5th & 6th
5th & 6th
5th & 6th
COLLEGE OF ENGINEERING
(An Autonomous Institution under VTU)
R.V. Vidyaniketan Post, Mysore Road,
Bangalore—560 059.
V TO VI SEMESTER SCHEME
& SYLLABUS
5. Professional Electives 6 24 12
6. Other Electives 1 4 2
7. Project Work 3 19 9.5
* Elective—I
* Elective— II ** Elective—III
Aim:
The objective of the course on Data Communications and Networking is to provide a foundation to
the course on Computer Networks. The coverage includes concepts related to signals, data
communications, shared assess of media /links, error detection and correction. The course concludes
with reference to layered architecture of computer networks and a detailed exposure to data link
control, medium access control and a few technologies related to connectivity devices.
Part - A
1. Introduction 4 Hours
Introduction to Data Communications, components, data representation, data flow, Essential
elements of network architecture, Message switching, circuit switching and packet switching,
Introduction to Networks, topologies, categories, Internet.
2. Data and Signals 6 Hours
Analog and digital, Periodic analog signal, Digital signals, Transmission impairments, Data rate
limits, Performance.
5. Multiplexing 3 Hours
FDM, WDM, Synchronous TDM, Statistical TDM.
Part - B
REFERENCE BOOKS:
1. Behrouz A Forouzan, Data Communications and Networking, Tata McGraw-Hill, Fourth Edition.
2. Alberto Leon-Garcia and Indra Widjaja, Communication Networks, Tata McGraw-Hill, Second
Edition.
3. William Stallings, Data and Computer Communications, Pearson Education, Seventh Edition.
4. Wayne Tomasi, Introduction to Data Communications & Networking, Pearson Education, 2007.
Outcome:
A clear understanding of the basic features of peer-to-peer network’s and important concepts are
achieved. Thus enabling the student to persue a cause on computer networks.
OPERATING SYSTEMS
Sub Code : 07CS52 CIE Marks : 100
Hrs / Week : 4+0+0 Exam Hrs : 3 Hrs
Credits :4 SEE Marks : 100
Total Hrs : 48
Aim:
The students get to know about CPU Scheduling, disk scheduling, synchronization of processes.
Concept of threading and different operating systems are introduced.
Part-A
1. Introduction to operating systems & their classification 5 Hours
What is an operating system, Mainframe systems, Desktop systems, Multiprocessor system,
Distributed system, Clustered system, Real time system, handheld system, Feature migration,
Computing environments. Operating system structures : System components, OS Services,
System calls, System programs, System structure, Virtual machines.
4. Deadlock 6 Hours
System model, Deadlock characterization: necessary conditions, resource-allocation graph,
Methods for handling deadlocks: deadlock prevention, deadlock avoidance: Banker’s algorithm`,
Deadlock detection and recovery from deadlock: Process termination and resource preemption.
Part-B
REFERENCE BOOKS:
1. Abraham silberschatz, Peter Baer Galvin , Greg Gagne, Operating System Concepts, John Wiley
& Sons, 6th edition, 2003.
2. Andrew S. Tenenbaum, Modern Operating Systems, Pearson Education, Second Edition, 2001.
3. Gary Nutt, Operating Systems, Pearson Education, Third Edition, 2004.
4. Harvey M Deitel, Operating Systems, Addison Wesley, 1990.
5. D.M Dhamdhere, Operating systems - A concept based Approach, Tata McGraw-Hill 2002.
Outcome:
Understanding the basic concepts of operating systems, thus facilitating the student to work/program
on different operating systems efficiently.
COMPILER DESIGN
Sub Code : 07CS53 CIE Marks : 100
Hrs / Week : 4+0+0 Exam Hrs : 3 Hrs
Credits :4 SEE Marks : 100
Total Hrs : 48
Aim:
The objective is to know how to construct compiler by hand, which gives the student a good insight
into the algorithms, which have wider applications. They learn about optimization which helps them
to write good program. They are also able to link computer architecture, programming language,
mathematics in this subject.
Part – A
1. Introduction to Compiling and Lexical Analysis 7 Hours
Introduction, Language Processors, The structure of Compiler, Evolution of programming
Languages, Programming Language Basics, Lexical Analysis- The Role of Lexical Analyzer,
Input Buffering, Specifications of Tokens, Recognition of Tokens, Lexical Analyzer Generator -
LEX.
MICROPROCESSORS - THEORY
Sub Code : 07CS54 CIE Marks : 100+50
Hrs / Week : 3+1+3 Exam Hrs : 3 Hrs
Credits :5 SEE Marks : 100+50
Total Hrs : 36
Aim:
The objective of this course is to introduce the internal architecture and programming in 8086. It deals
with different instruction coding format and program structure of 80 x 86 families. Memory interface
and interrupt handling along with digital interfacing is introduced.
Part- A
Part-B
Part– C
MICROPROCESSOR LABORATORY
Note :
• Develop and execute the following programs using an 8086 Assembly Language. All the
programs to be executed using an assembler like MASM, TASM etc.
• Program should have suitable comments.
1. a) Write an ALP to search a key element in a list of ‘n’ 16-bit numbers using the Binary search
algorithm.
b) Write ALP to read the status of eight input bits from the logic controller Interface and display
‘FF’if it is even parity bits otherwise display 00. Also display number of 1’s in the input data.
3. a) Write an ALP to sort a given set of ‘n’ numbers in ascending or descending orders using
Bubble sort algorithm.
b) Write an ALP to read the status of two 8-bit inputs (X & Y ) from the logic controller
Interface and display X*Y.
4. a) Write an ALP to read an alphanumeric character and display its equivalent ASCII code at the
center of the screen.
b) Write an ALP to display messages FIRE and HELP alternately with flickering effects on a 7-
segment display interface for a suitable period of time. Ensure a flashing rate that makes it
easy to read both the messages (Examiner does not specify these delay values nor it is
necessary for the student to compute these values).
5. a) Write an ALP to read two strings, store them in locations STR1 and STR2. Check whether
they are equal or not and display appropriated messages. Also display the length of the stored
strings.
b) Write an ALP to convert a 16-bit binary value (assumed to be an unsigned integer) to BCD
and display it from left to right and right to left for specified number of times on a 7-segment
display interface.
6. a) Write an ALP to read your name from the keyboard and display it at a specified location on
the screen in front of the message What is your name? You must clear the entire screen
before display.
b) Write an ALP to drive a stepper motor interface to rotate the motor in clockwise direction by
N steps (N is specified by the examiner). Introduce suitable delay between successive steps.
(Any arbitrary value for the delay may be assumed by the student).
7. a) Write an ALP to compute the factorial of a positive integer ‘n’ using recursive procedure.
b) Write an ALP to drive a stepper motor interface to rotate the motor in anticlockwise direction
by N steps (N is specified by the examiner). Introduce suitable delay between successive steps
(Any arbitrary value for the delay may be assumed by the student).
8. a) Write an ALP to compute nCr using recursive procedure. Assume that ‘n’ and ‘r’ are non-
negative integers.
b) Write an ALP to drive a stepper motor interface to rotate the motor by N steps left direction
and N steps right direction (N is specified by the examiner). Introduce suitable delay between
successive steps. (Any arbitrary value for the delay may be assumed by the student).
9. a) Write an ALP to find out whether a given sub-string is present or not in a main string of
characters.
b) Write an ALP to scan a 8 x 3 keypad for key closure and to store the code of the key pressed
in a memory location or display on screen. Also display row and column numbers of the key
pressed.
10 a) Write an ALP to reverse a given string and check whether it is a palindrome or not.
b) Write an ALP to generate the sine wave using DAC interface (The output of the DAC is to be
displayed on the CRO).
12. a) Write an ALP to read a pair of input co-ordinates in BCD and move the cursor to the specified
location on the screen.
b) Write an ALP to generate a fully rectified sine waveform using the DAC interface. (The
output of the DAC is to be displayed on the CRO).
REFERENCE BOOKS:
1. Ajoy Kumar Ray & Kishor M Bhurchandi, Advanced Microprocessors and Peripherals :
Architecture, Programming and Interfacing, 2nd Edition, Tata McGraw-Hill Pub.
2. Barry B Brey, The Intel Microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486 Pentium
and Pentium processor, 6th Edition, Pearson Education.
3. Douglas V. Hall, Microprocessors and Interfacing, Revised 2nd Edition, TMH.
Aim:
The objective of system software theory & lab is to get exposed to the fundamental concepts of
writing lexical and syntax analysis using tools, which have many other applications in the field of
computer science. They also know about the fundamentals of system software which forms the core
of computer science.
Part - A
1. Machine Architecture 5 Hours
Introduction, System software and machine architecture, Simplified instructional Computer (SIC)
Machine Architecture, SIC/XE Machine Architecture, SIC programming examples, Traditional
(CISC) machines - VAX architecture, Pentium pro architecture, RISC Machines - Ultra SPARC
architecture, Cray T3E architecture.
2. Assemblers 7 Hours
Basic Assembler Function - A Simple SIC Assembler, Assembler Algorithm and Data Structures,
Machine Dependent Assembler Features - Instruction Formats & Addressing Modes, Program
Relocation, Machine Independent Assembler Features – Literals, Symbol-Definition Statements,
Expression, Program Blocks, Control Sections and Programming Linking, Assembler Design
Operations - One-Pass Assembler, Multi-Pass Assembler, Implementation examples - MASM
Assembler, SPARC Assembler.
Part - B
Part – C
SYSTEM SOFTWARE LABORATORY
Unit – 1
Execution of the following programs using LEX:
1) Write a program to count the number of vowels and consonants in a given string.
2) Write a program to implement word count command using lex specification.
3) Write a program to count number of
a) Positive and negative integers
b) Positive and negative fractions
4) Write a program to count the number of comment lines in a given C program. Also eliminate
them and copy that program into separate file.
5) Write a program to count the number of ‘scanf’ and ‘printf’ statements in a C program. Replace
them with ‘readf’ and ‘writef’ statements respectively.
6) Write a program to recognize and count the number of identifiers in a given input file.
7) Write a program to implement Find and Replace.
Unit – II
Students (A batch must consist of 2 students) can do one of the below mentioned mini Projects.
1) Implement a 2-pass Assembler for the working model of 8086.
2) Implement a Text Editor.
3) Implement a simple Lexical Analyzer.
4) Implement a Single pass assembler
5) Implement a Parser
Note:
a) A report of about 25 – 30 pages on the package developed in Part B, duly certified by the
department must be submitted during examination.
b) Students must give code in their report
Outcome:
The student will be capable of designing and developing complete system software and also work at
system level on popular Operating Systems like MS-Dos, Sun Operating Systems, Cray MPP linker.
Aim:
To present an adequate survey of topics in probability and statistics to the student and an
understanding of logic behind the probabilistic tech as well as practice in using them.
Part-A
1. Probability 6 Hours
Sample space and events, counting, The concept of probability, The axioms of probability, Some
important theorems on Probability, Conditional Probability, Theorems on conditional probability,
Baye’s Theorem.
Part-B
1. Miller and Freund’s (Richard .A. Johnson, C. B. Gupta), Probability and statistics for Engineers,
Pearson Education, Second impression 2007.
2. Raj Jain, The Art of Computer Systems Performance Analysis, John Wiley and Sons, INC.1991
3. Murray R. Spiegel, Probability and Statistics, McGrawHill, Schaum’s Outline Series.
4. Kishor S. Trivedi, Probability & Statistics with Reliability, Queuing and Computer Science
Applications, Prentice Hall of India, 2000.
5. A. Papoulis and S.Unnikrishna Pillai, Probability, Random Variables and Stochastic Processes,
McGrawHill, 4th Edition.
Outcome:
The student can apply the concepts learnt to analyze computing systems and optimize both hardware
and software.
Aim:
The objective of this course is to introduce the scope and applications of Artificial Intelligence. It also
deals with expert system technology, issues in knowledge representation and automated reasoning.
Part – A
1. Introduction: 12 Hours
Artificial Intelligence - Its Scope, History and Applications, AI as Representation and Search-The
Predicate Calculus – Inference rules. Logic based financial advisor- Structures and strategies for
State space search-graph theory, Strategies for space search, Using state space to represent
reasoning with the predicate calculus.
Part – B
1. G.F. Lunger and W.A Stubblefield, Artificial Intelligence – Structures and Strategies for complex
Problem solving, Third Edition, Addison-Wesley, 1998
2. P.H.Wintson, Artificial Intelligence, Third Edition, Addison-Wesley, 1992.
3. E.Rich and Knight, Artificial Intelligence, Second Edition, Tata McGraw Hill Publishing, 1991.
4. Nils J. Nilsson, Artificial Intelligence, A New Synthesis, Morgan Kaufmann, 2000.
Outcome:
The concepts learnt in Artificial Intelligence will enable the students to exploit them in application
development that solve hard problems in various domains.
Aim:
The objective of this course is to introduce the basic concepts of signal analysis and signal processing
system. Characteristics of signals, time and frequency domain is also introduced. Biological signal
processing, graphical techniques and spectral analysis are introduced.
Part – A
SIGNAL ANALYSIS
1. Introduction 2 Hours
Pre-history of DSP, Some applications of signal processing, Analog and digital signal processing.
2. Signals 6 Hours
Signal defined, The simplest signals, Characteristics of signals, Signal arithmetic, The vector
space of all possible signals, Time and frequency domain, Analog and digital domain, Sampling,
Digitization, Ant aliasing & reconstruction filters, Practical analog & digital conversion.
5. Noise 6 Hours
Unpredictable noise, a naïve view of noise, noise reduction by averaging, pseudorandom signals,
chaotic signals, stochastic signals, spectrum of random signals, stochastic approximation methods,
probabilistic algorithms.
Part – B
7. Filters 3 Hours
Filter specification, phase & group delay, special filters, feedback, the ARMA transfer function,
pole zero plots, classical filter design, digital filter design, spatial filtering.
9. Correlation 3 Hours
Signal comparison & detection, cross correlation & autocorrelation,, the Wiener-Khintchine
theorem, The frequency domain signal detector, correlation & convolution, application to Radar,
The Wiener Filter, correlation & prediction, linear predictive coding, the Levinson Durbin
recursion, Line spectral pairs, Higher order signal processing.
REFERENCE BOOK:
1. Jonathan (Y) Stein, Digital Signal Processing: A Computer Science Perspective , John Wiley &
Sons, September 2000
2. Paul A. Lynn, Wolfgang Fuerst, Introductory Digital Signal Processing with Computer
Applications, 2E , Wiley edition (April 1998)
Outcome:
The students will be capable of applying Graphical Techniques for processing signals and spectral
analysis of wavelets and also designing filters for a given domain.
Aim:
The objective is to allow to get knowledge of object oriented concepts with design and analysis
perspective. The students get a feel of UML notations. A banking case study is provided so that the
student can get use to the analysis and design aspect of the problem.
Part-A
1. Introduction. 12 Hours
An overview of object oriented systems development. Why an object orientation? Overview of
the United Approach.
Object basics: Introduction, An object-oriented philosophy.
Objects, Classes, Attributes: Object behavior and methods. Encapsulation and Information hiding,
Class hierarchy, Polymorphism, Object relationships and associations, Aggregations and object
containment, Case study- Payroll program, advanced topics.
Object-oriented systems development life cycle: Introduction. The software development process,
Building high-quality software, Object oriented systems development - A use-case driven
approach, Reusability.
Part-B
REFERENCE BOOKS:
Outcome:
The student will be capable of designing UML dynamic models using different modeling techniques.
Given any problem the student will be capable of designing and analyzing a solution using Object
Oriented Analysis.
Objectives:
• To provide the students with an overview of several influential approaches and concepts of
management those that have shaped managerial thinking during the past century.
• To trigger the entrepreneurial thinking amongst the student community and to provide necessary
inputs and motivation for promoting entrepreneurship.
Part–A
PRINCIPLES OF MANAGEMENT
1. Management: 4 Hours
Introduction – Meaning – nature and characteristics of Management, scope and functional areas of
management – Management as a science, art or profession – Management and administration –
Roles of management, Levels of management, Development of Management Thought – Early
management approaches – Modern management approaches.
3. Organizing: 3 Hours
Nature of Organizing, Technology and Modern Organization Structures, Authority and Power,
Delegation, Committees and Meetings.
Part – B
ENGINEERING MANAGEMENT
Part - C
ENTREPRENEURSHIP
Reference Books:
1. Harold Koontz and Heinz Weihrich ,Essentials of Management, TMH, VII Edition.
2. Daniel L Babcock and Lucy C Morse – Managing Engineering and Technology, 3rd Edition,
Pearson Education
3. Entrepreneurship Development – SS Khanka – S Chand & Co.
4. James Arthur Finch Stoner, R. Edward Freeman, Daniel R., Jr. Gilbert, Management, Prentice
Hall; 6 Sub edition (January 1995) ISBN-13: 978-0131087477
5. Entrepreneurship Development – Small Business Enterprises – Poornima M Charantimath –
Pearson Education – 2006
6. David Holt – Entrepreneurship
Note: The subject treatment should be introductory in nature. The course is meant to equip
engineering students on the managerial aspects of an enterprise and motivate the students to
consider entrepreneurship as a career option.
Two questions from Part – A, Four questions from Part – B and Two questions from Part – C are to
be set. Students are required to answer at least one question from Part – A, three from Part – B and
one from Part – C.
Aim:
The basic concepts of UNIX and ANSI standards are introduced. The complete unix API’s, daemon
processes are taught. A brief introduction about interprocess communication is presented.
Part –A
1. Introduction 5 Hours
UNIX and ANSI Standards - The ANSI C standard, The ANSI/ISO standards, The POSIX.1 FIPS
standard, The X/open Standards.
Part –B
REFERENCE BOOKS:
1. Terrence Chan, UNIX System Programming Using C++, Prentice Hall India, 1999.
2. W.Richard Stevens, Advanced Programming in the UNIX Environment, Addison Wesley/PHI.
3. Maurice. J. Bach, The Design of the UNIX Operating System, Pearson Education/ Prentice Hall
of India.
4. Uresh Vahalia, Unix Internals, Pearson Education, ASIA, 2001.
Outcome:
The student will have a detailed understanding of Unix Internals. The student can design efficient
system level applications using Unix API’s. The applications involving inter-process
communications can be developed.
Aim:
The objective of DBMS is to introduce the basic concepts & terminology and database conceptual
modeling principles. It gives details about relational algebra and ER Modeling. The subject gives in
depth knowledge of databases using the concept of normalization. Concepts on transaction
processing, concurrency control techniques and recovery management techniques are introduced.
Part-A
1. Introduction to Database Systems 4 Hours
Databases and Database users: Introduction, An example, Characteristics of Database Approach,
Actors on the scene, Workers behind the scene, Advantages of using the DBMS Approach, A
brief history of Database applications, When not to use a DBMS. Database System—Concepts
and Architecture: Data Models, Schemas and Instances, Three-schema Architecture and Data
Independence, Database Languages and Interfaces, The Database System Environment,
Centralized and Client/Server Architectures for DBMSs, Classification of Database Management
Systems.
Part-C
Minimum requirement
1. At least 8 to 10 tables
2. 5 – 8 forms
3. Security for the database to be provided
Typical mini-projects
1. Elmasri, Navathe, Somayajulu, Shyam Gupta, Fundamentals of Database Systems, Fifth Edition,
Pearson Education, 2006.
2. Silberschatz, Korth and Sudharshan, Data base System Concepts, Fourth Edition, Mc-GrawHill,
2002.
3. Raghu Ramakrishnan and Johannes Gehrke, Database Management Systems, Third Edition,
McGraw-Hill, 2003.
Outcome:
The student will be capable of designing a complete Database application. They are also exposed to
different internal components of the internal architecture.
Aim:
The course on Computer Networks seamlessly provides a continuation from the course on ‘Data
Communication & Networking’. The objective of the course is to provide exposure to the type and
uses of computer networks, the upper layers of the network architecture viz network, Transport and
application layers the course concludes with an exposure to a relatively new concept of wireless
sensor networks.
Part -A
Part - B
Part-C
Unit–I
Note :
• Implement the below exercises using C/C++ on Linux Operating System.
• Client and Server programs must to do the following :
i) The Client should send the name of a file to the server.
ii) The Server sends back contents of the requested file, if it is present, else return an
appropriate message.
1. Write and execute Client and Server programs to do the above work, using Pipes as the Inter
Process Communication (IPC) channel. (Processes are running on the same machine).
2. Write and execute Client and Server programs to do the above work, using FIFO as the IPC
channel. (Processes are running on different machines).
3. Write and execute Client and Server program to do the above work, using Message Queue as the
IPC channel. (Processes are running on different machines).
4. Write and execute Client and Server program to do the above work, using Sockets as the IPC
channel. (Processes are running on different machines)
5. Write and execute a parallel program to find the sum of given ‘N’ numbers, using Pipes as the
IPC channel.
(Hint: Divide N elements into subgroups. send each subgroup to individual process to find partial
sum. Finally add all partial sums to get the actual sum)
6. Write and execute a parallel program to find the sum of given ‘N’ numbers, each using Sockets as
the IPC channel.
(Hint: Divide N elements into subgroups. send each subgroup to individual process to find partial
sum. Finally add all partial sums to get the actual sum)
7. Write a program to perform serial communication between two desktops, using – minicom under
Linux.
REFERENCE BOOKS:
In the examination questions must be given on lots for Unit–I. Student must execute 1 program from
Unit–I for a total of 20 marks. The project developed under Unit – II will be evaluated for 30 marks.
Outcome:
The students are made to understand popular protocols in use as of today. The lab associated with this
course, help them to implement a networking application. The students are exposed to the basics of
wireless sensor networks.
Aim:
Objective of the course is to teach the basic concept of simulation with real life examples. The
different ways of modeling the behavior of a system, different steps towards simulation study with
examples are introduced.
Part-A
Part-B
REFERENCE BOOKS:
1. Jerry Banks, John S. Carson, Barry L. Nelson, David M. Nicol, Discrete-Event System
Simulation, Third Edition, Prentice-Hall India
2. R. Pannerselvam, Research Methodology, PHI, New Delhi, 2005
3. Geoffrey Gordon, System Simulation, Third Edition, Prentice-Hall India.
4. Averill M. Law, W. David Kelton, Simulation Modeling and Analysis, Third Edition, McGraw-
Hill.
Outcome:
The student will be capable of modeling a real world problem, simulate using an appropriate
technique. Verification and validation of simulating model and output analysis can be done for the
designed system.
REFERENCE BOOKS:
1. Thomas H. Cormen et al, Introduction to Algorithms, Prentice Hall India, 1990.
2. Michael J. Laszlo, Computational Geometry and Computer Graphics in C++, Prentice Hall India,
1996.
Outcome:
The students will be capable of applying advanced problem solving techniques for different domains
like Graphics, Cryptosystem and Networks.
Aim:
The objective of the course is to introduce the basics of pattern recognition system, design cycle,
learning and adaptation. The required mathematical background, theoretical concepts and techniques
are introduced. Case studies are also considered.
Part-A
1. Introduction 3 Hours
Machine Perception, Pattern Recognition systems, Design cycle, learning and adaptation
Part-B
1. Richard O. Duda, Peter E. Hart and David G Stork, Pattern Classification, John Wiley & Sons,
Inc.2nd Ed. 2001.
2. Robert Schalkoff, Pattern Recognition: Statistical, Structural and Neural Approaches, John Wiley
& Sons, Inc.1992.
3. Earl Gose, Richard Johnsonbaugh, Steve Jost Pattern Recognition and Image Analysis, Prentice
Hall, Prentice Hall; Har/Dsk edition, May 1996.
Outcome:
Pattern Recognition techniques discussed motivates the students in designing many pattern
recognition systems to classify objects into various categories- finds application in numerous areas
such as medicine, weather forecasting, automated industrial inspection, geology, agriculture and so
on.
Part-A
1. Introduction 2 Hours
OSI model, BSD Networking history, Test networks and hosts, Unix standards, 64-Bit
architectures
Part-B
REFERENCE BOOKS:
1. W.Richard Stevens, Bill Fenner, Andrew M. Rudoff, UNIX Network Programming – The sockets
networking API Vol.– 1 , Third edition, PHI.
2. Stephen A. Rago, Unix System V Network Programming, AWL.
3. Comer, Stevens, Internetworking with TCP/IP, volume III, Second Edition, PHI.
4. Bill Riekan & Lyle Weiman, Adventures in UNIX Network Applications Programming.
5. Chris Brown, Unix Distributed Programming, 1994, PH.
Outcome:
The student will be capable of design application using either TCP/UDP sockets, use threads to
develop applications.
Part-A
1. Basics of Software Testing 11 Hours
Human Errors and Testing, Software Quality; Requirements, Behavior and Correctness,
Correctness versus Reliability, Testing and Debugging, Test Metrics, Software and Hardware
Testing, Testing and Verification, Defect Management, Execution History, Test-generation
Strategies, Static Testing, Model-Based Testing and Model Checking, Control-Flow Graph, Types
of Testing, The Saturation Effect.
2. Test Generation from Requirements 13 Hours
Introduction, The Test-Selection Problem, Equivalence Partitioning, Boundary Value Analysis,
Category-Partition Method, Cause-Effect Graphing, Test Generation from Predicates.
Part-B
3. Types of Testing - 1 9 Hours
White Box Testing, Introduction, Static Testing, Structural Testing, Challenges in Whit box
testing, Black Box Testing: Introduction, Testing methods. Integration Testing: Introduction,
Integration testing as a Type of Testing, Integration testing as a Phase of Testing, Scenario
Testing, Defect Bash.
REFERENCE BOOKS:
1. Aditya P Mathur, Foundations of Software Testing, Pearson Education, 2008.
2. Srinivasan Desikan, Gopalaswamy Ramesh, Software Testing - Principles and Practices, Pearson
Education, 2008.
3. Ron Patton, Software Testing, 2nd Edition, Pearson Education.
4. Peter Farrell, Vinay, Manage Software Testing, Auerbach Publications, 2008.
Scheme of Semester End Evaluation
Students have to answer 5 questions choosing at least 2 out of 4 questions
from Part – A and 2 questions out of 4 questions from Part – B.
Part – A
1. Fundamentals 6 Hours
What is Distributed Computing Systems?, Distributed Computing System Models, What is
Distributed Operating System?, Issues in Designing a Distributed Operating System, Introduction
to Distributed Computing Environment(DCE).
Part – B
5. Synchronization 9 Hours
Clock Synchronization – logical clocks – physical clock – clock synchronization algorithms,
Mutual exclusion – A centralized algorithm – A distributed algorithm – a token ring algorithm,
comparison of the three algorithms Election algorithms – The Bully algorithm – ring algorithm,
Dead locks in distributed systems – Distributed deadlock detection – distributed deadlock
prevention.
REFERENCE BOOK:
1. Pradeep. K. Sinha, Distributed Operating System: Concepts and Design, 1997, PHI.
2. Andrew S. Tanenbaum, Distributed Operating System, Pearson Education, 2002.
3. G. Coulouris, J.Dollimore& T. Kindberg, Distributed Systems concepts and design, Pearson, 4th
Edition, 2005.
Outcome:
The student will be capable of implementing remote procedure calls, designing distributed shared
memory with efficient synchronization and resource management.