M. Tech. (Computer Networks) First Semester

44
BHILAI INSTITUTE OF TECHNOLOGY, DURG (An Autonomous Institution) SCHEME OF TEACHING AND EXAMINATION (Effective from 2020-2021 Batch) M. Tech. (Computer Networks) First Semester Sl. No Board of Studies (BOS) Course (Subject) Course Code Periods Per Week Scheme of Examination Total Marks Credit Theory/Practical L T P ESE CT TA 1 Computer Science & Engineering Computer & Communication Networks 221101CS 3 1 - 100 20 20 140 4 2 Computer Science & Engineering Network Processors 221102CS 3 1 - 100 20 20 140 4 3 Computer Science & Engineering Advance Network Programming 221103CS 3 1 - 100 20 20 140 4 4 Computer Science & Engineering Wireless Technology & Standards 221104CS 3 1 - 100 20 20 140 4 5 Refer Table-I Elective-I 3 1 - 100 20 20 140 4 6 Computer Science & Engineering Computer N/W Simulation Laboratory 221191CS - - 3 75 - 75 150 2 7 Computer Science & Engineering Advance Network Programming Laboratory 221192CS - - 3 75 - 75 150 2 Total 15 5 6 650 100 250 1000 24 Table - IElective - I Sl. No Board of Studies (BOS) Course (Subject) Course Code 1 Computer Science & Engineering Advanced TCP/IP 221121CS 2 Computer Science & Engineering Mobile & Cellular Telecommunication 221122CS 3 Computer Science & Engineering Distributed Computing 221123CS 4 Computer Science & Engineering Internetworking Technologies 221124CS 5 Computer Science & Engineering Mobile Computing 221125CS Note: (a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-Teacher's Assessment. (b) Choice of elective course once made for an examination cannot be changed in future examinations.

Transcript of M. Tech. (Computer Networks) First Semester

BHILAI INSTITUTE OF TECHNOLOGY, DURG

(An Autonomous Institution)

SCHEME OF TEACHING AND EXAMINATION (Effective from 2020-2021 Batch)

M. Tech. (Computer Networks) First Semester

Sl. N

o

Board of Studies

(BOS) Course (Subject)

Course

Code

Periods

Per Week

Scheme of

Examination

Tota

l

Mark

s

Cred

it

Theory/Practical

L T P ESE CT TA

1 Computer Science

& Engineering

Computer &

Communication

Networks

221101CS 3 1 - 100 20 20 140 4

2 Computer Science

& Engineering Network Processors 221102CS 3 1 - 100 20 20 140 4

3 Computer Science

& Engineering

Advance Network

Programming 221103CS 3 1 - 100 20 20 140 4

4 Computer Science

& Engineering

Wireless

Technology &

Standards

221104CS 3 1 - 100 20 20 140 4

5 Refer Table-I Elective-I 3 1 - 100 20 20 140 4

6 Computer Science

& Engineering

Computer N/W Simulation

Laboratory

221191CS - - 3 75 - 75 150 2

7 Computer Science

& Engineering

Advance Network

Programming

Laboratory

221192CS - - 3 75 - 75 150 2

Total 15 5 6 650 100 250 1000 24

Table - IElective - I S

l. No

Board of Studies (BOS) Course (Subject) Course Code

1 Computer Science & Engineering Advanced TCP/IP 221121CS

2 Computer Science & Engineering Mobile & Cellular Telecommunication 221122CS

3 Computer Science & Engineering Distributed Computing 221123CS

4 Computer Science & Engineering Internetworking Technologies 221124CS

5 Computer Science & Engineering Mobile Computing 221125CS

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-Teacher's

Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Computer & Communication Networks

Course Code 221101CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn about

various internet access technologies and networking

devices, study routing protocols and to understand

the basics of mobile ad-hoc networks and wireless

sensor networks.

On successful completion of the course, the student will be able to:

CO1: Identify the available internet access

technologies and for each of these access technologies, provide a range of transmission

rates and networking devices.

CO2: Outline a suitable routing protocol for

interconnected networks. CO3: List appropriate transport layer protocol required

for an application.

CO4: Describe the component and working of wireless networks.

CO5: Explain the basics of mobile ad-hoc networks and

wireless sensor networks.

UNIT-I:

Review Computer Networks and the Internet: What is the Internet, The Network edge, The Network core,

Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-Switched

Networks, History of Computer Networking and the Internet - Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized Packets Model: ATM -

Networking Devices: Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices,

Router Structure. [10 Hrs]

UNIT II:

The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error- Detection and Error

Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs

and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing and Internetworking: Network–Layer Routing, Least-Cost Path algorithms, Non-Least-Cost-Path algorithms, Intra domain Routing Protocols,

Inter domain Routing Protocols, Congestion Control at Network Layer. [10 Hrs]

UNIT III:

Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6,

Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques, Intra

domain Multicast Protocols, Inter domain Multicast Protocols, Node-Level Multicast algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol

(UDP), Mobile Transport Protocols, TCP Congestion Control – Application Layer: Principles of Network

Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System

(DNS), P2P File Sharing, Socket Programming with TCP and UDP, Building a Simple Web Server. [10 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

UNIT IV

Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE

802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) - Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking Devices, Large-Scale

Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study: An All-Optical Switch.

[9 Hrs]

UNIT V:

VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label Switching

(MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking, Stream

Control Transmission Protocol - Mobile Ad-Hoc Networks: Overview of Wireless Ad-Hoc Networks,

Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless Sensor Networks: Sensor

Networks and Protocol Structures, Communication Energy Model, Clustering Protocols, Routing Protocols.

[9 Hrs]

Text Books:

S. No. Title Authors Publisher

1) Computer Networking: A Top-Down

Approach Featuring the Internet

James F. Kurose, Keith

W. Ross Pearson Education

2) Computer and Communication Networks Nader F. Mir Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) Data Communications and Networking Behrouz A. Forouzan Tata McGraw Hill

2) Guide to Networking Essentials Greg Tomsho,Ed Tittel,

David Johnson

Thomson

3) An Engineering Approach to Computer

Networking

S.Keshav Pearson Education

4) Campus Network Design Fundamentals Diane Teare, Catherine

Paquet

Pearson Education (CISCO

Press)

5) Computer Networks Andrew S. Tanenbaum Prentice Hall

6) The Internet and Its Protocols A.Farrel Elsevier

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Network Processors

Course Code

221102CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn the

fundamentals of Network Processors. To make

students aware about Network processor

technology. Get knowledge about Commercial

Network Processors.

On successful completion of the course, the student will

be able to: CO1: Analyze the working of Network processing

hardware and concept classification and

forwarding. CO2: Examine and compare various components of

Network Processor Technology.

CO3: Analyze and interpret the concept of Commercial

Network Processors. CO4: Analyze Network Processor Architecture.

CO5: Discuss and interpret IOS Technologies.

UNIT-I:

INTRODUCTION Traditional protocol processing Systems – Network processing Hardware – Basic Packet

Processing Algorithms and data Structures - Packet processing functions – Protocol Software Hardware Architectures for Protocol processing – Classification and Forwarding – Switching Fabrics. [10 Hrs]

UNIT II:

NETWORK PROCESSOR TECHNOLOGY Network Processors: Motivation and purpose Complexity of

Network Processor Design – Network Processor Architectures architectural variety, architectural characteristics

Peripheral Chips supporting Network Processors: Storage processors, Classification Processors, Search Engines, Switch Fabrics, Traffic Managers. [10 Hrs]

UNIT III:

COMMERCIAL NETWORK PROCESSORS Multi-Chip Pipeline, Augmented RISC processor, Embedded Processor plus Coprocessors, Pipeline of Flomogeneous processors. Configurable Instruction set processors –

Pipeline of Electrogeneous processors – Extensive and Diverse processors – Flexible RISC plus Coprocessors –

Scalability issues – Design Tradeoffs and consequences. [10 Hrs]

UNIT IV [NETWORK PROCESSOR: ARCHITECTURE AND PROGRAMMING CASE STUDY

Architecture: Intel Network Processor: Multiheaded Architecture Overview – Features – Embedded EISC

processor - Packet Processor Hardware – Memory interfaces – System and Control Interface Components – Bus Interface. Programming Software Development Kit-IXP Instruction set – register formats – Micro Engine

Programming – Intra thread and Inter-thread communication – thread synchronization – developing sample

applications – control plane – ARM programming. [9 Hrs]

UNIT V: IOS TECHNOLOGIES CISCO COS – Connectivity and scalability – high availability – IP

routing – IP services – IPV6 – Mobile IP – MPLS – IP Multicast 0 Manageability – QoS – Security –

Switching – Layer VPN2. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Networks Systems Design using

Network Processors

Douglas E.Comer Prentice Hall Jan.

2) Network Processors: Architectures,

Protocols and Paradigms

Panas C. Lekkas McGraw Hill, Professiona

Reference Books:

S. No. Title Authors Publisher

1) Network Processor Design Patrick Crowley Morgan Kaufman

2) IXP2400/2806 Programming: The

Microengine Coding Grade

Erik, J.Johnson and Aaron

R.Kunze Intel Press

3)

Intel Internet Exchange

Architecture & Applications a Practical Guide to Intel’s network

Processors

Hill Carlson Intel press

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Advanced Network Programming

Course Code

221103CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn

about network architecture, protocols, port,

socket interface for developing client server-

based application, routing information and

domain name system.

On successful completion of the course, the student will be

able to: CO1: List components required to design network-based

application.

CO2: Develop client server application using socket and debug if error occurs in server side.

CO3: Apply access routing table information and domain

name essential information. CO4: Design solution for broadcasting and multicast

addressing.

CO5: Develop test client and thread-based server

application.

UNIT-I:

The Transport Layer: TCP and UDP with policy control TCP Connection Establishment and Termination,

TIME_WAIT State, Port Numbers, Concurrent Servers, Buffer Sizes and Limitations. [10 Hrs]

UNIT II: Sockets and Socket Programming Introduction, Socket Address Structures, Value-Result Arguments, Byte

Ordering Functions, Byte Manipulation Functions, socket Function. TCP Client-Server: TCP Echo Server, TCP

Echo Client, Crashing of Server Host, Crashing and Rebooting of Server Host, Shutdown of Server Host. UDP Sockets: UDP Echo server, UDP Echo Client. [10 Hrs]

UNIT III:

Routing Sockets Datalink Socket Address Structure, Reading and Writing, Interface Name and Index unctions Name and Address Conversions Domain Name System, Functions. Advanced Name and Address onversions:

Functions and Implementation [10 Hrs]

UNIT IV

IPv4 and IPv6 Interoperability IPv4 Client, IPv6 Server, IPv6 Client, IPv4 Server, IPv6 Address Testing Macros, IPV6_ADDRFORM Socket Option Multicasting and Broadcasting Broadcast Addresses, Unicast

versus Broadcast, Multicasting: Multicast Addresses, Multicasting versus Broadcasting on A LAN,

Multicasting on a WAN, Multicast Socket Options, Simple Network Time Protocol, SNTP. [9 Hrs]

UNIT V:

Threads Thread Functions: Creation and Termination, TCP Echo Server, Thread-Specific Data, Web Client

and Simultaneous Connections. Client-Server Design iterative TCP Client Alternatives, TCP Test Client, Iterative Server, Concurrent Server, Thread Locking around accept, TCP Preforked Server, Descriptor Passing,

TCP Concurrent Server, One Thread per Client, TCP Prethreaded Server. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1)

UNIX network programming

Volume-1 - The Sockets

Networking API

Steavens/ Bill Fenner /

Rudoff

Pearson

2) Data Communications and

Networking Behrouz A. Forouzan Tata McGraw Hill

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Wireless Technology & Standards

Course Code

221104CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to understand

the functioning of wireless communication system

and evolution of different wireless communication

systems and standards.

On successful completion of the course, the student will

be able to: CO1: Demonstrate their understanding on functioning

of wireless communication system and evolution

of different wireless communication systems and standards.

CO2: Compare different technologies used for wireless

communication systems. CO3: Explain the architecture, functioning, protocols,

capabilities and application of various wireless

communication networks.

CO4: Demonstrate an ability explain multiple access techniques for Wireless Communication

CO5: Demonstrate an ability to evaluate design

challenges, constraints and security issues associated with Ad-hoc wireless networks

UNIT-I:

Transmission Fundamentals: Signals for conveying Information, Analog & Digital Data Transmission,

Channel Capacity, Transmission Media Multiplexing. [10 Hrs]

UNIT II:

Antennas and Propagation: Antennas, propagation modes, Line -Of-Sight Transmission. [10 Hrs]

UNIT III:

Wireless Standards IEEE 802.11a/b/g and IEEE 802.15, 16: Introduction to wireless networking,

Nomenclature & Design, Types of networks: Satellite, GSM, Network Operation. Challenges for the MAC, MAC Access Modes and Timings, Contention-Based Access using the DCF. 802.11 frames. [10 Hrs]

UNIT IV

Wifi , Wi-Max & Bluetooth [9 Hrs]

UNIT V:

Advanced Wireless Protocols WEP: WEP Cryptographic Operations, WEP Data processing, Problems with WEP. EAP: EAP formats, Working of EAP. Mobile IP, TCP-Snoop, M-TCP. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Wireless Communications and

Networks

William Stallings Pearson Education

2) 802.11 Wireless Networks, The definitive Guide

O’Reilly Publications.

3) Wireless Communications:

Principles and Practice

Theodore S. Rappaport Pearson Education India

Reference Books:

S. No. Title Authors Publisher

1) Wireless and Personal

Communications Systems

Vijay K Garg and Joseph E

Wilkes

Prentice Hall,

1996

2) Wireless Information Networks Kaveh Pahlavan & Allen H Levesque

John Wiley & Sons, 1995.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Advanced TCP/IP (Elective - I )

Course Code 221121CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to study the

problematic of service integration in TCP/IP

networks focusing on protocol design,

implementation and performance issues.

On successful completion of the course, the student will

be able to:

CO1: Identify the issues in designing Client-Server environment

CO2: Explain the concept of DHCP and DDNS

CO3: Determine the need of TELNET and discuss how it can be accomplished.

CO4: Explain the principles and functionality of

SMTP.

CO5: Explain theoretical and practical concepts of Voice Over IP.

UNIT I:

Introduction to Client-Server environment Introduction Client-Server model, complexity of servers, RARP servers, UNIX IO paradigm and Network IO, Sending and Receiving data through a Socket, IP address

manipulation outlines, Obtaining Information about Host, Networks Protocols and Network services. [10 Hrs]

UNIT II:

BOOTP and DHCP- BOOTP Operations, BOOTP Message format, DHCP Operations, DHCP Message format.

Domain Name System - Hierarchical Name space, Domain Name Space: Label. Domain name, FQDN,

Distribution of Name space: Hierarchy of Name space, Zone, Root servers, DNS in the Internet, Resolution: Mapping Names to Address, Mapping Address to Names, Recursive resolution, Iterative resolution, caching,

Types of Record: Resource record, Zone Delegation, Zone Transfer, DDNS. [10 Hrs]

UNIT III:

TELNET and Rlogin- Concept of Telnet, Telnet Protocol and options, Timesharing Environments, Network

Virtual Terminals (NVT), Mode of operations, Rlogin File Transfer Protocol- FTP, FTP features, process

model, TFTP, NFS implementation, RPC. [10 Hrs]

UNIT IV:

Simple Mail Transfer Protocol- SMTP, User Agent, Addresses, Mail Transfer Agent, Mail transfer phases, MIME, Multi part messages, POP. Hyper Test transfer Protocols- Architectural components, URL, HTTP

transactions, Response Message, Header, WWW. [9 Hrs]

UNIT V:

Voice Over IP (RTP)- Real Time Transfer Protocol, RTP encapsulation, RTP Control protocol, operation, QoS,

RSVP [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1)

Internetworking with TCP/IP,

Principles, Protocols and

Architecture

Douglas Comer Pearson Education Asia

2) TCP/IP Protocol suite Behrouz Forouzan Tata McGraw-Hill

Reference Books:

S. No. Title Authors Publisher

1) Inside TCP/IP Karnjit S. Siyan Techmedia

2) TCP/IP Clearly Explained Pete Loshin Morgan Kaufmann

Publications

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Mobile & Cellular Telecommunication (Elective - I )

Course Code 221122CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to explain the

various terminology, principles, devices, schemes,

concepts, algorithms and different methodologies

used in Wireless Communication Networks.

On successful completion of the course, the student will

be able to:

CO1: Discuss the importance of Cellular Mobile

Systems. CO2: Analyse the Mobile radio propagation, fading,

diversity concepts and the channel modeling.

CO3: Analyse the co-channel interference and design of antenna and

CO4: Explain the principles of Cell Coverage for

Signal & Traffic.

CO5: Explain theoretical and practical concepts of Cell Site Antennas and Mobile Antennas.

UNIT I:

Introduction to Cellular Mobile Systems - A basic cellular system, performance criteria, uniqueness of mobile radio environment, operation of cellular systems, planning a cellular system, analog & digital cellular systems [10 Hrs]

UNIT II:

Elements of Cellular Radio Systems Design - General description of the problem, concept of frequency reuse

channels, co-channel interference reduction factor, desired C/I from a normal case in an omni directional

antenna system, cell splitting, consideration of the components of cellular systems. [10 Hrs]

UNIT III:

Interference - Introduction to co-channel interference, real time co-channel interference, cochannel

measurement design of antenna system, antenna parameter and their effects, diversity receiver in cochannel interference – different types. [10 Hrs]

UNIT IV:

Cell Coverage for Signal & Traffic - General introduction, obtaining the mobile point to point mode,

propagation over water or flat open area, foliage loss, propagation near in distance, long distance propagation, point to point prediction model- characteristics, cell site, antenna heights and signal coverage cells, mobile to

mobile propagation. [9 Hrs]

UNIT V:

Cell Site Antennas and Mobile Antennas - Characteristics, antenna at cell site, mobile antennas Frequency

Management and Channel Assignment Frequency management, fixed channel assignment, non-fixed channel

assignment, traffic & channel assignment. Hand Off, Dropped Calls Why hand off, types of handoff and their characteristics, dropped call rates & their evaluation. Operational Techniques- Parameters, coverage hole filler,

leaky feeders, cell splitting and small cells, narrow beam concept [9 Hrs]

Text Books:

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

S. No. Title Authors Publisher

1) Mobile Cellular Telecommunications William, C Y Lee McGraw Hill

2) Wireless and Digital Communications Dr. Kamilo Feher PHI

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Distributed Computing (Elective - I )

Course Code 221123CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to expose

students to both the abstraction and details of file

systems and to introduce concepts related to

distributed computing systems.

On successful completion of the course, the student will

be able to:

CO1: Explain the concepts and issues related

to distributed computing systems CO2: Illustrate the various paradigms of Distributed

Computing

CO3: Describe various Distributed Objects Paradigm CO4: Describe the concepts of Distributed

Document-based Systems

CO5: Apply the fundamental design paradigms and

technologies used in grid computing.

UNIT I:

Introduction- The different forms of computing – Monolithic, Distributed, Parallel and cooperative computing,

the meaning of Distributed computing, Examples of Distributed systems, the strengths and weaknesses of Distributed computing, operating system concepts relevant to distributed computing, the architecture of

distributed applications. [10 Hrs]

UNIT II:

Distributed Computing Paradigms- Paradigms for Distributed Applications – Message Passing Paradigm, The Client-Server Paradigm (Java Socket API), The peer-to-peer Paradigm, Message system (or MOM) Paradigm –

the point-to-point message model and the publish/subscribe message model, RPC model, The Distributed

Objects Paradigms – RMI, ORB, the object space Paradigm, The Mobile Agent Paradigm, the Network Services Paradigm, The collaborative application ( Groupware Paradigm),choosing a Paradigm for an

application. [10 Hrs]

UNIT III:

Distributed Objects Paradigm (RMI): Message passing versus Distributed Objects, An Archetypal Distributed

Object Architecture, Distributed Object Systems, RPC, RMI, The Java RMI Architecture, Java RMI API, A

sample RMI Application, steps for building an RMI application, testing and debugging, comparison of RMI

and socket API - Distributed Object Paradigm(CORBA): The basic Architecture, The CORBA object interface, Inter-ORB protocols, object servers and object clients, CORBA object references, CORBA Naming Service

and the Interoperable Naming Service, CORBA object services, object Adapters, Java IDL, An example

CORBA application. [10 Hrs]

UNIT IV:

Distributed Document-based Systems: WWW, Lotus Notes, comparison of WWW and Lotus Notes,

Distributed Coordination-based systems – Introduction to coordination models, TIB, JINI, comparison of TIB

and JINI - Software Agents, Agent Technology, Mobile Agents - Distributed Multimedia Systems : characteristics of multimedia data, QOS of service management, Resource Management, Stream Adaptation.

[9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

UNIT V:

Grid Computing: Definition of grid, grid types – computational grid, data grid, grid benefits and applications,

drawbacks of grid computing, grid components, grid architecture and its relation to various Distributed Technologies - Cluster Computing: Parallel computing overview, cluster computing – Introduction, Cluster

Architecture, parallel programming models and Paradigms, Applications of Clusters. [9 Hrs]

Text Books:

S. No. Title Authors Publisher

1) Distributed Computing, Principles

and Applications

M.L.Liu Pearson Education

2) Distributed Systems, Principles and

Paradigms

A.S.Tanenbaum and

M.V.Steen

Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) A Networking Approach to Grid

Computing

D.Minoli Wiley & sons

2) Grid Computing: A Practical Guide

to Technology and Applications

A.Abbas Firewall Media

3) Distributed Systems, Concepts and

Design

G.Coulouris, J.Dollimore

and Tim Kindbirg

Pearson Education

4) Java Programming with CORBA Brose, Vogel, Duddy Wiley Dreamtech

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Internetworking Technologies (Elective - I )

Course Code 221124CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to teach the

basics involved in Internetworking model, TCP/IP,

WAN connection and Internet access technologies.

On successful completion of the course, the student will

be able to:

CO1: Identify the issues in Internetworking model

and its applications area.. CO2: Analyse the concepts of IP addressing and

routing protocols.

CO3: Describe the working of transport protocols. CO4: Apply the concepts of WAN, VOIP and QOS

architectures in the internet.

CO5: Identify the concepts of internet access

technologies.

UNIT I:

Internetworking model, application & upper layers, physical & data link layers network layer & path determination, router basics: Types, configuration & operation. [10 Hrs]

UNIT II:

TCP/IP, IP Addressing, IP routing configuration, Multi-protocol routing, IP Subnets, IP routing protocols: OSPF, RIP, BGP, IP forwarding, classless inter domain routing, traffic management with access lists. [10 Hrs]

UNIT III:

Transport protocols: TCP, basic behavior, versions of TCP, UDP, link layer technologies: ARP, RARP,

Ethernet, HDLC, LAP-B. Modems, CSU/DSU, B.35 and G.7.3 interfaces, ISDN, Fire walling, IPSEC basics,

L2TP, New services over internet. [10 Hrs]

UNIT IV:

Introduction to WAN connection, configuration of X.25, configuration of frame-relay New services over the

Internet: VOIP, Fax over IP, VOATM, VOFR, RTP/RTCP, SIP, H.323. Virtual private network, IPmulticast, QOS architectures in the Internet, IntServ, DiffServ, Core Stateless fare Queing. [9 Hrs]

UNIT V:

Internet access technologies- security, directory enabled networking, network caching technologies [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) TCP/IP Illustrated- Volume 1- The

Protocols

W R Stevens Pearson Edition Asis

Education

2) Internetworking withTCP/IP Volume 1 – Principles, protocols and

architecture,

Duglas Comer Prentice Hall

Reference Books:

S. No. Title Authors Publisher

1) Internetworking Technologies

handbook

Cisco Press

2) Introduction to CISCO router

configuration

Cisco Press

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Mobile Computing (Elective - I )

Course Code 221125CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn

fundamental design paradigms and technologies to

mobile computing applications.

On successful completion of the course, the student will

be able to:

CO1: Identify the issues in designing cellular & mobile communications.

CO2: Select Medium Access Control for wireless

networks. CO3: Describe the working of Mobile IP.

CO4: Recommend appropriate transport layer

protocol for Wireless Network.

CO5: Apply the fundamental design paradigms and technologies to mobile computing applications

UNIT I:

Introduction to Mobile Communications and Computing: Mobile Computing (MC): Introduction to MC,

novel applications, limitations, and architecture GSM: Mobile services, System architecture, Radio interface,

Protocols, Localization and calling, Handover, Security, and New data services. [10 Hrs]

UNIT II:

(Wireless) Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near

and far terminals), SDMA, FDMA, TDMA, CDMA. [10 Hrs]

UNIT III:

Mobile Network Layer: Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent

advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host

Configuration Protocol (DHCP). [10 Hrs]

UNIT IV:

Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast

recovery, Transmission /time-out freezing, Selective retransmission, Transaction oriented TCP. [9 Hrs]

UNIT V:

Database Issues: Hoarding techniques, caching invalidation mechanisms, client server computing with

adaptation, power-aware and context-aware computing, transactional models, query processing, recovery, and

quality of service issues. Protocols and Tools: Wireless Application Protocol-WAP. (Introduction, protocol

architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer,

networking, security, link management). [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Mobile Communications Jochen Schiller Wesley.

(Chapters 4, 7, 9,10, 11)

2)

Handbook of Wireless Networks and

Mobile Computing

Stojmenovic and Cacute Wiley, ISBN

0471419028. (Chapters 11, 15, 17, 26 and 27)

Reference Books:

S. No. Title Authors Publisher

1)

Mobile Computing Principles: Designing and Developing Mobile

Applications with

UML and XML

Reza Behravanfar Cambridge University Press, October 2004,

ISBN: 0521817331,

2) Fundamentals of Mobile

and Pervasive Computing

Adelstein, Frank, Gupta,

Sandeep KS, Richard III,

Golden , Schwiebert,

Loren,

ISBN: 0071412379, McGraw-

Hill Professional

3) Principles of Mobile Computing Hansmann, Merk,

Nicklous, Stober

Springer

4) Mobile and Wireless Design

Essentials

Martyn Mallick Wiley DreamTech

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Course Objectives Course Outcomes

The objective of the course is aimed to learn about

network architecture, protocols, port, socket

interface for developing client server-based

application and to learn about routing information

and domain name system.

On successful completion of the course, the student will

be able to: CO1: List components required to design network-

based application.

CO2: Develop client server application using socket and debug if error occurs in server side.

CO3: Apply access routing table information and

domain name essential information.

CO4: Design solution for broadcasting and multicast addressing.

CO5: Develop test client and thread-based server

application.

LIST OF EXPERIMENTS:

All the Programs to be written using C in UNIX Environment or simulators like NS2/NS3 , glomosim, omnet

PP, Qualnet.

1. Simulation of ARP / RARP.

2. Develop a client that contacts a given DNS server to resolve a given host name.

3. Iterative and Concurrent Daytime Client Server using TCP.

4. Iterative and Concurrent Daytime Client Server using UDP.

5. Iterative and Concurrent ECHO Client Server using TCP.

6. Iterative and Concurrent ECHO Client Server using UDP.

7. Develop a client server application for chat.

8. Develop a trace route program.

9. Signal handling and handling zombie.

10. Implementation of RPC.

11. Write a client to download a file from HTTP server.

12. Implementation of FTP.

13. Multiplexed TCP server and client.

14. Study of NS2/Glomosim

Advance Network Programming Laboratory

Course Code 221191CS L = 3 T = 0 P = 0 Credits = 2

-Examination

Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) First Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Computer Network Programming Laboratory

Course Code 221192CS L = 0 T = 0 P = 3 Credits = 2

Examination

Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of the course is aimed to study packet

capturing tool called WireShark, network Simulator –

2 (NS2), behavior of different variants of TCP and to

learn different routing protocols in wired network.

On successful completion of the course, the student

will be able to:

CO1: Apply packet capturing tool called WireShark.

CO2: Use Network Simulator – 2 (NS2).

CO3: Recommend appropriate transport layer

protocol required for an application. CO4: Describe working of routing protocols in wired

networks.

CO5: Explain the basics of mobile ad-hoc networks.

LIST OF EXPERIMENTS:

1. A thorough study of packet capturing tool called WireShark.

2. Familiarizing Network Simulator – 2 (NS2) with suitable examples

3. Simulate a wired network consisting of TCP and UDP Traffic using NS2 and then calculate their respective throughput using AWK script.

4. Performance evaluation of different routing protocols in wired network environment using NS2

5. Performance evaluation of different queues and effect of queues and buffers in wired network

environment using NS2 6. Compare the behavior of different variants of TCP (Tahoe, Reno, Vegas….) in wired network

using NS2. Comparison can be done on the congestion window behavior by plotting graph

7. Simulation of wireless Ad hoc networks using NS2/Netsim 8. Simulate a wireless network consisting of TCP and UDP Traffic using NS2 and then calculate

their respective throughput using AWK script.

9. Performance evaluation of different ad-hoc wireless routing protocols (DSDV, DSR,AODV etc) using NS2

10. Create different Wired-cum-Wireless networks and MobileIP Simulations using NS2.

BHILAI INSTITUTE OF TECHNOLOGY, DURG

(An Autonomous Institution)

SCHEME OF TEACHING AND EXAMINATION (Effective from 2020-2021 Batch)

M. Tech. (Computer Networks) SecondSemester

Sl. N

o

Board of Studies

(BOS) Course (Subject)

Course

Code

Periods

Per Week

Scheme of

Examination

Tota

l

Mark

s

Cred

it

Theory/Practical

L T P ESE CT TA

1 Computer Science & Engineering

High

Performance

Computer

Networks

221201CS 3 1 - 100 20 20 140 4

2 Computer Science

& Engineering Network Routing 221202CS 3 1 - 100 20 20 140 4

3 Computer Science

& Engineering

Mobile &

Wireless Security 221203CS 3 1 - 100 20 20 140 4

4 Computer Science & Engineering

Computer

Security & Threat

Management

221204CS 3 1 - 100 20 20 140 4

5 Refer Table-II Elective-II 3 1 - 100 20 20 140 4

6 Computer Science

& Engineering

Computer

Security &

Threat

Management

Laboratory

221291CS - - 3 75 - 75 150 2

7 Computer Science

& Engineering

Mobile &

Wireless Security

Laboratory 221292CS - - 3 75 - 75 150 2

Total 15 5 6 650 100 250 1000 24

Table - IIElective - II

Sl. N

o

Board of Studies (BOS) Course (Subject) Course Code

1 Computer Science & Engineering Agent Technology 221221CS

2 Computer Science & Engineering Convergence standards and Protocols 221222CS

3 Computer Science & Engineering Multimedia Communications & Networks 221223CS

4 Computer Science & Engineering Storage Area Network 221224CS

5 Computer Science & Engineering System & Network Administration 221225CS

Note:

(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-Teacher's

Assessment.

(b) Choice of elective course once made for an examination cannot be changed in future examinations.

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

High Performance Computer Networks

Subject Code 221201CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to understand

evolution of computer and communication

networking, associated algorithm and technologies

with traffic and congestion control.

On successful completion of the course, the student will be able to:

CO1: Identify the already existing communication

and computer networks.

CO2: Explain congestion control in TCP. CO3: Explain traffic and congestion control in ATM.

CO4: Understand the algorithm and technologies

involved in the internet and associated networks.

CO5: Explain the working of real-time transport

protocols for supporting QoS.

UNIT I: HIGH SPEED NETWORKS

Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed LAN’s: Fast Ethernet, Gigabit Ethernet, Fiber

Channel – Wireless LAN’s. Queuing Analysis- Queuing Models – Single Server Queues – Effects of

Congestion – Congestion Control – Traffic Management – Congestion Control in Packet Switching Networks – Frame Relay Congestion Control. [10 Hrs]

UNIT II: TCP CONGESTION CONTROL

TCP Flow control – TCP Congestion Control – Retransmission – Timer Management – Exponential RTO

backoff – KARN’s Algorithm Window management Performance of TCP over ATM [10 Hrs]

UNIT III: TRAFFIC AND CONGESTION CONTROL IN ATM

Traffic and Congestion control in ATM – Requirements – Attributes – Traffic Management Frame work,

Traffic Control – ABR traffic Management – ABR rate control, RM cell formats, ABR Capacity allocations – GFR traffic management. [10 Hrs]

UNIT IV: INTEGRATED AND DIFFERENTIATED SERVICES

Integrated Services Architecture – Approach, Components, Services- Queuing Discipline, FQ, PS, BRFQ, GPS, WFQ – Random Early Detection, Differentiated Services. [9 Hrs]

UNIT V: PROTOCOLS FOR QoS SUPPORT RSVP – Goals & Characteristics, Data Flow, RSVP

operations, Protocol Mechanisms – Multiprotocol Label Switching – Operations, Label Stacking, Protocol

details – RTP – Protocol Architecture, Data Transfer Protocol, RTCP [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) High speed networks and Internet William Stallings Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) High performance communication

networks Warland & Pravin Varaiya Jean Harcourt Asia Pvt. Ltd.

2) MPLS and VPN architecture Irvan Pepelnjk, Jim

Guichard and Jeff Apcar Cisco Press

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Network Routing

Subject Code 221202CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to enable the student to understand the basic concept of network

routing, switch and router specifications,

configurations and their protocols.

On successful completion of the course, the student

will be able to:

CO1: Understand the fundamental concept of

networking and network routing. CO2: Design routing algorithms for any conventional

networks

CO3: Understand the various types of key routing protocols used in modern computer networks.

CO4: Analyze the various network algorithms.

CO5: Discuss routing protocols for Quality-of-

Service routing.

UNIT I:

Networking and Network Routing: An Introduction Addressing and Internet Service: An Overview,

Network Routing, IP Addressing, Service Architecture, Protocol Stack Architecture, Router Architecture, Network Topology, Architecture, Network Management Architecture, Public Switched Telephone Network.

[10 Hrs]

UNIT II:

Routing Algorithms: Shortest Path and Widest Path: Bellman–Ford Algorithm and the Distance Vector

Approach, Dijkstra’s Algorithm, Widest Path Algorithm, Dijkstra-Based Approach, Bellman–Ford-Based

Approach, k-Shortest Paths Algorithm. OSPF and Integrated IS-IS: OSPF: Protocol Features, OSPF Packet

Format, Integrated IS-IS, Key Features, comparison BGP: Features, Operations, Configuration Initialization, [phases, Message Format. IP Routing and Distance Vector Protocol Family: RIPv1 and RIPv2. [10 Hrs]

UNIT III:

Routing Protocols: Framework and Principles Routing Protocol, Routing Algorithm, and Routing Table, Routing Information Representation and Protocol Messages, Distance Vector Routing Protocol, Link State

Routing Protocol, Path Vector Routing, Protocol, Link Cost. Internet Routing and Router Architectures

Architectural View of the Internet, Allocation of IP Prefixes and AS Number, Policy- Based Routing, Point of Presence, Traffic Engineering Implications, Internet Routing Instability. Router Architectures: Functions,

Types, Elements of a Router, Packet Flow, Packet Processing: Fast Path versus Slow Path, Router

Architectures. [10 Hrs]

UNIT IV: Analysis of Network Algorithms Network Bottleneck, Network Algorithmics, Strawman solutions, Thinking

Algorithmically, Refining the Algorithm, Cleaning up, Characteristics of Network Algorithms. IP Address

Lookup Algorithms : Impact, Address Aggregation, Longest Prefix Matching, Naïve Algorithms, Binary , Multibit and Compressing Multibit Tries, Search by Length Algorithms, Search by Value Approaches,

Hardware Algorithms, Comparing Different Approaches IP Packet Filtering and Classification : Classification,

Classification Algorithms, Naïve Solutions, Two- Dimensional Solutions, Approaches for d Dimensions,

[9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

UNIT V:

Quality of Service Routing QoS Attributes, Adapting Routing: A Basic Framework. Update Frequency,

Information Inaccuracy, and Impact on Routing, Dynamic Call Routing in the PSTN, Heterogeneous Service, Single-Link Case, A General Framework for Source-Based QoS Routing with Path Caching , Routing Protocols

for QoS Routing, QOSPF: Extension to OSPF for QoS Routing, ATM PNNI. Routing and Traffic

Engineering Traffic Engineering of IP/MPLS Networks, VPN Traffic Engineering, Problem Illustration: Layer 3 VPN, LSP Path Determination: Constrained Shortest Path Approach, LSP Path Determination: Network Flow

Modeling Approach, Layer 2 VPN Traffic Engineering, Observations and General Modeling Framework,

Routing/Traffic Engineering for Voice Over MPLS. [9 Hrs]

Text Books:

S. No. Title Authors Publisher

1)

Network Routing: Algorithms,

Protocols, and Architectures

Deepankar Medhi and

Karthikeyan

Ramasamy

(Morgan Kaufmann Series in

Networking)

Reference Books:

S. No. Title Authors Publisher

1)

Network Algorithmic: An Interdisciplinary Approach to

Designing Fast Networked

Devices

George Varghese (Morgan Kaufmann Series in

Networking)

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Mobile & Wireless Security

Subject Code 221203CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to provide knowledge

of information security technology and methods for

communication systems that provide services for mobile

users by wireless access networks.

On successful completion of the course, the student will be able to:

CO1: Describe mobile wireless System and CIA CO2: Discuss Vulnerabilities and Security

perspective of Wireless Network.

CO3: Explain wireless Security and authentication protocols

CO4: Illustrate the Knowledge specific to

network management in context of VPN

and DMZ CO5: Design and plan the Wireless Networks.

UNIT I:

Introduction & Review Introduction to wireless communication, Understanding basic wireless concepts Basic networking architecture ,Fundamentals of wired and wireless networks, Wireless Communications vs.

Networking ,802.11 Framing ,Mobility & Roaming Signaling & Modulation .Security Models: CIA Model

,Security Context ,Security Architecture, [10 Hrs]

UNIT II:

Wireless Network Vulnerabilities and securities WarDriving, WarRiding, WarWalking, & WarChalking,

Scanning Denial of Service, Man-in-the-Middle, “Evil Twin” Access Points, MAC Address Filtering 64, 128,

and 256-bit WEP,SSID-Based Attempts, VPN-Based Solutions, IPsec, Issues & Weaknesses [10 Hrs]

UNIT III:

WPA Components: 802.1x & 802.1aa, Extensible Authentication Protocol, TKIP,WPA-PSK Transitional

Secure Network, Robust Secure Network, EAP,LEAP,PEAP,EAP-FAST, TLS & TTLS AES ,CCMP, Authentication Servers, RADIUS (DIAMETER?),Kerberos, Certificate Servers [10 Hrs]

UNIT IV:

Centralized Management Approach ,Software Solution Systems (CiscoWorks),Wireless Management Switch Systems (AireSpace/Symbol),Other Management Approaches, Performance Monitoring, 802.11i vs. VPN,

Wireless DMZ [9 Hrs]

UNIT V:

Wireless Network Planning & Design: Spectrum/Frequency Reuse Plans, Basics – Distribution System, Advanced – Integration into Enterprise Network, Improving Network Coverage and Capacity-Cell Splitting,

Cell Sectoring, Repeaters. Global Mobile Satellite Systems; case studies of the IRIDIUM and GLOBALSTAR

systems. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Enhanced Wireless Networking

Certification Max Main Max Main

Reference Books:

S. No. Title Authors Publisher

1) Wireless Security Essentials:

Defending Mobile from Data Piracy Russel Dean Vines

John Wiley &

Sons

2) Maximum Wireless Security Cyrus, Peikari and Seth Fogie

SAMS Publishing

3) Wireless and Mobile Networks

Architectures

Yi-Bing Lin and Imrich

Chlamtac John Wiley & Sons

4) Mobile and Personal Communication systems and

services

Raj Pandya Prentice Hall of India

5) Wireless Security and Privacy- Best Practices and

Design Techniques

Tara M. Swaminathan and

Charles R. Eldon Addison Wesley

6) 802.11 Security Bruce Potter and Bob Fleck O’Reilly Publications

7) Pervasive Computing Burkhardt Pearson Education, India

Edition

8) Mobile Communication J. Schiller Pearson Education, India

Edition

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Computer Security & Threat Management

Subject Code 221204CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to exhibit

knowledge to secure corrupted systems, protect

personal data, and secure computer networks in

an Organization.

On successful completion of the course, the student will

be able to:

CO1: Analyze and evaluate the computer security needs of an organization.

CO2: Determine and analyze software ulnerabilities

and security solutions to reduce the risk of exploitation

CO3: Design and implement access control rules to

assign privileges and protect data in databases.

CO4: Understand the security issues involved with different Network operating systems

CO5: Analyze the Social and intellectual Property

Issues Emerging From ‘Cyberspace

UNIT I:

Computer security, threats, attacks, computer criminals, defense methods, information and network policies,

cryptography, symmetric and public-key encryption, uses of encryption. [10 Hrs]

UNIT II:

Program security, secure programs, viruses and other malicious code, control against program threats,

protection in general-purpose OS, protected resources and methods of protection, user authentication. [10 Hrs]

UNIT III:

Designing trusted OS, models of security, database security, security requirements, reliability and integrity,

inference. [10 Hrs]

UNIT IV:

Threats in networks, network security controls, firewalls, intrusion detection, administering security, legal,

privacy, and ethical issues in computer security. [9 Hrs]

UNIT V:

Computer crime, computer fraud, hacking, unauthorized modification of information, piracy, computer pornography and harassment. Intellectual property rights, computer software copyrights, copyright in databases

and electronic publishing, law of confidence, patent laws, trademarks, product designs, international &

domestic cyber-Laws. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Security in Computing C. P. Fleeger and S. L.

Fleeger

Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) Cryptography and Network Security

Principles and Practice William Stallings Pearson

Education Asia

2) Introduction to Computer Security M. Bishop and S. S.

Venkatramanayya

Pearson Education

Asia

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Agent Technology (Elective – II)

Subject Code 221221CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to have a

proficiency in a traditional AI language and

distributed computing systems including an

ability to write simple to intermediate programs

and an ability to understand code written in that

language..

On successful completion of the course, the student will be

able to:

CO1: Explain basic agent technology.

CO2: Explain interaction between different types of

agents.

CO3: Identify the concepts of agent communication

language.

CO4: Apply different algorithms for agents.

CO5: Analyze the security features associated with agents.

UNIT-I :

Agent Definition - History - Intelligent Agents - Agent Programming Paradigms – Agent Vs Object - Aglet -

Mobile Agents – Agent Frameworks - Agent Reasoning. [10 Hrs]

UNIT-II:

Interaction between Agents - Reactive Agents - Cognitive Agents – Interaction protocols – Agent coordination

-Agent negotiation - Agent Cooperation – Agent Organization - Self – interested agents in electronic commerce

applications. [10 Hrs]

UNIT-III:

Agents and Multi-agent Systems- Problem Solving and Knowledge Representation Reasoning Systems and Learning Systems- Agent Oriented Methodologies and Frameworks- Agent Interoperability- Logics for

Multiagent Systems – Interface Agents - Agent Communication Languages - Agent Knowledge representation -

Agent adaptability - Belief Desire Intension - Mobile

Agent Applications. [10 Hrs]

UNIT-IV: Situational Calculus - Representation of Planning - Partial order Planning – Practical Planning Conditional

Planning – Replanning Agents - Distributed Problem Solving and Task Sharing - Result Sharing - Distributed

Planning - Distributed Plan Representations -Distributed Planning and Execution - Search Algorithms for

Agents - Constraint satisfaction - Path finding –

problem Two player games. [9 Hrs]

UNIT-V :

Agent Security Issues - Mobile Agents Security - Protecting Agents against Malicious Hosts - Untrusted Agent

-Black Box Security - Authentication for agents - Security issues for aglets- Agent oriented analysis and design,

Gaia methodology, MASE, OPEN process framework, Tropos, Agent UML. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Software Agents Bradshaw MIT Press

2) Artificial Intelligence: a modern

approach Russel & Norvig Prentice Hall

Reference Books:

S. No. Title Authors Publisher

1) Intelligent Software Agents

Richard Murch and

Tony Johnson Prentice Hall of India

2) Multi-agent systems A modern approach to Distributed Artificial Intelligence

Gerhard Weiss MIT press

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Convergence Standards & Protocols (Elective – II)

Subject Code 221222CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to

understand the various convergence technologies

like VOIP and ATM technologies.

On successful completion of the course, the student will be

able to:

CO1: Explain basic concepts of convergence.

CO2: Explain switching networks.

CO3: Identify the different scopes of ATM technologies.

CO4: Familiarity with the access signaling types.

CO5: Analyze the concepts behind VOIP and network

convergence.

UNIT-I :

Why Convergence, Identifying benefits of Converged network, Voice Packetization, Voice Compression

(G.711,G.726,G.729 Etc), Switching basics, Circuit Switching Vs Packet Switching, Identify capabilities of T

carrier systems. [10 Hrs]

UNIT-II:

Switching Networks: ISDN (Concept, services, architecture, protocol overview etc.), Overview Of Frame

Relay Networks, B-ISDN. [10 Hrs]

UNIT-III:

ATM Technology : ATM VPI and VCI Creation of virtual channels ,Definition of Switched Virtual Circuit

and Permanent Virtual Circuit ,Step-by-step PVC example of how an ATM network processes cells ,Step-by-step SVC example of how an ATM network processes cells ,Connection Admission Control (CAC) ,Cell Loss

Priority (CLP) ,SVC signalling - Q.2931 ,Adaptation layers from a Voice over ATM perspective ,AAL1 ,

AAL2 ,AAL5 . [10 Hrs]

UNIT-IV: Access Signaling Types: Interconnection of voice gateways & IP, ATM, and Frame Relay networks. Learn

which protocol is best for key systems, ISDN Q.931 signaling protocol ,How PRI and BRI use Q.931signaling

,Q.931 call setup process ,Comparison of signalling protocols based on ISDN's Q.931,MEGACO, ATM Q.2931, H.323, SS7. [9 Hrs]

UNIT-V :

VOIP Convergence: IP telephony basics, VOIP and its features and benefits, Overview of VOIP technology

(including access gateways), Quality Of service and VOIP Network Convergence: Characteristics of the

H.323 protocol, Identify the key benefits of Session Initiation Protocol, SIP components and messages, Media Gateway Control Protocol (MGCP), Overview of NetMeeting. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Multimedia Communications

Directions and Innovations Jerry Gibson Academic Press

2) Multimedia Communication

Systems techniques Standards and Networks

K.R.Rao Zoran

Bojkovic and Dragorad Milovanovic Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) VOIP Ulyess Black

2) ATM Networks Concepts and

Protocols

Sumeet Kasera and Pankaj

Sethi Tata McGraw Hill

3) ISDN and Broadband ISDN

with Frame relay and ATM 4/e William Stallings

Prentice Hall

Publication

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Multimedia Communications & Networks (Elective – II)

Subject Code 221223CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn the

concept of IP networks and aware students about

wireless multimedia communications.

On successful completion of the course, the student will be

able to:

CO1: Explain basic IP Networks.

CO2: Explain the concepts of advanced routing.

CO3: Identify the different aspects of guaranteed service

models.

CO4:Apply different features multimedia

communications.

CO5: Analyze a given problem and apply requisite facets

of wireless multimedia communications.

UNIT-I :

IP NETWORKS Open Data Network Model – Narrow Waist Model of the Internet – Success and Limitations

of the Internet – Suggested Improvements for IP and TCP – Significance of UDP in modern Communication –

Network level Solutions – End to End Solutions – Best Effort service model – Scheduling and Dropping

policies for Best Effort Service model [10 Hrs]

UNIT-II:

ADVANCED ROUTING Intra AS routing – Inter AS routing – Router Architecture – Switch Fabric – Active

Queue Management – Head of Line blocking – Transition from IPv4 to IPv6 – Multicasting –Abstraction of Multicast groups – Group Management – IGMP – Group Shared Multicast Tree – Source based Multicast Tree

– Multicast routing in Internet – DVMRP and MOSPF – PIM – Sparse mode and Dense mode. [10 Hrs]

UNIT-III:

GUARANTEED SERVICE MODEL Best Effort service model – Scheduling and Dropping policies – Network Performance parameters – Quality of Service and metrics – WFQ and its variants – Random Early Detection –

QoS aware Routing – Admission Control – Resource Reservation – RSVP - Traffic Shaping Algorithms –

Caching – Laissez Faire Approach – Possible Architectures – An Overview of QoS Architectures. [10 Hrs]

UNIT-IV: MULTIMEDIA COMMUNICATION Stream characteristics for Continuous media – Temporal Relationship –

Object Stream Interactions, Media Levity, Media Synchronization – Models for Temporal Specifications –

Streaming of Audio and Video – Jitter – Fixed playout and Adaptive playout – Recovering from packet loss –

RTSP –– Multimedia Communication Standards – RTP/RTCP – SIP and H.263. [9 Hrs]

UNIT-V :

WIRELESS MULTIMEDIA COMMUNICATION End to End QoS provisioning in Wireless Multimedia

Networks – Adaptive Framework – MAC layer QoS enhancements in Wireless Networks – A Hybrid MAC protocol for Multimedia Traffic – Call Admission Control in Wireless Multimedia Networks – A Global QoS

Management for Wireless Networks [9 Hrs]

Text Books:

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

S. No. Title Authors Publisher

1) High Performance Networks Jean Warland and

Pravin Vareya Morgan Kauffman Publishers

2) High Performance TCP/IP

Networking

Mahbub Hassan and

Raj Jain Pearson Education

3) High Speed Networks: Performance

and Quality of Service William Stallings Pearson Education

Reference Books:

S. No. Title Authors Publisher

1) Computer Networks : A top down

Approach Kurose and Ross Pearson Education

2) Multimedia Information

Networking Nalin K Sharda Prentice Hall of India

3)

Multimedia Wireless Networks:

Technologies,

Standards and QoS

Aura Ganz, Zvi Ganz and

Kitti Wongthawaravat Prentice Hall

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Storage Area Networks (Elective – II)

Subject Code 221224CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to expose

the students to different Backup, Archive and

Replication, Business Continuity, Local

Replication, Cloud Computing, Securing Storage

Infrastructure.

On successful completion of the course, the student will be

able to:

CO1: Explain basic storage technology.

CO2: Explain the architecture and working storage system.

CO3: Identify the evolution, architecture, components and

topologies of network storage.

CO4: Monitoring & Managing Datacenter.

CO5: Apply the virtualization technologies and securing

storage.

UNIT-I : Introduction to storage technology

Review data creation and the amount of data being created and understand the value of data to a business,

challenges in data storage and data management, Solutions available for data storage, Core elements of a data center infrastructure, role of each element in supporting business activities. [10 Hrs]

UNIT-II: Storage Systems Architecture

Hardware and software components of the host environment, Key protocols and concepts used by each

component ,Physical and logical components of a connectivity environment ,Major physical components of a disk drive and their function, logical constructs of a physical disk, access characteristics, and performance

Implications, Concept of RAID and its components , Different RAID levels and their suitability for different

application environments: RAID 0, RAID 1,RAID 3, RAID 4, RAID 5, RAID 0+1, RAID 1+0, RAID 6, Compare and contrast integrated and modular storage systems ,High-level architecture and working of an

intelligent storage system. [10 Hrs]

UNIT-III: Introduction to Networked Storage

Evolution of networked storage, Architecture, components, and topologies of FC-SAN, NAS, and IP-SAN,

Benefits of the different networked storage options, Understand the need for long-term archiving solutions and

describe how CAS fulfills the need, Understand the appropriateness of the different networked storage options for different application environments. [10 Hrs]

UNIT-IV: Information Availability & Monitoring & Managing Datacenter List reasons for planned/unplanned outages and the impact of downtime, Impact of downtime, Differentiate

between business continuity (BC) and disaster recovery (DR) ,RTO and RPO, Identify single points of failure in a storage infrastructure and list solutions to mitigate these failures , Architecture of backup/recovery and the

different backup/recovery topologies , replication technologies and their role in ensuring information

availability and business continuity, Remote replication technologies and their role in providing disaster recovery and business continuity capabilities Identify key areas to monitor in a data center, Industry standards

for data center monitoring and management, Key metrics to monitor for different components in a storage

infrastructure, Key management tasks in a data center. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

UNIT-V : Securing Storage and Storage Virtualization

Information security, Critical security attributes for information systems, Storage security Domains, List and analyzes the common threats in each domain, Virtualization technologies, block-level and file-level

virtualization technologies and processes Case Studies: The technologies described in the course are reinforced

with EMC examples of actual solutions. Realistic case studies enable the participant to design the most

appropriate solution for given sets of criteria. [9 Hrs]

Text Books:

S. No. Title Authors Publisher

1) EMC Corporation, Information

Storage and Management Wiley

2) Storage Networks: The Complete

Reference Robert Spalding Tata McGraw Hill

Reference Books:

S. No. Title Authors Publisher

1) Building Storage Networks Marc Farley Tata McGraw Hill

2) Storage Area Network

Fundamentals Meeta Gupta Pearson Education Limited

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

System & Network Administration (Elective – II)

Subject Code 221225CS L = 3 T = 1 P = 0 Credits = 4

Examination

Scheme

ESE CT TA Total ESE Duration

100 20 20 140 3 Hours

Minimum number for class tests to conducted = 2 Minimum assignments = 2

Course Objectives Course Outcomes

The objective of the course is aimed to learn the

concept of Computer Networks, networking

devices, network protocol and foundation of shell

programming.

On successful completion of the course, the student will be

able to:

CO1: Independently understand basic computer network

technology.

CO2: Understand and explain Interconnecting devices and

its components

CO3: Identify the different types of network security and

attacks within a network.

CO4: Familiarity with the basic protocols of Host

administration, and how they can be used to assist

in network design and implementation.

CO5: Analyze a given problem and apply requisite facets

of SHELL programming in order to devise a

SHELL script to solve the problem

UNIT-I : Introduction

N/w Administration Introduction to networks, TCP/IP model, IP addressing, Sub-netting NAT, VLAN. Basic

Concepts of proxy server, webserver, DNS, Firewall, Router, Mail Server and their respective configuration

settings. [10 Hrs]

UNIT-II: Interconnecting Devices

Hub, Switch, Bridges, Routers, Gateway, repeater, brouter. Knowledge about various network related

commands: ping, netstat, tracert, traceroute, ifconfg, ipconfig etc. Steps followed in establishing a network.

[10 Hrs]

UNIT-III: Security

Concept of Security, its need, issues, cryptography techniques :ciphers, substitution cipher, transposition,

symmetric key algorithms like AES, DES, public key algo's like RSA, Authentication algorithms IPSEC,

VAN, Digital Signatures, IDS, Firewall. Types of attacks, access control list, filtering rules. [10 Hrs]

UNIT-IV: Host Administration Introduction to system Administration, what are the necessary issues to be tackled in host management,

installation of unix, linux, windows OS, formatting file systems like FAT, NTFS, etc., Booting process in

various OS, User accounts, group accounts, passwords, shadow passwords, directory structure of analysis of

host machine and how to improve the systems performance. [9 Hrs]

UNIT-V : Scripting

Knowledge of UNIX commands, administration based commands, Shell scripting, AWK, Perl. [9 Hrs]

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Text Books:

S. No. Title Authors Publisher

1) Data Communications and

Networking Behrouz A. Forouzan Tata McGraw-Hill.

2) Guide to Networking Essentials Greg Tomsho,Ed

Tittel, David Johnson

Thomson.

3) Your UNIX The Ultimate Guide Sumitabha Das McGraw-Hill

Reference Books:

S. No. Title Authors Publisher

1) The Unix programming

Brian W. Kernighan and

Dennis M. Ritchie Prentice Hall of India

2) Design of the Unix Maurice J Bach Pearson

3) Advanced Unix programmer's Stephen Prato SAMS

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Computer Security & Threat Management Laboratory

Subject Code

221291CS L = 0 T = 0 P = 3 Credits = 2

Examination

Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of the course is aimed Exhibit

knowledge to secure corrupted systems,

protect personal data, and secure computer

networks in an Organization.

On successful completion of the course, the student will

be able to:

CO1: Analyze and evaluate the computer security

needs of an organization.

CO2: Determine and analyze software vulnerabilities

and security solutions to reduce the risk of

exploitation

CO3: Able to design and implement access control rules

to assign privileges and protect data in databases.

CO4: Understand the security issues involved with

different Network operating systems

CO5: Be conversant With the Social and Intellectual

Property Issues Emerging From ‘Cyberspace

LIST OF EXPERIMENTS:

Experiment No.1

Operating System Installation, Network Reconnaissance, Network Mapping, and Vulnerability Assessment lab Installing VMWare so that students may run multiple operating systems including initially Windows XP and

Red Hat 7.2 versions. Vmware is a commercial software package that allows one physical machine to run

multiple virtual machines simultaneously. Additionally, the first lab includes installation of initial network security tools. The initial tools that are loaded include a network management tool for mapping and monitoring

networks (Cheops-NG), a security auditing and network mapping tool (nmap),a ulnerability-scanning tool

(nessus) , a Windows XP scanning tool (Super Scan 4) , and a Windows reconnaissance tool (Sam Spade) . lab highlights the need to carefully consider how much and what information an organization should expose to the

Internet in order to minimize exploitation.

Experiment No.2:

Experimenting with some of the password cracking tools available for Windows and Linux as well as using a network sniffer named ethereal to sniff the network connection between Linux and Windows computers. In

addition, address resolution protocol (ARP) and ettercap tools are used to examine how hackers carry out a

Man-in-the-Middle attack. To crack passwords on the Windows system, we use a program called L0phtCrack For the Linux system, we use the software “John the Ripper” to crack the passwords. Ethereal is used to watch

a telnet session, capture packets from an SSH session, and to watch the network mapping tool nmap work. In

the second part of this lab, Address Resolution Protocol is explored and the theory of address resolution protocol poisoning is experimented with. In addition, the tool hunt is used to hijack a TCP session.

The goals of this lab include making students aware of how easy it is to obtain passwords, sniff network traffic,

and how attackers can exploit the characteristics of address resolution protocol to take over sessions in the

network. In this lab one computer with three virtual machines is used to implement a LAN with three

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

computers attached. The host computer has Red Hat 8.0 (RH 8.0) installed with VMware. The host computer

uses VMware to implement two other Red Hat 7.2 computers and a Windows XP computer all on the same

network Defense mechanisms such as password choices and defensive network scanning are used. Experiment No.3

To implement the concept of falsifying identity on a network. Both Ethernet Medium Access Control addresses

(MAC) as well as Internet Protocol (IP) address spoofing are examined and experimented with. After successfully spoofing addresses, this lab also allows examination of how attackers may use spoofing for several

kinds of denial of service attacks. In particular, a Domain Name System Spoofing tool (DNSspoof from the

dsniff tools) is examined. In addition, a tool named dsniff , which includes the capability to kill tcp sessions, is examined. To counter these types of attacks, the tool arpwatch , which helps to detect spoofing attacks, is

examined for effectiveness. The tool suite datapool , which contains approximately 100 denial of service types

of attacks, is also employed in this lab.

Experiment No.4 : Experimenting With Network sniffer and password cracking tools such as

(a) Etherial

(b) Wireshark

(c) LAN tool (d) Packet analyzer

(e) IP Watcher

(f) Etherscan

(g) PRTG Monitor (h) CAIN AND ABEL

Experiment No.5: Experimenting With Cryptography Techniques

(a) Symmetric Encryption Scheme - Stream Cipher RC4 (b) Symmetric Encryption Scheme - Block Cipher – SDES & 3DES

(c) Asymmetric Encryption Scheme – Block Cipher RSA

(d) Block Cipher Modes- ECB,CBC,CFB,OFB (e) Hashing Schemes

Experiment No.6: Experimenting With Web Services using crypto techniques

(a) Public Key Infrastructure

(b) Authentication Schemes (c) Steganography

Experiment No.7: Exercising with Network Enumeration (Identification) for

(a) System Identification (b) OS Detection

(c) Port scanning and Services identification

Experiment No-08: Experimenting with Network System Threats

(a) Denial of Service DOS

(b) Distributed Denial of Service DDOS

(c) Sniffer

Experiment No.09: Experimenting with Malware tools

(a) Trojans and Backdoors

(b) Virus and Antivirus Method

Experiment No.10: Experimenting with Web Vulnerabilities

(a) Web based password Capturing

(b) SQL Injection

(c) Buffer Overflow

(d) Honeypots – FTP, Telnet

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

Mobile & Wireless Security Laboratory

Subject Code 221292CS L = 0 T = 0 P = 3 Credits = 2

Examination

Scheme

ESE CT TA Total ESE Duration

75 - 75 150 -

Course Objectives Course Outcomes

The objective of the course is aimed to provide

knowledge of information security technology and

methods for communication systems that provide

services for mobile users by wireless access

networks.

On successful completion of the course, the student will

be able to:

CO1: Exposure of mobile wireless System and CIA

CO2: Vulnerabilities and Security perspective of

Wireless Network

CO3: Exposure to wireless Security and

authentication protocols

CO4: Knowledge specific to network management

in context of VPN and DMZ

CO5: To plan and Design Wireless Networks.

LIST OF EXPERIMENTS:

The following laboratory projects will be conducted during the course of the semester. All students are

expected to participate in these projects.

01, Connectivity and Security of Linksys WRT54G Wireless-G Broadband Router using Factory Settings

02, Communication within a Wireless LAN using File Sharing

03, Incorporating Simple WEP Encryption

04, Adding Internet Access to a Wireless LAN

05, Introduction to Windows Zero Wireless Configuration

06, Automatic Switching Among Access Points

07, Introduction to NetStumbler

08, Changing IEEE Wireless Network Mode

09, Changing IEEE Transmission Rate

10, Disabling SSID Broadcast

11, Access Point Isolation

12, Creating an IBSS (ad hoc) Network

13, Network Log Files

Seth Balkrishan Memorial

Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)

SYLLABUS

M. Tech. (Computer Network) Second Semester

November 2020

1.00 Applicable for

AY 2020-21 Onwards

Chairman (AC) Chairman (BoS) Date of Release Version

14, Using NetStumbler as a Site Survey Tool

15, Using Windows as a Site Survey Tool for Linksys Wireless Networks

16, Set a MAC Address Filter on a Linksys AP

17, Set WEP on a Linksys AP

18, Set a Pre-Shared Key on Linksys AP