Escolar Documentos
Profissional Documentos
Cultura Documentos
Writing on desks and walls is strictly prohibited, failing which the students will be fined heavily. If the identity of
the individual is not established the entire class / students in the block will be fined.
Students are advised to show due respect to all faculty regardless of their department and maintain affable personality.
Students are to maintain absolute discipline and decorum, so as to promote the fair name of their college in all its
activities.
Students securing less than 85% attendance (with a condonation benefit of 10%) in any individual subject, theory
Students are informed to clarify their doubts in the respective courses with the faculty by taking prior appointment.
Students are to inform their parents that they should follow up the progress of their wards by being in touch with the
Ragging is punishable under Karnataka Education Act and is strictly prohibited. Any student involved in
ragging, will be severely punished which includes handing over the case to Police, rustication from the college
etc.
The suggestion boxes are maintained at strategic places in the campus. Students are to avail these facilities.
Students should come prepared with algorithm / flowchart / program / procedure for all the experiments before
Students should bring the data sheets and laboratory records complete in all respects to the laboratory.
Students are not supposed to alter the configuration of the system / any software on the systems.
Students are advised to be present for the mentor meetings conducted by the Faculty Advisors failing which appropriate
4. CC
UE14CS354 Compiler Design Laboratory 0 0 2 0 1
Unix System Programming
5. UE14CS355 0 0 2 0 1 CC
Laboratory
Elective - III
Elective -IV
UE14CS344, UE14CS345,
C. Data Science UE14CS333
UE14CS346
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulative
Syllabus %
1 Unit#1 Compilers: Language Processors
2 T1: Chapters 1, 3, 4 The Phases of a Compiler, Cousins of the Compiler.
3 Introduction, The Grouping of Phases, CompilerConstruction Tools.
1.1 - 1.2
4 Lexical Analysis, Lexical Analysis: The Role of the Lexical Analyzer, 19.23 19.23
3.13.5, 3.8
5 Input Buffering,
6 Specification of Tokens.
7 Recognition of Tokens,
8 A Language for Specifying Lexical Analyzers.
9 A Language for Specifying Lexical Analyzers : sample
programs.
10 Design of a Lexical Analyzer Generator.
11 Unit#2 Syntax Analysis: The role of the Parser, ContextFree
Grammar, Writing a Grammar.
T1: Chapter 4
12 Syntax Analysis, TopDown Parsing
13 4.1.1, 4.2- 4.7 BottomUp Parsing. 23.08 42.31
14 T1: Chapter 5 LR Parsers.
15 Syntax Directed SLR Parser.
Translation
16 LALR Parser.
5.1, 5.2.15.2.4, 5.3.1,
17 CLR Parser.
5.3.2, 5.4.1 5.4.3
18 Syntax Directed Translation: Syntaxdirected Definitions
19 Evaluation Orders for SDDs, Dependency Graphs, Ordering the
Evaluation of Attributes.
20 SAttributed Definitions, LAttributed Definitions.
21 Applications of Syntax-Directed Translation.
22 Syntax-directed Translation Schemes Postfix Translation
Schemes.
23 Unit #3 Syntax Directed Translation: SDT's with actions inside
Productions.
24 T1: Chapter 5 SDT's for L-Attributed Definitions.
25 Syntax Directed LAttributed SDDs & LL Parsing.
26 Translation BottomUp Parsing of LAttributed SDDs. 23.08 65.39
27 5.5.35.5.4 IntermediateCode Generation: Variants of Syntax Trees
T1: Chapters 6 Directed Acyclic Graphs for Expressions.
28 IntermediateCode Three-Address Code Addresses and Instructions.
29 Generation, Quadruples, Triples.
30 6.1-6.2,6.3.1 6.3.4 , Declarations.
31 6.6, 6.8, Storage Layout for Local Names.
32 Control flow.
33 Control flow translation of Boolean Expressions.
Publication Information
Book Type Code Title & Author
Edition Publisher Year
CompilersPrinciples, Techniques and Tools
Text Book T1 Alfred V. Aho, Monica S. Lam, Ravi Sethi, 2nd Pearson Education 2009
Jeffery D. Ullman
Modern Compiler Design, Dick Grune, Kees
Reference
R1 van Reeuwijk, Henri E. Bal, Ceriel J.H. Jacobs, 2nd Pearson Education 2012
Book
Koen Langendoen,
# of Hours: 39
Chapter % of portions covered
Class Title /
# Reference Topics to be Covered Percentage Cumulative
Literature
Unit #1 : Unix System Overview, File I/O
Publication Info
Book Type Code Title Author
Edition Publisher
Advanced programming W. Richard Stevens,
in the UNIX Environment Stephen A Rago,
Text Book T1 2nd Edition Pearson
Foreword by Dennis
Ritchie
#2
Statement Lex to remove comment lines.
Objective To help students get familiarized with the most basic
functionality of a lexical analyzer of removing
whitespaces and comments from a given program.
Task #3 #3
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -10
Statement
Lex to validate identifiers.
#4
Statement
Yacc to validate context free grammars
#5
Statement Yacc to implement semantic rules to calculate the
Task #5
expression that takes an expression with digits, + and *
and computes the value.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -11
Deliverable The output is verified at the terminal, students are asked
to input valid and invalid expressions.
Practice Problem Yacc to evaluate a built-in functions whose syntax has
this form:
function_name (argument)
#6
Statement Program to implement the functionalities required for
predictive parser.
#7
Statement
Yacc to validate Nested IFELSE construct
Task #8 #8
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -12
Statement
Convert The BNF rules into Yacc form and write code to
generate abstract syntax tree.
#9
Statement Mini Project
Objective Work in teams and get familiarized with over all working
Task #9 of a language processing system.
Outcome Students will be able to implement front-end/back-end/
mini compiler/mini-assembler.
Deliverable A report that describes the mini project implemented.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -13
12 Implement a mini compiler which takes as input a Java program and produces as output optimized
intermediate code/assembly code.. The programming construct to focus : do-while loop.
13 Implement a mini compiler which takes as input a Python program and produces as output optimized
intermediate code/assembly code.. The programming construct to focus : while loop and do-while loop.
14 Implement a Two-pass assembler, which takes as input an assembly code and produces as output Object
code.
15 Implement a Linker/Loader module of a language processing system,taking as input the object code.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -14
UE14CS355: UNIX SYSTEM PROGRAMMING LABORATORY (0-0-2-0-1)
# of Weeks: 12
#1
Statement 1. Experiment with open system call.
2. Experiment with lseek system call
Open an existing file in read-write mode.
Seek to different positions in file and make
observations.
Objective Familiarize students with open and lseek system calls
Outcome Students will be able to use open and lseek systems
calls and understand the concept of umask, permissions
Task #1 and file holes.
Deliverable Write programs to create file with permissions, open
file and perform seeking at different positions in file
using open and lseek calls.
Practise Programs 1. Experiment with different file modes and
flags using open system call.
2. Write a program to display a file in reverse
using lseek system call.
3. Bring out the difference between open and
create system call.
#2
Statement 1. Experiment with dup2 and fcntl system calls. 2.
Write a program to combine stdout and
stderr streams into a single file
Objective Familiarize students with dup2 and fcntl system calls.
Outcome Students will be able to understand the concept of inode
structure, file descriptors and duplicating file
Task #2 descriptors.
Deliverable Program to demonstrate duplicating file descriptors
using dup2 and fcntl calls.
Practise Programs 1. Write a program to demonstrate duplicating
file descriptors using dup.
2. Write a program to append a file using fcntl
function.
3. Can the status of all file flags be changed
using fcntl once the file is open?
ask #3 #3
Statement 1. Simulate stat command. Display the
following :
file type, file permissions, file size, inode
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -15
number, time stamp, no: of links
2. Change permissions of an open file using
chmod function. How does umask affect
the effective permissions?
Objective Familiarize students with file type, file permissions,
file size, inode number, time stamp, no: of links and
chmod functions.
Outcome Student will be able to visualize inode structure of a
file.
Students will be able to modify the permissions of the
file programmatically.
Deliverable Program to simulate stat command and display file
attributes.
Program to change the file permissions using chmod
fumction.
Practise Programs 1. When does time stamp of a file change?
2. Does ownership of the file decide whether
chmod is successful or not.
3. Using access function check for the
existence of the file.
#4
Statement 1. Write a program to open a directory and
read directory contents using opendir and
readdir calls.
2. What happens if we open a symbolic link
and read the file? How to read contents of
symbolic link?
Objective Familiarize students with opendir, readdir, and
symbolic link.
Outcome Students will be able to write programs to open and
Task #4 read contents of a directory and delete files.
Students will be able to understand the concept of
symbolic links.
Deliverable Program to open and read directory contents.
Program to create and read symbolic link.
Practise Programs 1. Write a program to remove all empty files in a given
directory?
2. Write a program to create hard link to a
directory.
3. When does time stamp of a directory
change.
Task #5 #5
Statement 1. Given code using fork() system call, analyse
code, find output and make observations
2. Write a program in which the parent displays
uppercase characters A-Z and child displays lowercase
characters a-z with a delay of max of 2 seconds
between each character. Run the program repeatedly
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -16
and see if there is racing.
#6
Statement 1. Experiment with different exec calls
2. Experiment behaviour of environment
variables on fork
3. Demonstrate creation of orphan and zombie
Process
Objective Familiarize students with variants of exec system call,
creation of orphan and zombie processes
Observe behaviour of environment variables on fork.
Outcome Students will be able to observe overlaying of address
space of a process on exec call
Students will be able to examine behaviour of
Task #6 environment variables on fork
Students will be able to write programs to create orphan
and zombie processes.
Deliverable Program to demonstrate overlaying of address space
using different exec calls
Program to create orphan and zombie process.
Program to create and set values for environment
variables and demonstrate behaviour on fork
Practise Programs 1. Write a program to avoid zombie processes.
2. Write a program to print the environment
variables in Unix.
3.Experiment with different variance of exec
system calls.
Task #7 #7
Statement 1. Demonstrate difference between static and dynamic
linking
2. Create static and dynamic libraries
3. Experiment with set-user bit
Objective Familiarize students with static and dynamic linking
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -17
and creation of static and dynamic libraries.
Teach students how to run programs with special
permissions using set-user ID
Observe what happens to open files on exec
Outcome Students will be able to analyse difference between
static and dynamic linking and execute commands to
create static and dynamic libraries
Students will be able to execute programs with special
permissions
Deliverable Execute commands to create static and dynamic
libraries
Write programs that can run with special permissions
Practise Programs 1. Write a program to demonstrate the effect of close-
on-exec (FD_CLOEXEC) flag on open files.
2. Demonstrate the use of sticky bit on a file.
#8
Statement 1. Experiment signals on fork and exec.
2. Experiment with signal and sigaction system call
Objective Experiment behaviour of signals on fork and exec call.
Demonstrate difference between signal and sigaction
system call
Outcome Students will be able to observe the behaviour of
signals on fork and exec call.
Task #8 Students will be able to use signal and sigaction calls
for signal handling and explore why signal handling is
essential to system programming
Deliverable Program to demonstrate signal handling using signal
and sigaction calls
Practise Programs 1. Experiment using signal system call.
2. Can every signal be handled or ignored?
Demonstrate with example.
3. Using sigaction system call demonstrate
how to avoid creation of zombie processes.
Task #9 #9
Statement 1. Write program to synchronize parent and
child processes using signal and pause calls.
2. Experiment on exec as to what happens to
pending signals
Objective Use signal and pause calls to synchronize execution of
parent and child processes
Demonstrate blocking and unblocking signals for a
process and check status of pending signals
Examine what happens to pending signals on exec.
Outcome Students will be able to write programs to synchronize
processes using signal and pause.
Students will be able to write programs to block,
unblock and check status of pending signals
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -18
Deliverable Program to synchronize processes using signal and
pause.
Program to block, unblock and check status of pending
signals
Practise Programs 1. In kill function, what happens when signal number is
0?
2. Examine signal mask after fork and exec?
3. Demonstrate difference between
SIG_UNBLOCK and SIG_SETMASK in
sigprocmask function?
#10
Statement 1. Write program to create and use message queue as an
IPC mechanism
2. Implement client server communication using pipes.
Objective Use message queue for inter process communication
between client and server process
Study working of message queue and data structures
associated with message queue.
Demonstrate communication between related processes
using pipes
Outcome Student will be able to write program to create message
queue and use it to demonstrate IPC.
Student will be able to write program using pipes and
Task #10 demonstrate two way communication between parent
and child process.
Deliverable Program to create message queue and use it as IPC
mechanism between related and unrelated processes.
Program using pipes and demonstrate two way
communication between parent and child process.
Practise Programs 1. Create a FIFO and demonstrate
communication between two unrelated
processes.
2. Demonstrate the use of type argument in
popen with an example.
3. What happens if the message queue is
removed when the queue contains #
number of messages?
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -19
Deliverable Program to create shared memory segment and use it as
IPC between related and unrelated processes.
Practise Programs 1. How do you remove a shared memory
segment?
2. What happens when you try to remove a
shared memory segment when it is used by
some process?
3. Can one process attach the same shared
memory segment more than once?
#12
Statement 1. Write program to synchronize access to
shared memory segment using semaphore.
2. Write program to synchronize execution of
two processes using two semaphores.
Objective Demonstrate synchronized access to shared memory by
two processes using semaphore
Demonstrate synchronized execution of two processes
using two semaphores
Study data structures associated with semaphore set.
Outcome Students will be able to write program to use
Task #12 semaphore for synchronized access to shared area
among two processes and also for synchronized
execution of processes.
Deliverable Program to demonstrate synchronized access to shared
resources among two processes using semaphore.
Practise Programs 1. How do you initialize a semaphore?
2. What happens when semaphore set is
removed? Is the removal immediate or does
it gets delayed until processes using the
semaphores terminate?
3. Demonstrate with example the use of
SEM_UNDO flag.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -20
UE14CS356: WEB TECHNOLOGIES II LABORATORY (0-0-2-0-1)
# of Weeks: 12
#1
Statement To demonstrate hidden frames AJAX technique:
Create an HTML page that has a form with 4 text
fields. The fields are USN, NAME, DEPT and GPA.
Only the "USN" field is editable. The "NAME",
"DEPT" and "GPA" fields are NOT editable. They are
READ-ONLY. The student can enter a valid USN in
the USN field. As soon as the student exits the "USN"
field, an AJAX call is made to a server script. The
server returns the NAME, DEPT and GPA values
corresponding to the USN entered. If the USN entered
is invalid, the server returns "INVALID USN". This
string is then appended (next to the USN field) on the
screen. If proper values are returned for NAME,
DEPT and GPA, the values are populated into the
respective text fields. (Remember these are read-only
and hence only the server can populate these using
Javascript. The server side script can be trivial and
return hard-coded values). Implement the
Task
functionality using hidden iframes. Demonstrate the
unique advantage of this technique.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -21
#2
Statement To demonstrate multistage download using AJAX: A
book-search web page served by localhost is rich in
content and GUI. It has multiple images to display, a
search form for the front-end user to search for a book, a
set of links which might interest the user and also general
information on how to use the site. Use Multi-stage
download pattern to demonstrate good user experience
with this page. On entering an ISBN in the search box
and searching for it, return the matching book from the
server. The server maintains book information in a
database.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -22
#3
Statement To demonstrate Periodic refresh (with exponential
back-off feature). : A Website provides for Engg seat
Counseling. The user can opt colleges - PESIT and
RVCE and courses - CSE or ECE. The number of seats
are limited and hence there is a <div> at the top of the
page which displays the total number of seats available
for each course/college. Since multiple users can access
the website and opt for courses, this information must
be frequently refreshed. Demonstrate the functionality
by employing the periodic refresh pattern. Implement a
simple fallback pattern for this using exponential back-
off method.
Outcome Student will be able to develop a web page and use the
XHR AJAX technique to do periodic refresh and
fallback in a page when needed.
Deliverable A web page containing HTML5 elements, CSS styles,
and demonstrate page periodic refresh and the fallback
pattern.
Practice Programs 1. Build a page that incorporates Multi-Stage
download pattern. Include video in this and
load the video asynchronously using the XHR
technique
Task #4
Statement To demonstrate usage of AJAX, HTML5 with
Bootstrap 3: Build a web page that demonstrates basic
UI effects of the Bootstrap Library. Demo the use of the
Grid classes, Fixed/fluid layouts, Table related classes,
Image related classes, Form related classes and Alert
classes. Also build a photo slideshow using JQuery
libraries. There must be atleast 3 photos in the album.
When the first photo is displayed, only a "next" link is
available. When the second photo is displayed, there is a
"next" and "previous" link. When the last photo is
displayed, we only have a "previous" link. Provide
animations for displaying the photos. That is, the photos
should enter the screen in an animated manner (enter
from top-left or top-right or expand from center etc)
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -23
(including Jquery).
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -24
#5
Statement To demonstrate use of AJAX with RSS for
automatic updates to web sites : Implement a
Javascript/AJAX program to fetch RSS feeds from a
well-known RSS feed site. Provide a scrolling display of
latest news on your page. You can use xparser.js if you
like.
Outcome Student will be able to develop a web page and use RSS
for automatic update of information on the browser
(without visiting server manually).
Deliverable A Web site containing volatile information on server and
a browser page which updates automatically using RSS
and AJAX Call.
Practice Programs For the XSS attack code built as part of the Lab
exercise, demonstrate how the server can protect
itself against both the temporary and permanent
attacks.Also demonstrate how it can protect the
client cookies from being stolen.
Use PHP sessions to demonstrate how a CSRF
attack can take place.
#6
Task
Statement To demonstrate usage of REVERSE AJAX AKA
COMET : Use the Reverse AJAX technique to build a
web-based chat application. The application is two-way
browser-based. That is, we have a window in which one
user types his messages. From other other side, the
second user also updates a browser window. Show the
chat windows side-by-side and demo it.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -25
application using reverse AJAX technique and Server-
sent Events approach.
Practice Programs Demonstrate an ATOM based news scroll
feature. Parse the XML using xparser.
Demonstrate a brute force parser for ATOM-
based News feeds.
#7
Statement To implement REST-ful Web Services : By
implementing a single server side PHP script,
demonstrate the working of a RESTful Web Service. The
service must essentially provide the CREATE, READ
and UPDATE operations. For each operation, the server
returns data in json format. Also implement a PHP script
which acts as client to this service. You need to show
URL mapping using Apaches configuration file.
#8
Statement To demonstrate an XSS attack (non-persistent and
Task
persistent) : Create a PHP server script that just takes a
username as parameter from a client and greets the user.
Demonstrate the Reflected XSS vulnerability by building
an evil hacker page that lures an unsuspecting user to it
and exploits the vulnerability. Similarly build a PHP
script that saves user-entered comments to a database.
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -26
Demonstrate the Persistent XSS vulnerability in this
case. Show how you can alter the server-side scripts to
offer basic protection against these attacks.
#9
Statement Mini Project : Build a Web Site that has at least 6 pages.
The site should employ AJAX techniques, features of
the Bootstrap Library and any server-side framework
(not Code-Igniter).
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -27
UE14CS331 : COMPUTER AND NETWORK SECURITY (4-0-0-0-4)
PART A : THEORY
# of Hours :52
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -28
UNIT III Cryptographic Tools and Algorithms
31-33 T1: Cryptographic Tools : Confidentiality with symmetric encryption,
Ch 2,20,21 Message Authentication & Hash Functions, Digital Signatures, Random
Numbers
34-37 Symmetric Encryption and Message Confidentiality : DES, AES,
Stream Ciphers, Cipher Block Modes of Operation, Key Distribution
38-41 Public Key Cryptography and Message Authentication : Secure Hash
Functions, HMAC, RSA, Diffie Hellman Algorithms
Readings :
1. Programming Satan's Computer Ross Anderson and Roger
21% 79%
Needham
2. SSL certicates Symantec whitepaper
T1: Ch: 2 , Ch: 20 , Ch: 21
Optional Readings :
1. Why crypto systems fail - Ross Anderson
2. Cryptography protocol practices Needham
3. The BREACH attack: encryption and compression don't mix, by
Gluck, Harris, and Prado (Read at least overview)
4. Handbook of Applied Cryptography, by A. Menezes, P. van
Oorschot, and S. Vanstone (for basics)
UNIT IV Security Protocols, Malware and Software Security
42-45 T1: Internet Security Protocols and standards : SSL, TLS, IPSEC, S/
Ch: 22,6,10,11? MIME
46-48 Malicious Software : Types of Malware, Viruses & Counter Measures,
Worms, Bots, Rootkits
49-52 Software Security : Buffer Overflows, Sta;ck overflows, Defense, Other
overflow attacks, Software Security Issues, Handling Program Input,
Writing Safe Program Code, Interacting with the Operating System and
Other Programs, Handling Program Output
Readings :
1. Smashing The Stack For Fun And Profit, Aleph One 21% 100%
2. Advanced-targeted-attacks Fireeye
3. Gartner 2013- Threats from SSL traffic
T1: Ch: 22 , Ch: 6 , Ch: 10, Ch 11?
Optional Readings :
1. Buffer Overflow : A;ttacks and Defenses by Crispin Cowan
2. ForceHTTPS: protecting high-security web sites from
network attacks, by A. Barth and C. Jackson (Prefer
Mandatory )
3. The case for short-lived certificates. by Topalovic et al. (only
the problem)
Network Protocols & Android ( Optional based on time)
Network Protocol security : TCP/IP and other network protocols
security
Android security
Readings :
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -29
Text Book(s) & Reference Book(s):
Week
Program # List of programs
#
Assignments and Projects will be assigned in 3rd week of the course
NOTE: Project Presentations will be presented in class
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -30
UE14CS332: STORAGE AREA NETWORK (4-0-0-0-4) # of Hours: 52
% Of Portions
UNIT Chapter Title/
Class Topics To Be Covered Covered
NO. Reference Literature
Cumulative
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -31
UE14CS334: HIGH PERFORMANCE COMPUTING AND ARCHITECTURE (4-0-0-0-4)
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -32
Systems: A Programmers Perspective
David Kirk and Wen-meiHwu, Programming
Morgan Kaufmann
TextBook T3 Massively Parallel Processors: A Hands On 1 2010
Approach,
Morgan Kaufmann
Reference Gerassimos Barlas, Multicore and GPU 1
R1 2014
Book programming: An integrated approach
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -33
UE14CS 335 : ADVANCED COMPUTER NETWORKS (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Syllabus Cumulative
%
Unit#1 -Introduction & Bridging the gap
1 Quick revision of what was learnt in last semester
2 Driving factors for the next generation networks
3 Elements of modern networking
4 Requirements and technology
5 Bridging the gap : IPV6 Need, Features
6 T1- Sec 1.1 to 1.5 IPV6-Header Migration from IPV4 to IPV6
7 T2- Sec 4.4 & 4.6 Hierarchical routing in internet
T1- Sec 9.1 20 20
8 BGP
9 VLANs- Definition-Benefits
10 IEEE 802.Q standards
Unit#2-End devices & Access technology-Part#1
11 MPLS-Principles
12 Augmenting TCP for wireless networks
13 The IOT Era; Scope of Internet Of Things
14 IOT Architecture
15 Components of IOT Enabled Things; Sensors
16 Actuators, Microcontrollers, Transceivers, RFID
17 IOT Implementation
18 IOT Implementation
19 R1- Sec 5.8 Case study : Cisco IOT System
T1- Sec 14.1
20 Wireless & Mobile Networks-Elements of wireless
T2- Sec 6.2, 6.3, 6.4 & 23 43
networks
6.5
21 Challenges in wireless networks
22 Cellphone architecture and working principles
23 Typical Transmission & Media Access technologies
Unit#3-Access technology Part#2
24 Mobility aspects of wireless networks
25 2G-3G-4G-5G : What do they mean ?
26 Wi-Fi Networks Features
27 Elements of Wi-Fi networks and Principles
28 Wireline access technologies
29 Carrier grade Networks 21 64
30 T2- Sec 6.3-6.5 LTE - Introduction
31 T2- Sec 7.1 LTE Architecture-Protocols and standards
32 Internet telephony-VOIP- Challenges -Building blocks
33 Basics of Voice digitization.
34 VOIP protocols-H.323, SIP
Unit#4-Network Core-Part#1
35 Core network-requirements-Challenges
36 SONET Principles
37 Architecture-Key protocols
38 Software Defined Networks : Background & Motivation
39 SDN Data Plane &Open flow : Data plane functions
40 R3 Sec 6.5 Data plane protocols 20 84
41 T1-Sec 3, 4,5 OpenFlow Logical Network Decice
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -34
42 OpenFlow protocol
43 SDN Control Plane Architecture
44 Control plane functions-interfaces
Unit#5-Network Core Part#2
45 SDN Application Plane -Architecture
46 Application plane user interface
47 Data center networking & Big Data over SDN
48 T1 Sec 6 Guest lecture 16 100
49 Revision/Seminars
50 Revision/Seminars
51 Revision/Seminars
52 Revision/Seminars
Publication Information
Book Type Code Title & Author
Edition Publisher Year
Foundations of Modern Networking, William Addison-
Text Book T1 1 2015
Stallings Wesley
Computer Networking - A Top-down approach,
6 Pearson 2016
Text Book T2 James F Kurose, Keith W
1
Reference Next Generation Network Services--
R1 [ Special WILEY 2015
Book Technologies & Strategies, Neill Wilkinson
Indian Edition]
1
Pearson
Computer Networks- A Top-down Approach
Reference 2012
R2 -Behrouz A Forouzan, Firouz Mosharraf [ Special
Book3
Indian Edition]
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -35
UE14CS336 PARALLEL COMPUTING (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulativ
Syllabus e%
1 Unit#1 Parallelism vs. Concurrency
2 Parallelism vs. Pipelining
3 Understanding Instruction Level and Memory Level Parallelism
4 Parallelism contd.
5 Flynn's taxonomy: SISD, SIMD, MISD, MIMD 22 22
6 The need for parallelism
7 Amdahl's Law vs. Gustafson's Law
8 Exploring Parallelizable Regions
9 contd.
10 Unit#2 The Fork-Join Model
11 contd.
12 Parallel contd.
13 Programming Programming with Fork-Join in OpenMP and Java
14 Paradigms contd. 22 44
15 contd.
16 Message Passing
17 Programming with MPI in C
18 contd.
19 Unit #3 Task level and data level parallelism
20 TAO Analysis
21 Parallel Applications of TAO analysis to Graph Analytics
22 Programming contd.
23 Models Bulk Synchronous Parallel model 20 64
24 contd.
25 Map Reduce Algorithms
26 contd.
27 contd.
28 Unit#4 Introduction to the GPU Model
29 contd.
30 GPU Programming CUDA Programming
31 contd.
32 contd.
20 84
33 GPU Trends
34 contd.
35 contd.
37 Paper Reading/Guest Lecture
38 Paper Reading/Guest Lecture
39 Unit #5 Concurrent data structures: Java 1.8 concurrent collections
40 contd.
16 100
41 Advanced Topics contd.
42 Paper Readings
43 To 52 Project Presentations and Discussions
Publication Information
Book Type Code Title & Author
Edition Publisher Year
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -36
Introduction to Parallel Computing, Ananth
Text Book T1 Grama, George Karypis, Vipin Kumar and Anshul 2 Pearson 2003
Gupta
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -37
UE14CS338: ARCHITECTURE OF OPEN SOURCE TECHNOLOGIES (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulativ
Syllabus e%
1 Unit#1 Intro to network programming
2 Basics of Network Evolution of socket programming
3 Programming Evolution of socket programming
4 Practical assignment and exercises
5 Evolution of socket programming
6 Evolution of socket programming 19.5 19.5
7 Evolution of socket programming
8 Practical assignment and exercises
9 Scalable web architectures
10 Scalable web architectures
11 Unit#2 Architecture of Boa Web Server
12 Architecture of Boa Web Server
13 Web Server Architecture of Apache Web Server
14 Technologies Practical assignment and exercises
15 Architecture of Apache Web Server 19.5 39.0
16 Architecture of Apache Web Server
17 Architecture of Nginx Web Server
18 Practical assignment and exercises
19 Architecture of Nginx Web Server
20 Architecture of Nginx Web Server
21 Unit #3 Introduction to version Control
22 Centralized version Control
23 Git and GDB Distributed Version Control
24 Intro to Git
25 Git Architecture 15.5 54.0
26 Practical assignment and exercises
27 GDB architecture
28 GDB Architecture
29 Unit#4 Bash Architecture
30 Bash Architecture
31 Bash, NoSql, Chrome Practical assignment and exercises
32 Networking Practical assignment and exercises
33 High Performance networking in Chrome
34 High Performance networking in Chrome 23.00 77.00
35 Practical work: 500 lines or less
36 Practical work: 500 lines or less
37 NoSql Eco System
38 NoSql Eco System
39 Practical work: 500 lines or less
40 Practical work: 500 lines or less
41 Unit #5 Mini Project implementation
42 Mini Project implementation
43 Mini project Mini Project implementation
44 And Paper Mini Project implementation
45 Presentation Mini Project implementation
46 Mini Project implementation
47 Mini Project implementation
48 Mini Project implementation 23.00 100
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -38
49 Mini Project implementation
50 Mini Project implementation
51 Mini Project implementation
52 Mini Project implementation
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -39
UE14CS341: CLOUD COMPUTING (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulative
Syllabus %
1 Unit#1 Introduction background, business case
2 Introduction computing models, history
3 Introduction and Background REST, RPCs
4 Background Background Hardware virtualization
5 Background principles of distributed computing
19.5 19.5
6 Unit 2: IaaS basics Openstack overview
7 Software Virtualization
8 Openstack deep dive 1 Nova and Swift
23.0
9 Openstack deep dive 2 Cinder,Keystone and Neutron
10 Amazon compute 42.5
11 Amazon storage
12 Unit #3 Cloudwatch
13 Containers
14 Project defintion 19.5 61.5
15 Paas Azure architecture
16 Guest Lecture 1 - virtualization
17 Unit #4 Design Scaling computation
18 considerations Scaling Storage
19 Storage virtualization 19.5
20 File systems
21 Multi-tenancy 80.7
Publication Information
Book Type Code Title & Author
Edition Publisher Year
Dinkar Sitaram and Geeta Manjunath, Moving to
Text Book T1 the cloud- Developing Apps in the new world of 1 Elsevier 2012
Cloud Computing
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -40
UE14CS342: ADHOC SENSOR NETWORKS (4-0-0-0-4)
# Of Hours: 52
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -41
23.
24.
25. Other Transport Layers for Ad hoc wireless networks,
26.
27.
28.
Networks Ad hoc transport protocol, Security in Ad hoc wireless networks,
29.
30.
Network Security Attacks
31.
Publication Information
Book Type Code Title & Author
Edition Publisher Year
Ad Hoc Wireless Networks
Text Book T1 Architectures and Protocols, C.Siva -- Pearson 2004
Ram Murthy and B.S. Manoj.
Wireless Sensor Networks: Morgan
Text Book T2 Information Processing Approach, -- Kaufmann 2004
Feng ZHAO and Leonidas GUIBAS. Publishers
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -42
UE14CS343: SOFTWARE DEFINED NETWORKS (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulativ
Syllabus e%
1 Unit#1 Course Intro, Scheme and plans
2 Basics of SDN Elements of Modern Networking
3 Networks: Requirements and Technology
4 Introduction to SDN, Background and Motivation
5 Distributed and Control Plane
6 Practical assignment and exercises 19.5 19.5
7 SDN: Data Plane and Openflow
8 SDN: Control Plane
9 SDN Application Plane
10 Practical assignment and exercises
11 Unit#2 SDN Controllers : General Concept
12 SDN Cotrollers: VMWare, Nicira
13 SDN Controllers SDN Controllers: Mininet, Pox, Ryu, Trema, Floodlight
14 Practical assignment and exercises
15 SDN Controllers: Opendaylight 19.5 39.0
16 SDN Controllers: Coordination and Cooperation
17 SDN: Traffic Engineering, PCE
18 Practical assignment and exercises
19 Network Programmability
20 Network Programmability
21 Unit #3 Data Center Concepts and Constructs
22 Data Center Concepts and Constructs
23 Data Center and Virtualization: Concepts and Architecture
24 NFV NFV Functionality
25 Network Virtualization 15.5 54.0
26 Practical assignment and exercises
27 Business Applications
28 Business Applications
29 Unit#4 SDN Traffic Engineering
30 SDN Traffic Engineering
31 SDN Future SDN Startsups
32 Practical assignment and exercises
33 SDN in other environments
34 SDN in other environments 23.00 77.00
35 SDN business ramifications
36 Practical assignment and exercises
37 Data Center Implementation
38 Data Center Implementation
39 Data Center Implementation
40 Practical assignment and exercises
41 Unit #5 Mini Project implementation
42 Mini Project, Mini Project implementation
43 Paper presentation Mini Project implementation
44 Mini Project implementation
45 Mini Project implementation
46 Mini Project implementation
47 Mini Project implementation
48 Mini Project implementation 23.00 100
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -43
49 Mini Project implementation
50 Mini Project implementation
51 Mini Project implementation
52 Mini Project implementation
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -44
UE14CS344: KNOWLEDGE MANAGEMENT (4-0-0-0-4)
# of Hours: 52
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -45
Text Book(s) & Reference Book(s):
% of Portion
Class Chapter Title / Reference Covered
Topics to be Covered
# Literature % of Cumulative
Syllabus %
1 Unit I 23.10 23.10
Principles of modeling and simulation;
Introduction to
2 Simulation: Model taxonomies;
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -46
3 T1: 1.1-1.12,2.1-2.6 Fundamentals of queuing theory;
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -47
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -48
UE14CS347: NETWORK MANAGEMENT # of Hours: 52
Cum % Of
Unit Chapter Title/
Class Topics To Be Covered Portions
No. Reference Literature
Covered
Introduction to Introduction, Network Management, Network topologies, functions
Network Management and types, Challenges of managing a network, Internet and Network
and the Management. Administrative Entities their autonomy and
responsibilities in terms of policies, Current state of managing
network, NM Big Picture, and the Activities/IT groups which
1-8
support them, Network Devices and Services which need to be
managed, Benefits of Automation, Maturity of network
1. management, How do organizations build their networks and what 27.00
are the expectations from an NMS, Research in Network
Management
Network Management who is best suited for providing a network
9-10 management system to manage the components? What should a
typical NM system provide, Architectural Approaches of NMS
OSI and IETF based NM approaches and Dumbell Architecture of
11-14
NM interoperability
Network Devices and Network Services, Network Elements And
Element Management 15-18 Element Management, Effect Of Physical Organization On
2 & Configuration and Management, Examples of Network Elements And Services 46.00
Fault Management 19-21 Configuration Management
22-24 Fault Management
3 Accounting Mgmt., 25-26 Accounting Management
Performance Mgmt., 27-29 Performance Management 60.00
Security Management 30-31 Security Management
SNMP, CIM, 32-33 Intro to SDN and its relationship to NM, Autonomic Computing
4 WEBEM, SNIA 34-37 SNMP-Recap 77.00
38-40 CIM, WEBEM, SNIA
NM Open Source Tool Network Management Tool Installation, Configuration, Demo and
41-48
deployment, presentation
5 Experience sharing SNMP Manager, Agent and MIB development and demo 100.00
and SNMP 48-52
implementation
Publication Info
Book Type Code Title & Author
Publisher Year
Text Book T1 Automated Network Management Systems, Douglas Addison-Wesley
E Comer
Communications Network Management, Terplan, Prentice-Hall, Englewood
Text Book T2 1991
Kornel Cliffs, N.J.
Text Book T3 SNMP, SNMPv2 and CMIP, Reading, Mass., Addison-Wesley 1993
Stallings, William
Text Book T4 Advances in Network Management Jianguo Ding 2010
Articles Various Articles from Internet, Published Papers
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -49
UE14CS 348: DIGITAL IMAGE PROCESSING (4-0-0-0-4)
# of Hours: 52
Class Chapter Title / Topics to be Covered
% of Portion covered
# Reference Literature
% of Cumulativ
Syllabus e%
1 Unit#1 Introduction to digital image processing
2 Introduction Origins, example fields and various components
3 T: Basics of visual perception
4 Chapter 1,2 Image acquisition
5 Sampling
6 Quantization 19.23 19.23
7 Relationship between pixels
8 Review of relevant linear algebraic concepts
9 Interesting problems in the field of image processing
10 Case studies
Unit#2 Image enhancement in the spatial domain: background
11 Basics of spatial processing, Negative, log,, power law
Image enhancement Piece wise linear functions
12 In the spatial domain Histograms and using histogram statistics for processing
13 T: Histogram equalization and matching 19.23 38.46
14 Chapter 3 Mechanics of spatial filtering
15 3.1-3.6 Correlation and convolution
16 Smoothing and sharpening filters, order statistics filtering
17 First and second derivatives for filtering
18 Image gradient
19 Case studies/ review
20 Case studies/ review
21 Unit #3 Image Enhancement in the frequency domain
Basics of the Fourier transform and interpreting an image in the
Image enhancement transformed domain
in the frequency Correspondences between the space and frequency domains
22 domain Smoothing in the frequency domain 19.23 57.69
23 T1: Sharpening in the frequency domain
24 Chapter 4, 7 Ideal versus optimal filters
25 4.7-4.10 Types of noise that can affect an image and enhancement
26 7.1 Evaluating the performance of the filter
27 Introduction to multiresolution transformations or the space-
frequency domain
28 Image transformation and subband coding for denoising,
compression and feature extraction
29 Case studies/ review
30 Case studies/ review
31 Unit#4 Morphological processing basics
32 Erosion, dilation, open and closing
33 Morphological Hit or miss
34 processing and image Some algorithms boundary extraction, hole filling, thinning
35 segmentation Gray scale morphology
36 T: Segmentation basics point, line and edge detection 19.31 77.00
37 Chapter 9, 10 Thresholding global, using Otsus method, multiple thresholds
38 9.1-9.6 Segmentation using region-growing and region-merging
39 10.1-10.5 Segmentation using morphological operations revisited
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -50
40 An overview of other segmentation techniques
Publication Information
Book Type Code Title & Author
Edition Publisher Year
Text Book T Digital Image Processing Gonzalez and Woods 3 Pearson 2008
Digital Image Processing and Analysis Scott E. CRC Press
R1 1 2014
Umbaugh
Reference Digital Image Procesing - S.Jayaraman, McGraw Hill Ed. (India) Pvt.2013
Ltd.
R2 Scilab
Book S.Esakkirajan, T.Veerakumar
Digital Signal and Image Processing - Tamal John Wiley
R3 1 2004
Bose
P.E.S.University B.Tech.6th Semester Course Information - CSE Jan- May 2017 -51