BHILAI INSTITUTE OF TECHNOLOGY, DURG
(An Autonomous Institution)
SCHEME OF TEACHING AND EXAMINATION (Effective from 2020-2021 Batch)
M. Tech. (Computer Networks) First Semester
Sl. N
o
Board of Studies
(BOS) Course (Subject)
Course
Code
Periods
Per Week
Scheme of
Examination
Tota
l
Mark
s
Cred
it
Theory/Practical
L T P ESE CT TA
1 Computer Science
& Engineering
Computer &
Communication
Networks
221101CS 3 1 - 100 20 20 140 4
2 Computer Science
& Engineering Network Processors 221102CS 3 1 - 100 20 20 140 4
3 Computer Science
& Engineering
Advance Network
Programming 221103CS 3 1 - 100 20 20 140 4
4 Computer Science
& Engineering
Wireless
Technology &
Standards
221104CS 3 1 - 100 20 20 140 4
5 Refer Table-I Elective-I 3 1 - 100 20 20 140 4
6 Computer Science
& Engineering
Computer N/W Simulation
Laboratory
221191CS - - 3 75 - 75 150 2
7 Computer Science
& Engineering
Advance Network
Programming
Laboratory
221192CS - - 3 75 - 75 150 2
Total 15 5 6 650 100 250 1000 24
Table - IElective - I S
l. No
Board of Studies (BOS) Course (Subject) Course Code
1 Computer Science & Engineering Advanced TCP/IP 221121CS
2 Computer Science & Engineering Mobile & Cellular Telecommunication 221122CS
3 Computer Science & Engineering Distributed Computing 221123CS
4 Computer Science & Engineering Internetworking Technologies 221124CS
5 Computer Science & Engineering Mobile Computing 221125CS
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-Teacher's
Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Computer & Communication Networks
Course Code 221101CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn about
various internet access technologies and networking
devices, study routing protocols and to understand
the basics of mobile ad-hoc networks and wireless
sensor networks.
On successful completion of the course, the student will be able to:
CO1: Identify the available internet access
technologies and for each of these access technologies, provide a range of transmission
rates and networking devices.
CO2: Outline a suitable routing protocol for
interconnected networks. CO3: List appropriate transport layer protocol required
for an application.
CO4: Describe the component and working of wireless networks.
CO5: Explain the basics of mobile ad-hoc networks and
wireless sensor networks.
UNIT-I:
Review Computer Networks and the Internet: What is the Internet, The Network edge, The Network core,
Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-Switched
Networks, History of Computer Networking and the Internet - Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized Packets Model: ATM -
Networking Devices: Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices,
Router Structure. [10 Hrs]
UNIT II:
The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error- Detection and Error
Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs
and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing and Internetworking: Network–Layer Routing, Least-Cost Path algorithms, Non-Least-Cost-Path algorithms, Intra domain Routing Protocols,
Inter domain Routing Protocols, Congestion Control at Network Layer. [10 Hrs]
UNIT III:
Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6,
Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques, Intra
domain Multicast Protocols, Inter domain Multicast Protocols, Node-Level Multicast algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol
(UDP), Mobile Transport Protocols, TCP Congestion Control – Application Layer: Principles of Network
Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System
(DNS), P2P File Sharing, Socket Programming with TCP and UDP, Building a Simple Web Server. [10 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
UNIT IV
Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE
802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) - Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking Devices, Large-Scale
Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study: An All-Optical Switch.
[9 Hrs]
UNIT V:
VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label Switching
(MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking, Stream
Control Transmission Protocol - Mobile Ad-Hoc Networks: Overview of Wireless Ad-Hoc Networks,
Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless Sensor Networks: Sensor
Networks and Protocol Structures, Communication Energy Model, Clustering Protocols, Routing Protocols.
[9 Hrs]
Text Books:
S. No. Title Authors Publisher
1) Computer Networking: A Top-Down
Approach Featuring the Internet
James F. Kurose, Keith
W. Ross Pearson Education
2) Computer and Communication Networks Nader F. Mir Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) Data Communications and Networking Behrouz A. Forouzan Tata McGraw Hill
2) Guide to Networking Essentials Greg Tomsho,Ed Tittel,
David Johnson
Thomson
3) An Engineering Approach to Computer
Networking
S.Keshav Pearson Education
4) Campus Network Design Fundamentals Diane Teare, Catherine
Paquet
Pearson Education (CISCO
Press)
5) Computer Networks Andrew S. Tanenbaum Prentice Hall
6) The Internet and Its Protocols A.Farrel Elsevier
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Network Processors
Course Code
221102CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn the
fundamentals of Network Processors. To make
students aware about Network processor
technology. Get knowledge about Commercial
Network Processors.
On successful completion of the course, the student will
be able to: CO1: Analyze the working of Network processing
hardware and concept classification and
forwarding. CO2: Examine and compare various components of
Network Processor Technology.
CO3: Analyze and interpret the concept of Commercial
Network Processors. CO4: Analyze Network Processor Architecture.
CO5: Discuss and interpret IOS Technologies.
UNIT-I:
INTRODUCTION Traditional protocol processing Systems – Network processing Hardware – Basic Packet
Processing Algorithms and data Structures - Packet processing functions – Protocol Software Hardware Architectures for Protocol processing – Classification and Forwarding – Switching Fabrics. [10 Hrs]
UNIT II:
NETWORK PROCESSOR TECHNOLOGY Network Processors: Motivation and purpose Complexity of
Network Processor Design – Network Processor Architectures architectural variety, architectural characteristics
Peripheral Chips supporting Network Processors: Storage processors, Classification Processors, Search Engines, Switch Fabrics, Traffic Managers. [10 Hrs]
UNIT III:
COMMERCIAL NETWORK PROCESSORS Multi-Chip Pipeline, Augmented RISC processor, Embedded Processor plus Coprocessors, Pipeline of Flomogeneous processors. Configurable Instruction set processors –
Pipeline of Electrogeneous processors – Extensive and Diverse processors – Flexible RISC plus Coprocessors –
Scalability issues – Design Tradeoffs and consequences. [10 Hrs]
UNIT IV [NETWORK PROCESSOR: ARCHITECTURE AND PROGRAMMING CASE STUDY
Architecture: Intel Network Processor: Multiheaded Architecture Overview – Features – Embedded EISC
processor - Packet Processor Hardware – Memory interfaces – System and Control Interface Components – Bus Interface. Programming Software Development Kit-IXP Instruction set – register formats – Micro Engine
Programming – Intra thread and Inter-thread communication – thread synchronization – developing sample
applications – control plane – ARM programming. [9 Hrs]
UNIT V: IOS TECHNOLOGIES CISCO COS – Connectivity and scalability – high availability – IP
routing – IP services – IPV6 – Mobile IP – MPLS – IP Multicast 0 Manageability – QoS – Security –
Switching – Layer VPN2. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Networks Systems Design using
Network Processors
Douglas E.Comer Prentice Hall Jan.
2) Network Processors: Architectures,
Protocols and Paradigms
Panas C. Lekkas McGraw Hill, Professiona
Reference Books:
S. No. Title Authors Publisher
1) Network Processor Design Patrick Crowley Morgan Kaufman
2) IXP2400/2806 Programming: The
Microengine Coding Grade
Erik, J.Johnson and Aaron
R.Kunze Intel Press
3)
Intel Internet Exchange
Architecture & Applications a Practical Guide to Intel’s network
Processors
Hill Carlson Intel press
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Advanced Network Programming
Course Code
221103CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn
about network architecture, protocols, port,
socket interface for developing client server-
based application, routing information and
domain name system.
On successful completion of the course, the student will be
able to: CO1: List components required to design network-based
application.
CO2: Develop client server application using socket and debug if error occurs in server side.
CO3: Apply access routing table information and domain
name essential information. CO4: Design solution for broadcasting and multicast
addressing.
CO5: Develop test client and thread-based server
application.
UNIT-I:
The Transport Layer: TCP and UDP with policy control TCP Connection Establishment and Termination,
TIME_WAIT State, Port Numbers, Concurrent Servers, Buffer Sizes and Limitations. [10 Hrs]
UNIT II: Sockets and Socket Programming Introduction, Socket Address Structures, Value-Result Arguments, Byte
Ordering Functions, Byte Manipulation Functions, socket Function. TCP Client-Server: TCP Echo Server, TCP
Echo Client, Crashing of Server Host, Crashing and Rebooting of Server Host, Shutdown of Server Host. UDP Sockets: UDP Echo server, UDP Echo Client. [10 Hrs]
UNIT III:
Routing Sockets Datalink Socket Address Structure, Reading and Writing, Interface Name and Index unctions Name and Address Conversions Domain Name System, Functions. Advanced Name and Address onversions:
Functions and Implementation [10 Hrs]
UNIT IV
IPv4 and IPv6 Interoperability IPv4 Client, IPv6 Server, IPv6 Client, IPv4 Server, IPv6 Address Testing Macros, IPV6_ADDRFORM Socket Option Multicasting and Broadcasting Broadcast Addresses, Unicast
versus Broadcast, Multicasting: Multicast Addresses, Multicasting versus Broadcasting on A LAN,
Multicasting on a WAN, Multicast Socket Options, Simple Network Time Protocol, SNTP. [9 Hrs]
UNIT V:
Threads Thread Functions: Creation and Termination, TCP Echo Server, Thread-Specific Data, Web Client
and Simultaneous Connections. Client-Server Design iterative TCP Client Alternatives, TCP Test Client, Iterative Server, Concurrent Server, Thread Locking around accept, TCP Preforked Server, Descriptor Passing,
TCP Concurrent Server, One Thread per Client, TCP Prethreaded Server. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1)
UNIX network programming
Volume-1 - The Sockets
Networking API
Steavens/ Bill Fenner /
Rudoff
Pearson
2) Data Communications and
Networking Behrouz A. Forouzan Tata McGraw Hill
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Wireless Technology & Standards
Course Code
221104CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to understand
the functioning of wireless communication system
and evolution of different wireless communication
systems and standards.
On successful completion of the course, the student will
be able to: CO1: Demonstrate their understanding on functioning
of wireless communication system and evolution
of different wireless communication systems and standards.
CO2: Compare different technologies used for wireless
communication systems. CO3: Explain the architecture, functioning, protocols,
capabilities and application of various wireless
communication networks.
CO4: Demonstrate an ability explain multiple access techniques for Wireless Communication
CO5: Demonstrate an ability to evaluate design
challenges, constraints and security issues associated with Ad-hoc wireless networks
UNIT-I:
Transmission Fundamentals: Signals for conveying Information, Analog & Digital Data Transmission,
Channel Capacity, Transmission Media Multiplexing. [10 Hrs]
UNIT II:
Antennas and Propagation: Antennas, propagation modes, Line -Of-Sight Transmission. [10 Hrs]
UNIT III:
Wireless Standards IEEE 802.11a/b/g and IEEE 802.15, 16: Introduction to wireless networking,
Nomenclature & Design, Types of networks: Satellite, GSM, Network Operation. Challenges for the MAC, MAC Access Modes and Timings, Contention-Based Access using the DCF. 802.11 frames. [10 Hrs]
UNIT IV
Wifi , Wi-Max & Bluetooth [9 Hrs]
UNIT V:
Advanced Wireless Protocols WEP: WEP Cryptographic Operations, WEP Data processing, Problems with WEP. EAP: EAP formats, Working of EAP. Mobile IP, TCP-Snoop, M-TCP. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Wireless Communications and
Networks
William Stallings Pearson Education
2) 802.11 Wireless Networks, The definitive Guide
O’Reilly Publications.
3) Wireless Communications:
Principles and Practice
Theodore S. Rappaport Pearson Education India
Reference Books:
S. No. Title Authors Publisher
1) Wireless and Personal
Communications Systems
Vijay K Garg and Joseph E
Wilkes
Prentice Hall,
1996
2) Wireless Information Networks Kaveh Pahlavan & Allen H Levesque
John Wiley & Sons, 1995.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Advanced TCP/IP (Elective - I )
Course Code 221121CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to study the
problematic of service integration in TCP/IP
networks focusing on protocol design,
implementation and performance issues.
On successful completion of the course, the student will
be able to:
CO1: Identify the issues in designing Client-Server environment
CO2: Explain the concept of DHCP and DDNS
CO3: Determine the need of TELNET and discuss how it can be accomplished.
CO4: Explain the principles and functionality of
SMTP.
CO5: Explain theoretical and practical concepts of Voice Over IP.
UNIT I:
Introduction to Client-Server environment Introduction Client-Server model, complexity of servers, RARP servers, UNIX IO paradigm and Network IO, Sending and Receiving data through a Socket, IP address
manipulation outlines, Obtaining Information about Host, Networks Protocols and Network services. [10 Hrs]
UNIT II:
BOOTP and DHCP- BOOTP Operations, BOOTP Message format, DHCP Operations, DHCP Message format.
Domain Name System - Hierarchical Name space, Domain Name Space: Label. Domain name, FQDN,
Distribution of Name space: Hierarchy of Name space, Zone, Root servers, DNS in the Internet, Resolution: Mapping Names to Address, Mapping Address to Names, Recursive resolution, Iterative resolution, caching,
Types of Record: Resource record, Zone Delegation, Zone Transfer, DDNS. [10 Hrs]
UNIT III:
TELNET and Rlogin- Concept of Telnet, Telnet Protocol and options, Timesharing Environments, Network
Virtual Terminals (NVT), Mode of operations, Rlogin File Transfer Protocol- FTP, FTP features, process
model, TFTP, NFS implementation, RPC. [10 Hrs]
UNIT IV:
Simple Mail Transfer Protocol- SMTP, User Agent, Addresses, Mail Transfer Agent, Mail transfer phases, MIME, Multi part messages, POP. Hyper Test transfer Protocols- Architectural components, URL, HTTP
transactions, Response Message, Header, WWW. [9 Hrs]
UNIT V:
Voice Over IP (RTP)- Real Time Transfer Protocol, RTP encapsulation, RTP Control protocol, operation, QoS,
RSVP [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1)
Internetworking with TCP/IP,
Principles, Protocols and
Architecture
Douglas Comer Pearson Education Asia
2) TCP/IP Protocol suite Behrouz Forouzan Tata McGraw-Hill
Reference Books:
S. No. Title Authors Publisher
1) Inside TCP/IP Karnjit S. Siyan Techmedia
2) TCP/IP Clearly Explained Pete Loshin Morgan Kaufmann
Publications
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Mobile & Cellular Telecommunication (Elective - I )
Course Code 221122CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to explain the
various terminology, principles, devices, schemes,
concepts, algorithms and different methodologies
used in Wireless Communication Networks.
On successful completion of the course, the student will
be able to:
CO1: Discuss the importance of Cellular Mobile
Systems. CO2: Analyse the Mobile radio propagation, fading,
diversity concepts and the channel modeling.
CO3: Analyse the co-channel interference and design of antenna and
CO4: Explain the principles of Cell Coverage for
Signal & Traffic.
CO5: Explain theoretical and practical concepts of Cell Site Antennas and Mobile Antennas.
UNIT I:
Introduction to Cellular Mobile Systems - A basic cellular system, performance criteria, uniqueness of mobile radio environment, operation of cellular systems, planning a cellular system, analog & digital cellular systems [10 Hrs]
UNIT II:
Elements of Cellular Radio Systems Design - General description of the problem, concept of frequency reuse
channels, co-channel interference reduction factor, desired C/I from a normal case in an omni directional
antenna system, cell splitting, consideration of the components of cellular systems. [10 Hrs]
UNIT III:
Interference - Introduction to co-channel interference, real time co-channel interference, cochannel
measurement design of antenna system, antenna parameter and their effects, diversity receiver in cochannel interference – different types. [10 Hrs]
UNIT IV:
Cell Coverage for Signal & Traffic - General introduction, obtaining the mobile point to point mode,
propagation over water or flat open area, foliage loss, propagation near in distance, long distance propagation, point to point prediction model- characteristics, cell site, antenna heights and signal coverage cells, mobile to
mobile propagation. [9 Hrs]
UNIT V:
Cell Site Antennas and Mobile Antennas - Characteristics, antenna at cell site, mobile antennas Frequency
Management and Channel Assignment Frequency management, fixed channel assignment, non-fixed channel
assignment, traffic & channel assignment. Hand Off, Dropped Calls Why hand off, types of handoff and their characteristics, dropped call rates & their evaluation. Operational Techniques- Parameters, coverage hole filler,
leaky feeders, cell splitting and small cells, narrow beam concept [9 Hrs]
Text Books:
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
S. No. Title Authors Publisher
1) Mobile Cellular Telecommunications William, C Y Lee McGraw Hill
2) Wireless and Digital Communications Dr. Kamilo Feher PHI
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Distributed Computing (Elective - I )
Course Code 221123CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to expose
students to both the abstraction and details of file
systems and to introduce concepts related to
distributed computing systems.
On successful completion of the course, the student will
be able to:
CO1: Explain the concepts and issues related
to distributed computing systems CO2: Illustrate the various paradigms of Distributed
Computing
CO3: Describe various Distributed Objects Paradigm CO4: Describe the concepts of Distributed
Document-based Systems
CO5: Apply the fundamental design paradigms and
technologies used in grid computing.
UNIT I:
Introduction- The different forms of computing – Monolithic, Distributed, Parallel and cooperative computing,
the meaning of Distributed computing, Examples of Distributed systems, the strengths and weaknesses of Distributed computing, operating system concepts relevant to distributed computing, the architecture of
distributed applications. [10 Hrs]
UNIT II:
Distributed Computing Paradigms- Paradigms for Distributed Applications – Message Passing Paradigm, The Client-Server Paradigm (Java Socket API), The peer-to-peer Paradigm, Message system (or MOM) Paradigm –
the point-to-point message model and the publish/subscribe message model, RPC model, The Distributed
Objects Paradigms – RMI, ORB, the object space Paradigm, The Mobile Agent Paradigm, the Network Services Paradigm, The collaborative application ( Groupware Paradigm),choosing a Paradigm for an
application. [10 Hrs]
UNIT III:
Distributed Objects Paradigm (RMI): Message passing versus Distributed Objects, An Archetypal Distributed
Object Architecture, Distributed Object Systems, RPC, RMI, The Java RMI Architecture, Java RMI API, A
sample RMI Application, steps for building an RMI application, testing and debugging, comparison of RMI
and socket API - Distributed Object Paradigm(CORBA): The basic Architecture, The CORBA object interface, Inter-ORB protocols, object servers and object clients, CORBA object references, CORBA Naming Service
and the Interoperable Naming Service, CORBA object services, object Adapters, Java IDL, An example
CORBA application. [10 Hrs]
UNIT IV:
Distributed Document-based Systems: WWW, Lotus Notes, comparison of WWW and Lotus Notes,
Distributed Coordination-based systems – Introduction to coordination models, TIB, JINI, comparison of TIB
and JINI - Software Agents, Agent Technology, Mobile Agents - Distributed Multimedia Systems : characteristics of multimedia data, QOS of service management, Resource Management, Stream Adaptation.
[9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
UNIT V:
Grid Computing: Definition of grid, grid types – computational grid, data grid, grid benefits and applications,
drawbacks of grid computing, grid components, grid architecture and its relation to various Distributed Technologies - Cluster Computing: Parallel computing overview, cluster computing – Introduction, Cluster
Architecture, parallel programming models and Paradigms, Applications of Clusters. [9 Hrs]
Text Books:
S. No. Title Authors Publisher
1) Distributed Computing, Principles
and Applications
M.L.Liu Pearson Education
2) Distributed Systems, Principles and
Paradigms
A.S.Tanenbaum and
M.V.Steen
Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) A Networking Approach to Grid
Computing
D.Minoli Wiley & sons
2) Grid Computing: A Practical Guide
to Technology and Applications
A.Abbas Firewall Media
3) Distributed Systems, Concepts and
Design
G.Coulouris, J.Dollimore
and Tim Kindbirg
Pearson Education
4) Java Programming with CORBA Brose, Vogel, Duddy Wiley Dreamtech
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Internetworking Technologies (Elective - I )
Course Code 221124CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to teach the
basics involved in Internetworking model, TCP/IP,
WAN connection and Internet access technologies.
On successful completion of the course, the student will
be able to:
CO1: Identify the issues in Internetworking model
and its applications area.. CO2: Analyse the concepts of IP addressing and
routing protocols.
CO3: Describe the working of transport protocols. CO4: Apply the concepts of WAN, VOIP and QOS
architectures in the internet.
CO5: Identify the concepts of internet access
technologies.
UNIT I:
Internetworking model, application & upper layers, physical & data link layers network layer & path determination, router basics: Types, configuration & operation. [10 Hrs]
UNIT II:
TCP/IP, IP Addressing, IP routing configuration, Multi-protocol routing, IP Subnets, IP routing protocols: OSPF, RIP, BGP, IP forwarding, classless inter domain routing, traffic management with access lists. [10 Hrs]
UNIT III:
Transport protocols: TCP, basic behavior, versions of TCP, UDP, link layer technologies: ARP, RARP,
Ethernet, HDLC, LAP-B. Modems, CSU/DSU, B.35 and G.7.3 interfaces, ISDN, Fire walling, IPSEC basics,
L2TP, New services over internet. [10 Hrs]
UNIT IV:
Introduction to WAN connection, configuration of X.25, configuration of frame-relay New services over the
Internet: VOIP, Fax over IP, VOATM, VOFR, RTP/RTCP, SIP, H.323. Virtual private network, IPmulticast, QOS architectures in the Internet, IntServ, DiffServ, Core Stateless fare Queing. [9 Hrs]
UNIT V:
Internet access technologies- security, directory enabled networking, network caching technologies [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) TCP/IP Illustrated- Volume 1- The
Protocols
W R Stevens Pearson Edition Asis
Education
2) Internetworking withTCP/IP Volume 1 – Principles, protocols and
architecture,
Duglas Comer Prentice Hall
Reference Books:
S. No. Title Authors Publisher
1) Internetworking Technologies
handbook
Cisco Press
2) Introduction to CISCO router
configuration
Cisco Press
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Mobile Computing (Elective - I )
Course Code 221125CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn
fundamental design paradigms and technologies to
mobile computing applications.
On successful completion of the course, the student will
be able to:
CO1: Identify the issues in designing cellular & mobile communications.
CO2: Select Medium Access Control for wireless
networks. CO3: Describe the working of Mobile IP.
CO4: Recommend appropriate transport layer
protocol for Wireless Network.
CO5: Apply the fundamental design paradigms and technologies to mobile computing applications
UNIT I:
Introduction to Mobile Communications and Computing: Mobile Computing (MC): Introduction to MC,
novel applications, limitations, and architecture GSM: Mobile services, System architecture, Radio interface,
Protocols, Localization and calling, Handover, Security, and New data services. [10 Hrs]
UNIT II:
(Wireless) Medium Access Control: Motivation for a specialized MAC (Hidden and exposed terminals, Near
and far terminals), SDMA, FDMA, TDMA, CDMA. [10 Hrs]
UNIT III:
Mobile Network Layer: Mobile IP (Goals, assumptions, entities and terminology, IP packet delivery, agent
advertisement and discovery, registration, tunneling and encapsulation, optimizations), Dynamic Host
Configuration Protocol (DHCP). [10 Hrs]
UNIT IV:
Mobile Transport Layer: Traditional TCP, Indirect TCP, Snooping TCP, Mobile TCP, Fast retransmit/fast
recovery, Transmission /time-out freezing, Selective retransmission, Transaction oriented TCP. [9 Hrs]
UNIT V:
Database Issues: Hoarding techniques, caching invalidation mechanisms, client server computing with
adaptation, power-aware and context-aware computing, transactional models, query processing, recovery, and
quality of service issues. Protocols and Tools: Wireless Application Protocol-WAP. (Introduction, protocol
architecture, and treatment of protocols of all layers), Bluetooth (User scenarios, physical layer, MAC layer,
networking, security, link management). [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Mobile Communications Jochen Schiller Wesley.
(Chapters 4, 7, 9,10, 11)
2)
Handbook of Wireless Networks and
Mobile Computing
Stojmenovic and Cacute Wiley, ISBN
0471419028. (Chapters 11, 15, 17, 26 and 27)
Reference Books:
S. No. Title Authors Publisher
1)
Mobile Computing Principles: Designing and Developing Mobile
Applications with
UML and XML
Reza Behravanfar Cambridge University Press, October 2004,
ISBN: 0521817331,
2) Fundamentals of Mobile
and Pervasive Computing
Adelstein, Frank, Gupta,
Sandeep KS, Richard III,
Golden , Schwiebert,
Loren,
ISBN: 0071412379, McGraw-
Hill Professional
3) Principles of Mobile Computing Hansmann, Merk,
Nicklous, Stober
Springer
4) Mobile and Wireless Design
Essentials
Martyn Mallick Wiley DreamTech
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Course Objectives Course Outcomes
The objective of the course is aimed to learn about
network architecture, protocols, port, socket
interface for developing client server-based
application and to learn about routing information
and domain name system.
On successful completion of the course, the student will
be able to: CO1: List components required to design network-
based application.
CO2: Develop client server application using socket and debug if error occurs in server side.
CO3: Apply access routing table information and
domain name essential information.
CO4: Design solution for broadcasting and multicast addressing.
CO5: Develop test client and thread-based server
application.
LIST OF EXPERIMENTS:
All the Programs to be written using C in UNIX Environment or simulators like NS2/NS3 , glomosim, omnet
PP, Qualnet.
1. Simulation of ARP / RARP.
2. Develop a client that contacts a given DNS server to resolve a given host name.
3. Iterative and Concurrent Daytime Client Server using TCP.
4. Iterative and Concurrent Daytime Client Server using UDP.
5. Iterative and Concurrent ECHO Client Server using TCP.
6. Iterative and Concurrent ECHO Client Server using UDP.
7. Develop a client server application for chat.
8. Develop a trace route program.
9. Signal handling and handling zombie.
10. Implementation of RPC.
11. Write a client to download a file from HTTP server.
12. Implementation of FTP.
13. Multiplexed TCP server and client.
14. Study of NS2/Glomosim
Advance Network Programming Laboratory
Course Code 221191CS L = 3 T = 0 P = 0 Credits = 2
-Examination
Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) First Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Computer Network Programming Laboratory
Course Code 221192CS L = 0 T = 0 P = 3 Credits = 2
Examination
Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of the course is aimed to study packet
capturing tool called WireShark, network Simulator –
2 (NS2), behavior of different variants of TCP and to
learn different routing protocols in wired network.
On successful completion of the course, the student
will be able to:
CO1: Apply packet capturing tool called WireShark.
CO2: Use Network Simulator – 2 (NS2).
CO3: Recommend appropriate transport layer
protocol required for an application. CO4: Describe working of routing protocols in wired
networks.
CO5: Explain the basics of mobile ad-hoc networks.
LIST OF EXPERIMENTS:
1. A thorough study of packet capturing tool called WireShark.
2. Familiarizing Network Simulator – 2 (NS2) with suitable examples
3. Simulate a wired network consisting of TCP and UDP Traffic using NS2 and then calculate their respective throughput using AWK script.
4. Performance evaluation of different routing protocols in wired network environment using NS2
5. Performance evaluation of different queues and effect of queues and buffers in wired network
environment using NS2 6. Compare the behavior of different variants of TCP (Tahoe, Reno, Vegas….) in wired network
using NS2. Comparison can be done on the congestion window behavior by plotting graph
7. Simulation of wireless Ad hoc networks using NS2/Netsim 8. Simulate a wireless network consisting of TCP and UDP Traffic using NS2 and then calculate
their respective throughput using AWK script.
9. Performance evaluation of different ad-hoc wireless routing protocols (DSDV, DSR,AODV etc) using NS2
10. Create different Wired-cum-Wireless networks and MobileIP Simulations using NS2.
BHILAI INSTITUTE OF TECHNOLOGY, DURG
(An Autonomous Institution)
SCHEME OF TEACHING AND EXAMINATION (Effective from 2020-2021 Batch)
M. Tech. (Computer Networks) SecondSemester
Sl. N
o
Board of Studies
(BOS) Course (Subject)
Course
Code
Periods
Per Week
Scheme of
Examination
Tota
l
Mark
s
Cred
it
Theory/Practical
L T P ESE CT TA
1 Computer Science & Engineering
High
Performance
Computer
Networks
221201CS 3 1 - 100 20 20 140 4
2 Computer Science
& Engineering Network Routing 221202CS 3 1 - 100 20 20 140 4
3 Computer Science
& Engineering
Mobile &
Wireless Security 221203CS 3 1 - 100 20 20 140 4
4 Computer Science & Engineering
Computer
Security & Threat
Management
221204CS 3 1 - 100 20 20 140 4
5 Refer Table-II Elective-II 3 1 - 100 20 20 140 4
6 Computer Science
& Engineering
Computer
Security &
Threat
Management
Laboratory
221291CS - - 3 75 - 75 150 2
7 Computer Science
& Engineering
Mobile &
Wireless Security
Laboratory 221292CS - - 3 75 - 75 150 2
Total 15 5 6 650 100 250 1000 24
Table - IIElective - II
Sl. N
o
Board of Studies (BOS) Course (Subject) Course Code
1 Computer Science & Engineering Agent Technology 221221CS
2 Computer Science & Engineering Convergence standards and Protocols 221222CS
3 Computer Science & Engineering Multimedia Communications & Networks 221223CS
4 Computer Science & Engineering Storage Area Network 221224CS
5 Computer Science & Engineering System & Network Administration 221225CS
Note:
(a) Abbreviations used: L-Lecture, T-Tutorial, P-Practical, ESE-End Semester Exam, CT- Class Test, TA-Teacher's
Assessment.
(b) Choice of elective course once made for an examination cannot be changed in future examinations.
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
High Performance Computer Networks
Subject Code 221201CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to understand
evolution of computer and communication
networking, associated algorithm and technologies
with traffic and congestion control.
On successful completion of the course, the student will be able to:
CO1: Identify the already existing communication
and computer networks.
CO2: Explain congestion control in TCP. CO3: Explain traffic and congestion control in ATM.
CO4: Understand the algorithm and technologies
involved in the internet and associated networks.
CO5: Explain the working of real-time transport
protocols for supporting QoS.
UNIT I: HIGH SPEED NETWORKS
Frame Relay Networks – Asynchronous transfer mode – ATM Protocol Architecture, ATM logical Connection, ATM Cell – ATM Service Categories – AAL. High Speed LAN’s: Fast Ethernet, Gigabit Ethernet, Fiber
Channel – Wireless LAN’s. Queuing Analysis- Queuing Models – Single Server Queues – Effects of
Congestion – Congestion Control – Traffic Management – Congestion Control in Packet Switching Networks – Frame Relay Congestion Control. [10 Hrs]
UNIT II: TCP CONGESTION CONTROL
TCP Flow control – TCP Congestion Control – Retransmission – Timer Management – Exponential RTO
backoff – KARN’s Algorithm Window management Performance of TCP over ATM [10 Hrs]
UNIT III: TRAFFIC AND CONGESTION CONTROL IN ATM
Traffic and Congestion control in ATM – Requirements – Attributes – Traffic Management Frame work,
Traffic Control – ABR traffic Management – ABR rate control, RM cell formats, ABR Capacity allocations – GFR traffic management. [10 Hrs]
UNIT IV: INTEGRATED AND DIFFERENTIATED SERVICES
Integrated Services Architecture – Approach, Components, Services- Queuing Discipline, FQ, PS, BRFQ, GPS, WFQ – Random Early Detection, Differentiated Services. [9 Hrs]
UNIT V: PROTOCOLS FOR QoS SUPPORT RSVP – Goals & Characteristics, Data Flow, RSVP
operations, Protocol Mechanisms – Multiprotocol Label Switching – Operations, Label Stacking, Protocol
details – RTP – Protocol Architecture, Data Transfer Protocol, RTCP [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) High speed networks and Internet William Stallings Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) High performance communication
networks Warland & Pravin Varaiya Jean Harcourt Asia Pvt. Ltd.
2) MPLS and VPN architecture Irvan Pepelnjk, Jim
Guichard and Jeff Apcar Cisco Press
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Network Routing
Subject Code 221202CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to enable the student to understand the basic concept of network
routing, switch and router specifications,
configurations and their protocols.
On successful completion of the course, the student
will be able to:
CO1: Understand the fundamental concept of
networking and network routing. CO2: Design routing algorithms for any conventional
networks
CO3: Understand the various types of key routing protocols used in modern computer networks.
CO4: Analyze the various network algorithms.
CO5: Discuss routing protocols for Quality-of-
Service routing.
UNIT I:
Networking and Network Routing: An Introduction Addressing and Internet Service: An Overview,
Network Routing, IP Addressing, Service Architecture, Protocol Stack Architecture, Router Architecture, Network Topology, Architecture, Network Management Architecture, Public Switched Telephone Network.
[10 Hrs]
UNIT II:
Routing Algorithms: Shortest Path and Widest Path: Bellman–Ford Algorithm and the Distance Vector
Approach, Dijkstra’s Algorithm, Widest Path Algorithm, Dijkstra-Based Approach, Bellman–Ford-Based
Approach, k-Shortest Paths Algorithm. OSPF and Integrated IS-IS: OSPF: Protocol Features, OSPF Packet
Format, Integrated IS-IS, Key Features, comparison BGP: Features, Operations, Configuration Initialization, [phases, Message Format. IP Routing and Distance Vector Protocol Family: RIPv1 and RIPv2. [10 Hrs]
UNIT III:
Routing Protocols: Framework and Principles Routing Protocol, Routing Algorithm, and Routing Table, Routing Information Representation and Protocol Messages, Distance Vector Routing Protocol, Link State
Routing Protocol, Path Vector Routing, Protocol, Link Cost. Internet Routing and Router Architectures
Architectural View of the Internet, Allocation of IP Prefixes and AS Number, Policy- Based Routing, Point of Presence, Traffic Engineering Implications, Internet Routing Instability. Router Architectures: Functions,
Types, Elements of a Router, Packet Flow, Packet Processing: Fast Path versus Slow Path, Router
Architectures. [10 Hrs]
UNIT IV: Analysis of Network Algorithms Network Bottleneck, Network Algorithmics, Strawman solutions, Thinking
Algorithmically, Refining the Algorithm, Cleaning up, Characteristics of Network Algorithms. IP Address
Lookup Algorithms : Impact, Address Aggregation, Longest Prefix Matching, Naïve Algorithms, Binary , Multibit and Compressing Multibit Tries, Search by Length Algorithms, Search by Value Approaches,
Hardware Algorithms, Comparing Different Approaches IP Packet Filtering and Classification : Classification,
Classification Algorithms, Naïve Solutions, Two- Dimensional Solutions, Approaches for d Dimensions,
[9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
UNIT V:
Quality of Service Routing QoS Attributes, Adapting Routing: A Basic Framework. Update Frequency,
Information Inaccuracy, and Impact on Routing, Dynamic Call Routing in the PSTN, Heterogeneous Service, Single-Link Case, A General Framework for Source-Based QoS Routing with Path Caching , Routing Protocols
for QoS Routing, QOSPF: Extension to OSPF for QoS Routing, ATM PNNI. Routing and Traffic
Engineering Traffic Engineering of IP/MPLS Networks, VPN Traffic Engineering, Problem Illustration: Layer 3 VPN, LSP Path Determination: Constrained Shortest Path Approach, LSP Path Determination: Network Flow
Modeling Approach, Layer 2 VPN Traffic Engineering, Observations and General Modeling Framework,
Routing/Traffic Engineering for Voice Over MPLS. [9 Hrs]
Text Books:
S. No. Title Authors Publisher
1)
Network Routing: Algorithms,
Protocols, and Architectures
Deepankar Medhi and
Karthikeyan
Ramasamy
(Morgan Kaufmann Series in
Networking)
Reference Books:
S. No. Title Authors Publisher
1)
Network Algorithmic: An Interdisciplinary Approach to
Designing Fast Networked
Devices
George Varghese (Morgan Kaufmann Series in
Networking)
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Mobile & Wireless Security
Subject Code 221203CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to provide knowledge
of information security technology and methods for
communication systems that provide services for mobile
users by wireless access networks.
On successful completion of the course, the student will be able to:
CO1: Describe mobile wireless System and CIA CO2: Discuss Vulnerabilities and Security
perspective of Wireless Network.
CO3: Explain wireless Security and authentication protocols
CO4: Illustrate the Knowledge specific to
network management in context of VPN
and DMZ CO5: Design and plan the Wireless Networks.
UNIT I:
Introduction & Review Introduction to wireless communication, Understanding basic wireless concepts Basic networking architecture ,Fundamentals of wired and wireless networks, Wireless Communications vs.
Networking ,802.11 Framing ,Mobility & Roaming Signaling & Modulation .Security Models: CIA Model
,Security Context ,Security Architecture, [10 Hrs]
UNIT II:
Wireless Network Vulnerabilities and securities WarDriving, WarRiding, WarWalking, & WarChalking,
Scanning Denial of Service, Man-in-the-Middle, “Evil Twin” Access Points, MAC Address Filtering 64, 128,
and 256-bit WEP,SSID-Based Attempts, VPN-Based Solutions, IPsec, Issues & Weaknesses [10 Hrs]
UNIT III:
WPA Components: 802.1x & 802.1aa, Extensible Authentication Protocol, TKIP,WPA-PSK Transitional
Secure Network, Robust Secure Network, EAP,LEAP,PEAP,EAP-FAST, TLS & TTLS AES ,CCMP, Authentication Servers, RADIUS (DIAMETER?),Kerberos, Certificate Servers [10 Hrs]
UNIT IV:
Centralized Management Approach ,Software Solution Systems (CiscoWorks),Wireless Management Switch Systems (AireSpace/Symbol),Other Management Approaches, Performance Monitoring, 802.11i vs. VPN,
Wireless DMZ [9 Hrs]
UNIT V:
Wireless Network Planning & Design: Spectrum/Frequency Reuse Plans, Basics – Distribution System, Advanced – Integration into Enterprise Network, Improving Network Coverage and Capacity-Cell Splitting,
Cell Sectoring, Repeaters. Global Mobile Satellite Systems; case studies of the IRIDIUM and GLOBALSTAR
systems. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Enhanced Wireless Networking
Certification Max Main Max Main
Reference Books:
S. No. Title Authors Publisher
1) Wireless Security Essentials:
Defending Mobile from Data Piracy Russel Dean Vines
John Wiley &
Sons
2) Maximum Wireless Security Cyrus, Peikari and Seth Fogie
SAMS Publishing
3) Wireless and Mobile Networks
Architectures
Yi-Bing Lin and Imrich
Chlamtac John Wiley & Sons
4) Mobile and Personal Communication systems and
services
Raj Pandya Prentice Hall of India
5) Wireless Security and Privacy- Best Practices and
Design Techniques
Tara M. Swaminathan and
Charles R. Eldon Addison Wesley
6) 802.11 Security Bruce Potter and Bob Fleck O’Reilly Publications
7) Pervasive Computing Burkhardt Pearson Education, India
Edition
8) Mobile Communication J. Schiller Pearson Education, India
Edition
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Computer Security & Threat Management
Subject Code 221204CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to exhibit
knowledge to secure corrupted systems, protect
personal data, and secure computer networks in
an Organization.
On successful completion of the course, the student will
be able to:
CO1: Analyze and evaluate the computer security needs of an organization.
CO2: Determine and analyze software ulnerabilities
and security solutions to reduce the risk of exploitation
CO3: Design and implement access control rules to
assign privileges and protect data in databases.
CO4: Understand the security issues involved with different Network operating systems
CO5: Analyze the Social and intellectual Property
Issues Emerging From ‘Cyberspace
UNIT I:
Computer security, threats, attacks, computer criminals, defense methods, information and network policies,
cryptography, symmetric and public-key encryption, uses of encryption. [10 Hrs]
UNIT II:
Program security, secure programs, viruses and other malicious code, control against program threats,
protection in general-purpose OS, protected resources and methods of protection, user authentication. [10 Hrs]
UNIT III:
Designing trusted OS, models of security, database security, security requirements, reliability and integrity,
inference. [10 Hrs]
UNIT IV:
Threats in networks, network security controls, firewalls, intrusion detection, administering security, legal,
privacy, and ethical issues in computer security. [9 Hrs]
UNIT V:
Computer crime, computer fraud, hacking, unauthorized modification of information, piracy, computer pornography and harassment. Intellectual property rights, computer software copyrights, copyright in databases
and electronic publishing, law of confidence, patent laws, trademarks, product designs, international &
domestic cyber-Laws. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Security in Computing C. P. Fleeger and S. L.
Fleeger
Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) Cryptography and Network Security
Principles and Practice William Stallings Pearson
Education Asia
2) Introduction to Computer Security M. Bishop and S. S.
Venkatramanayya
Pearson Education
Asia
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Agent Technology (Elective – II)
Subject Code 221221CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to have a
proficiency in a traditional AI language and
distributed computing systems including an
ability to write simple to intermediate programs
and an ability to understand code written in that
language..
On successful completion of the course, the student will be
able to:
CO1: Explain basic agent technology.
CO2: Explain interaction between different types of
agents.
CO3: Identify the concepts of agent communication
language.
CO4: Apply different algorithms for agents.
CO5: Analyze the security features associated with agents.
UNIT-I :
Agent Definition - History - Intelligent Agents - Agent Programming Paradigms – Agent Vs Object - Aglet -
Mobile Agents – Agent Frameworks - Agent Reasoning. [10 Hrs]
UNIT-II:
Interaction between Agents - Reactive Agents - Cognitive Agents – Interaction protocols – Agent coordination
-Agent negotiation - Agent Cooperation – Agent Organization - Self – interested agents in electronic commerce
applications. [10 Hrs]
UNIT-III:
Agents and Multi-agent Systems- Problem Solving and Knowledge Representation Reasoning Systems and Learning Systems- Agent Oriented Methodologies and Frameworks- Agent Interoperability- Logics for
Multiagent Systems – Interface Agents - Agent Communication Languages - Agent Knowledge representation -
Agent adaptability - Belief Desire Intension - Mobile
Agent Applications. [10 Hrs]
UNIT-IV: Situational Calculus - Representation of Planning - Partial order Planning – Practical Planning Conditional
Planning – Replanning Agents - Distributed Problem Solving and Task Sharing - Result Sharing - Distributed
Planning - Distributed Plan Representations -Distributed Planning and Execution - Search Algorithms for
Agents - Constraint satisfaction - Path finding –
problem Two player games. [9 Hrs]
UNIT-V :
Agent Security Issues - Mobile Agents Security - Protecting Agents against Malicious Hosts - Untrusted Agent
-Black Box Security - Authentication for agents - Security issues for aglets- Agent oriented analysis and design,
Gaia methodology, MASE, OPEN process framework, Tropos, Agent UML. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Software Agents Bradshaw MIT Press
2) Artificial Intelligence: a modern
approach Russel & Norvig Prentice Hall
Reference Books:
S. No. Title Authors Publisher
1) Intelligent Software Agents
Richard Murch and
Tony Johnson Prentice Hall of India
2) Multi-agent systems A modern approach to Distributed Artificial Intelligence
Gerhard Weiss MIT press
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Convergence Standards & Protocols (Elective – II)
Subject Code 221222CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to
understand the various convergence technologies
like VOIP and ATM technologies.
On successful completion of the course, the student will be
able to:
CO1: Explain basic concepts of convergence.
CO2: Explain switching networks.
CO3: Identify the different scopes of ATM technologies.
CO4: Familiarity with the access signaling types.
CO5: Analyze the concepts behind VOIP and network
convergence.
UNIT-I :
Why Convergence, Identifying benefits of Converged network, Voice Packetization, Voice Compression
(G.711,G.726,G.729 Etc), Switching basics, Circuit Switching Vs Packet Switching, Identify capabilities of T
carrier systems. [10 Hrs]
UNIT-II:
Switching Networks: ISDN (Concept, services, architecture, protocol overview etc.), Overview Of Frame
Relay Networks, B-ISDN. [10 Hrs]
UNIT-III:
ATM Technology : ATM VPI and VCI Creation of virtual channels ,Definition of Switched Virtual Circuit
and Permanent Virtual Circuit ,Step-by-step PVC example of how an ATM network processes cells ,Step-by-step SVC example of how an ATM network processes cells ,Connection Admission Control (CAC) ,Cell Loss
Priority (CLP) ,SVC signalling - Q.2931 ,Adaptation layers from a Voice over ATM perspective ,AAL1 ,
AAL2 ,AAL5 . [10 Hrs]
UNIT-IV: Access Signaling Types: Interconnection of voice gateways & IP, ATM, and Frame Relay networks. Learn
which protocol is best for key systems, ISDN Q.931 signaling protocol ,How PRI and BRI use Q.931signaling
,Q.931 call setup process ,Comparison of signalling protocols based on ISDN's Q.931,MEGACO, ATM Q.2931, H.323, SS7. [9 Hrs]
UNIT-V :
VOIP Convergence: IP telephony basics, VOIP and its features and benefits, Overview of VOIP technology
(including access gateways), Quality Of service and VOIP Network Convergence: Characteristics of the
H.323 protocol, Identify the key benefits of Session Initiation Protocol, SIP components and messages, Media Gateway Control Protocol (MGCP), Overview of NetMeeting. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Multimedia Communications
Directions and Innovations Jerry Gibson Academic Press
2) Multimedia Communication
Systems techniques Standards and Networks
K.R.Rao Zoran
Bojkovic and Dragorad Milovanovic Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) VOIP Ulyess Black
2) ATM Networks Concepts and
Protocols
Sumeet Kasera and Pankaj
Sethi Tata McGraw Hill
3) ISDN and Broadband ISDN
with Frame relay and ATM 4/e William Stallings
Prentice Hall
Publication
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Multimedia Communications & Networks (Elective – II)
Subject Code 221223CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn the
concept of IP networks and aware students about
wireless multimedia communications.
On successful completion of the course, the student will be
able to:
CO1: Explain basic IP Networks.
CO2: Explain the concepts of advanced routing.
CO3: Identify the different aspects of guaranteed service
models.
CO4:Apply different features multimedia
communications.
CO5: Analyze a given problem and apply requisite facets
of wireless multimedia communications.
UNIT-I :
IP NETWORKS Open Data Network Model – Narrow Waist Model of the Internet – Success and Limitations
of the Internet – Suggested Improvements for IP and TCP – Significance of UDP in modern Communication –
Network level Solutions – End to End Solutions – Best Effort service model – Scheduling and Dropping
policies for Best Effort Service model [10 Hrs]
UNIT-II:
ADVANCED ROUTING Intra AS routing – Inter AS routing – Router Architecture – Switch Fabric – Active
Queue Management – Head of Line blocking – Transition from IPv4 to IPv6 – Multicasting –Abstraction of Multicast groups – Group Management – IGMP – Group Shared Multicast Tree – Source based Multicast Tree
– Multicast routing in Internet – DVMRP and MOSPF – PIM – Sparse mode and Dense mode. [10 Hrs]
UNIT-III:
GUARANTEED SERVICE MODEL Best Effort service model – Scheduling and Dropping policies – Network Performance parameters – Quality of Service and metrics – WFQ and its variants – Random Early Detection –
QoS aware Routing – Admission Control – Resource Reservation – RSVP - Traffic Shaping Algorithms –
Caching – Laissez Faire Approach – Possible Architectures – An Overview of QoS Architectures. [10 Hrs]
UNIT-IV: MULTIMEDIA COMMUNICATION Stream characteristics for Continuous media – Temporal Relationship –
Object Stream Interactions, Media Levity, Media Synchronization – Models for Temporal Specifications –
Streaming of Audio and Video – Jitter – Fixed playout and Adaptive playout – Recovering from packet loss –
RTSP –– Multimedia Communication Standards – RTP/RTCP – SIP and H.263. [9 Hrs]
UNIT-V :
WIRELESS MULTIMEDIA COMMUNICATION End to End QoS provisioning in Wireless Multimedia
Networks – Adaptive Framework – MAC layer QoS enhancements in Wireless Networks – A Hybrid MAC protocol for Multimedia Traffic – Call Admission Control in Wireless Multimedia Networks – A Global QoS
Management for Wireless Networks [9 Hrs]
Text Books:
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
S. No. Title Authors Publisher
1) High Performance Networks Jean Warland and
Pravin Vareya Morgan Kauffman Publishers
2) High Performance TCP/IP
Networking
Mahbub Hassan and
Raj Jain Pearson Education
3) High Speed Networks: Performance
and Quality of Service William Stallings Pearson Education
Reference Books:
S. No. Title Authors Publisher
1) Computer Networks : A top down
Approach Kurose and Ross Pearson Education
2) Multimedia Information
Networking Nalin K Sharda Prentice Hall of India
3)
Multimedia Wireless Networks:
Technologies,
Standards and QoS
Aura Ganz, Zvi Ganz and
Kitti Wongthawaravat Prentice Hall
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Storage Area Networks (Elective – II)
Subject Code 221224CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to expose
the students to different Backup, Archive and
Replication, Business Continuity, Local
Replication, Cloud Computing, Securing Storage
Infrastructure.
On successful completion of the course, the student will be
able to:
CO1: Explain basic storage technology.
CO2: Explain the architecture and working storage system.
CO3: Identify the evolution, architecture, components and
topologies of network storage.
CO4: Monitoring & Managing Datacenter.
CO5: Apply the virtualization technologies and securing
storage.
UNIT-I : Introduction to storage technology
Review data creation and the amount of data being created and understand the value of data to a business,
challenges in data storage and data management, Solutions available for data storage, Core elements of a data center infrastructure, role of each element in supporting business activities. [10 Hrs]
UNIT-II: Storage Systems Architecture
Hardware and software components of the host environment, Key protocols and concepts used by each
component ,Physical and logical components of a connectivity environment ,Major physical components of a disk drive and their function, logical constructs of a physical disk, access characteristics, and performance
Implications, Concept of RAID and its components , Different RAID levels and their suitability for different
application environments: RAID 0, RAID 1,RAID 3, RAID 4, RAID 5, RAID 0+1, RAID 1+0, RAID 6, Compare and contrast integrated and modular storage systems ,High-level architecture and working of an
intelligent storage system. [10 Hrs]
UNIT-III: Introduction to Networked Storage
Evolution of networked storage, Architecture, components, and topologies of FC-SAN, NAS, and IP-SAN,
Benefits of the different networked storage options, Understand the need for long-term archiving solutions and
describe how CAS fulfills the need, Understand the appropriateness of the different networked storage options for different application environments. [10 Hrs]
UNIT-IV: Information Availability & Monitoring & Managing Datacenter List reasons for planned/unplanned outages and the impact of downtime, Impact of downtime, Differentiate
between business continuity (BC) and disaster recovery (DR) ,RTO and RPO, Identify single points of failure in a storage infrastructure and list solutions to mitigate these failures , Architecture of backup/recovery and the
different backup/recovery topologies , replication technologies and their role in ensuring information
availability and business continuity, Remote replication technologies and their role in providing disaster recovery and business continuity capabilities Identify key areas to monitor in a data center, Industry standards
for data center monitoring and management, Key metrics to monitor for different components in a storage
infrastructure, Key management tasks in a data center. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
UNIT-V : Securing Storage and Storage Virtualization
Information security, Critical security attributes for information systems, Storage security Domains, List and analyzes the common threats in each domain, Virtualization technologies, block-level and file-level
virtualization technologies and processes Case Studies: The technologies described in the course are reinforced
with EMC examples of actual solutions. Realistic case studies enable the participant to design the most
appropriate solution for given sets of criteria. [9 Hrs]
Text Books:
S. No. Title Authors Publisher
1) EMC Corporation, Information
Storage and Management Wiley
2) Storage Networks: The Complete
Reference Robert Spalding Tata McGraw Hill
Reference Books:
S. No. Title Authors Publisher
1) Building Storage Networks Marc Farley Tata McGraw Hill
2) Storage Area Network
Fundamentals Meeta Gupta Pearson Education Limited
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
System & Network Administration (Elective – II)
Subject Code 221225CS L = 3 T = 1 P = 0 Credits = 4
Examination
Scheme
ESE CT TA Total ESE Duration
100 20 20 140 3 Hours
Minimum number for class tests to conducted = 2 Minimum assignments = 2
Course Objectives Course Outcomes
The objective of the course is aimed to learn the
concept of Computer Networks, networking
devices, network protocol and foundation of shell
programming.
On successful completion of the course, the student will be
able to:
CO1: Independently understand basic computer network
technology.
CO2: Understand and explain Interconnecting devices and
its components
CO3: Identify the different types of network security and
attacks within a network.
CO4: Familiarity with the basic protocols of Host
administration, and how they can be used to assist
in network design and implementation.
CO5: Analyze a given problem and apply requisite facets
of SHELL programming in order to devise a
SHELL script to solve the problem
UNIT-I : Introduction
N/w Administration Introduction to networks, TCP/IP model, IP addressing, Sub-netting NAT, VLAN. Basic
Concepts of proxy server, webserver, DNS, Firewall, Router, Mail Server and their respective configuration
settings. [10 Hrs]
UNIT-II: Interconnecting Devices
Hub, Switch, Bridges, Routers, Gateway, repeater, brouter. Knowledge about various network related
commands: ping, netstat, tracert, traceroute, ifconfg, ipconfig etc. Steps followed in establishing a network.
[10 Hrs]
UNIT-III: Security
Concept of Security, its need, issues, cryptography techniques :ciphers, substitution cipher, transposition,
symmetric key algorithms like AES, DES, public key algo's like RSA, Authentication algorithms IPSEC,
VAN, Digital Signatures, IDS, Firewall. Types of attacks, access control list, filtering rules. [10 Hrs]
UNIT-IV: Host Administration Introduction to system Administration, what are the necessary issues to be tackled in host management,
installation of unix, linux, windows OS, formatting file systems like FAT, NTFS, etc., Booting process in
various OS, User accounts, group accounts, passwords, shadow passwords, directory structure of analysis of
host machine and how to improve the systems performance. [9 Hrs]
UNIT-V : Scripting
Knowledge of UNIX commands, administration based commands, Shell scripting, AWK, Perl. [9 Hrs]
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Text Books:
S. No. Title Authors Publisher
1) Data Communications and
Networking Behrouz A. Forouzan Tata McGraw-Hill.
2) Guide to Networking Essentials Greg Tomsho,Ed
Tittel, David Johnson
Thomson.
3) Your UNIX The Ultimate Guide Sumitabha Das McGraw-Hill
Reference Books:
S. No. Title Authors Publisher
1) The Unix programming
Brian W. Kernighan and
Dennis M. Ritchie Prentice Hall of India
2) Design of the Unix Maurice J Bach Pearson
3) Advanced Unix programmer's Stephen Prato SAMS
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Computer Security & Threat Management Laboratory
Subject Code
221291CS L = 0 T = 0 P = 3 Credits = 2
Examination
Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of the course is aimed Exhibit
knowledge to secure corrupted systems,
protect personal data, and secure computer
networks in an Organization.
On successful completion of the course, the student will
be able to:
CO1: Analyze and evaluate the computer security
needs of an organization.
CO2: Determine and analyze software vulnerabilities
and security solutions to reduce the risk of
exploitation
CO3: Able to design and implement access control rules
to assign privileges and protect data in databases.
CO4: Understand the security issues involved with
different Network operating systems
CO5: Be conversant With the Social and Intellectual
Property Issues Emerging From ‘Cyberspace
LIST OF EXPERIMENTS:
Experiment No.1
Operating System Installation, Network Reconnaissance, Network Mapping, and Vulnerability Assessment lab Installing VMWare so that students may run multiple operating systems including initially Windows XP and
Red Hat 7.2 versions. Vmware is a commercial software package that allows one physical machine to run
multiple virtual machines simultaneously. Additionally, the first lab includes installation of initial network security tools. The initial tools that are loaded include a network management tool for mapping and monitoring
networks (Cheops-NG), a security auditing and network mapping tool (nmap),a ulnerability-scanning tool
(nessus) , a Windows XP scanning tool (Super Scan 4) , and a Windows reconnaissance tool (Sam Spade) . lab highlights the need to carefully consider how much and what information an organization should expose to the
Internet in order to minimize exploitation.
Experiment No.2:
Experimenting with some of the password cracking tools available for Windows and Linux as well as using a network sniffer named ethereal to sniff the network connection between Linux and Windows computers. In
addition, address resolution protocol (ARP) and ettercap tools are used to examine how hackers carry out a
Man-in-the-Middle attack. To crack passwords on the Windows system, we use a program called L0phtCrack For the Linux system, we use the software “John the Ripper” to crack the passwords. Ethereal is used to watch
a telnet session, capture packets from an SSH session, and to watch the network mapping tool nmap work. In
the second part of this lab, Address Resolution Protocol is explored and the theory of address resolution protocol poisoning is experimented with. In addition, the tool hunt is used to hijack a TCP session.
The goals of this lab include making students aware of how easy it is to obtain passwords, sniff network traffic,
and how attackers can exploit the characteristics of address resolution protocol to take over sessions in the
network. In this lab one computer with three virtual machines is used to implement a LAN with three
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
computers attached. The host computer has Red Hat 8.0 (RH 8.0) installed with VMware. The host computer
uses VMware to implement two other Red Hat 7.2 computers and a Windows XP computer all on the same
network Defense mechanisms such as password choices and defensive network scanning are used. Experiment No.3
To implement the concept of falsifying identity on a network. Both Ethernet Medium Access Control addresses
(MAC) as well as Internet Protocol (IP) address spoofing are examined and experimented with. After successfully spoofing addresses, this lab also allows examination of how attackers may use spoofing for several
kinds of denial of service attacks. In particular, a Domain Name System Spoofing tool (DNSspoof from the
dsniff tools) is examined. In addition, a tool named dsniff , which includes the capability to kill tcp sessions, is examined. To counter these types of attacks, the tool arpwatch , which helps to detect spoofing attacks, is
examined for effectiveness. The tool suite datapool , which contains approximately 100 denial of service types
of attacks, is also employed in this lab.
Experiment No.4 : Experimenting With Network sniffer and password cracking tools such as
(a) Etherial
(b) Wireshark
(c) LAN tool (d) Packet analyzer
(e) IP Watcher
(f) Etherscan
(g) PRTG Monitor (h) CAIN AND ABEL
Experiment No.5: Experimenting With Cryptography Techniques
(a) Symmetric Encryption Scheme - Stream Cipher RC4 (b) Symmetric Encryption Scheme - Block Cipher – SDES & 3DES
(c) Asymmetric Encryption Scheme – Block Cipher RSA
(d) Block Cipher Modes- ECB,CBC,CFB,OFB (e) Hashing Schemes
Experiment No.6: Experimenting With Web Services using crypto techniques
(a) Public Key Infrastructure
(b) Authentication Schemes (c) Steganography
Experiment No.7: Exercising with Network Enumeration (Identification) for
(a) System Identification (b) OS Detection
(c) Port scanning and Services identification
Experiment No-08: Experimenting with Network System Threats
(a) Denial of Service DOS
(b) Distributed Denial of Service DDOS
(c) Sniffer
Experiment No.09: Experimenting with Malware tools
(a) Trojans and Backdoors
(b) Virus and Antivirus Method
Experiment No.10: Experimenting with Web Vulnerabilities
(a) Web based password Capturing
(b) SQL Injection
(c) Buffer Overflow
(d) Honeypots – FTP, Telnet
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
Mobile & Wireless Security Laboratory
Subject Code 221292CS L = 0 T = 0 P = 3 Credits = 2
Examination
Scheme
ESE CT TA Total ESE Duration
75 - 75 150 -
Course Objectives Course Outcomes
The objective of the course is aimed to provide
knowledge of information security technology and
methods for communication systems that provide
services for mobile users by wireless access
networks.
On successful completion of the course, the student will
be able to:
CO1: Exposure of mobile wireless System and CIA
CO2: Vulnerabilities and Security perspective of
Wireless Network
CO3: Exposure to wireless Security and
authentication protocols
CO4: Knowledge specific to network management
in context of VPN and DMZ
CO5: To plan and Design Wireless Networks.
LIST OF EXPERIMENTS:
The following laboratory projects will be conducted during the course of the semester. All students are
expected to participate in these projects.
01, Connectivity and Security of Linksys WRT54G Wireless-G Broadband Router using Factory Settings
02, Communication within a Wireless LAN using File Sharing
03, Incorporating Simple WEP Encryption
04, Adding Internet Access to a Wireless LAN
05, Introduction to Windows Zero Wireless Configuration
06, Automatic Switching Among Access Points
07, Introduction to NetStumbler
08, Changing IEEE Wireless Network Mode
09, Changing IEEE Transmission Rate
10, Disabling SSID Broadcast
11, Access Point Isolation
12, Creating an IBSS (ad hoc) Network
13, Network Log Files
Seth Balkrishan Memorial
Bhilai Institute of Technology, Durg (An Autonomous Institute affiliated to CSVTU, Bhilai)
SYLLABUS
M. Tech. (Computer Network) Second Semester
November 2020
1.00 Applicable for
AY 2020-21 Onwards
Chairman (AC) Chairman (BoS) Date of Release Version
14, Using NetStumbler as a Site Survey Tool
15, Using Windows as a Site Survey Tool for Linksys Wireless Networks
16, Set a MAC Address Filter on a Linksys AP
17, Set WEP on a Linksys AP
18, Set a Pre-Shared Key on Linksys AP
Top Related