.5, 1.6., 1.7.

Class 4 and 5. Block ciphers and encryption modes. Slides, and handout. Read book sections: 2.1--2.4, 4.1, 4.2. On section 2.7, answer problems 2, 3 and 6. Class 6. Message Authentication Codes. web slides, pdf slides,and handout. Read book sections: 2.6, 4.3, 5.1, and 5.2. On section 4.5, answer problems 2, and 4. On section 5.8, answer problems 2, 3, 17. Class 7. Stream ciphers. Web slides, pdf slides, and handouts. Class 8. Authentication mechanisms. Web slides, pdf slides, and handouts. Reading: Bill Bryant. Designing an authentication system... and G. Steiner, B. Clifford Neuman, and J.I. Schiller. Kerberos. Class 9. The birthday paradox and applications. html writeup and pdf document. Class 10. Kerberos. Web slides, handouts. Read book sections: 9, and solve the following problems: 9.10.2, 9.10.3. Classes 11, 12, 13 and 14. Public key cryptography. Web slides, handouts. Read book sections: 6, and solve the following problems: 6.9.1, 6.9.2, and 6.9.10. Class 15. Public key infrastructure. Web slides, handouts. Read book sections: 15, and solve the following prolems: 15.1, 15.2, 15.3, 15.5, 15.8. Class 16. Exam review. Class 17. Midterm Class 18. RSA scheme. Web slides, and handouts. Re-read chapter 6, specially part 6.3. Solve the following problems: 6.9.3 and 6.9.8. Class 19. SSL scheme. Web Slides, and handouts. Read book chapter 19. Answer questions 19.16.1, 19.16.2, and 19.17.3. Class 20. IPSEC scheme. Web Slides, and handouts. Read book chapter 17. Answer questions 17.8.1, 17.8.5, 17.8.6. Class 21. IPSEC-IKE scheme. Web slides, and handouts. Read book chapter 18. Answer questions 18.8.1, 18.8.2, 18.8.3, 18.8.5, 18.8.8. Classes 22, 23, and 24. Student presentations. Class 25. Internet protocols review, and introduction to packet filtering. TCP/UDP/IP web slides, TCP/UDP/IP handouts. Filtering slides, handouts. Read paper B. Chapman, Internet (In)security through IP packet filtering. Class 26. Building Internet firewalls. Web slides, and handouts. Read book, chapter 23. Class 27. Intrusion detection systems. Web slides, and handouts. Read T. Ptacek and T. Newsham, Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection.

Class 28. Final review.