MULTIMEDIA COMMUNICATIONS As Per Choice PDF
MULTIMEDIA COMMUNICATIONS As Per Choice PDF
MULTIMEDIA COMMUNICATIONS As Per Choice PDF
Module -1 Teaching
Hours
Introduction, Overview and Applications of Wireless Sensor Networks Introduction, 8 Hours
Basic overview of the Technology, Applications of Wireless Sensor Networks:
Introduction, Background, Range of Applications, Examples of Category 2 WSN
Applications, Examples of Category 1 WSN Applications, Another Taxonomy of WSN
Technology. (Chapter 1: 1.1, 1.2, Chapter2: 2.1-2.6)
Module -2
Basic Wireless Sensor Technology and Systems: Introduction, Sensor Node Technology, 8 Hours
Sensor Taxonomy, WN Operating Environment, WN Trends, Wireless Transmission
Technology and Systems: Introduction, Radio Technology Primer, Available Wireless
Technologies (Chapter3: 3.1-3.5, Chapter 4: 4.1-4.3)
Module – 3
MAC and Routing Protocols for Wireless Sensor Networks: Introduction, Background, 8 Hours
Fundamentals of MAC Protocols, MAC Protocols for WSNs, Sensor-MAC case Study,
IEEE 802.15.4 LR-WPANs Standard Case Study. Routing Protocols for Wireless Sensor
Networks: Introduction, Background, Data Dissemination and Gathering, Routing
Challenges and Design Issues in WSNs, Routing Strategies in WSNs. (Chapter 5: 5.1-5.6,
Chapter 6: 6.1-6.5)
Module-4
Transport Control and Middleware for Wireless Sensor Networks: Traditional Transport 8 Hours
Control Protocols, Transport Protocol Design Issues, Examples of Existing Transport
Control Protocols, Performance of Transport Control Protocols. Middleware for Wireless
Sensor Networks: Introduction, WSN Middleware Principles, Middleware Architecture,
Existing Middleware. (Chapter 7: 7.1-7.4, Chap. 8: 8.1-8.4)
Module-5
Network Management and Operating System for Wireless Sensor Networks: 8 Hours
Introduction, Network Management Requirements, Traditional Network Management
Models, Network Management Design Issues. Operating Systems for Wireless Sensor
Networks: Introduction, Operating System Design Issues, Examples of Operating
Systems. (Chapter 9: 9.1-9.5, Chapter 10: 10.1-10.3)
Course outcomes:
The students shall able to:
• Explain existing applications of wireless sensor actuator networks
• Apply in the context of wireless sensor networks and explain elements of distributed
computing and network protocol design
• Contrast Various hardware, software platforms that exist for sensor networks
• Summarize various network level protocols for MAC, routing, time synchronization,
aggregation, consensus and distributed tracking
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module.
The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. KAZEM SOHRABY, DANIEL MINOLI, TAIEB ZNATI, “Wireless Sensor Networks:
Technology, Protocols and Applications:, WILEY , Second Edition (Indian) , 2014
Reference Books:
1. Ian F. Akyildiz, Mehmet Can Vuran "Wireless Sensor Networks", Wiley 2010
2. Feng Zhao & Leonidas J. Guibas, “Wireless Sensor Networks- An Information Processing
Approach", Elsevier, 2007.
OPTICAL NETWORKS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – II
Subject Code 16SCN253 IA Marks 20
CREDITS – 03
Client Layers of the Optical Layer: SONET/SDH: Multiplexing, CAT and LCAS, 8 Hours
Sonnet/SDH Layers, SONET Frame Structure, SONET/SDH Physical Layer , Elements
of a SONET/SDH Infrastructure, Optical Transport Network: Hierarchy, Frame Structure,
Multiplexing, Generic Framing Procedure Ethernet: Frame Structure, Switches, Ethernet
Physical Layer, Carrier Transport IP: Routing and Forwarding, Quality of Service
Multiprotocol Label Switching: Labels and Forwarding, Quality of Service, Signaling and
Routing, Carrier Transport, Resilient Packet Ring: Quality of Service, Node Structure,
Fairness Storage-Area Networks: Fiber Channel.
Module -2
WDM Network Elements: Optical Line Terminals, Optical Line Amplifiers, Optical 8 Hours
Add/Drop Multiplexers: OADM Architectures, Reconfigurable OADMs Optical Cross
connects: All-Optical OXC Configurations.
Module – 3
Module-4
Basic Concepts: Protection in SONET/SDH: Point-to-Point Links, Self-Healing Rings, 8 Hours
Unidirectional Line-Switched Rings, Bidirectional Line-Switched Rings, Ring
Interconnection and Dual Homing. Protection in the Client Layer: Protection in Resilient
Packet Rings, Protection in Ethernet, Protection in IP, Protection in MPLS, Why Optical
Layer Protection: Service Classes Based on Protection. Optical Layer Protection
Schemes: 1+1 OMS Protection, 1:1 OMS Protection, OMS-DPRing, OMS-SPRing, 1:N
Transponder Protection, 1+1 OCh Dedicated Protection, OCh-SPRing, OCH-Mesh
Protection, GMPLS Protection, Interworking between Layers.
Module-5
WDM Network Design: Cost Trade-OFFS: A Detailed Ring Network Example LTD and 8 Hours
RWA Problems, Light path Topology Design, Routing and Wavelength Assignment,
Wavelength Conversion. Dimensioning Wavelength-Routing Networks, Statistical
Dimensioning Models: First-Passage Model, Blocking Model, Maximum Load
Dimensioning Models: Offline Light path Requests, Online RWA in Rings
Course outcomes:
Reference Books:
MINIPROJECT
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – II
Laboratory Code 16LNI26/ 16SCE26 / 16SCN26 IA Marks 20
/16SCS26 /16SFC26 / 16SIT26 /
16SSE26
Number of Lecture Hours/Week 03 hours of lab Exam 80
Marks
Total Number of Lecture Hours ------ Exam 03
Hours
CREDITS – 02
Course objectives: This course will enable students to
• Enable the student to design, develop and analyze an application development
The student will carry out a mini project relevant to the course. The project must be development of
an application (Hardware/Software). It is preferable if the project is based on mobile application
development.
Course outcomes:
• Design, develop and to analyze an application development.
• Prepare report of the project.
Conduction of Practical Examination:
Evaluation:
Evaluation shall be taken up at the end of the semester. Project work evaluation and viva-voce
examination shall be conducted. Internal evaluation shall be carried by the Guide and Head of the
department for 20 marks. Final examination which includes demonstration of the project and viva-
voce shall be conducted for 80 Marks viz report + Outputs of the project + presentation = 30+30+20
= 80 marks.
SEMINAR
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – II
Subject Code 16SCE27 / 16SCN27 /
16LNI27 / 16SIT27 /
IA Marks 100
16SSE27 / 16SCS27 /
16SFC27
Number of Lecture Hours/Week ---- Exam Marks -
Total Number of Lecture Hours ---- Exam Hours -
CREDITS – 01
Course objectives: This course will enable students to
• Motivate the students to read technical article
• Discover recent technology developments
Descriptions
The students should read a recent technical article (try to narrow down the topic as much as possible)
from any of the leading reputed and refereed journals like:
1. IEEE Transactions, journals, magazines, etc.
2. ACM Transactions, journals, magazines, SIG series, etc.
3. Springer
4. Elsevier publications etc
In the area of (to name few and not limited to)
• Web Technology
• Cloud Computing
• Artificial Intelligent
• Networking
• Security
• Data mining
Course Outcomes
The students should be able to:
• Conduct survey on recent technologies
• Infer and interpret the information from the survey conducted
• Motivated towards research
Conduction:
The students have to present at least ONE technical seminar on the selected topic and submit a report
for internal evaluation.
Marks Distribution: Literature Survey + Presentation (PPT) + Report + Question & Answer
+ Paper: 20 + 30 + 30 + 20 (100).
CLIENT SERVER PROGRAMMING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – IV
Subject Code 16SIT151 / 16LNI41
IA Marks 20
/ 16SCN41
Number of Lecture Hours/Week 04 Exam Marks 80
Total Number of Lecture Hours 50 Exam Hours 03
CREDITS – 04
Course objectives: This course will enable students to
• Explain Client-Server software, Context Switching and Protocol Software, I/o.
• Define System Calls, Basic I/O Functions available in UNIX
• Illustrate socket interface, TCP, UDP in detail.
• Compare various client Software and various algorithms issue related to server software
design.
Module 1 Teaching
Hours
The Client Server Model and Software Design: Introduction, Motivation, 10 Hours
Terminology and Concepts. Concurrent Processing in Client-Server software:
Introduction, Concurrency in Networks, Concurrency in Servers, Terminology and
Concepts, An example of Concurrent Process Creation, Executing New Code, Context
Switching and Protocol Software Design, Concurrency and Asynchronous I/O.
Program Interface to Protocols: Introduction, Loosely Specified Protocol Software
Interface, Interface Functionality, Conceptual Interface Specification, System Calls,
Two Basic Approaches to Network Communication, The Basic I/O Functions available
in UNIX, Using UNIX I/O with TCP/IP.
Module 2
The Socket Interface: Introduction, Berkley Sockets, Specifying a Protocol Interface, 10 Hours
The Socket Abstraction, Specifying an End Point Address, A Generic Address Structure,
Major System Calls used with Sockets, Utility Routines for Integer Conversion, Using
Socket Calls in a Program, Symbolic Constants for Socket Call Parameters. Algorithms
and Issues in Client Software Design: Introduction, Learning Algorithms instead of
Details, Client Architecture, Identifying the Location of a Server, Parsing an Address
Argument, Looking up a Domain Name, Looking up a well-known Port by Name, Port
Numbers and Network Byte Order, Looking up a Protocol by Name, The TCP Client
Algorithm, Allocating a Socket, Choosing a Local Protocol Port Number, A
fundamental Problem in choosing a Local IP Address, Connecting a TCP Socket to a
Server, Communicating with the Server using TCP, Reading a response from a TCP
Connection, Closing a TCP Connection, Programming a UDP Client, Connected and
Unconnected UDP Socket, Using Connect with UDP, Communicating with a Server
using UDP, Closing a Socket that uses UDP, Partial Close for UDP, A Warning about
UDP Unreliability.
Module 3
Example Client Software: Introduction, The Importance of Small Examples, Hiding 10 Hours
Details, An Example Procedure Library for Client Programs, Implementation of Connect
TCP, Implementation of Connect UDP, A Procedure that Forms Connections, Using the
Example Library, The DAYTIME Service, Implementation of a TCP Client for
DAYTIME, Reading from a TCP Connection, The Time Service, Accessing the TIME
Service, Accurate Times and Network Delays, A UDP Client for the TIME Service, The
ECHO Service, A TCP Client for the ECHO Service, A UDP Client for the ECHO
Service.
Module 4
Algorithms and Issues in Server Software Design: Introduction, The Conceptual 10 Hours
Server Algorithm, Concurrent Vs Iterative Servers, Connection-Oriented Vs
Connectionless Access, Connection-Oriented Servers, Connectionless Servers, Failure,
Reliability and Statelessness, Optimizing Stateless Servers, Four Basic Types of Servers,
Request Processing Time, Iterative Server Algorithms, An Iterative Connection-
Oriented Server Algorithm, Binding to a Well Known Address using INADDR_ANY,
Placing the Socket in Passive Mode, Accepting Connections and using them. An
Iterative Connectionless Server Algorithm, Forming a Reply Address in a
Connectionless Server, Concurrent Server Algorithms, Master and Slave Processes, A
Concurrent Connectionless Server Algorithm, A concurrent Connection-Oriented Server
Algorithm, Using separate Programs as Slaves, Apparent Concurrency using a Single
Process, When to use each Server Types, The Important Problem of Server Deadlock,
Alternative Implementations.
Module 5
Iterative, Connectionless Servers (UDP): Introduction, Creating a Passive Socket, 10 Hours
Process Structure, An example TIME Server. Iterative, Connection-Oriented Servers
(TCP): Introduction, Allocating a Passive TCP Socket, A Server for the DAYTIME
Service, Process Structure, An Example DAYTIME Server, Closing Connections,
Connection Termination and Server Vulnerability. Concurrent, Connection-Oriented
Servers (TCP): Introduction, Concurrent ECHO, Iterative Vs Concurrent
Implementations, Process Structure, An example Concurrent ECHO Server, Cleaning up
Errant Processes.
Course Outcomes
The students should be able to:
• Explain Client-Server software, Context Switching and Protocol Software, I/O.
• Demonstrate programming System Calls, Basic I/O Functions available in UNIX
• Implement Socket interface, TCP, UDP in detail.
• Compare and contrast Client Software Various applications and their issues
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Douglas E.Comer, David L. Stevens: Internetworking with TCP/IP – Vol. 3, Client-Server
Programming and Applications, BSD Socket Version with ANSI C, 2nd Edition, Pearson,
2001.
Reference Books:
1. NIL
SERVICE ORIENTED ARCHITECTURE
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER – IV
Subject Code 16SSE13
/16SIT153 / IA Marks 20
16SCN421
Number of Lecture Hours/Week 03 Exam Marks 80
Total Number of Lecture Hours 40 Exam Hours 03
CREDITS – 03
Course objectives: This course will enable students to
• Interpret various architecture for application development
• Demonstrate the importance of SOA in Application Integration
• To learn web service and SOA related tools
• To Learn implementation details of SOA
• To understand varies case studies
Module 1 Teaching
Hours
SOA BASICS :Software Architecture – Types of IT Architecture – SOA – Evolution – 8 Hours
Key components – perspective of SOA – Enterprise-wide SOA – Architecture –
Enterprise Applications – Solution Architecture for enterprise application – Software
platforms for enterprise Applications – Patterns for SOA – SOA programming models.
Module 2
SOA ANALYSIS AND DESIGN: Service-oriented Analysis and Design – Design of 8 Hours
Activity, Data, Client and business process services – Technologies of SOA – SOAP –
WSDL – JAX – WS – XML WS for .NET – Service integration with ESB – Scenario –
Business case for SOA – stakeholder OBJECTIVES – benefits of SPA – Cost Savings.
Module 3
SOA GOVERNANCE:SOA implementation and Governance – strategy – SOA 8 Hours
development – SOA governance – trends in SOA – event-driven architecture – software
s a service – SOA technologies – proof-of-concept – process orchestration – SOA best
practices.
Module 4
SOA IMPLEMENTATION:SOA based integration – integrating existing application – 8 Hours
development of web services – Integration - SOA using REST – RESTful services –
RESTful services with and without JWS – Role of WSDL,SOAP and Java/XML
mapping in SOA – JAXB Data binding.
Module 5
APPLICATION INTEGRATION:JAX –WS 2.0 client side/server side development – 8 Hours
Packaging and Deployment of SOA component – SOA shopper case study –WSDL
centric java WS with SOA-J – related software – integration through service
composition (BPEL) – case study - current trends.
Course Outcomes
The students should be able to:
• Compare different IT architecture
• Analyze and design of SOA based applications
• Implement web service and realize of SOA
• Implement REST full services
• Design and implement of SOA based Application Integration using BPEL
Question paper pattern:
The question paper will have ten questions.
There will be 2 questions from each module.
Each question will have questions covering all the topics under a module. The students will have to
answer 5 full questions, selecting one full question from each module.
Text Books:
1. Shankar Kambhampaly, “Service–Oriented Architecture for Enterprise
Applications”,Wiley 2008.
Reference Books:
1. Mark D. Hansen, “SOA using Java Web Services”, Practice Hall, 2007.
2. Waseem Roshen, “SOA-Based Enterprise Integration”, Tata McGraw-HILL, 2009.
ANALYSIS OF COMPUTER NETWORKS
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER - IV
Subject Code 16SCN422 IA Marks 20
CREDITS - 03
Module -1 Teaching
Hours
Introduction: Two examples of analysis: Efficient transport of packet voice calls, 8 Hours
Achievable throughput in an input-queuing packet switch; the importance of quantitative
modeling in the Engineering of Telecommunication Networks.
Module -2
Stream Sessions: Deterministic Network Analysis: Events and processes in packet 8 Hours
multiplexer models: Universal concepts; Deterministic traffic models and Network
Calculus; Scheduling; Application to a packet voice example; Connection setup: The
RSVP approach; Scheduling (continued).
Module-4
Stream Sessions: Stochastic Analysis: Deterministic analysis can yield loose bounds; 8 Hours
Stochastic traffic models; Additional notation; Performance measures; Little’s theorem,
Brumelle’s theorem, and applications; Multiplexer analysis with stationary and ergodic
traffic; The effective bandwidth approach for admission control; Application to the packet
voice example; Stochastic analysis with shaped traffic; Multihop networks; Long-Range-
Dependent traffic
Module-5
Adaptive Bandwidth Sharing for Elastic Traffic: Elastic transfers in a Network; 8 Hours
Network parameters and performance objectives; sharing a single link; Rate-Based
Control; Window-Based Control: General Principles; TCP: The Internet’s Adaptive
Window Protocol; Bandwidth sharing in a Network.
Course outcomes:
• List and classify network services, protocols and architectures, explain why they are
layered.
• Implement key Internet applications and their protocols, and will apply to develop their own
applications (e.g. Client Server applications, Web Services) using the sockets API.
Reference Books:
CREDITS - 03
Module -2
Module – 3
Course outcomes:
• Given the network and user requirements and the type of channel over which the network has to
operate, the student would be in a position to apply his knowledge for identifying a suitable
routing algorithm, implementing it and analyzing its performance.
• The student would also be able to design a new algorithm or modify an existing algorithm to
satisfy the evolving demands in the network and by the user applications.
1. William Stallings, “High speed networks and Internets Performance and Quality of Service”,
2nd Edition, Pearson Education Asia. Reprint India 2002.
2. M. Steen Strub, “Routing in Communication network,” Prentice –Hall International,
Newyork, 1995.
3. James D. McCabe, “Network Analysis, Architecture, and Design”, 3rd Edition, 2007 Elsevier
Inc.
WEB MINING
[As per Choice Based Credit System (CBCS) scheme]
(Effective from the academic year 2016 -2017)
SEMESTER - IV
Subject Code 16SCN424 IA Marks 20
CREDITS – 03
Module -1 Teaching
Hours
Module – 3
LEARNING I: Similarity and Clustering – Formulations and approaches- Bottom up and 8 Hours
Top down Partitioning Paradigms – Clustering and Visualization via Embedding’s –
Probabilistic Approaches to clustering – Collaborative Filtering,
SUPERVISED LEARNING: The Supervised Learning Scenario, Overview of
Classification Strategies, Evaluating Text Classifiers, Nearest Neighbor Learners, Feature
Selection.
Module-4
LEARNING II : SUPERVISED LEARNING – Bayesian Learners, Exploiting 8 Hours
Hierarchy among Topics, Maximum Entropy Learners, Discriminative Classification,
Hypertext Classification,
SEMI SUPERVISEDLEARNING-- Expectation Maximization, Labeling Hypertext
Graphs and Co- training.
Module-5
APPLICATIONS: Social Network Analysis- Social Sciences and Bibliometry – Page 8 Hours
Rank and HITS – Shortcomings of coarse Grained Graph model- Enhanced Models and
Techniques- Evaluation of Topic Distillation- Measuring and Modeling the Web –
Resource Discovery – Collecting Important Pages Preferentially – Similarity Search
Using Link Topology – Topical Locality and Focused Crawling – Discovering
Communities- The Future of Web Mining.
Course outcomes:
1. Sholom Weiss, “Text Mining: Predictive Methods for Analyzing Unstructured Information”,
Springer, 2005
2. Soumen Chakrabarti, “Mining the Web: Discovery Knowledge from Hypertext Data,” Elsevier
Science 2003
Reference Books:
1. Min Song, Yi-fang Brrok Wu, “Handbook of Research on Text and Web Mining Technologies”,
Vol I & II, Information Science Reference (IGI), 2009
2. K.P.Soman, ShyamDiwakar, V.Ajay, “Insight into Data Mining Theory and Practice ,” Prentice
Hall of India Private Ltd 2006
3. Anthony Scime, “Web Mining Applications and Techniques”, Idea Group Publishing,2005
4. Margret H.Dunham “DATA MINING - Introductory and Advanced Concepts”,
PearsonEducation,2003.