RAJAGIRI SCHOOL OF ENGINEERING
& TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
M.Tech – NETWORK ENGINEERING
CURRICULUM BOOK (KTU)
Vision & Mission of the Institute
Vision: To evolve into a premier technological and research institution, moulding eminent
professionals with creative minds, innovative ideas and sound practical skill, and to
shape a future where technology works for the enrichment of mankind.
Mission: To impart state-of-the-art knowledge to individuals in various technological
disciplines and to inculcate in them a high degree of social consciousness and human
values, thereby enabling them to face the challenges of life with courage and conviction.
Vision & Mission of the Department
Vision: To evolve into a department of excellence in information technology by the creation
and exchange of knowledge through leading edge research, innovation and services,
which will in turn contribute towards solving complex societal problems and thus
building a peaceful and prosperous mankind.
Mission: To impart high quality technical education, research training, professionalism and
strong ethical values in the young minds for ensuring their productive careers in
industry and academia so as to work with a commitment to the betterment of mankind.
1
KERALA TECHNOLOGICAL UNIVERSITY
CET Campus, Thiruvananthapuram, Kerala -695 016
ORDINANCE
For
Master of Technology - M.Tech.
In exercise of the Powers conferred under Clause 44 of the Ordinance, the Executive Committee of the University hereby promulgate the Ordinance for the University for the Academic Year 2015-2016.
The Academic ordinance will come into effect from the date of publication in the Gazette.
INDEX
01 Admission to the M. Tech. Programme
02 Duration of the Programme
03 Post Graduate Programme Clusters
04 Specialization Streams in M.Tech., Programme
05 M.Tech., Programme Structure
06 Course Registration and Enrolment
07 Recommended Credit distribution over the semesters
08 Academic Assessment/Evaluation
09 Course Completion and earning of credits
10 End Semester and Supplementary Examinations
11 Conduct of End Semester Examination
12 Award of M.Tech., Degree
13 Amendments to Ordinance
14 Miscellaneous provisions
i) Stream of Specializaion
ii) Language of Instruction
iii) Academic Calendar
iv) Eligibility to continue with the programme
v) Seminar
vi) Project work
vii) Faculty Advisor, Class Committee
viii) Award of Grades
ix) Grades and Grade Points
x) Academic Auditing
2
xi) Revaluation and Grade Improvement
xii) Grade Cards
xiii) Academic Discipline and Malpractices in Examinations
xiv) Student’s Welfare Committee
xv) Grievances and Appeals Committee
xvi) Attendance
xvii) Leave of Absence
xviii) Project Evaluation
xix) Project Work outside the College
Ragging
Calculation of SGPA/CGPA
O-1 Admission to the M. Tech. Programme
Candidates who have been awarded or qualified for the award of the Bachelor’s degree
in Engineering / Technology, from an Institution approved by AICTE are eligible for
admission to the M. Tech., Programme. Eligibility of candidates having MCA/MSc
qualifications will be decided from time to time by following the guidelines issued by All
India Council for Technical Education (AICTE) and the Government of Kerala and notified
separately. Other important eligibility criteria are as listed out by the Director of
Technical Education with the approval of the Government of Kerala.
O-1.1 Candidates qualified in Graduate Aptitude Test in Engineering (GATE ) and
admitted to the M. Tech. programme are eligible to receive Half Time Teaching
Assistantship ( HTTA) as per the rules of the All India Council for Technical
Education (AICTE)/Ministry of Human Resource Development (MHRD).
O-1.2 Sponsored candidates from Industries, R&D organizations, National Laboratories
as well as Educational Institutions, with a bachelor’s degree in engineering
are eligible for admission to the M. Tech. programme.
O-1.3 Foreign nationals whose applications are received through Indian Council
of Cultural Relations, Government of India are also eligible for admission to the M.
Tech. programme.
O-1.4 Announcements for M. Tech. Programmes will be made by the DTE, Government
of Kerala.
O-1.5 Selection of candidates for the M. Tech programme will be done centrally or
monitored by the Directorate of Technical Education as per the guidelines given
on this by the Government of Kerala
3
O-1.6 The number of candidates to be admitted to each M. Tech stream will be as per
the approval of the University which shall be based on decision on this given by
the All India Council for Technical Education.
O-1.7 Admission will be complete only on meeting all the other requirements
mentioned in the letter of admission and on payment of the fees.
O-1.8 Candidates who have the Associate Membership of Professional Bodies that are
approved by the University and have qualified in GATE shall also be eligible for
admission to the M. Tech. programme.
O-1.9 The reservation policy of the Government of Kerala and the Government of India
shall be followed in admission to the M. Tech. programme.
O-1.10 All admission will be governed by the procedure laid down for this by the Director
of Technical Education, Kerala and the Government of Kerala.
O-1.11 Notwithstanding all that is stated above, the admission policy may be modified
from time to time by the University, particularly to confirm to directions from the
Government of Kerala and the Government of India.
O-2 Duration of the Programme
The normal duration of the M. Tech programme, including the project work, shall be four
semesters.
O-3 Post Graduate Programme Clusters
The University shall identify clusters of colleges offering M. Tech programmes in different streams and allow them to formulate procedures for the smooth conduct of all academic activities associated with the M. Tech programme, in line with the ordinances/regulations of the University. These clusters shall have academic autonomy, regulated by a Cluster level Graduate Committee [CGPC] consisting of all the principals of the colleges in the cluster. The Chairman of CGPC shall be an eminent academician nominated by the Vice Chancellor. The CGPC will be responsible for all academic matters including the curriculum, syllabi, course plans, internal evaluations, end semester examinations, and grading for all streams of M. Tech. programme offered by the colleges in the cluster. The CGPC can formulate additional rules for other academic aspects that are not covered
by this Ordinance.
O-4 Specialization Streams in M. Tech., Programme
The M. Tech. programme streams offered by each cluster as well as the eligibility of
candidates of different B. Tech. branches or having other qualifications, for each of them
shall be approved by the CGPC.
O-5 M. Tech. Programme Structure
4
i) The M. Tech programme in all streams of specialization will be structured on a
credit based system following the semester pattern with continuous evaluation.
ii) The University permits regular as well as external registration (part time) for those
in employment.
iii) The duration for the M. Tech. programme in all streams of specialization will
normally be 4 semesters. The maximum duration is 6 semesters.
iv) For students admitted on external registration, the normal duration will be 6
semesters. Here the maximum duration is 7 semesters.
v) The University permits a regular student to change over to external registration
during
the programme, under specific circumstances like initiating a start up venture or
to take up a job.
vi) Each semester shall have a minimum of 72 instruction days followed by the end
semester examination.
vii) A common course structure for the M. Tech programmes in all streams of
specialization is to be followed and consists of the following.
Core Courses
Elective Courses
Laboratory Courses
Seminar
Project
viii) Every stream of specialisation in the M. Tech. programme will have a curriculum
and syllabi for the courses. The curriculum should be so drawn up that the
minimum number of credits for successful completion of the M. Tech. programme
in any stream of specialization is not less than 64 and not more than 68.
Ix) Credits are assigned as follows, for one semester
1 credit for each lecture hour per week
1 credit for each tutorial hour per week
1 credit for each laboratory/ practical of 2 or 3 hours per week
2 credits for the seminar
2 credits for Mini Project
6 credits for Project in the 3rd Semester
12 credits for Project in the 4th Semester
x) A pass is mandatory in all core courses. In case of failure in an elective course,
there is the provision to choose another elective listed in the curriculum.
5
xi) On their request, CGPC shall examine the academic records and permit
candidates with B. Tech (Honours) who have earned credits for any relevant
graduate level courses to transfer credits towards the M. Tech. programme.
Candidates who received B. Tech (Honours) degree just prior to their M. Tech
admission are permitted to transfer up to 9 credits. For those who received the B.
Tech (Honours) degree within three years prior to their M. Tech. admission are
permitted to transfer up to 6 credits.
Xii) The maximum number of lecture based courses and laboratory courses in any
semester shall not exceed 5 and 2 respectively. The maximum credits in a
semester shall be 23.
Xiii) Extension of Programme duration
The normal duration of the programme shall be four semesters.
In case of prolonged illness or other personal exigencies, the university may allow
a student who has earned credits for at least one semester, to extend the
programme up to the maximum duration of six semesters.
Students who have earned credits for the courses listed in the first two semesters
are permitted to transfer their registration as external candidates if they take up a
job. However, they have to complete the programme within six semesters.
O-6. Course Registration and Enrolment
All students have to register for the courses they desire to attend in a semester. Students
admitted to the first semester are advised to register for all courses offered in the first
semester. They do not have to enrol for the semester. All other students are required to
register at the end of the semester for the courses they desire to take in the next
semester. Later they have to enrol for these courses in the new semester based on the
results in the previous semester. This allows them to make minor changes in the list of
courses already registered for. Before enrolment, students should clear all dues including
any fees to be paid and should not have any disciplinary proceedings pending. The dates
for registration and enrolment will be given in the academic calendar. Any late
registration or enrolment, allowed only up to 7 working days from the commencement of
the semester, will attract a late fee.
A student can drop a course or substitute one already registered for by another, for valid
reasons with the approval of the faculty advisor. However this has to be done within 7
working days from the commencement of the semester.
The maximum number of credits a student can register for in a semester is limited to 24.
O-7 Recommended Credit distribution over the semesters
First Semester : 20 to 23 credits Second Semester : 18 to 19 credits Third Semester : 14 credits
6
Fourth Semester : 12 credits [Project]
O-8. Academic Assessment/Evaluation
The University follows a continuous academic evaluation procedure.
The Assessment procedure and corresponding weights recommended are as
follows:-
For theory courses
i) Two internal tests, each having 15%
ii) Tutorials/Assignments/ Mini projects having 10%
iii) End Semester examination having 60%
All the above are mandatory requirements to earn credits.
Students who have missed either the first or the second test can register with the
consent of the faculty member and the Head of the Department concerned for a
re-test which shall be conducted soon after the completion of the second test and
before the end semester examination. The re-test will cover both the first and the
second test course plans. If a student misses both the scheduled tests, there is no
provision for any retests and zero marks will be given for each test. In case of
serious illness and where the attendance is above 70% the Principal may permit
the conduct of the tests for a student based on his application and other relevant
medical reports. Such cases are to be reported to CGPC.
For Laboratory /Practical courses
i) Practical Records /outputs 40%
ii) Regular Class Viva-Voce 20%
iii) Final Test (Objective) 40%
O-9. Course Completion and earning of credits
Students registered and later enrolled for a course have to attend the course regularly
and meet the attendance rules of the University and appear for all internal evaluation
procedures for the completion of the course. However, earning of credits is only on
completion of the end semester/supplementary examination and on getting a pass
grade. Students, who had completed a course but could not write the end
semester/supplementary examination for genuine health reasons or personal exigencies,
if otherwise eligible are permitted to write the semester examination, at the next
opportunity and earn credits without undergoing the course again. Failed candidates
having more than 45% marks in their internals can also avail of this option. However,
those who are not eligible to appear for the end semester examination have to register
and undergo the course again, whenever it is offered, to earn the credits.
O-10. End Semester and Supplementary Examinations
At the end of the semester, the end semester examination will be conducted in all
courses offered in the semester and will be of three hours duration unless otherwise
specified. Supplementary examinations are to be conducted for eligible candidates
registered for them, before the commencement of the next semester.
O-10.1 Eligibility to write the End Semester Examination and Grading
7
Eligibility criteria to appear for the semester examination are the attendance
requirements in the course, 45% or more marks in the internal evaluation and
having no pending disciplinary action. The minimum attendance for appearing for
the semester examination is 85% in the course. In case of serious illness there is a
relaxation for attendance [O-14.xvi]. Those who do not meet the eligibility criteria
shall be awarded an FE Grade and have to register again for the course.
A student should have a minimum of 45% marks in the end semester examination
to be eligible for grading in a course. Otherwise he/she will be considered to have
failed in the course and an F grade will be awarded.
O-10.2 Eligibility to write the Supplementary Examination
Only failed students and those who could not write the semester examination due
to health reasons or other personal exigencies that are approved by the Principal
can register for the supplementary examination provided they meet the eligibility
requirements given in O-10.1. Grades awarded in the supplementary
examination will be taken as the semester grades in these courses.
O-11. Conduct of End Semester Examination
The Clusters will prepare the question papers, conduct the end semester examinations,
organize the valuation of the answer scripts, finalise the results and submit it to the
University, as per the academic calendar.
O-12. Award of M. Tech., Degree
The award of the M. Tech. Degree shall be in accordance with the Ordinances and
Procedures given by the University.
A student will be eligible for the award of M. Tech. Degree of the University on
meeting the following requirements;
i) Registered and earned the minimum credits, as prescribed in the
curriculum, for the stream of specialization.
ii) No pending disciplinary action.
O-13. Amendments to Ordinance:
Notwithstanding all that has been stated above, the University has the right to modify any of the above provisions of the ordinance from time to time.
O- 14. Miscellaneous provisions:
i) Stream of Specialization:
The streams of specializations are to be in line with the approval given on this by
the All India Council for Technical Education.
8
ii) Language of Instruction
Unless otherwise stated, the language of instruction shall be English.
iii) Academic Calendar
The University shall publish in its website the academic calendar for every academic semester indicating the date of commencement of the semester as well as instruction. It will specify the course registration and enrolment dates, the schedule for mandatory internal tests for theory courses, dates by which laboratory/practical evaluations are to be completed, date for finalization of internal marks, last instruction day in the semester, planned schedule of end semester examinations and result declaration as well as approved holidays falling within the semester. Schedules for the supplementary examinations and result declaration dates are to be included in the calendar. Additionally colleges may publish their academic calendar, in line with the University academic calendar, indicating other schedules and events they plan to conduct during the semester.
Iv) Eligibility to continue with the programme
A student has to earn a minimum number of credits in a semester to register for
higher semester courses. This should be at least 2/3rd of the credits for the
courses listed in for the semester. CGPC shall formulate the rules based on this
and spell out the procedure to proceed with the programme.
Failed students who have more than 45% marks in the internal course evaluation
are permitted to write the semester examination without registering and
undergoing the course. Those with less than 45% in internal course evaluation
have to register again for the course, attend the classes and earn the credits.
v) Seminar
Students have to register for the seminar and select a topic in consultation with
any faculty member offering courses for the programme. A detailed write-up on
the topic of the seminar is to be prepared in the prescribed format given by the
Department. The seminar shall be of 30 minutes duration and a committee with
the Head of the department as the chairman and two faculty members from the
department as members shall evaluate the seminar based on the report and
coverage of the topic, presentation and ability to answer the questions put
forward by the committee.
Suggested evaluation procedure:-
Faculty member in charge of the seminar and another faculty member in the
department nominated by the Head of the Department are the evaluators for the
seminar. Distribution of marks for the seminar is as follows.
Marks for the report: 30%
Presentation: 40%
Ability to answer questions on the topic: 30%
9
vi) Project work
Project work is spread over the third and fourth semesters. Project work is to be
evaluated both in the third and the fourth semesters. Based on these evaluations
the grade is finalised only in the fourth semester.
Project evaluation weights shall be as follows:- For convenience the marks are allotted as follows.
Total marks for the Project: 150
In the 3rd Semester:- Marks:50 Project Progress evaluation details:
Progress evaluation by the Project Supervisor : 20 Marks Presentation and evaluation by the committee : 30 Marks
In the 4th Semester:- Mraks:100
Project evaluation by the supervisor/s : 30 Marks Presentation & evaluation by the Committee : 40 Marks Evaluation by the External expert : 30 Marks
vii) Faculty Advisor, Class Committee
a) Faculty Advisor
The Head of the Department offering the M. Tech. programme shall nominate
senior faculty members as faculty advisors who shall advise the students in
academic matters and support them in their studies. Their role is to help the
students in academics and personal difficulties related to studies. A faculty
advisor may support a group of students in a semester.
b) Class Committees are to be in place for all M. Tech. programs in the college.
Class Committee
All M. Tech streams of specialization will have class committees for each
semester, constituted by the respective Heads of Departments.
The Chairman of the committee shall be a senior faculty member who does not
offer any course for that stream in that semester.
Members:-
i) All faculty members teaching courses for the stream in that semester.
ii) Two student representatives nominated by the Head of the Department,
from the stream.
Class committees shall meet at least thrice in a semester - one in the beginning
and one around the middle of the semester and one at least two weeks before
the semester examinations. These committees should monitor the conduct of the
courses, adherence to the course plan and time schedule, completion of the
10
syllabus, standards of internal tests and evaluation process and address the
difficulties faced by the students and take suitable remedial actions at the
appropriate time. Before the end semester examination, the committee should
meet without the student representatives and finalise the internal marks. A
report on the student performance in each course should be prepared and
submitted to the CGPC by the colleges.
viii) Award of Grades
Grading is based on the marks obtained by the student in a course. [O-14 ix]
The grade card will only show the grades against the courses the student has
registered.
The semester grade card will show the grade for each registered course, Semester
Grade Point Average (SGPA) for the semester as well as Cumulative Grade Point
Average (CGPA).
ix) Grades and Grade Points
Grades and Grade Points as per UGC guidelines are to be followed by the
University
Grades Grade Point % of Total Marks obtained in the course
O 10 90% and above
A+ 9 85% and above but less than 90%
A 8 80% and above but less than 85%
B+ 7 70% and above but less than 80%
B 6 60% and above but less than 70%
C 5 50% and above but less than 60%
P 4 45% and above but less than 50%
F 0 Less than 45%
FE 0 Failed due to eligibility criteria [O.10.1]
I Course Incomplete
Grade Point Average (GPA) and Cumulative Grade Point Average (CGPA) are
calculated based on the above grading norms and are explained at the end of this
document.
x) Academic Auditing
The University shall have a detailed academic auditing procedure in place
comprising of an internal academic auditing cell within the college and an external
academic auditing for each college. The internal academic auditing cell in each
college shall oversee and monitor all academic activities including all internal
evaluations and semester examinations. This cell is to prepare academic audit
statements for each semester at regular intervals of four weeks of instruction.
These reports are to be presented to the external academic auditor appointed by
11
the University, who will use it as a reference for his independent auditing and for
the final report to the University.
Academic auditing will cover:-
i) Course delivery covering syllabus, adherence to course plan, quality of
question papers for internal examinations, internal evaluation, laboratory
experiments, practical assignments, mini projects, conduct of practical
classes and their evaluation. Semester examination and academic
performance of the students.
ii) Co-curricular and Extra-curricular activities available for students, and
their organization.
iii) Academic functioning of the college encompassing students, faculty and
college administration covering punctuality, attendance, discipline,
academic environment, academic accountability, academic achievements
and benchmarking.
xi) Revaluation and Grade improvement
There is no provision for revaluation of the semester answer books or for improving the grade.
` Students are permitted to check the answer books of the semester examination,
after the results are declared. Any discrepancies in evaluation could be brought to the notice of the teacher concerned who will initiate appropriate action on this and report to the CGPC for a final decision on this.
xii) Grade Cards
Students who have written the semester examination will be given the grade cards for the registered courses, in every semester by the respective colleges. On earning the required credits for the degree, a consolidated grade sheet for the M. Tech programme will be issued by the University on the recommendation of the respective CGPC. The M. Tech. degree will not have any classification like distinction or first class.
xiii) Academic Discipline and Malpractices in Examinations
Every student is required to observe discipline and decorous behaviour.
Any act of indiscipline, misbehaviour and unfair practice in examinations will be
referred to the Disciplinary Action Committee (DAC). Malpractices in
examinations shall be viewed seriously and any such incident observed or
reported by a faculty member or an invigilator associated with the examinations
shall be reported to the Principle who in turn shall refer it to DAC. On the basis of
the report and evidence available or gathered, DAC shall immediately initiate an
enquiry giving the concerned student a chance to explain his/her case. Based on
this the committee shall recommend the course of action in line with the
guidelines formulated for this by the Controller of Examination of the University
and forward it to the Principal for action.
12
Actions are to be based on the severity of the offence and are to be dealt with, on a course basis. Guidelines on this shall be given by the Controller of Examination which is to be followed by the Disciplinary Action Committee of the college. DAC shall be headed by a department head and shall have three other faculty
members drawn from different departments as members. In case of malpractices
in end semester examinations, the report given by the college DAC and the action
taken by the Principal shall be intimated to the Controller of Examination of the
University
xiv) Student’s Welfare Committee
Every college shall have a Student’s Welfare Committee, constituted by the
Principal of the college. This committee shall have at least three faculty members
as members and the chairman shall be a senior faculty member in the rank of a
Professor. This committee is entrusted with the task of looking after the welfare
of the students by taking appropriate steps with the concurrence of the principal.
xv) Grievances and Appeals Committee
Each college should have a Grievances Redress Committee constituted by the
Principal to address the grievances of the students and to consider their appeals
on any decisions made by the college. This committee consisting of at least three
faculty members and chaired by a senior professor shall look into student’s
grievances and appeals and give its recommendations to the Principal for action.
xvi) Attendance
Attendance is marked for each course. 85% attendance is mandatory for writing
the semester examination in a course. Students who get Part Time Teaching
Assistantship (PTTA) or Scholarships from the Central or State Governments or
any other agencies are expected to have 100 % attendance. However, under
unavoidable circumstances students are permitted to take leave. Leave is
normally sanctioned for any approved activity taken up by students outside the
college covering sports and other extra-curricular activities. Leave is also
permitted on medical grounds or on personal exigencies. Leave of absence for all
these is limited to 15 % of the academic contact hours for the course.
In case of long illness or major personal tragedies/exigencies the Principal can
relax the minimum attendance requirement to 70%, to write the semester
examination. This is permitted for one or more courses registered in the
semester. The Principal shall keep all records which led to his decision on
attendance, for verification by the Academic Auditor. However this concession is
applicable only to any one semester during the entire programme. In case of
prolonged illness, break of study is permitted up to two semesters which could
extend the programme up to six semesters, the maximum permitted by the
regulations.
13
xvii) Leave of Absence
Students who desire to take leave have to apply for it to the teacher conducting
the course. This application together with any supporting documents like doctor’s
certificate or other relevant information is to be forwarded to the Head of the
Department with the recommendation of the teacher indicating the total leave of
absence the student has so far availed. Approval for leave is to be given by the
head of the department. After any prolonged medical leave, normally exceeding
five instruction days, on rejoining, the student has to produce the fitness
certificate given by the doctor.
xviii) Project Evaluation
Normally students are expected to do the project within the college. However
they are permitted to do the project in an industry or in a government research
institute under a qualified supervisor from that organization. Progress of the
project work is to be evaluated at the end of the third semester. For this a
committee headed by the head of the department with two other faculty
members in the area of the project and the project supervisor/s. If the project is
done outside the college, the external supervisor associated with the student shall
also be a member of the committee.
Final evaluation of the project will be taken up only if the student has earned all
course credits listed in the first three semesters. Project evaluation shall be done
by the same committee mentioned above with an external expert, either from an
academic/R&D organization or from Industry, as an additional member. Final
project grading shall take into account the progress evaluation done in the third
semester and the project evaluation in the fourth semester. If the quantum of
work done by the candidate is found to be unsatisfactory, the committee may
extend the duration of the project up to one more semester, giving reasons for
this in writing to the student. Normally further extension will not be granted and
there shall be no provision to register again for the project.
Xix) Project work outside the College
While students are expected to do their projects in their colleges, provision is
available for them to do it outside the college either in an industry or in an
institute of repute. This is only possible in the fourth semester and the topic of
investigation should be in line with the project part planned in the 3rd semester.
Student should apply for this through the project supervisor indicating the reason
for this well in advance, preferably at the beginning of the 3rd semester. The
application for this shall include the following:-
Topic of the Project: Project work plan in the 3rd Semester: Reason for doing the project outside: Institution/Organization where the project is to be done:
14
External Supervisor – Name: Designation: Qualifications: Experience:
Letter of consent of the External Supervisor as well as from the organization is to be obtained.
This application is to be vetted by the head of the department and based on the
decision taken the student is permitted to do the project outside the college.
Ragging
Ragging of any nature is a criminal and non-bailable offence. Involvement in
ragging shall lead to stringent punishment, including imprisonment as per the law
of the land. A student, whose involvement in ragging is established, shall be
summarily dismissed from the college. Each student of the Institute, along with
his/her parent, is required to give an undertaking in this regard and the same is to
be submitted at the time of registration.
Calculation of SGPA/CGPA
Semester Grade Point Average (SGPA) and Cumulative Grade Point Average
(CGPA) are calculated as follows.
SGPA = Σ(Ci×GPi)/ΣCi where Ci is the credit assigned for a course and GPi is the
grade point for that course. Summation is done for all courses registered by the
student in the semester. Here the failed courses are also accounted.
CGPA = Σ(Ci×GPi)/ΣCi where Ci is the credit assigned for a course and GPi is the
grade point for that course. Summation is done for all courses registered by the
student during all the semesters for which the CGPA is needed. Here the failed
courses are also accounted. CGPA of all courses passed may also be given.
Thiruvanthapuram Registrar 26-6-2015
KERALA TECHNOLOGICAL UNIVERSITY
ERNAKULAM – I CLUSTER
SCHEME AND SYLLABI FOR
M. Tech. DEGREE PROGRAMME IN
NETWORK ENGINEERING (2015 ADMISSION ONWARDS)
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 16
SCHEME AND SYLLABI FOR M. Tech. DEGREE PROGRAMME IN
NETWORK ENGINEERING SEMESTER-1
Exam Slot
Course No Name L-T-P Internal Marks
End Semester Exam
Credits Marks
Duration (hrs)
A 06NE6011 Theoretical Foundation in Computer Networking
4-0-0 40 60 3 4
B 06NE6021 Advanced Computer Networks
4-0-0 40 60 3 4
C 06NE6031 Wireless & Adhoc Networks
4-0-0 40 60 3 4
D 06NE6041 Cloud Computing Concepts
3-0-0 40 60 3 3
E 06NE6X51 Elective I 3-0-0 40 60 3 3 06NE6061 Research methodology* 1-1-0 100 0 0 2 06NE6071 Seminar I 0-0-2 100 0 0 2 06NE6081 Network Systems Lab 0-0-3 100 0 0 1
Total Credits 23
Elective – I
06NE6151 Web and Rich Internet Applications
06NE6251 Internetworking Technologies
06NE6351 Multicore Architecture & Programming
06NE6451 Linux Shell Scripting
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 17
SEMESTER-2 dddfgdfgdfgd
Exam Slot
Course No Name L-T-P Internal Marks
End Semester Exam
Credits Marks
Duration (hrs)
A 06NE6012 Design of Computer Networks
4-0-0 40 60 3 4
B 06NE6022 Foundations in Big Data Processing
3-0-0 40 60 3 3
C 06NE6032 Enterprise Devices & Networks
3-0-0 40 60 3 3
D 06NE6X42 Elective II 3-0-0 40 60 3 3 E 06NE6X52 Elective III 3-0-0 40 60 3 3 06NE6062 Mini Project 0-0-4 100 0 0 2 06NE6072 Network Simulation Lab 0-0-3 100 0 0 1
Credits 19
Elective – II Elective – III
06NE6142 Modern Concurrent Programming Paradigm
06NE6152 Cyber Physical Systems
06NE6242 Distributed Algorithms 06NE6252 Network Security
06NE6342 High Performance Networks 06NE6352 Advances in Storage Area Networks
06NE6442 Internet Routing Design 06NE6452 Next Generation Internetworking Protocol
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 18
SEMESTER-III sdf
Exam Slot
Course No Name L-T-P Internal Marks
End Semester Exam
Credits Marks
Duration (hrs)
A 06NE7X11 Elective IV 3-0-0 40 60 3 3 B 06NE7X21 Elective V 3-0-0 40 60 3 3 06NE7031 Seminar II 0-0-2 100 0 0 2 06NE7041 Project(Phase 1) 0-0-8 50 0 0 6
Credits 14
Elective – IV Elective – V
06NE7111 Big Data Analytics 06NE7121 Software Defined Networking
06NE7211 Concurrent Algorithms and Data Structures
06NE7221 Network Forensics
06NE7311 Social Network Analysis 06NE7321 Cloud Security
06NE7411 Intrusion Detection Systems 06NE7421 Green Computing
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 19
SEMESTER-IV sdf
Exam Slot
Course No Name L-T-P Internal Marks
End Semester Exam
Credits Marks
Duration (hrs)
06NE7012 Project(Phase 2) 0-0-21 100 0 0 12 Credits 12
Total Credits for all semesters 68
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 20
SEMESTER – I
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 21
Course No. Course Name L-T-P-
Credits Year
06NE6011 Theoretical Foundation in Computer Networking 4-0-0-4 2015 Prerequisites : Fundamentals of Algorithm Analysis Course Objectives :
Ability to recognize and formulate network flow problems Knowledge of basic and advanced network flow algorithms
Ability to design resolution approaches to solve non-standard network flow problems Syllabus : Fundamentals on Graph Theory, Network flow problems, Shortest Paths, Maximum Flows, Minimum Cost flows, Minimum Spanning Trees Course Outcome : On successful completion of this course
Know and formulate network flow problems Model decision problems as network flow problems Use base and advanced algorithms to solve network flow problems Ability to identify network flow models scope Ability to explain network flows models and algorithms Ability to learn state-of-art algorithms for network flow problems
Text Book : 1. Ravindra K. Ahuja, Thomas L. Magnanti, James B.Orlin, Network Flows – “Theory, Algorithms
and Applications”, Prentice Hall References :
2. Mokhtar S. Bazaraa, John J. Jarvis, Hanif D. Sherali, “Linear Programming And Network Flows”, John Wiley & Sons, 4th Edition,
3. Gunther Ruhe, Kluwer, “Algorithmic Aspects Of Flows In Networks”, Academic Publishers Group
4. Michael W. Lucas, “Network Flow Analysis”, , No Starch Press 5. Alexander Engau, Vdm Verlag Dr. Muller, “Semi-Simultaneous Flows In Multiple Networks”,
Aktiengesellschaft & Co. Kg 6. Wai-kai Che, John Wiley, “Theory Of Nets: Flows In Network”s, 7. Ulrich Derigs, “Programming In Networks And Graphs: On The Combinatorial Background
And Near-Equivalence Of Network Flow And Matching Algorithms”, 8. Ford L. R. Jr. , Robert G. Bland, Fulkerson D. R, “Flows In Networks”, Princeton University
Press. 9. Alexander Hall, Vdm Verlag Dr. Mueller E. K, “Scheduling And Flow-Related Problems In
Networks” 10. Pioro M, Routing, “Flow And Capacity Design In Communication And Computer Networks”,
Elsevier India Private Limited COURSE PLAN
COURSE NO:
06NE6011
COURSE TITLE: Theoretical Foundation in Computer Networking
(L-T-P :4-0-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
1
Fundamentals on Graph Theory- Network flow problems- Network representations- Complexity Analysis- Developing Polynomial time algorithms- Search Algorithms- Flow Decomposition algorithms
12
30%
2 Shortest Paths: Label Setting Algorithms – Dijkstra’s Algorithm- Dial’s implementation- Heap Implementation- Radix Heap Implementation
6
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 22
FIRST INTERNAL EXAMINATION
2
Shortest Paths : Label Correcting Algorithms – Generic Label Correcting algorithms- Special implementations of the modified label correcting algorithm- detecting negative cycles- All pairs shortest path problem
6
30%
3
Maximum Flows : Generic Augmenting path algorithm- Labeling algorithm and Max- Flow Min – cut theorem- Capacity Scaling Algorithm- Distance labels and layered networks- Generic pre flow push algorithm- FIFO pre flow push algorithm
8
SECOND INTERNAL EXAMINATION
3
Minimum Cost flows : Optimality conditions- Cycle canceling algorithm and the integrity property- Successive shortest path algorithm- Primal – dual algorithm- Out – of Kilter Algorithm- Capacity scaling algorithm- Cost scaling algorithm
4
40%
4
Minimum Spanning Trees – Kruskal’s algorithm- Prim’s Algorithm- Sollin’s Algorithm- Convex Cost Flows – Pseudo Polynomial time algorithm- polynomial time algorithm Generalized Flows – Augmented forest structures- determining potentials and flows for an augmented forest structure- generalized network simplex algorithm
12
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 23
Course No. Course Title L-T-P-
Credits Year
06NE6021 Advanced Computer Networks 4-0-0-4 2015 Prerequisites : Fundamentals of Computer Networks or Computer Networking programs Course Objectives :
To uncover and understand the current directions of computer networks from literature readings.
To encourage a performance perspective towards analysis of computer and communications networks.
To “fill-in” gaps in students’ networking knowledge Syllabus : Internet Protocol : IPv4 , IP Datagram Formats, Routing and Forwarding, Path Vectors and Policies, End-to-End Protocols, Flow Control, Congestion Control, Congestion-Avoidance Mechanisms Course Outcome : On successful completion of this course
Independently understand basic computer network technology. Identify the different types of network topologies and protocols. Enumerate the layers of TCP/IP and explain the function(s) of each layer. Identify the different types of network devices and their functions within a network Understand and building the skills of subnetting and routing mechanisms. Familiarity with the basic protocols of computer networks, and how they can be used to assist
in network design and implementation. Text Book :
1. The Internet and Its Protocols - A Comparative Approach by ADRIAN FARREL, Elsevier 2. Computer Networks – A Systems Approach by Larry L. Peterson and Bruce S. Davie, The
Morgan Kaufmann Series in Networking, Remote Procedure Call, References :
1. Data networks by D.Berteskas and R Gallagar, Printice Hall 2. Design and Analysis of Communication Networks By V Ahuja , McGraw Hill 3. Kerchenbaum A., “Telecommunication Network Design Algorithms”, Tata McGraw Hill 4. James D.McCabe, Network analysis, Architecture and Design, 2nd Edition, Elsevier, 2003. 5. An Engineering approach to computer Networking by S.Keshav, Pearson education 6. Network Algorithms by George Varghese, Morgan Kaufmann
COURSE PLAN
COURSE NO:
06NE6021
COURSE TITLE: Advanced Computer Networks
(L-T-P :4-0-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
1
Internet Protocol : IPv4 - IP Datagram Formats - Data and Fragmentation - Address Masks- Prefixes- and Subnetworks - Network Address Translation (NAT) - IP Switching and Routing - Local Delivery and Loopbacks - Address Resolution Protocol - Route Control and Recording – ICMP - Discovering Routers - Path MTU Discovery – Multicast - IP Version Six.
13
30%
2
Routing and Forwarding – CIDR - Building and Using a Routing Table - Router IDs- Numbered Links- and Unnumbered Links - Distributing Routing Information - Distance Vectors - Link State Routing
5
FIRST INTERNAL EXAMINATION
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 24
2
Path Vectors and Policies - Computing Paths– Routing Information Protocol – OSPF - OSPF – Intermediate System to Intermediate System - Border Gateway Protocol - Multicast Routing - Inter-Gateway Routing Protocol - Inter-Domain Routing Protocol
8
30%
3
End-to-End Protocols : Ports and Addresses - User Datagram Protocol - UDP Message Format - Transmission Control Protocol - Segment Format - Connection Establishment and Termination - Flow Control - Triggering Transmission
9
SECOND INTERNAL EXAMINATION
3
Silly Window Syndrome - Nagle’s Algorithm - Adaptive Retransmission - Karn/Partridge Algorithm - Remote Procedure Call – BLAST – CHAN – SELECT – SunRPC- Stream Control Transmission Protocol - Real-time Transport Protocol.
7
40%
4
Congestion Control : Packet-Switched Network - Connectionless Flows - Issues in Resource Allocation - Fair Resource Allocation - Queuing Disciplines – FIFO - Fair Queuing - TCP Congestion Control - Additive Increase/Multiplicative Decrease - Slow Start - Fast Retransmit and Fast Recovery - Congestion-Avoidance Mechanisms – DECbit - Random Early Detection - Source-Based Congestion Avoidance – Tahoe- Reno- and Vegas- QoS Application Requirements - Real-Time Audio - Taxonomy of Real-Time Applications - Approaches to QoS Support.
13
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 25
Course No. Course Title L-T-P-
Credits Year
06NE6031 Wireless & Adhoc Networks 4-0-0-4 2015 Prerequisites : Fundamentals of Wireless Network Course Objectives :
To develop an understanding of modern network architectures from a design and performance perspective.
To introduce the student to the major concepts involved in wide-area networks (WANs), local area networks (LANs) and Wireless LANs (WLANs).
To clarify network terminology. Syllabus : Ad hoc Wireless Networks, Routing Protocols for Ad Hoc Wireless Networks, Multicast Routing in Ad hoc Wireless Networks, Transport Layer and Security Protocols, Security in Ad hoc Wireless Networks, Quality of Service and Energy Management in Ad hoc Wireless Networks Course Outcome : On successful completion of this course
Describe the unique issues in ad-hoc/sensor networks. Describe current technology trends for the implementation and deployment of wireless ad-
hoc/sensor networks. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-
hoc/sensor networks. Discuss the challenges in designing routing and transport protocols for wireless
Adhoc/sensor networks. Comprehend the various sensor network Platforms, tools and applications
Text Books : 1. C. Siva Ram Murthy & B. S. Manoj: Ad hoc Wireless Networks, 2nd Edition, Pearson
Education, 2011
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 26
References : 1. Imielinski T. and Korth H.F., “Mobile Computing”, Kluwer Academic Publishers, 1996. 2. William Stallings, “Wireless Communications and Networks”, Prentice Hall, 2004. 3. Clint Smith. P.E., and Daniel Collins, “3G Wireless Networks”, 2nd Edition, Tata
McGraw Hill, 2007. 4. Carlos de Morais Cordeiro and Dharma Prakash Agrawal, “Ad Hoc & Sensor Networks:
Theory and Applications”, World Scientific, 2007. 5. Toh C. K., “Ad Hoc Mobile Wireless Networks Protocols and Systems”, Prentice Hall, PTR,
2001. 6. Yi-Bing and Imrich Chlamtac, “Wireless and Mobile Networks Architectures”, John Wiley &
Sons, 2001. 7. Vijay. K. Garg, “Wireless Communication and Networking”, Morgan Kaufmann
Publishers 8. Ian F. Akyildiz and Mehmet Can Vuran, Wirless Sensor Networks, Wiley
COURSE PLAN COURSE
NO: 06NE6031
COURSE TITLE: Wireless & Adhoc Networks (L-T-P : 4-0-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
1
Ad hoc Wireless Networks: Introduction- Issues in Ad hoc Wireless Networks- Ad hoc Wireless Internet; MAC Protocols for Ad hoc Wireless Networks: Introduction- Issues in Designing a MAC Protocol- Design Goals of MAC Protocols- Classification of MAC protocols- Contention-Based Protocols- Contention-Based Protocols with Reservation Mechanisms- Contention-Based Protocols with Scheduling Mechanisms- MAC Protocols that Use Directional Antennas
13
30%
2
Routing Protocols for Ad Hoc Wireless Networks: Introduction- Issues in Designing a Routing Protocol for Ad hoc Wireless Networks; Classification of Routing Protocols; Table Driven Routing Protocols; On- Demand Routing Protocols- Hybrid Routing Protocols- Hierarchical Routing Protocols and Power-Aware Routing Protocols
5
FIRST INTERNAL EXAMINATION
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 27
2
Multicast Routing in Ad hoc Wireless Networks: Introduction- Issues in Designing a Multicast Routing Protocol- Operation of Multicast Routing Protocols- An Architecture Reference Model for Multicast Routing Protocols- Classifications of Multicast Routing Protocols- Tree-Based Multicast Routing Protocols and Mesh-Based Multicast Routing Protocols.
8
30%
3
Transport Layer and Security Protocols for Ad hoc Networks: Introduction- Issues in Designing a Transport Layer Protocol; Design Goals of a Transport Layer Protocol; Classification of Transport Layer Solutions; TCP over Transport Layer Solutions; Other Transport Layer Protocols for Ad hoc Networks
9
SECOND INTERNAL EXAMINATION
3 Security in Ad hoc Wireless Networks- Issues and Challenges in Security Provisioning- Network Security Attacks- Key Management and Secure Touting Ad hoc Wireless Networks.
7
40%
4
Quality of Service and Energy Management in Ad hoc Wireless Networks Introduction- Issues and Challenges in Providing QoS in Ad hoc Wireless Networks- Classification of QoS Solutions- MAC Layer Solutions- Network Layer Solutions; Energy Management in Ad hoc Wireless Networks: Introduction- Need for Energy Management in Ad hoc Wireless Networks- Classification of Energy Management Schemes- Battery Management Schemes- Transmission Management Schemes- System Power Management Schemes.
13
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 28
Course No. Course Title L-T-P-
Credits Year
06NE6041 Cloud Computing Concepts 3-0-0-3 2015 Prerequisites : Distributed Computing Course Objectives :
To impart fundamental concepts in the area of cloud computing To impart knowledge in applications of cloud computing
Syllabus : Fundamental Cloud Computing, Fundamental Cloud Security, Cloud Infrastructure Mechanisms, Specialized Cloud Mechanisms, Cloud Architectures, Cloud Delivery Models Course Outcome : On successful completion of this course
Understanding the systems, protocols and mechanisms to support cloud computing Develop applications for cloud computing Understanding the hardware necessary for cloud computing Design and implement a novel cloud computing application
Text Books : 1. Thomas Erl, Zaigham Mahmood, and Ricardo Puttini, Cloud Computing : Concepts,
Technology & Architecture, Prentice Hall, 2013. ISBN-13: 978-0-13-338752-0 References :
1. John W.Rittinghouse and James F.Ransome, “Cloud Computing: Implementation, Management, and Security”, CRC Press, 2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”,TMH, 2009.
3. Kumar Saurabh, “Cloud Computing – insights into New-Era Infrastructure”, Wiley India,2011.
4. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud” O'Reilly
5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan Kaufmann, 2005.
6. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing – A Business Perspective on Technology and Applications”, Springer.
7. Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure Cloud Computing”, Wiley – India, 2010.
8. Rajkumar Buyya, Christian Vecchiola, S.Thamarai Selvi, ‘Mastering Cloud Computing”, TMGH,2013.
9. Gautam Shroff,Enterprise Cloud Computing,Cambridge University Press,2011 10. Michael Miller, Cloud Computing,Que Publishing,2008 11. Nick Antonopoulos, Cloud computing,Springer Publications,2010
COURSE PLAN COURSE
NO: 06NE6041
COURSE TITLE: Cloud Computing Concepts
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Fundamental Cloud Computing : Business Drivers - Technology Innovations - Basic Concepts and Terminology - Roles and Boundaries - Cloud Characteristics - Cloud Delivery Models - Cloud Deployment Models. Cloud-Enabling Technology - Broadband Networks and Internet Architecture - Data Center Technology - Virtualization Technology - Web Technology - Multitenant Technology - Service Technology.
13 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 29
2 Fundamental Cloud Security : Basic Terms and Concepts - Threat Agents - Cloud Security Threats - Additional Considerations
5
FIRST INTERNAL EXAMINATION
2 Cloud Infrastructure Mechanisms : Logical Network Perimeter - Virtual Server - Cloud Storage Device - Cloud Usage Monitor - Resource Replication -
8
30%
3
Specialized Cloud Mechanisms : Automated Scaling Listener - Load Balancer - SLA Monitor- Pay-Per-Use Monitor - Audit Monitor -Failover System – Hypervisor - Resource Cluster - Multi-Device Broker - State Management Database
9
SECOND INTERNAL EXAMINATION
3
Cloud Architectures : Workload Distribution Architecture - Resource Pooling Architecture - Dynamic Scalability Architecture - Elastic Resource Capacity Architecture - Service Load Balancing Architecture - Cloud Bursting Architecture - Elastic Disk Provisioning Architecture - Redundant Storage Architecture - Hypervisor Clustering Architecture - Load Balanced Virtual Server Instances Architecture - Non-Disruptive Service Relocation Architecture - Zero Downtime Architecture - Cloud Balancing Architecture - Resource Reservation Architecture - Dynamic Failure Detection and Recovery Architecture - Bare-Metal Provisioning Architecture - Rapid Provisioning Architecture - Storage Workload Management Architecture
7
40%
4
Cloud Delivery Models The Cloud Provider Perspective : Building IaaS Environments - Equipping PaaS Environments - Optimizing SaaS Environments. Cloud Delivery Models The Cloud Consumer Perspective : Working with IaaS Environments - Working with PaaS Environments - Working with SaaS Services. Cost Metrics and Pricing Models : Business Cost Metrics - Client Database - Cloud Usage Cost Metrics - Network Usage - Server Usage - Cloud Storage Device Usage - Cloud Service Usage
13
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 30
Course No. Course Title L-T-P-
Credits Year
06NE6061 Research methodology 1-1-0-2 2015 Prerequisites : Nil Course Objectives :
Understand some basic concepts of research and its methodologies Identify appropriate research topics
Syllabus : Research process, Data collection –Data Analysis, Basic Statistical measures, Ethics of Research, Statistical test of hypothesis, Guidelines for writing a PhD thesis Course Outcome : On successful completion of this course, the student should
Select and define appropriate research problem and parameters Prepare a project proposal(to undertake a project) Organize and conduct research (advanced project) in a more appropriate manner Write a research report and thesis Write a research proposal (grants)
Text Books : 1. Research Methodology By R Panneerselvam - Prentice Hall International 2004 - Eleventh
printing, 2013. 2. Research Methodology By CR Kothari - New Age International publishers Second Revised
Edition, Reprint 2013. References :
1. A beginners guide to uncertainty of measurement by Stephanie Bell, NPL Publishing 2. Research Methodology By Francis C. Dane, Brooks/Cole Publishing Company, California.
COURSE PLAN COURSE
NO: 06NE6061
COURSE TITLE: Research methodology (L-T-P : 1-1-0)
CREDITS:2
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction - Meaning of Research- Objectives- Motivation- Types of Research. Research process- Problem definition-Objectives of Research- Research design- Data collection –Data Analysis –Interpretation of Results- Validation of Results. Formulation of a Research problem.
13
30%
2 Basic Statistical measures - Measures of central tendency – Arithmetic Mean- Median- Mode- Geometric Mean- Harmonic Mean
5
FIRST INTERNAL EXAMINATION
2 Measures of variation – Range- Mean Deviation- Quartile Deviation- Coefficient of Variation and Standard Deviation- Measures of skewness.
8 30%
3 Ethics of Research- Scientific Misconduct- Forms of Scientific Misconduct. Measurement of errors
9
SECOND INTERNAL EXAMINATION
3 Measurement uncertainty. Statistical test of hypothesis- T-test- Z Test- F-test- Chi-square test.
7 40%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 31
4
Guidelines for writing a PhD thesis - Guidelines for writing the abstract- introduction- methodology- results and discussion- conclusion sections of a manuscript. Impact factor-Validity- Merits- limitations. Other measurements of impact. h-index-advantages- criticism of h-index-modification of h-index- Intellectual property rights (IPR)- forms of IPR- patents-copyrights-Trademarks-Industrial design-geographical indication.
13
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 32
Course No. Course Title L-T-P-Credits Year
06NE6151 Web and Rich Internet Applications 3-0-0-3 2015
Prerequisites : Fundamentals of Web Application Course Objectives :
Understand the various steps in designing a creative and dynamic website. Syllabus : Introduction: From Browsers to Rich Clients – browser drawbacks, A solution – rich clients, Rich clients today. Course Outcome : On successful completion of this course
Clear understanding of hierarchy of objects in HTML and XML. Finally they can create good, effective and customized websites. Know regarding internet related technologies. Systematic way of developing a website. Design dynamic and interactive web pages by embedding Java Script code in HTML. Know the advantages and use of Web services.
Text Book : 1. HTML 5 Up and Running, Mark Pilgrim, O’REILLY| GOOGLE Press, 2010. 2. Professional AJAX, Nicholas C Zakas et al, 2nd Edition, Wrox publications,2007.
References : 1. Professional Web 2.0 Programming, Eric Van Der VList et al, Wrox Publications, 2007 2. SOA: Concepts, Technology and Design, Thomas Erl, Pearson, 2005
COURSE PLAN COURSE
NO: 06NE6151
COURSE TITLE: Web and Rich Internet Applications (L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction: From Browsers to Rich Clients – browser drawbacks- A solution – rich clients- Rich clients today. Web 1.0: HTML- URLs and HTTP- The WEB Model and REST – resources- representations- state- transfer – using HTTP methods. XML- XPATH and XSLT – XML Support in browsers- XPath support in browsers- XSLT support in Browsers.
9
30%
2
HTML 5: Detecting HTML 5 features – Canvas- video- local storage- web workers- offline applications- geolocation- placeholders- input types. What does it all mean – doctype- root- headers- articles- dates and times- navigation and footers.
5
FIRST INTERNAL EXAMINATION
2
Let’s call it a drawing surface – Simple shapes- canvas- Paths- texts- gradients and images. The past- present and future of local storage for web applications- A Form of madness – place holders- autofocus fields- email- web addresses- numbers as spinboxes and sliders- date and color pickers- search boxes.
4
30%
3 AJAX-I: Basic communication techniques – XHR- AJAX with images- Dynamic script loading- Cache control.
5
SECOND INTERNAL EXAMINATION
3
AJAX patterns: Communication control patterns – predictive fetch- page preloading- submission throttling- periodic refresh- multi-stage download. Fallback patterns. AJAX libraries – JQuery.
4 40%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 33
4
AJAX-II: Syndication with RSS and Atom – RSS- Atom- XParser- Creating a news ticker- Web search with RSS. JSON – Array- object- mixing literals- syntax- encoding/decoding- JSON versus XML- server-side JSON tools. COMET: HTTP streaming – request delays- file modification example- using Iframes- browser-specific approaches- server-sent DOM events- connection management and server-side support. Mashups and Web services: The rise of mashups- geocoding- Google maps API. Introduction to Service Oriented Architecture- Combining protocols to build Web services – clarifying web services- REST Services- WS-* Web services using SOAP and WSDL- REST vs WS-* services.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 34
Course No. Course Title L-T-P-
Credits Year
06NE6251 Internetworking Technologies 3-0-0-3 2015 Prerequisites : Network Fundamentals Course Objectives :
Ability to understand socket programming. Learn about routing sockets
Syllabus: Introduction to Socket Programming – Overview of TCP/IP Protocols, Introduction to SCTP, Routing sockets, Broadcasting, Multicasting, Advanced UDP sockets Course Outcome : On successful completion of this course
Implementation of End-to-End protocols Text Book :
1. D.E. Comer, “Internetworking with TCP/IP Vol- III”, (BSD Sockets Version), Second Edition, Pearson Education, 2003.
2. W. Richard Stevens, “Unix Network Programming Vol-I”, Second Edition, Pearson Education, 1998.
References : 1. Michael Donahoo, Kenneth Calvert, “TCP/IP Sockets in C, A practical guide for programmers”,
Second Edition, Elsevier, 2009 2. Forouzan, “ TCP/IP Protocol Suite” Second Edition, Tata MC Graw Hill, 2003.
COURSE PLAN COURSE
NO: 06NE6251
COURSE TITLE: Internetworking Technologies
(L-T-P : 3-1-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to Socket Programming – Overview of TCP/IP Protocols –Introduction to Sockets – Iterative TCP programming – Iterative UDP programming – Concurrent programming – fork and exec - I/O multiplexing – I/O Models – select function – shutdown function – TCP echo Server (with multiplexing) – poll function – TCP echoClient (with Multiplexing) Multiplexing TCP and UDP sockets- Threaded servers – thread creation and termination – TCP echo server using threads – Mutexes – condition variables
9
30%
2
Introduction to SCTP- Interface Modules – SCTP functions- sctp_bindx- sctp_connectx- sctp_getpaddrs- sctp_freepaddrs- sctp_getladdrs- sctp_freeladdrs- sctp_sendmsg-sctp_recvmsg- sctp_opt_info- sctp_peeloff- shutdown – Notifications - Socket options – getsockopt and setsockopt functions- Socket states – generic socket options – IP socket options – ICMP socket options – TCP socket options -.SCTP socket options – fcntl functions.
5
FIRST INTERNAL EXAMINATION
2
Routing sockets – Datalink socket address structure – Reading and writing – sysctl operations – get_ifi_info function – Interface name and index functions- Key Management sockets – Reading and writing – Dumping Security Association Database – Creating static Security Association – Dynamically maintaining SA’s
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 35
3
Broadcasting – Broadcast addresses – Unicast versus Broadcast – (Client) Application development for broadcasting – Race conditions – Multicasting – Multicast addresses- Multicasting versus Broadcasting on a LAN – Multicasting on a WAN – Source specific Multicast – Multicast socket options – mcast_join- (Client) Application development for multicasting – Receiving IP multicast infrastructure session announcements – Sending and receiving.
5
SECOND INTERNAL EXAMINATION
3
Advanced UDP sockets – Receiving flags- Destination IP address and Interface index – Datagram truncation – Using UDP instead of TCP – Adding reliability to UDP – Binding interface addresses – Concurrent UDP servers – Advanced SCTP sockets
4
40%
4
Partial delivery – Notifications – Unordered data – Binding a subset of addresses – Determining peer and local address information – Finding an association Id given an IP address – Heartbeating and Address failure – Peeling off an association – Controlling timing – Using SCTP instead of TCP – Out of band data – Signal driven I/O.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 36
Course No. Course Title L-T-P-Credits Year 06NE6351 Multicore Architecture & Programming 3-0-0-3 2015
Prerequisites : Students are expected to know the C language, and know basics on computer architecture. Course Objectives :
how to organize the computations of the threads in so that they work together and perform the required computations efficiently, making good use of the available hardware resources.
To expose the students to the problems related to multiprocessing
To understand the different types of multi core architectures
Syllabus : Multi-core Architecture, Fundamental Concepts of Parallel Programming, Threading and Parallel Programming, OpenMP, Performance oriented Programming, GPU programming Course Outcome : On successful completion of this course
Point out the salient features of different multi-core architectures and how they exploit parallelism.
Knowledge on architecture of GPUs, warehouse-scale computers and embedded processors. Text Book :
1. Shameem Akhter and Jason Roberts, Multicore Programming , Increased Performance through Software Multi-threading, Intel Press , 2006.
2. Jason Sanders, Jason Sanders, CUDA by Example: An Introduction to General-Purpose GPU Programming, Pearson, 2010
References : 1. John L. Hennessey and David A. Patterson, “ Computer architecture – A quantitative
approach”, Morgan Kaufmann/Elsevier Publishers, 5th. edition, 2011. 2. Peter S. Pacheco, “An introduction to parallel programming”, Morgan Kaufmann, 2011. 3. Michael J Quinn, “Parallel programming in C with MPI and OpenMP”, Tata McGraw Hill,
2003. 4. Shameem Akhter and Jason Roberts, “Multi-core Programming”, Intel Press, 2006. 5. David E. Culler, Jaswinder Pal Singh, “Parallel computing architecture : A hardware/
software approach” , Morgan Kaufmann/Elsevier Publishers, 2004. 6. Wesley Petersen and Peter Arbenz, “Introduction to Parallel Computing”, Oxford University
Press, 2004. COURSE PLAN
COURSE NO:
06NE6351 COURSE TITLE: Multicore Architecture & Programming
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to Multi-core Architecture: Motivation for Concurrency in software- Parallel Computing Platforms- Parallel Computing in Microprocessors- Differentiating Multi-core Architectures from Hyper- Threading Technology- Multi-threading on Single-Core versus Multi-Core Platforms Understanding Performance- System Overview of Threading: Defining Threads- System View of Threads- Threading above the Operating System- Threads inside the OS- Threads inside the Hardware - Case studies – Intel Multi-core architecture – SUN CMP architecture – IBM cell processor – NVIDIA GPU – AMD APU.
9 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 37
2
Fundamental Concepts of Parallel Programming: Designing for Threads- Task Decomposition- Data Decomposition- Data Flow Decomposition- Implications of Different Decompositions- Challenges- Parallel Programming Patterns- A Motivating Problem: Error Diffusion- Analysis of the Error Diffusion Algorithm- An Alternate Approach: Parallel Error Diffusion- Other Alternatives.
5
FIRST INTERNAL EXAMINATION
2
Threading and Parallel Programming Constructs: Synchronization- Critical Sections- Deadlock- Synchronization Primitives- Semaphores- Locks- Condition Variables- Messages- Flow Control- based Concepts- Fence- Barrier- Implementation-dependent Threading Features. Threading APIs
4
30%
3
OpenMP: A Portable Solution for Threading: Challenges in Threading a Loop- Loop-carried Dependence- Data-race Conditions- Managing Shared and Private Data- Loop Scheduling and Portioning- Effective Use of Reductions- Minimizing Threading Overhead- Work-sharing Sections
5
SECOND INTERNAL EXAMINATION
3
Performance oriented Programming- Using Barrier and No wait- Interleaving Single-thread and Multi-thread Execution- Data Copy-in and Copy-out- Protecting Updates of Shared Variables- Intel Task queuing Extension to OpenMP- OpenMP Library Functions- OpenMP Environment Variables- Compilation- Debugging- performance.
4
40%
4
GPU programming : The CUDA standard. Kernels and host-device communication. Shared and constant memory- synchronicity and performance. GPU coding restrictions. Overview of Open CL- Open Acc
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 38
Course No. Course Title L-T-P-Credits Year 06NE6451 Linux Shell Scripting 3-0-0-3 2015
Prerequisites : Operating Systems Concepts Course Objectives :
Perform system administration tasks to manage files, software, storage, users, processes and services.
Write shell scripts for common shell environment. Syllabus : Linux Basics, Managing Users, Boot Loaders, Core System Services, File System, Shell Scripting Basics, Script Control Course Outcome : On successful completion of this course
Ability to perform system administration tasks Ability develop and execute Shell Scripts as per the system level requirements
Text Book : 1. Richard Blum, Linux Command Line and Shell Scripting Bible, Wiley Publishing, Inc 2. WALE SOYINKA, Linux Administration:A Beginner’s Guide, Fifth Edition, McGraw-Hill
References :
1. Linux System Administration Solve Real-life Linux Problems Quickly by Tom Adelstein, Bill Lubanovic. O'Reilly Media, March 2007
2. Essential System Administration : Tools and Techniques for Linux and Unix Administration ( 3rd Edition), Ellen Frisch
COURSE PLAN COURSE
NO: 06NE6451
COURSE TITLE: Linux Shell Scripting (L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Linux Basics: Managing Users- The /etc/passwd File- The /etc/shadow File- The /etc/group File- Pluggable Authentication Modules (PAM)- Commands - useradd- groupadd- usermod-groupmod-userdel-groupdel.Files- File Types- File Ownership- and File Permissions- File Management and Manipulation Commands- Process management commands
9
30%
2
Boot Loaders: GRUB and LILO- Bootstrapping- Init Process- rc Scripts. File System : i-Nodes - Superblocks- ext3 and ReiserFS- Overview of Partitions-Creating Partitions and Logical Volumes
5
FIRST INTERNAL EXAMINATION
2
Core System Services : The /etc/inittab File- The /etc/xinetd.conf File-Enabling/Disabling a Service-Invoking rsyslogd- Log Message Classifications-Format of /etc/rsyslog.conf-The crontab File-Editing the crontab File
4
30%
3
Shell Scripting Basics : Creating a Script File- Using Variables-Redirecting Input and Output- Pipes-Performing Math-Exiting the Script.Using Structured Commands : The if-then-else Statement- Advanced if-then Features- The case Command-The for Command- The C-Style for Command- The while Command- The until Command- Looping on File Data- Controlling the Loop
5
SECOND INTERNAL EXAMINATION
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 39
3
Handling User Input : Command Line Parameters- Special Parameter Variables- Working With Options- Understanding Input and Output- Redirecting Output in Scripts- Redirecting Input in Scripts- Using Temporary Files- Logging Messages
4
40%
4
Script Control : Handling Signals- Running Scripts in Background Mode- Running Scripts without a Console- Job Control-nice command- Scheduling a job using the at command- Using the batch command- Starting your scripts at boot. Text Manipulation: The sed editor- The gawk program
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 40
Course No. Course Title L-T-P-
Credits Year
06NE6071 Seminar I 0-0-2-2 2015 Each student shall present a seminar on any topic of interest related to the core / elective courses offered in the first semester of the M. Tech. Programme. He / she shall select the topic based on the References: from reputed International Journals, preferably IEEE journals. They should get the paper approved by the Programme Co-ordinator / Faculty member in charge of the seminar and shall present it in the class. Every student shall participate in the seminar. The students should undertake a detailed study on the topic and submit a report at the end of the semester. Marks will be awarded based on the topic, presentation, participation in the seminar and the report submitted. Encourage students to convert these seminar topics into a good survey paper or Technical paper.
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 41
Course No. Course Title L-T-P-
Credits Year
06NE6081 Network Systems Lab 0-0-3-1 2015 Prerequisites : Computer Networks Course Objectives :
This course teaches an understanding of networks and systems design through hands-on construction and experimentation with real-world implementations.
Syllabus : 1. Familiarization of Wireshark 2. Detailed Study of protocols in TCP/IP model using Wireshark 3. Detailed Study of Subnetting and Supernetting 4. Familiarization of following Linux/Unix network commands
a. Ping b. traceroute c. arp d. route e. netstat f. About /etc folder g. IP Setting /Subnet Masking h. Setting up Hostname/Setting local name resolution
7. Deploy Web, Postgre SQL, Email, DNS, DHCP, SSH FTP,SAMBA and Proxy Servers. Deploy it using virtual machines.
8. Implement LDAP authentication server. Deploy it using virtual machines. 9. Build your own ISP. It should include a DNS, DHCP, Leased Line, PPP, Webserver, Internet
Backbone with appropriate routing protocols. Experiment may be implemented using real systems/Simulators
10. Develop your own LAN with WAN for offshore connectivity. It should employ a firewall/proxy to redirect all external traffic. Use CIDR for forming departments. Experiment may be implemented using real systems/Simulators
11. Network administration and defence a. Measuring Internet topology with BGP Updates b. Characterizing traffic aggregates with Netflow c. Analyzing packet-level traffic with tcpdump
12. Build your own firewall using IPTables. 13. Configure a Distributed Computing Cluster using MPI. Deploy it using virtual machines. 14. Configure a Distributed File System using Hadoop. Deploy it using virtual machines. 15. Familiarization on Open Stack Cloud Computing Tool 16. Familiarization of Open Shift Cloud Computing Tool 17. Familiarization of Google App Engine 5. Socket Programming Experiments on
a. TCP Echo Server, TCP Echo Client b. UDP Echo server, UDP Echo Client c. File Server d. Broadcast, Multicast e. Simple Network Time Protocol f. TCP Iterative Server g. TCP Concurrent Server
Course Outcome : On successful completion of this course
Will Acquire hands on experience on deploying different network and server services. References :
1. WALE SOYINKA, Linux Administration:A Beginner’s Guide, Fifth Edition, McGraw-Hill 2. Tom Adelstein, Bill Lubanovic , Linux System Administration, O’Reilly
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 42
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 43
SEMESTER – II
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 44
Course No. Course Title L-T-P-
Credits Year
06NE6012 Design of Computer Networks 4-0-0-4 2015 Prerequisites : Computer Networks Course Objectives :
To obtain knowledge on major protocols used in computer networks for the design of LAN, WAN and WLAN systems
To analyse and resolve all issues in implementing the selected protocols at LAN, WAN and WLAN designs
To apply the detailed knowledge and understanding of secure network architectures for the design and implementation of firewalls
Syllabus : Overview of Analysis, Architecture and Design Process, Requirement Analysis Process, Developing the requirements specification Individual and Composite Flows, Architecture and design, Design Concepts, Network Management Architecture, Design Concepts. Course Outcome : On successful completion of this course
analyse the use of models for performance measures and performance prediction of advanced data networks;
demonstrate practical ability to design and setup LANs, WANs, and wireless LANs using standard protocols and typical hardware;
make recommendations for network performance improvements; demonstrate practical skills in setting up TCP/IP connections and routing configurations for
different environments; Text Book :
1. Network Analysis, Architecture, and Design By James D. McCabe, Morgan Kaufmann, Third Edition, 2007.ISBN-13: 978-0123704801
References : 1. Computer Networks: A Systems Approach by Larry L. Peterson, Bruce S. Davie - 2007,
Elsevier Inc. 2. Top-down Network Design: [a Systems Analysis Approach to Enterprise Network Design] By
Priscilla Oppenheimer, Cisco Press , 3rd Edition, ISBN-13: 978-1-58720- 283-4 ISBN-10: 1-58720-283-2
3. Integrated Management of Networked Systems: Concepts, Architectures, and Their Operational Application (The Morgan Kaufmann Series in Networking), Heinz-Gerd Hegering, Sebastian Abeck, and Bernhard Neumair, 1999.
4. “Network Design and Management” – by Steven T.Karris, Orchard publications, Second edition, Copyright 2009, ISBN 978-1-934404-15-7
5. “Network Design, Management and Technical Perspective”, Teresa C. Mann-Rubinson and Kornel Terplan, CRC Press, 1999
6. “Ethernet Networks-Design, Implementation, Operation and Management by Gilbert Held,John Wiley and sons, Fourth Edition
7. James Kurose and Keith Ross, “Computer Networking: A Top-Down Approach Featuring theInternet”, 1999
COURSE PLAN COURSE
NO: 06NE6012
COURSE TITLE: Design of Computer Networks
(L-T-P : 4-0-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 45
1
Overview of Analysis, Architecture and Design Process-System Methodology, Service methodology- Service Description - Service characteristics - Performance Characteristics -Network supportability - Requirement analysis – User Requirements – Application Requirements – Device Requirements – Network Requirements – Other Requirements - Requirement specification and map.
9
30%
2
Requirement Analysis Process – Gathering and Listing Requirements- Developing service metrics – Characterizing behavior – Developing RMA requirements – Developing delay Requirements - Developing capacity Requirements - Developing supplemental performance Requirements – Requirements mapping
5
FIRST INTERNAL EXAMINATION
2
Developing the requirements specification Individual and Composite Flows – Critical Flows - Identifying and developing flows – Data sources and sinks – Flow models- Flow prioritization – Flow specification algorithms – Example Applications of Flow Analysis
4
30%
3
Architecture and design – Component Architectures – Reference Architecture – Architecture Models – System and Network Architecture – Addressing and Routing Architecture – Addressing and Routing Fundamentals – Addressing Mechanisms – Addressing Strategies – Routing Strategies
5
SECOND INTERNAL EXAMINATION
3
Network Management Architecture – Network Management Mechanisms Performance Architecture – Performance Mechanisms – Security and Privacy Architecture – Planning security and privacy Mechanisms
4
40%
4
Design Concepts – Design Process - Network Layout – Design Traceability – Design Metrics – Logical Network Design – Topology Design – Bridging- Switching and Routing Protocols- Physical Network Design – Selecting Technologies and Devices for Campus and Enterprise Networks – Optimizing Network Design
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 46
Course No. Course Title L-T-P-
Credits Year
06NE6022 Foundations in Big Data Processing 3-0-0-3 2015 Prerequisites : NIL Course Objectives :
The course provides an introduction to Data Science. Syllabus : Introduction to KDD process, Association Rule Mining , Classification vs. Prediction, Support Vector Machines , Cluster Analysis,Hadoop Course Outcome : On successful completion of this course
Understand basic concepts in data mining Learn how to map data mining concepts to big data streams Fundamental knowledge in Big data tool
Text Book : 1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques” Second Edition,
Elsevier, Reprinted 2008. References :
1. K.P. Soman, Shyam Diwakar and V. Ajay, “Insight into Data mining Theory and Practice”, Easter Economy Edition, Prentice Hall of India, 2006.
2. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice Hall of India, 2006.
3. BERSON, ALEX & SMITH, STEPHEN J, Data Warehousing, Data Mining, and OLAP, TMH Pub. Co. Ltd, New Delhi, 2012
4. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”, Pearson Education, 2007
5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012. 6. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.
COURSE PLAN COURSE
NO: 06NE6022
COURSE TITLE: Foundations in Big Data Processing
(L-T-P : 3-0-0)
CREDITS:4
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to KDD process – Knowledge Discovery from Databases - Need for Data Preprocessing – Data Cleaning – Data Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation.Association Rule Mining - Mining Frequent Itemsets with and without Candidate Generation - Mining Various Kinds of Association Rules - Constraint- Based Association Mining.
9
30%
2
Classification vs. Prediction – Data preparation for Classification and Prediction – Classification by Decision Tree Induction – Bayesian Classification – Rule Based Classification
5
FIRST INTERNAL EXAMINATION
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 47
2
Support Vector Machines – Associative Classification – Lazy Learners – Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the Accuracy of a Classifier or Predictor. Cluster Analysis: - Types of Data in Cluster Analysis- A Categorization of Major Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based Methods – Model-Based Clustering Methods
4
30%
3
Clustering High- Dimensional Data – Constraint- Based Cluster Analysis – Outlier Analysis. Data format – analyzing data with Hadoop – scaling out – Hadoop streaming – Hadoop pipes.
5
SECOND INTERNAL EXAMINATION
3
Design of Hadoop distributed file system (HDFS) – HDFS concepts – Java interface – data flow- Data Ingest with Flume and Sqoop. Hadoop I/O – data integrity – compression – serialization – Avro – file-based data structures- MapReduce workflows – unit tests with MRUnit – test data and local tests – anatomy of MapReduce job run – classic Map-reduce – YARN – failures in classic Map-reduce and YARN
9
40%
4
job scheduling – shuffle and sort – task execution – MapReduce types – input formats – output formats Introduction to Hbase- Introduction to Cassandra- Introduction to Pig- Hive – data types and file formats – HiveQL data definition – HiveQL data manipulation – HiveQL queries.
4
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 48
Course No. Course Title L-T-P-
Credits Year
06NE6032 Enterprise Devices & Networks 3-0-0-3 2015 Prerequisites : Cloud computing Course Objectives :
To attain basic ideas and principles in data center design and management. Syllabus : Introduction to Cloud Networking, Switch Fabric Technology , Cloud Data Center Networking Topologies , Data Center Evolution, Cloud Data Center Networking Topologies, Server Virtualization and Networking, Storage Networks , Software-Defined Networking Course Outcome : On successful completion of this course
Apply the fundamental concepts in datacenters to understand the tradeoffs in power, efficiency and cost.
Discuss system virtualization and outline its role in enabling the cloud computing system model.
Text Book : 1. Gary Lee, “Cloud Networking - Understanding Cloud-based Data Center Networks”, Elsevier,
2014 References :
1. COURSE PLAN
COURSE NO:
06NE6032
COURSE TITLE: Enterprise Devices & Networks
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to Cloud Networking: Networking Basics- The network stack- Packets and frames- Network equipment- Interconnect- Cloud Data Center- Cloud Networking- Characteristics of Cloud Networking- Ethernet usage- Virtualization- Convergence- Scalability- Software. Data Center Evolution: Mainframes to the Cloud: The Data Center Evolution- Computer Networks- Ethernet- Enterprise versus Cloud Data Centers- Movement to the Cloud.
9
30%
2
Switch Fabric Technology: Switch Fabric Architecture Overview- Switch Fabric Topologies- Congestion Management- Flow Control- Traffic Management- Switch Chip Architecture Examples
5
FIRST INTERNAL EXAMINATION
2
Cloud Data Center Networking Topologies: Traditional Multitiered Enterprise Networks- Data Center Network Switch Types, Flat Data Center Networks, Rack Scale Architectures, Network Function Virtualization.
4
30%
3
Data Center Networking Standards: Ethernet Data Rate Standards, Virtual Local Area Networks- Data Center Bridging- Improving Network Bandwidth- Remote Direct Memory Access.
5
SECOND INTERNAL EXAMINATION
3
Server Virtualization and Networking: VM Overview- Virtual Switching- PCI Express- Edge Virtual Bridging- VM Migration. Network Virtualization: Multi-tenant Environments- Traditional Network Tunneling Protocols-
4 40%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 49
VXLAN- NVGRE- Tunnel Locations- Load Balancing
4
Storage Networks: Storage Background- Advanced Storage Technologies- Storage Communication Protocols- Network Convergence- Software-Defined Storage- Storage in Cloud Data Centers. Software-Defined Networking: Data Center Software Background- OpenStack- OpenFlow- Network Function Virtualization- SDN Deployment.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 50
Course No.
Course Name L-T-P-
Credits Year
06NE6142 Modern Concurrent Programming Paradigm 3-0-0-3 2015
Prerequisites : NIL Course Objectives :
The course is designed for people who want to gain expertise in their understanding of concurrent programming paradigm.
Syllabus : Design Patterns and MapReduce, Summarization Patterns, Filtering Patterns, Data Organization Patterns, Join Patterns, Metapatterns, Input and Output Patterns, Erlang , Fundamentals on Erlang Programming, Concurrent Programming Course Outcome : On successful completion of this course
Understand about the commonly used Design Patterns in MapReduce Learn the scenarios where to apply those Patterns in real world problems Write mature code using MapReduce Learn the best practices for using MapReduce Fundamental knowledge on Erlang and its use in concurrent programming
Text Book : Donald Miner & Adam Shook , “ MapReduce Design Patterns ” ,Published by O’Reilly Media,
Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. Joe Armstrong, Programming Erlang Software for a Concurrent World, Second Edition, The
Pragmatic Bookshelf References :
1. Jeffy Patton, “User Story Mapping Discover the Whole Story, Build the Right Product ”, O'Reilly Media, September 2014
2. Sandeep Karanth, “Mastering Hadoop”,Packt Publishing Ltd, 29-Dec-2014. 3. Thilina Gunarathne, “Hadoop MapReduce v2 Cookbook - Second Edition”, Packt Publishing
Ltd, 25-Feb-2015 4. Francesco Cesarini and Simon Thompson, Erlang Programming, O’Reilly Media
COURSE PLAN COURSE
NO: 06NE6142
COURSE TITLE: Modern Concurrent Programming Paradigm
L-T-P : 3-0-0
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Design Patterns and MapReduce - Summarization Patterns:Numerical Summarizations - Pattern Description - Numerical Summarization - Filtering Patterns:Filtering-Pattern Description-Filtering Examples-Bloom Filtering-Pattern Description-Bloom Filtering
9
30%
2
Data Organization Patterns: Structured to Hierarchical -Partitioning -Binning-Pattern-Total Order Sorting- Shuffling Join Patterns:Reduce Side Join -Replicated Join -Composite Join-Cartesian Product
4
FIRST INTERNAL EXAMINATION
2
Metapatterns - Job Chaining - Chain Folding - Job Merging
Input and Output Patterns.:Customizing Input and Output in Hadoop-Generating Data- External Source Output- External Source Input- Partition Pruning
5 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 51
3
Erlang Programming : Introducing Concurrency - The Shell - Processes- Modules- and Compilation - Basic Concepts - Starting and Stopping the Erlang Shell - Simple Integer Arithmetic – Variables - Floating-Point Numbers – Atoms – Tuples – Lists – Strings
6
SECOND INTERNAL EXAMINATION
3
Modules and Functions - Simple List Processing - List Comprehensions – BIFs – Guards - case and if Expressions - Building Lists in Natural Order – Accumulators - Records and Maps
3
40%
4
Concurrent Programming – Processes - Receive with a Timeout - Selective Receive - Registered Processes - Tail Recursion - Distributed Programming - Models for Distribution - Building the Name Server - Libraries and BIFS for Distributed Programming - Socket-Based Distribution
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 52
Course No. Course Title L-T-P-
Credits Year
06NE6242 Distributed Algorithms 3-0-0-3 2015 Prerequisites : Basic familiarity with algorithms, including theory. Course Objectives :
The course is intended to give students a thorough introduction to the topic of distributed algorithms with emphasis on principles and theory.
Syllabus : Introduction to model of synchronous distributed computing system, Introduction to model of asynchronous distributed computing system, Resource Allocation. Course Outcome : On successful completion of this course
The student will have developed a working understanding of the distributed problem domain and its main tools and techniques and be able to use these techniques in their own research.
Text Book : 1. Nancy A. Lynch, Morgan,” Distributed Algorithms”, Kaufmann Publishers, Inc
References : 1. 1. Wolfgang Reisig, W. Reisig, “Elements Of Distributed Algorithms: Modeling And Analysis
With Petri Nets”, Springer-verlag 2. Tel Gerard , “Introduction To Distributed Algorithms”, 2nd Edition, Cambridge University
Press 3. Sukumar Ghosh, ”Distributed Systems: An Algorithmic Approach (Hardcover)”, Chapman &
Hall/crc 4. Valmir C. Barbosa,”An Introduction To Distributed Algorithms”, Mit Press 5. Randy Chow, Theodore Johnson, “Distributed Opearating Systems and Algorithm Analysis, ,
Pearson Education 6. Santoro N., Nicola Santoro, “Design And Analysis Of Distributed Algorithms”, Wiley-
interscience 7. Fionnuala O'donnell, Vdm Verlag Dr. Muller, “A Simulated Framework For The Teaching Of
Distributed Algorithms”, Aktiengesellschaft & Co. Kg 8. Ajay D. Kshemkalyani, Mukesh Singhal, “Distributed Computing - Principles, Algorithms, And
Systems”, Cambridge University Press COURSE PLAN
COURSE NO:
06NE6242
COURSE TITLE: Distributed Algorithms
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to model of synchronous distributed computing system- Leader election in a General Network - Simple Flooding Algorithm- Basic Breadth-First Search Algorithm.- Bellman-Ford algorithm.
9
30%
2
Algorithms in Synchronous Networks- Minimum Spanning Tree- Leader Election in a Synchronous Ring - LCR algorithm- HS algorithm- Time Slice Algorithm- Variable Speeds Algorithm- Lower Bound for Comparison-Based Algorithms
5
FIRST INTERNAL EXAMINATION
2 Maximal Independent Set- LubyMIS algorithm. Distributed Consensus with Link Failures and Process Failures – Basics
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 53
3
Introduction to model of asynchronous distributed computing system- Send/Receive systems- Broadcast systems- Multicast systems- Basic algorithms- Peterson Leader-Election Algorithm- Local Synchronizer- Safe Synchronizer.
5
SECOND INTERNAL EXAMINATION
3
Asynchronous System Model. Shared Memory Systems- Environment Model- Shared Variable Types- Mutual Exclusion - Asynchronous Shared Memory Model- Dijkstra's Mutual Exclusion Algorithm.
4
40%
4
Resource Allocation - Nonexistence of Symmetric Dining Philosophers Algorithms- Right-Left Dining Philosophers Algorithm- mutual exclusion and consensus- relationship between shared memory and network models- asynchronous networks with failures
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 54
Course No. Course Title L-T-P-
Credits Year
06NE6342 High Performance Networks 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :
To introduce the new developments in modern networking systems, multimedia communications and high speed networks.
Syllabus : Network Performance analysis, Gigabit Ethernet, ADSL and DSL Technologies, Introduction to MPLS and QOS, Network Components of MPLS, Storage and networking concepts, SAN topologies Course Outcome : On successful completion of this course
Describe and interpret the basics of high speed networking technologies. Apply the concept learnt in this course to optimize and troubleshoot high-speed network. Demonstrate the knowledge of network planning and optimization
Text Book : 1. Alex Goldman, “Storage Area Networks Fundamentals”, Cisco Press 2002 2. Storage Area Network Essentials: a Complete Guide to understanding andimplementing
SANs- Richard Barker and Paul Massiglia, John Wiley India References :
1. Storage Networks Explained – Uif Troppens, Raiver Erkens and Wolfgang Muller, John Wiley & Sons, 2003.
2. William Stallings: ISDN And BISDN 3. William Stallings: High Speed Networks 4. M Shwartz: Telecommunication Network Protocol Modeling And Analysis: Addison Wesley 5. Gallangar: Data Networks: Prentice Hall 6. Fred Halsall: Data Communication Computer Networks, And Open Systems: Addison Wesley. 7. Kershanbaum : Telecommunication Network Design Algorithms: MGH 8. Jochetl Schiller: Mobile Communication: Addison Wesley. 9. Tanenbaum: Computer Networks: PHI 10. Johnson: Fast Ethernet 11. Tom Clark, “Designing Storage Area Networks”, Addison-Wesley Professional, 1stedition,
1999 12. Storage Networks: The Complete Reference – Robert Sparding, Tata Mcgraw Hills, 2003.
COURSE PLAN COURSE
NO: 06NE6342
COURSE TITLE: High Performance Networks
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Network Performance analysis : Objectives and requirements for Quality of Service (QoS) in high performance networks. Architecture of high performance networks (HPN)- design issues- protocols for HPN- VHF backbone networks- virtual interface architectures- virtual interface for networking- High-speed switching and routing - internet and PSTN IP switching techniques- SRP protocols- SRP authentication- and key exchange- comparison of TCP/IP- FTP- TELNET- queuing systems- network modeling as a graph
9 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 55
2
Gigabit Ethernet : Architecture- standards- interface- applications- network design Frame relay: Frame relay protocols and services- frame relay congestion Control ATM: Architecture- protocol- switching- traffic and congestion control- flow control ATM service categories- ATM in LAN environment- classical IP over ATM
5
FIRST INTERNAL EXAMINATION
2
ADSL and DSL Technologies : Background and technological capabilities- Standards and associations- Architecture. Fiber Optics Communication: GPON (Gigabit capable Passive Optical Network)- SONET/SDH and comparison with other available standards.
4
30%
3
Introduction to MPLS and QOS- Network Components of MPLS- working RSVP protocol- MPLS network Components- MPLS basic working- Applications- IETF approach- RSVP protocol- Integrated & differential Services Framework.
5
SECOND INTERNAL EXAMINATION
3
Storage and networking concepts – SCSI bus architecture – Networking in front of the server – Networking behind the server – Network -attached Storage – Fibre channel internals – Layers – Data encoding – Framing protocol – class of service – flow control – Name and addressing conventions.
4
40%
4
SAN topologies – Point-to Point – Arbitrated Loop – Loop Addressing-Loop Initialization-Port Login-Loop port state machine – Design considerations for Arbitrated Loop –Fabrics – Fabric login – Simple Name Server – State Change Notification – Private Loop Support – Fabric Zoning – Building Extended SANs. Fibre Channel Products – Gigabit Interface Converters (GBICs) – host Bus Adapters – Fibre channel RAID – Fibre channel JBODs – Arbitrated Loop Hubs – hub Architecture – Unmanaged Hubs – Managed Hubs – Switching Hubs – Fabric Switches – Fibre Channel-to-SCSI Bridges – SAN software Products – Problem isolation in SANs – Isolation Techniques – Fibre channel Analyzers.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 56
Course No. Course Title L-T-P-
Credits Year
06NE6442 Internet Routing Design 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :
To study the design, operation, and challenges of the Internet as a global network. Syllabus : Routing protocols: framework and principles, Internet routing and Router architectures, Analysis of network algorithms, Quality of service routing, Routing and Traffic engineering Course Outcome : On successful completion of this course
Able to describe the architecture of the Internet. Able to describe the functions performed by routers. Able to describe IP switching and the operation of MPLS
Text Book : 1. Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and
Karthikeyan Ramasamy (Morgan Kaufmann Series in Networking) References :
1. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices George Varghese (Morgan Kaufmann Series in Networking)
2. TCP/IP Protocol Suite, (B.A. Forouzum) Tata McGraw Hill Edition, Third Edition 3. TCP/IP Volume 1,2,3 (N. Richard Steveus Addison Wesley) 4. Computer Networks (A.S. Taueubaum) Pearson Edition, 4th Edition
COURSE PLAN COURSE
NO: 06NE6442
COURSE TITLE: Internet Routing Design
(L-T-P : 3--0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
ROUTING PROTOCOLS: FRAMEWORK AND PRINCIPLES : Routing Protocol- Routing Algorithm- and Routing Table- Routing Information Representation and Protocol Messages- Distance Vector Routing Protocol- Link State Routing Protocol- Path Vector Routing- Protocol- Link Cost.
9
30%
2
INTERNET ROUTING AND ROUTER ARCHITECTURES : Architectural View of the Internet- Allocation of IP Prefixes and AS Number- Policy- Based Routing- Point of Presence- Traffic Engineering Implications- Internet Routing Instability. Router Architectures: Functions- Types- Elements of a Router- Packet Flow- Packet Processing: Fast Path versus Slow Path- Router Architectures
5
FIRST INTERNAL EXAMINATION
2
ANALYSIS OF NETWORK ALGORITHMS : Network Bottleneck- Network Algorithmics- Strawman solutions- Thinking Algorithmically- Refining the Algorithm- Cleaning up- Characteristics of Network Algorithms.
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 57
3
IP Address Lookup Algorithms : Impact- Address Aggregation- Longest Prefix Matching- Naïve Algorithms- Binary - Multibit and Compressing Multibit Tries- Search by Length Algorithms- Search by Value Approaches- Hardware Algorithms- Comparing Different Approaches IP Packet Filtering and Classification : Classification- Classification Algorithms- Naïve Solutions- Two-Dimensional Solutions- Approaches for d Dimensions-
5
SECOND INTERNAL EXAMINATION
3
QUALITY OF SERVICE ROUTING : QoS Attributes- Adapting Routing: A Basic Framework. Update Frequency- Information Inaccuracy- and Impact on Routing- Dynamic Call Routing in the PSTN- Heterogeneous Service- Single-Link Case- A General Framework for Source-Based QoS Routing with Path Caching - Routing Protocols for QoS Routing.
4
40%
4
ROUTING AND TRAFFIC ENGINEERING : Traffic Engineering of IP/MPLS Networks- VPN Traffic Engineering- Problem Illustration: Layer 3 VPN- LSP Path Determination: Constrained Shortest Path Approach- LSP Path Determination: Network Flow Modeling Approach- Layer 2 VPN Traffic Engineering- Observations and General Modeling Framework- Routing/Traffic Engineering for Voice Over MPLS.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 58
Course No. Course Title L-T-P-
Credits Year
06NE6152 Cyber Physical Systems 3-0-0-3 2015 Prerequisites : Nil Course Objectives :
To understand the fundamental and practical issues in designing and analysing cyber-physical systems.
Syllabus : Cyber-Physical Systems Concepts, Modeling Issues in Cyber-Physical Systems, Sensor based Cyber Physical Systems, Civilian cyber-physical system applications, Ubiquitous computing: basics and vision. Course Outcome : On successful completion of this course
Understand the basic principles of Cyber Physical Systems Text Book :
1. Cyber-Physical Systems: Integrated Computing and Engineering Design, Fei Hu CRC Press, 26-Sep-2013
References : 1. Ubiquitous Computing: Smart Devices, Environments and Interactions By Stefan Poslad,John
Wiley & Sons Ltd COURSE PLAN
COURSE NO:
06NE6152
COURSE TITLE: Cyber Physical Systems
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Cyber-Physical Systems Concepts - Cyber-Physical Systems: Design Challenges- Mobile Cyber-Physical Systems DESIGN PRINCIPLES: Cyber-Physical System Controls- Apprenticeship Learning for Cyber-Physical System- Intelligence Application of HDP- HMM in Recognition of Dynamic Hand Gestures.
9
30%
2
Modeling Issues in Cyber-Physical Systems Cyber-Physical System Modeling on Cognitive Unmanned Aerial Vehicle Cyber-Physical System Security—Smart Grid Example
5
FIRST INTERNAL EXAMINATION
2
SENSOR-BASED CYBER-PHYSICAL SYSTEMS: Wireless Sensor and Actuator Networks for Cyber-Physical System Applications-Community Sensing- Wireless Embedded/Implanted Microsystems: Architecture and Security-The Application of Machine Learning in Monitoring Physical Activity with Shoe Sensors
4
30%
3
CIVILIAN CYBER-PHYSICAL SYSTEM APPLICATIONS Energy Efficient Building- Cyber-Physical System for Smart Grid Applications -Cyber-Physical System for Transportation Applications-Video Communications in Unmanned Aerial Vehicle-Based -Cyber- Physical Systems.
5
SECOND INTERNAL EXAMINATION
3
UBIQUITOUS COMPUTING: BASICS AND VISION Ubiquitous Communication -Data Networks -Wireless Data Networks -Universal and Transparent Audio- Video and Alphanumeric Data Network Acces-Ubiquitous Networks -Further Network
4 40%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 59
Design Issues -Service Oriented Networks
4
Management of Smart Devices -Managing Smart Devices in Virtual Environments -Managing Smart Devices in Human User Centred Environments -Ubiquitous System: Challenges and Outlook -Overview of Challenges -Smart Devices -Smart Human Device Interaction -Human Intelligence Versus Machine Intelligence -Social Issues: Promise Versus Peril Case study: Smart city networks
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 60
Course No. Course Title L-T-P-
Credits Year
06NE6252 Network Security 3-0-0-3 2015 Prerequisites : Basic knowledge of computer networking & Protocols Course Objectives :
Understand security concepts, Ethics in Network Security. Comprehend and apply relevant protocol like SSL, SSH etc.
Syllabus : Security Problem in TCP/IP Protocol Suite, Security at Network Layer, Security at Transport Layer, Security at Application Layer, Firewalls and IDS. Course Outcome : On successful completion of this course
Should be able to identify network security threats and determine efforts to counter them Understand the security in different layers of protocol stack.
Text Book : 1. Stallings, W., “Cryptography and Network Security: Theory and Practice”, Second Edition,
John Wiley. References :
1. “Charles P. Pfleeger “Security in computing”, Pearson Education 2. Stalling W., “Network Security Essentials”, Pearson 3. Garfinkel S., Spafford G., “Practical Unix and Internet Security”, O'Reilly 4. Blacharski D., “Network Security in a Mixed Environment”
Practical Packet Analysis: Using Wireshark to Solve Real-Word Network problems by Chris Sanders
COURSE PLAN COURSE
NO: 06NE6252
COURSE TITLE: Network Security
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Security Problem in TCP/IP Protocol Suite: Identification of Security issues in Ethernet- ARP- IP- TCP- Application and Routing protocols. Security Models: Military and civil security- vulnerability and threat models- End-end security ( COMSEC)- l i n k encryption (TRANSEC)- compartments. Privacy. Authentication. Denial of service. Nonrepudiation. Issues in multi-level secure systems. Internet security models: IPv4/IPv6 encapsulation header
9
30%
2
Security at Network Layer: Routing algorithm vulnerabilities: route and sequence number spoofing- instability and resonance effects. Information hiding: DMZ networks- route aggregation and segregation ICMP redirect hazard: denial of service. ARP hazard: phantom sources- ARP explosions and slow links. Defending against Chernobyl packets and meltdown.
5
FIRST INTERNAL EXAMINATION
2
Fragmentation vulnerabilities and remedies: (ICMP Echo overrun) IPSec: IP Security Overview- IP Security Architecture- Security Associations- Security Association Database- Security Policy Database- Tunnel and Transport mode- AH and ESP- IP and IPv6- Encapsulating Security Payload- Internet Key Exchange
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 61
3
Security at Transport Layer: SSL and TLS Secure network infrastructure services: DNS, NTP, SNMP, SSL Architecture, SSL/TLS Basic Protocol, SSL Message Formats, Session Resumption, Computing the keys, Client Authentication, PKI as deployed by SSL, Version Numbers, Negotiating Cipher Suites, Negotiating Compression Methods, Exportability, Encoding,
5
SECOND INTERNAL EXAMINATION
3
Mobile systems: Address Export and re-use. Session key management: Blindkey cryptosystems (NTP). Security at Application Layer: PGP- S/MIMIE E-mail security- PGP- PEM- S/MIME- Secure binding of multimedia streams- Secure RTP. Secure RSVP.
4
40%
4
Firewalls and IDS - Firewalls: Network partitioning- firewall platforms- partitioning models and methods- Secure SNMP- Secure routing interoperability: virtual networks (DARTnet/CAIRN). Transparent and opaque network services. Source masking and hidden channels. IDS- Honeypots-Honey nets
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 62
Course No. Course Title L-T-P-
Credits Year
06NE6352 Advances in Storage Area Networks 3-0-0-3 2015 Prerequisites : Computer Networks, Operating Systems Course Objectives :
To Understand Storage Area Networks characteristics and components. To Define storage management software and its application to storage
Syllabus : Server Centric IT Architecture and its Limitations, I/O Techniques, Network Attached Storage , Storage Virtualization, SAN Architecture, Management of Storage Network. Course Outcome : On successful completion of this course
Understand Storage Area Networks characteristics and components. Familiar with storage virtualization.
Text Book : 1. Ulf Troppens, Rainer Erkens and Wolfgang Muller: Storage Networks Explained, Wiley
India,2013. References :
1. Robert Spalding: “Storage Networks The Complete Reference”, Tata McGraw-Hill, 2011. 2. Marc Farley: Storage Networking Fundamentals – An Introduction to Storage Devices,
Subsystems, Applications, Management, and File Systems, Cisco Press, 2005. 3. Richard Barker and Paul Massiglia: “Storage Area Network Essentials A CompleteGuide to
understanding and Implementing SANs”, Wiley India, 2006. COURSE PLAN
COURSE NO:
06NE6352
COURSE TITLE: Advances in Storage Area Networks
(L-T-P : 3-1-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction: Server Centric IT Architecture and its Limitations; Storage – Centric IT Architecture and its advantages. Case study: Replacing a server with Storage Networks The Data Storage and Data Access problem; The Battle for size and access. Intelligent Disk Subsystems: Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O Channels; JBOD- Storage virtualization using RAID and different RAID levels; Caching: Acceleration of Hard Disk Access; Intelligent disk subsystems- Availability of disk subsystems.
9
30%
2 I/O Techniques: The Physical I/O path from the CPU to the Storage System; SCSI; Fibre Channel Protocol Stack; Fibre Channel SAN; IP Storage.
5
FIRST INTERNAL EXAMINATION
2
Network Attached Storage: The NAS Architecture- The NAS hardware Architecture- The NAS Software Architecture- Network connectivity- NAS as a storage system. File System and NAS: Local File Systems; Network file Systems and file servers; Shared Disk file systems; Comparison of fibre Channel and NAS.
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 63
3
Storage Virtualization: Definition of Storage virtualization ; Implementation Considerations; Storage virtualization on Block or file level; Storage virtualization on various levels of the storage Network; Symmetric and Asymmetric storage virtualization in the Network.
5
SECOND INTERNAL EXAMINATION
3
SAN Architecture and Hardware devices: Overview- Creating a Network for storage; SAN Hardwaredevices; The fibre channel switch; Host Bus Adaptors; Putting the storage in SAN; Fabric operation from a Hardware perspective. Software Components of SAN: The switch’s Operating system; Device Drivers; Supporting the switch’s components; Configuration options for SANs.
4
40%
4
Management of Storage Network: System Management- Requirement of management System- Support by Management System- Management Interface- Standardized Mechanisms- Property Mechanisms- In-band Management- Use of SNMP- CIM and WBEM- Storage Management Initiative Specification (SMI-S)- CMIP and DMI
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 64
Course No. Course Name L-T-P-
Credits Year
06NE6452 Next Generation Internetworking Protocol 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :
To understand IPv6 Syllabus : Introduction to IPv6, IPv6 Addressing, IPv6 Address Types, ICMPv6 and Neighbor Discovery Protocol, IPv6 Configuration, Introduction to Routing IPv6 Course Outcome : On successful completion of this course
Know and design network with IPv6 Background Justification and Perspective for IPv6
Text Book : 11. Rick Graziani , IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6, Cisco
Press References :
1. Silvia Hagen, IPv6 Essentials, ISBN-13: 978-1449319212, 3rd EditionO’Reilly 2. Edward Horley , Practical IPv6 for Windows Administrators, Apress, ISBN-13: 978-
1430263708, First Edition COURSE PLAN
COURSE NO:
06NE6452 COURSE TITLE: Next Generation Internetworking Protocol
(L-T-P :3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1 Introduction to IPv6 : History of IPv6- Benefits of IPv6- IPv4 Address Depletion- IPv4 Header- IPv6 Header- Comparing IPv4 and IPv6
9 30%
2 IPv6 Addressing- Representation of IPv6 Addresses- Prefix Notation- Global Unicast Address- Subnetting
3
FIRST INTERNAL EXAMINATION
2
IPv6 Address Types : IPv6 Address Space- Unicast Address-Global Unicast Address-Manual Global Unicast Configuration-Dynamic Configuration-Link-local Unicast-Dynamic Link-local Address: EUI-64 109-Randomly Generated Interface IDs-Static Link-local Address-Link-local Addresses and Duplicate Address Detection-Link-local Addresses and Default Gateways- Isolated Link-local Address-Loopback Address-Unspecified Address- Unique Local Address-IPv4 Embedded Address-IPv4-Compatible IPv6 Addresses-IPv4-Mapped IPv6 Addresses-Multicast
6
30%
3 ICMPv6 and Neighbor Discovery Protocol: General Message Format- ICMP Error Messages- Path MTU Discovery ICMP Informational Messages-Neighbor Discovery Protocol
4
SECOND INTERNAL EXAMINATION
3
IPv6 Configuration- Configuring Global Unicast Addresses-Configuring Link-local Addresses- Enabling IPv6 Packet Forwarding and ND Router Advertisements- Tuning Neighbor Discovery Parameters
5 40%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 65
4
Introduction to Routing IPv6- IPv6 Routing Table- Configuring IPv6 Static Routes- RIPng for IPv6- EIGRP for IPv6-OSPFv3 DHCPv6 Services- Basics of Dual-Stack and Tunneling- Basics of Network Address Translation IPv6 to IPv4 (NAT64)
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 66
Course No. Course Title L-T-P-
Credits Year
06NE6062 Mini Project 0-0-4-2 2015 Each student shall identify a Mini project from networks and related areas . The Mini project work has to be carried out within the department itself. There is a project guide allotted to each student by the head of the division / course coordinator. The project work shall be reviewed and evaluated periodically by the project guide. At the end of the semester, each student shall submit a project report . The project must be evaluated by a team comprising of 3 internal examiners including the project guide,coordinator & a senior faculty member. Encourage students to convert Mini Project work into a good Technical paper.
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 67
Course No. Course Title L-T-P-
Credits Year
06NE6072 Network Simulation Lab 0-0-3-1 2015 Prerequisites : Computer Networks, Wireless Sensor Networks, Cloud Computing, Fundamentals of Big Data Processing Course Objectives :
To learn and simulate computer networks using in NS2/ns3/OMNeT++ To learn and simulate cloud computing environment using cloudsim To learn and implement map reduce programs Visualising network data using Gephi
Syllabus : 1. Familiarizing a network simulator tool - OMNeT++/ns3/ns2(least preference) (Select one
for experiments) 2. Simulate a wired network consisting of TCP and UDP Traffic and then calculate their
respective throughput. 3. Compare the behavior of different variants of TCP (Tahoe, Reno, Vegas….) in wired network.
Comparison can be done on the congestion window behavior by plotting graph. 4. Simulation of wireless Ad hoc networks 5. Simulate a wireless network consisting of TCP and UDP Traffic and then calculate their
respective throughput. 6. Familiarization of CloudSim with suitable examples. 7. Modeling and simulation Cloud computing environments, including Data Centers, Hosts and
Cloudlets and perform VM provisioning using CloudSim. (Atleast 3 Experiments) 8. Implementtion of Map Reduce concepts (Atleast 3 Experiments) 9. Familiarization of Graph Visualizing Tool – Gephi. 10. Graph Visualization experiments (Atleast 3 Experiments)
Course Outcome : On successful completion of this course
Simulation experience in NS2/ns3/OMNeT++ Simulation experience in Cloud Sim Basic concepts on Gephi Implement Map-Reduce concept.
References : 1. OMNeT++ Tutorials : https://omnetpp.org/documentation 2. Ns3 Tutorials : https://www.nsnam.org/docs/tutorial/html/ 3. Issariyakul, Teerawat, Hossain, Ekram, Introduction to Network Simulator NS2, Springer 4. CloudSim Official Tutorials - http://www.cloudbus.org/cloudsim/examples.html 5. Gephi Tutorial - http://gephi.github.io/users/ 6. Hadoop Map Reduce Official Tutorial -
http://hadoop.apache.org/docs/r1.2.1/mapred_tutorial.html
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 68
SEMESTER – III
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 69
Course No. Course Title L-T-P-
Credits Year
06NE7111 Big Data Analytics 3-0-0-3 2015 Prerequisites : Distributed Systems Course Objectives :
To understand about basic concepts of big data analytics. Syllabus : Introduction to BigData Platform, Regression Modeling, Bayesian Modeling, Fuzzy Logic, Search by simulated Annealing, Introduction to Streams Concepts. Course Outcome : On successful completion of this course, the student should
Understand and apply the Big Data Flow to actual projects . Successfully apply appropriate techniques (such as ML) and tools to solve actual Big Data problems (derive value from vast data sets) . Have an in-depth understanding of the Big
Data ecosystem, specifically the Apache projects Understand about different data analysis techniques.
Text Book : 1. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
References : 1. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge
University Press, 2012. 2. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
with Advanced Analytics”, John Wiley & sons, 2012. 3. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007 4. Pete Warden, “Big Data Glossary”, O’Reilly, 2011. 5. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Second Edition,
Elsevier, Reprinted 2008. 6. Da Ruan, Guoquing Chen, Etienne E.Kerre, Geert Wets, Intelligent Data Mining, Springer,2007 7. Paul Zikopoulos ,Dirk deRoos , Krishnan Parasuraman , Thomas Deutsch , James Giles, David
Corrigan , Harness the Power of Big Data The IBM Big Data Platform, Tata McGraw Hill Publications, 2012
8. Michael Minelli (Author), Michele Chambers (Author), Ambiga Dhiraj (Author) , Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses,Wiley Publications,2013
9. Zikopoulos, Paul, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, Tata McGraw Hill Publications, 2011
COURSE PLAN COURSE
NO: 06NE7111
COURSE TITLE: Big Data Analytics
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction To Big Data : Introduction to Big Data Platform – Traits of Big data -Challenges of Conventional Systems - Web Data – Evolution Of Analytic Scalability - Analytic Processes and Tools - Analysis vs Reporting - Modern Data Analytic Tools - Statistical Concepts: Sampling Distributions - ReSampling - Statistical Inference - Prediction Error
9
30%
2
Data Analysis : Regression Modeling - Multivariate Analysis - Bayesian Modeling - Inference and Bayesian Networks - Support Vector and Kernel Methods - Analysis of Time Series: Linear Systems Analysis - Nonlinear Dynamics - Rule
5
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 70
Induction - FIRST INTERNAL EXAMINATION
2
Neural Networks: Learning And Generalization - Competitive Learning - Principal Component Analysis and Neural Networks - Fuzzy Logic: Extracting Fuzzy Models from Data - Fuzzy Decision Trees - Stochastic Search Methods.
4
30%
3
Search by simulated Annealing – Stochastic- Adaptive search by Evaluation – Evaluation Strategies – Genetic Algorithm – Genetic Programming – Visualization – Classification of Visual Data Analysis Techniques.
5
SECOND INTERNAL EXAMINATION
3
Data Types – Visualization Techniques – Interaction techniques – Specific Visual data analysis Techniques. Introduction To Streams Concepts – Stream Data Model and Architecture - Stream Computing - Sampling Data in a Stream – Filtering Streams – Counting Distinct Elements in a Stream – Estimating Moments.
4
40%
4
Counting Oneness in a Window – Decaying Window - Real time Analytics Platform(RTAP) Applications - Case Studies - Real Time Sentiment Analysis, Stock Market Predictions. Frequent Item sets and Clustering: Mining Frequent Itemsets - Market Based Model – Apriori Algorithm – Handling Large Data Sets in Main Memory – Limited Pass Algorithm – Counting Frequent Itemsets in a Stream – Clustering Techniques – Hierarchical – K-Means – Clustering High Dimensional Data – CLIQUE And PROCLUS – Frequent Pattern based Clustering Methods – Clustering in Non-Euclidean Space – Clustering for Streams and Parallelism.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 71
Course No. Course Title L-T-P-
Credits Year
06NE7211 Concurrent Algorithms and Data Structures 3-0-0-3 2015 Prerequisites : Familiarity with standard programming techniques, familiarity with concurrent programming Course Objectives :
For familiarization with concurrent data types and implementation. To understand the importance of mutual exclusion.
Syllabus : Mutual exclusion; correctness conditions for concurrent data types, foundations of shared memory, the relative power of synchronization methods; universality of consensus. Implementing locks, monitors and barriers; implementing concurrent data types such as linked lists, queues, counting and sorting networks, hash tables, skip lists and priority queues. Course Outcome : On successful completion of this course
Understand the importance of mutual exclusion, and different ways to implement it. Understand correctness criteria for concurrent data types. Understand the relative power of different concurrency primitives.
Text Book : 1. “The Art of Multiprocessor Programming “ by Maurice Herlihy and Nir Shavit, revised first
edition, Morgan Kaufman, 2012. References :
1. Data Structures Using C and C++ by Y. Langsam, M. Augenstein & A. Tenenbaum 2. Mark Moir and Nir Shavit (2007). "Concurrent Data Structures". In Dinesh Metha and Sartaj
Sahni. 'Handbook of Data Structures and Applications' (1st ed.). Chapman and Hall/CRC Press. pp. 47–14–47–30.
3. Concurrent Algorithms and Data Structures for Many-Core Processors Daniel Cederman ISBN 978-91-7385-503-7
COURSE PLAN COURSE
NO: 06NE7211
COURSE TITLE: Concurrent Algorithms and Data Structures
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction: Shared Objects and Synchronization-The Producer–Consumer Problem-The Readers–Writers Problem-The Harsh Realities of Parallelization-Parallel Programming. Mutual Exclusion: Time- Critical Sections- 2-Thread Solutions- The Filter Lock- Fairness- Lamport’s Bakery Algorithm- Bounded Timestamps- Lower Bounds on the Number of Locations.
9
30%
2
Concurrent Objects: Concurrency and Correctness- Sequential Objects- Quiescent Consistency- Sequential Consistency- Linearizability- Formal Definitions- Progress Conditions- The Java Memory Model.
5
FIRST INTERNAL EXAMINATION
2
Foundations of Shared Memory: The Space of Registers- Register Constructions- Atomic Snapshots- The Relative Power of Primitive Synchronization Operations- Universality of Consensus
3 30%
3 Spin Locks and Contention: Test-And-Set Locks- queue locks- A Composite Lock- Hierarchical Locks- Monitors and
5
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 72
Blocking Synchronization- Monitor Locks and Conditions- Readers–Writers Locks Linked Lists: the Role of Locking: concurrent reasoning; coarse-grained synchronization; ne-grained synchronization; optimistic synchronization; lazy synchronization; non-blocking synchronization.
SECOND INTERNAL EXAMINATION
3
Concurrent Queues and the ABA Problem: bounded partial queue; unbounded total queue; unbounded lock-free queue; memory reclamation and the ABA problem. Concurrent Stacks and Elimination: a lock-free stack; elimination back-off stack.
4
40%
4
Concurrent Hashing and Natural Parallelism: closed-address hash sets (coarse-grained- striped- sharded- refinable); lock-free hash set (recursive split-ordering); open-addressed hash set (sharded; cuckoo hashing). Skiplists and Balanced Search: lock-based concurrent skiplist; lock-free concurrent skiplist. Priority Queues: array-based priority queue; tree-based priority queue; unbounded heap-based priority queue; skiplist-based unbounded priority queue. Barriers: sense-reversing barrier; combining tree barrier; static tree barrier; termination detecting barriers.
10
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 73
Course No. Course Title L-T-P-
Credits Year
06NE7311 Social Network Analysis 3-0-0-3 2015 Prerequisites : Internet And Web Technology Course Objectives :
To understand the concepts of Social networks and Web Social Networks To appreciate the modeling and visualizing techniques associated with Social Networks To understand the different techniques used to mine communities from Web Social
Networks To appreciate concepts of evolution and prediction in Social Networks To understand the application of text mining techniques for Content and Opinion mining
Syllabus : Social Networks, Visualizing Online Social Networks, Modelling and aggregating social network data, Aggregating and reasoning with social network data, Framework, Algorithms and Systems for Expert Location in Social Networks, Text Mining in Social Networks Course Outcome : On successful completion of this course
Build a social network data set from existing social networking sites Identify the different components of a web social network that can be used for analyzing and
mining Identify the different data structures and graph algorithms that can be used for web social
network mining Implement a community detection algorithm Process Social Network data using MapReduce paradigm Design an application that uses various aspects of Social Network Mining to improve its
functionality and to harvest information available on the web to build recommender systems Analyze social media data using appropriate data/web mining techniques
Text Book : 1. Charu C. Aggarwal, Social Network Data Analytics, Springer; 2011
References : 1. Peter Mika, Social Networks and the Semantic Web, Springer, 1st edition 2007. 2. Borko Furht, Handbook of Social Network Technologies and Applications, Springer, 1st
edition, 2010. 3. Guandong Xu , Yanchun Zhang and Lin Li, Web Mining and Social Networking – Techniques
and applications, Springer, 1st edition, 2011. 4. Giles, Mark Smith, John Yen, Advances in Social Network Mining and Analysis, Springer, 2010. 5. Ajith Abraham, Aboul Ella Hassanien, Václav Snášel, Computational Social Network Analysis:
Trends, Tools and Research Advances, Springer, 2009. 6. Toby Segaran, Programming Collective Intelligence, O’Reilly, 2012
COURSE PLAN COURSE
NO: 06NE7311
COURSE TITLE: Semantic Web and Social Networks
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to Web - Limitations of current Web – Development of Semantic Web – Emergence of the Social Web – Statistical Properties of Social Networks -Network analysis - Development of Social Network Analysis - Key concepts and measures in network analysis - Discussion networks - Blogs and online communities - Web-based networks.
9 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 74
2
Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation - Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix-Based Representations- Node-Link Diagrams - Hybrid Representations -
5
FIRST INTERNAL EXAMINATION
2
Modelling and aggregating social network data – Random Walks and their Applications –Use of Hadoop and Map Reduce - Ontological representation of social individuals and relationships.
4
30%
3
Aggregating and reasoning with social network data- Advanced Representations - Extracting evolution of Web Community from a Series of Web Archive - Detecting Communities in Social Networks - Evaluating Communities – Core Methods for Community Detection & Mining - Applications of Community Mining Algorithms - Node Classification in Social Networks.
5
SECOND INTERNAL EXAMINATION
3
Evolution in Social Networks – Framework - Tracing Smoothly Evolving Communities - Models and Algorithms for Social Influence Analysis - Influence Related Statistics - Social Similarity and Influence - Influence Maximization in Viral Marketing
4
40%
4
Algorithms and Systems for Expert Location in Social Networks - Expert Location without Graph Constraints - with Score Propagation – Expert Team Formation - Link Prediction in Social Networks - Feature based Link Prediction - Bayesian Probabilistic Models - Probabilistic Relational Models - Text Mining in Social Networks -Opinion extraction – Sentiment classification and clustering - Temporal sentiment analysis - Irony detection in opinion mining - Wish analysis - Product review mining – Review Classification – Tracking sentiments towards topics over time.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 75
Course No. Course Title L-T-P-
Credits Year
06NE7411 Intrusion Detection Systems 3-0-0-3 2015 Prerequisites : Network Security Course Objectives :
Understand the concepts of Intrusion Detection System. Understanding on Snort Technology.
Syllabus : IDS,SNORT, Intrusion Prevention Systems, Working with Snort Rules, Using Snort with MySQL. Course Outcome : On successful completion of this course
Learn to configure ID systems (e.g. SNORT) and analyze their output. Text Book :
1. Rafeeq Rehman, Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID, Prentice Hall PTR, 2003.
References : 1. Richard Bejtlich , The Practice of Network Security Monitoring, No Starch Press, 978-1-
59327-509-9 2. Ryan Trost , Practical Intrusion Analysis: Prevention and Detection for the Twenty-First
Century ,Addison-Wesley; ISBN 0-321-59180-1. 3. Michael Rash , Linux Firewalls: Attack detection and Response with iptables, psad, and
fwsnort No Starch Press; ISBN 1-59327-141-7.
COURSE PLAN COURSE
NO: 06NE7411
COURSE TITLE: Intrusion Detection Systems
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction- Some Definitions- Where IDS Should be Placed in Network Topology- Honey Pots- Security Zones and Levels of Trust- IDS Policy- Components of an intrusion detection system - Packet Decoders- Preprocessors- The Detection Engine- Logging and Alerting System- Output Modules- Dealing with Switches- TCP Stream Follow Up- How to Protect IDS Itself- Internal and external threats to data- attacks- need and types of IDS.
9
30%
2
Intrusion Prevention Systems- Network IDSs- Protocol based IDs- Application protocol- host based- hybrid based IDs- architectures- Snort - Snort Installation Scenarios- Test Installation- Single Sensor Production IDS- Single Sensor with Network Management System Integration- Single Sensor with Database and Web Interface.
5
FIRST INTERNAL EXAMINATION
2
Multiple Snort Sensors with Centralized Database- Installing Snort- Running Snort on a Non-Default Interface- Automatic Startup and Shutdown- Running Snort on Multiple Network Interfaces- Location of Snort Files- Snort Modes- Snort Alert Modes- Running Snort in Stealth Mode Working with Snort Rules - TCP/IP Network Layers- CIDR- Structure of a Rule- Rule Headers- Rule Options- The Snort Configuration File- Order of Rules Based upon Action.
4 30%
3 AutomaticallyUpdating Snort Rules- Default Snort Rules and 5
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 76
Classes- Sample Default Rules- Writing Good Rules. Plugins- Preprocessors and Output Modules - Preprocessors - HTTP Decode- Port Scanning- The frag2 Module- The stream4 Module- The spade Module- ARP Spoofing- Output Modules - The alert_syslog Output Module.
SECOND INTERNAL EXAMINATION
3
The alert_full Output Module- The alert_fast Output Module- The alert_smb Module- The log_tcpdump Output Module- The XML Output Module- Logging to Databases- CSV Output Module- Unified Logging Output Module- SNMP Traps Output Module- Log Null Output Module- Using BPF Filters. Using Snort with MySQL - Making Snort Work with MySQL- Snort Compilations with MySQL Support- Install MySQL.
4
40%
4
Creating Snort Database in MySQL- Creating MySQL User and Granting Permissions to User and Setting Password- Creating Tables in the Snort Database- Modify snort.conf Configuration File- Starting Snort with Database Support- Logging to Database- Secure Logging to Remote Databases Securely- Using Stunnel, Snort Database Maintenance.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 77
Course No. Course Title L-T-P-
Credits Year
06NE7121 Software Defined Networking 3-0-0-3 2015 Prerequisites: Enterprise Devices & Networking Course Objectives :
Introduces an emerging paradigm in computer networking that allows a logically centralized software program to control the behaviour of an entire network.
Syllabus : Basic Packet-Switching Terminology, Software Defined Networking, Open Flow, SDN in the Data Center Course Outcome : On successful completion of this course
Learn Software controlled virtual network devices Knowledge on Mininet and Open Flow
Text Book : 1. Paul Göransson, Chuck Black, Software Defined Networks A Comprehensive Approach,
Elsevier,2014 References :
1. Paul Goransson,Chuck Black, Software Defined Networks: A Comprehensive Approach, 1st Edition, MK
2. Thomas D. Nadeau, SDN: Software Defined Networks, 1st Edition, Oreilly COURSE PLAN
COURSE NO:
06NE7121
COURSE TITLE: Software Defined Networking
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Basic Packet-Switching Terminology- The Modern Data Center- Traditional Switch Architecture- Autonomous and Dynamic Forwarding Tables- Evolution of Switches and Control Planes- Cost- SDN Implications for Research and Innovation- Data Center Innovation- Data Center Needs
9 30%
2 The Evolution of Networking Technology- Forerunners of SDN - Software Defined Networking
5
FIRST INTERNAL EXAMINATION
2
OpenFlow- Sustaining SDN Interoperability- Network Virtualization- Fundamental Characteristics of SDN- SDN Operation- SDN Devices- SDN Controller- SDN Applications- Alternate SDN Methods
4
30%
3
OpenFlow Overview- OpenFlow 1.0 and OpenFlow Basics- OpenFlow 1.1 Additions- OpenFlow 1.2 Additions- OpenFlow 1.3 Additions- OpenFlow Limitations- Potential Drawbacks of Open SDN- SDN via APIs- DN via Hypervisor-Based Overlays- SDN via Opening Up the Device- Network Functions Virtualization- Alternatives Overlap and Ranking
5
SECOND INTERNAL EXAMINATION
3
SDN in the Data Center- Data Center Demands- Tunneling Technologies for the Data Center- Path Technologies in the Data Center- Ethernet Fabrics in the Data Center- SDN Use Cases in the Data Center
4 40%
4 Open SDN versus Overlays in the Data Center- Real-World Data Center- SDN in Other Environments- Wide Area
9
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 78
Networks- Service Provider and Carrier Networks- Campus Networks- Hospitality Networks- Mobile Networks- Optical Networks
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 79
Course No. Course Title L-T-P-
Credits Year
06NE7221 Network Forensics 3-0-0-3 2015 Prerequisites : Basics of System Administration Course Objectives :
Provide an overview of network security devices and infrastructures, including proxy servers and firewalls.
Describe network security risk and the range of threats. Describe the key network protocols, such as IP, TCP, ARP, ICMP, DNS.
Syllabus : Introduction to Network Forensics, Evidence Acquisition, Traffic Analysis, Statistical Flow Analysis, Intrusion Detection and Analysis , Network Tunneling,Covert Tunneling, Malware Forensics. Course Outcome : On successful completion of this course
Learn how to discuss and describe these common network security and forensic principles and concepts.
Knowledge about key concepts in information security and network forensics. Text Book :
1. Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers through Cyberspace, Pearson Education, 2012.
References : 1. Katzendbisser, Petitcolas, Information Hiding Techniques for Steganography and Digital
Watermarking, Artech House. 42 2. Peter Wayner,Disappearing Cryptography: Information Hiding, Steganography and
Watermarking 2/e, Elsevier 3. John Vecca, Computer Forensics: Crime scene Investigation, Firewall Media 4. Christopher L.T. Brown, Computer Evidence: Collection and Preservation, Firewall Media
COURSE PLAN COURSE
NO: 06NE7221
COURSE TITLE: Network Forensics
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Introduction to Network Forensics : Concepts in Digital Evidence- Challenges relating to Network Evidence- Network Forensics Investigative Methodology- Technical Fundamentals- Sources of Network-Based Evidence- On the Wire- In the Air- Switches - Routers- DHCP Servers- Name Servers- Authentication Servers- Network Intrusion Detection /Prevention Systems- Firewalls- Web Proxies- Application Servers- Central Log Servers- Evidence Acquisition: Physical Interception-Cables- Radio Frequency- Hubs- Switches- Traffic Acquisition Software- libpcap and WinPcap
9
30%
2
The Berkeley Packet Filter (BPF) Language- tcpdump - Wireshark- tshark- dumpcap- Active Acquisition- Common Interfaces- Inspection Without Access- Strategy. Traffic Analysis : Protocol Analysis- Protocol Analysis Tools- Protocol Analysis Techniques- Packet Analysis- Packet Analysis Tools- Packet Analysis Techniques- Flow Analysis- Flow Analysis Tools- Flow Analysis Techniques- Higher-Layer Traffic Analysis- Common Higher-Layer Protocols- Higher-Layer Analysis Tools- Higher-Layer Analysis
5
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 80
Technique
FIRST INTERNAL EXAMINATION
2
Statistical Flow Analysis- Process Overview- Sensors- Sensor Types- Sensor Software- Sensor Placement- Flow Record Export Protocols- NetFlow- IPFIX- sFlow- Collection and Aggregation- Wireless Traffic Capture and Analysis- Spectrum Analysis- Wireless Passive Evidence Acquisition- Common Attacks – Sniffing- Rogue Wireless Access Points- Evil Twin- WEP Cracking- Locating Wireless Devices.
4
30%
3
Network Devices- Intrusion Detection and Analysis : Typical NIDS/NIPS Functionality- Sniffing - Higher-Layer Protocol Awareness- Alerting on Suspicious Bits Modes of Detection- Signature-Based Analysis- Protocol Awareness- Behavioral Analysis- Types of NIDS/NIPSs - NIDS/NIPS Evidence Acquisition - Comprehensive Packet Logging - Event Log Aggregation- Correlation- and Analysis
5
SECOND INTERNAL EXAMINATION
3
Sources of Logs - Operating System Logs - Application Logs Physical Device Logs- Network Equipment Logs- Network Log Architecture- Three Types of Logging Architectures- Remote Logging: Common Pitfalls and Strategies. Switches - Content-Addressable Memory Table- ARP- Switch Evidence- Routers-Types of Routers- Router Evidence- Firewalls -Types of Firewalls - Firewall Evidence. Advanced Topics : Network Tunneling- Tunneling for Functionality- Inter-Switch Link (ISL)- Generic Routing Encapsulation (GRE).
4
40%
4
Tunneling for Confidentiality- Internet Protocol Security (IPsec)- Transport Layer Security (TLS) and Secure Socket Layer (SSL)- Covert Tunneling- Covert Tunneling Strategies - TCP Sequence Numbers - DNS Tunnels - ICMP Tunnels. Malware Forensics- Trends in Malware Evolution- Network Behavior of Malware- Propagation- Command-and-Control Communications- Payload Behavior.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 81
Course No. Course Title L-T-P-
Credits Year
06NE7321 Cloud Security 3-0-0-3 2015 Prerequisites : Cloud Computing Course Objectives :
Compare modern security concepts as they are applied to cloud computing Appraise compliance issues that arise from cloud computing
Syllabus : Security concepts, Multi-tenancy issues, Virtualization system-specific attacks, Legal and compliance issues Course Outcome : On successful completion of this course
Understand the basic concepts in cloud security. Learn the methods to improve virtualization security
Text Book : 1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance O'Reilly Media; 1 edition [ISBN: 0596802765], 2009. References :
1. Ronald L. Krutz, Russell Dean Vines, Cloud Security” [ISBN: 0470589876], 2010. 2. John Rittinghouse, James Ransome, Cloud Computing” CRC Press; 1 edition [ISBN:
1439806802], 2009. 4. J.R. ("Vic") Winkler, Securing the Cloud” Syngress [ISBN: 1597495921] 2011.
3. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing 2009.
4. Vmware VMware Security Hardening Guide White Paper, June 2011 . 5. Cloud Security Alliance 2010, Top Threats to Cloud Computing Microsoft 2013.
COURSE PLAN COURSE
NO: 06NE7321
COURSE TITLE: Cloud Security
(L-T-P : 3-0-0)
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Confidentiality- privacy- integrity- authentication- non-repudiation- availability- access control- defence in depth- least privilege- how these concepts apply in the cloud- what these concepts mean and their importance in PaaS- IaaS and SaaS. e.g. User authentication in the cloud; Cryptographic Systems- Symmetric cryptography- stream ciphers- block ciphers- modes of operation- public-key cryptography- hashing- digital signatures- public-key infrastructures- key management- X.509 certificates- OpenSSL.
9
30%
2
MULTI-TENANCY ISSUES: Isolation of users/VMs from each other. How the cloud provider can provide this; Virtualization System Security Issues- e.g. ESX and ESXi Security- ESX file system security- storage considerations- backup and recovery;
5
FIRST INTERNAL EXAMINATION
2
Virtualization System Vulnerabilities- Management console vulnerabilities- management server vulnerabilities- administrative VM vulnerabilities- guest VM vulnerabilities- hypervisor vulnerabilities- hypervisor escape vulnerabilities- configuration issues- malware (botnets etc).
4 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 82
3
VIRTUALIZATION SYSTEM-SPECIFIC ATTACKS: Guest hopping- attacks on the VM (delete the VM- attack on the control of the VM- code or file injection into the virtualized file structure)- VM migration attack- hyper jacking.
5
SECOND INTERNAL EXAMINATION
3 IBM security virtual server protection- virtualization-based sandboxing; Storage Security- HIDPS- log management- Data Loss Prevention. Location of the Perimeter.
4
40%
4
LEGAL AND COMPLIANCE ISSUES: Responsibility- ownership of data- right to penetration test- local law where data is held- examination of modern Security Standards (eg PCIDSS)- how standards deal with cloud services and virtualization- compliance for the cloud provider vs. compliance for the customer.
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 83
Course No. Course Name L-T-P-
Credits Year
06NE7421 Green Computing 3-0-0-3 2015 Prerequisites : NIL Course Objectives :
Course present the energy management policies at the operating system level that consider performance vs. energy saving tradeoffs.
Syllabus : Low-Power,Massively Parallel,Energy-Efficient Supercomputers:Introduction-Voltage Scaling in Hardware Technologies Course Outcome : On successful completion of this course, the student should
Understand the concepts of technologies that conform to low-power computation Understand green (power-efficient) technologies for components of one single computer,
such as CPU, memory and disk, and appreciate cutting edge designs for these components including memristors
Have a basic understanding of a variety of technologies applied in building a green system (especially green datacentres), including networks, Virtual Machine (VM) management and storage systems
Be able to use a range of tools to help monitor and design green systems Text Book :
1. Wu-chun Feng – “The Green Computing Book: Tackling Energy Efficiency at Large Scale”, CRC Press
References : 1. John W.Rittinghouse and James F.Ransome, “Cloud Computing: Implementation,
Management, and Security”, CRC Press, 2010. 2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”,TMH,
2009. 3. Kumar Saurabh, “Cloud Computing – insights into New-Era Infrastructure”, Wiley India,2011. 4. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in
the Cloud” O'Reilly 5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”,
Elsevier/Morgan Kaufmann, 2005. 6. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing – A
Business Perspective on Technology and Applications”, Springer. 7. Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure
Cloud Computing”, Wiley – India, 2010. In Networks” COURSE PLAN
COURSE NO:
6NE7421 COURSE TITLE: Green Computing
L-T-P : 3-0-0
CREDITS:3
Module Contents Content Hours
Sem.Exam Marks:%
1
Low-Power,Massively Parallel,Energy-Efficient Supercomputers:Introduction-Voltage Scaling in Hardware Technologies : Low-Voltage Scaling of Active Devices-On-Chip Digital Noise-Power Delivery- Off-Chip Connections-Cooling-Blue Gene Hardware : Voltage Scaling- Low-Power Floating-Point Units-Power Delivery -Off-Chip Connections-Cooling-System Software:Overview-System Monitoring-Job History-Operational Phases-Applications
9 30%
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 84
2
Compiler-Driven Energy Efficiency:Introduction-Energy-Aware I/O Optimizations-Modifying Application Code-Modifying Disk Layout of Data-Energy-Aware NoC Optimization-History -Based Dynamic Link Voltage Scaling-Static Analysis-Based Link Voltage Scaling
4
FIRST INTERNAL EXAMINATION
2
An Adaptive Run-Time System for Improving Energy Efficiency:Introduction-An Adaptive Run-Time System-Evaluation Methodology and setup-Experimental Results-Conclusion-Energy
5
30%
3
Efficient Multithreading through Run-Time Adaptation:Introduction-Run-Time Systems for Power-Performance Adaptation:An Overview-Scalability Prediction: Static Scalability Prediction Models-Dynamic Scalability Prediction Models-Evaluation-Multidimensional Power-Performance Adaptation: Sca Analysis of parallel applications-Run-Time support for Energy-Efficient Multithreading – Intergrating DCT with DVFS Exploring Trade-Offs between Energy Savings and Reliability in Storage Systems:Introduction-Reliability versus Energy-Efficient of storage system
6
SECOND INTERNAL EXAMINATION
3
Current state of the Art:Reliability Improvement Techniques-Redundant Array of Inexpensive Disks-Latent sector errors -Interleaved parity check-Disk Scrubbing-Intradisk Redundancy-Idle Read after Write-Fine-Tuning Intradisk Redundancy and Accelerated Scrubbing-Staggered Scrubbing -Energy Management Technique-High-Energy Consumption of Disk Arrays-Energy Conservation via Disk Block Migration
3
40%
4
Energy-Efficient Virtualized Systems:Introduction-Virtualization and Power management-Benefits of virtualized data center deployments-Virtualization Architectural overview-Power management requirements for virtualized systems-Platform enhancement for energy-aware VM management-Coordinated VM power Management with VirtualPower- VirtualPower architectural Overview-Experimental Results-Paravirtualized Management Interfaces for platform power budgeting-Power Management mechanisms for distributed Virtualized platforms-Experimental Results
9
END SEMESTER EXAM
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 85
Course No. Course Title L-T-P-
Credits Year
06NE7031 Seminar II 0-0-2-2 2015 Each student shall present a seminar on any topic of interest related Computer Networks/ Related fields. He / she shall select the topic based which can be extended for their Course Project on the References: from reputed International Journals, preferably IEEE journals. They should get the paper approved by the Programme Co-ordinator / Faculty member in charge of the seminar and shall present it in the class. Every student shall participate in the seminar. The students should undertake a detailed study on the topic and submit a report at the end of the semester. Marks will be awarded based on the topic, presentation, participation in the seminar and the report submitted. Encourage students to convert these seminar topics into a good survey paper or Technical paper.
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 86
Course No. Course Title L-T-P-
Credits Year
06NE7041 Project(Phase 1) 0-0-8-6 2015 In Project(Phase 1), the students are expected to select an emerging research area in Network Engineering or related fields, After conducting a detailed literature survey, they should compare and analyze research work done and review recent developments in the area and prepare an initial design of the work to be carried out as Project(Phase 2). It is expected that the students should refer National and International Journals and proceedings of National and International conferences while selecting a topic for their thesis. He/She should select a recent topic from a reputed International Journal, preferably IEEE/ACM. Emphasis should be given for introduction to the topic, literature survey, and scope of the proposed work along with some preliminary work carried out on the thesis topic. Students should submit a copy of Project(Phase 1) thesis report covering the content discussed above and highlighting the features of work to be carried out in Phase-II of the thesis. Students should follow standard practice of thesis writing. Presenting the work, carried out by the students in a National/International Conference is encouraged. The project work has to be carried out within the department itself. There is a project guide allotted to each student by the head of the division / course coordinator. The project work shall be reviewed and evaluated periodically by the project guide. Under special cases, student can carry out a project in a reputed Industry / R&D institutions with the permission of course coordinator / HOD. The candidate should present the current status of the thesis work and the assessment will be made on the basis of the work and the presentation, by a panel of internal examiners in which one will be the internal guide. The examiners should give their suggestions in writing to the students so that it should be incorporated in the Project(Phase 2)of the thesis.
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 87
SEMESTER – IV
Kerala Technological University Ernakulam Cluster - 1
M.Tech in Network Engineering 88
Course No. Course Title L-T-P-
Credits Year
06NE7012 Project(Phase 2) 0-0-21-12 2015 In the fourth semester, the student has to continue the Project () work and after the successful completion of the work, he / she have to submit a detailed thesis report. The work carried out should lead to a publication in a National / International Conference. They should submit the paper before the evaluation of the thesis and specific weightage will be given to accepted papers in reputed conferences.