SYLLABUS: 7TH SEMESTER (C.S.E)
(Aryabhatta knowledge university,patna)
Download in PDF Format: click here
FUNDAMENTALS OF DATA COMMUNICATION Credit : 3
- Introduction : Data Communication, Network Architecture, Protocols & Standard.
- Signal, Noise, Modulation & Demodulation : Signal analysis, Signal-to-noise ratio, Bit rate, Baud, Digital Modulation.
- Transmission Media : Guided transmission Media, Wireless Transmission. Digital transmission.
- Multiplexing : Time Division Multiplexing, Frequency Division Multiplex, Frequency Division multiplexing.
- Data Communication Codes, Error Control and Data Format: Data communication Character codes, Bar codes, Error Control & Detection, Character Synchronization.
- Data Communication Hardware: Data Communication Hardware & circuits, serial interfaces.
- Data Communication Equipment : Digital service unit, Channels service unit, Bell- system Compatible voice band modem. Asynchronous and Synchronous voice band modem
- Circuit Switching : Switching Networks, Circuit Switching Networks, Circuit Switching concepts, Routing in Circuit Switching Networks Control Signaling.
- Packet Switching : Packet Switching Principles, outing, X .25
- Asynchronous transfer mode : Protocol Architecture, ATM Logical Connection, ATM Cell, Transmission of ATM Cells, ATM Service categories, ATM adaptation layer.
- Routing in Switched Network : Routing in circuit-switching & Packet switching network.
- Integrated Service Data Network : Public Switch Data Network. X. 25 user-to-network Interface protocol. ISDNCRYPTOGRAPHY Credit : 3
- Introduction : The OSI Security Architecture, Security attack, Security Services, Security Mechanism, A model for Network Security.
- Symmetric Cipher : Classical Encryption Techniques, Symmetric Cipher Model, Block Cipher Principles, DES, Cryptanalysis, Block Cipher Design Principle, The Euclidean Algorithm, Finite field of Form GP(p), Advance Encryption Standard (AES), AES Cipher, Multiple Encryption and Triple DES, Stream, Placement of Encryption Function, Traffic Confidentiality, Key Distribution, Random number generation.3. Public Key Encryption and Hash Function : Fermat’s & Euler’s Theorems, The Chinese Remainder Theorem, RSA Algorithm, Diffe-Hellman Key Exchange, Elliptic Curve Cryptography, Massage authentication code, Security of Hash Functions and MAACs, Secure Hash algorithm, Whirlpool, HMAC, CMAC, Digital Signature.4. Network Security Applications : Kerberos, X.509 Authentication Service, S/MIME, IP Security Architecture, Encapsulating Security Payload, Secure Socket Layer (SSL), Transport layer security, Secure Electronic Transaction.
5. System Security : Intrusion detection, Password Management, Virus countermeasure, Denial of Service Attack, Firewall design principles, Trusted System.
E-COMMERCE & ERP Credit : 3
- Electronic Commerce : Overview, Definitions, Advantages & disadvantages of E-Commerce, Indian Readiness for E-commerce, E-transition, Challenges for Indian Corporate, The Information Technology Act 2000.
- Business Models of e-commerce : Model Based on Transaction Party – B2C, B2B, C2C, C2B, Model Based on Transaction Type.
- E-Marketing : Identifying Web Presence Goals, The Browsing Behaviour Model, Online Marketing, EAdvertising, Internet Marketing Trends, E-Branding, Marketing Strategies.
- 4. E-Security : Security on the Internet, E-Business Risk Management Issues, Firewall.
- E-Payment System : Digital Payment requirement, Digital token Based E-Payment Systems, E-Cash, Risk, Designing E-Payment Systems, Digital Signature, Online Financial Services in India.
- E-Supply Chain Management : Overview, Benefits, Components, Architecture, Major trends.
- E-Strategy : The Virtual Value Chain, Seven Dimensions, Planning the E-Commerce Project, Knowledge Management.
- Mobile Commerce : Growth, Wireless Applications, Origins, Wireless Technologies, Generations, Security Issues, Indian context.
- ERP : Concept, Origin, Evolution & Structure, Best Practices, ERP Vendor Analysis Basic Functional Modules in ERP,
ARTIFICIAL INTELLIGENCE Credit : 5
- Introduction : Why AI, Importance of AI. LISP, Prolog and other programming language for AI. Lecture : 3
- Search Strategies : Representation Scheme, Blind Search technique, Heuristic Search technique, Game search, Graph search (algorithm A and A*), Properties of A* algorithm, monotone – Specialized production systems – AO * algorithm. Lecture : 15
- Searching Game Trees : Minimax procedure, alpha-beta pruning – Introduction to predicate calculus – Resolution refutation systems – Answer extraction. Lecture : 4
- Knowledge Representation, Reasoning : Knowledge representation, Knowledge acquisition, Logical Representation scheme, procedural representation schema, network representation scheme, STRIPS robot problem solving system, Structured representations of knowledge (Semantic Nets, Frames, Scripts), KRR system, KR language, Domain modeling, Semantic net. Lecture : 8
- Uncertainly : Non monotonic & monotonic reasoning, confidence factors, Bayes theorem, Dempster & Shafer’s, Theory of evidence, Non-classical logic, Fuzzy reasoning. Lecture : 6
- Natural Language Processing : An Introduction to Natural language Understanding, Perception, Learning. Lecture : 4
- Applications of Artificial Intelligence : Al in E-commerce, Al in Industry, Al in Medicine Lecture : 2
DISTRIBUTED COMPUTING Credit : 5
- Fundamentals : Definition Evaluation of distributed Computing System, Distributed Computer System Models. Distributed Operating System Designing a distributed Operating System, Introduction of distributed computing environment. Lecture : 5
- Massage Passing : Introduction, Design features, Issues in IPC by message passing, synchronization Buffering, Multidiagram messages, encoding and decoding message data. Lecture : 4
- Remote Procedure Calls : Introduction, The RPC Model. Transparency of RPC. Implementing RPC mechanism RPC messages server management, parameter- passing and call semantic, Communication protocols for RPC’s. Lecture : 10
- Distributed Shared Memory : Introduction. Architecture of DSM Systems Design and implementation, granularly, Structure shared memory space Consistency models, replacement strategy, Thrashing. Lecture : 9
- Resource Management : Desirable feature, Task assignment approach, Load-balancing approach, Loadsharing approach. Lecture : 4
- Process Management : Process Migration, Threads Lecture : 2
- Distributed File System : Intake, Desirable features, File model, File accessing models, File-sharing semantic, File-catching schemes, File replication, Fault tolerance, Automatic transactions, Design principle. Lecture : 8
Note :Elective paper may be change…