K-Syllabus
Sub Code: 15051
Computer Network And Security
UNIT | TOPIC |
I | Data Communications |
II | OSI Model and Data link layer |
III | LAN Protocols and ISDN |
IV | TCP/IP suit |
V | Introduction to network security |
1.1 Data Communication :
Components of a data communication – Data flow: simplex – half duplex – full duplex; Networks – Network criteria – Types of Connections: Point to
point – multipoint; Topologies: Star, Bus, Ring, Mesh, Hybrid – Advantages and Disadvantages of each topology.
1.2 Types of Networks (Geographical Based):
LAN – MAN – WAN
1.3 Signals and Modulation:
Analog and Digital signals - Need for Modulation – Amplitude Modulation – Frequency Modulation – Pulse Modulation – Concepts only (no derivation).
1.4 Transmission Media :
Classification of transmission media - Guided – Twisted pair – Coaxial – Fiber optics – Unguided – Radio waves –Infrared – LOS – VSAT – cabling and
standards
1.5 Network devices:
Features and concepts of Hubs – Bridges – Switches - Routers – Gateways
2.1 Network Models:
Protocol definition - standards - OSI Model – layered architecture –
functions of all layers.
2.2 Error detection & correction:
Types of errors – detection versus correction – CRC – Hardware implementation - parity check and checksum – Hamming code.
2.3 Flow and Error control:
Introduction – ARQ – Stop & Wait ARQ – Features and disadvantages of stop-and-wait ARQ - Go- Back - N – ARQ – Selective repeat ARQ - Comparison of Flow control protocols
3.1 Character oriented Protocol:
BSC Frames – Bit oriented Protocol – HDLC – Transfer modes of HDLC – HDLC frame format - HDLC operation
3.2 802.X Protocols :
Concepts and PDU format of CSMA/CD (802.3) – Token bus (802.4) – Token ring (802.5) – Ethernet – type of Ethernet (Fast Ethernet, gigabit Ethernet) –
Comparison between 802.3, 802.4 and 802.5
3.3 FDDI :
Frame format – Advanatges and disadvantages of FDDI.
3.4 Switching :
Circuit– Packet– Message.
3.5 ISDN : Concepts – Services – Layers – Broad Band ISDN.
4.1 Overview of TCP / IP :
OSI & TCP/IP – Transport Layers Protocol – connection oriented and connectionless Services – Sockets - TCP & UDP.
4.2 Network Layers Protocol :
IP – Interior Gateway Protocols (IGMP, ICMP, ARP, RARP Concept only).
4.3 IP Addressing :
Subnetting & Supernetting – Dotted Decimal Notation – IPv6 (concepts only)
4.4 Application Layer Protocols:
FTP– Telnet – SMTP– HTTP – DNS – POP.
5.1 Introduction to network security:
definition & basic concepts – Basic concepts of RAID levels ( 0,1 and 5).
5.2 Types of attacks:
Access attacks –modification attacks – denial of service attacks.
5.3 Hacker Techniques:
Historical Hacking techniques & open sharing – bad passwords – advanced techniques sniffing switches networks–Malicious code identification–viruses–
Trojan horses–worms - SPAM.
5.4 Threats:
Definition – Targets- Agents – Events
5.5 Firewall :
Types –Developing firewalls
5.6 VPN:
Definition – Benefits – Issues – VPN – Server– Authentication – System – VPN Protocol.
Reference Books:
- Data Communication and networking - Behrouz A.Forouzan Tata McGraw-Hill, New Delhi
- Computer Communication Networks - Achyut S. Godbole Tata McGraw-Hill, New Delhi
- Data and Computer Communications - William Stallings Prentice-Hall of India, Eighth Edition
- Computer Networks Andrew - S.Tanenbaum Prentice-Hall of India, New Delhi
- Network Security A beginner’s Guide Eric Maiwald Tata Mc Graw-Hill., Second Edition
Full Syllabus & Reference Books
Sub Code: 15052
UNIT | TOPIC |
I | Basic Concepts |
II | Client/Server Technology & Relational Database Approach |
III | Structured Query Language |
IV | PL/SQL |
V | Enhanced Database Models |
Introduction:
Definition of Data, Data base and DBMS – Need for database –Advantages of database Systems - File based database systems – Disadvantages –
Record based database systems - Data base characteristics
Database terms :
Concurrency, Consistency, Data Availability, Reliability, Transparency Data Integrity
Components of a DBMS:
Database Engine – Data Dictionary – Query Processor –Report Writer – Forms Generator – Application Generator -Security
Data abstraction:
Schema – Data independence- Architecture of a database system DBMS system architecture types: Personal computer system – Centralized system –
Client / Server system – Distributed system.
Data models:
Relational – Hierarchical – Network.
Client/server technology:
Client – server – distributed and co-operative processing – peer- to-peer processing – application components - transaction management
Relational data structure:
Relation – Domains & Attributes – Keys – Extensions – Intensions – Data structures – Tables – Data Integrity – Manipulation views – managing
data concurrency in a multi–user system - Data Security – Data Availability.
Table:
Columns, Rows, Primary Key, Secondary Key, Foreign key
E-R model:
Entities and attributes – Relationships – One to one –One to many - Many to one – Many to Many relationships – Normalizing the model.
Normalization: Introduction - 1NF - 2NF – 3NF - guidelines – Codd’s Rules.
Database Administration :
DBA Tasks – DBA Tools – User Privileges - Performance monitoring and tuning – query tracing - Backup and Recovery
Data Definition Language:
Statements - Data Manipulation Language – statements - Retrieval operations
SQL Commands :
Selecting Columns from a table, Selecting Rows from a table - Built– in functions – Update Operations
Queries :
Simple query – where clause – group by – order by clauses -sub queries – correlated sub-queries. Set Operations – Union, minus
Constraints :
Alter table – table-level constraints.
Base Table:
Indexes – types – simple – compound ; Join – types – simple – Equi-join,
Non-equi join, self join, outer join
Creating and using Views:
creating a view, querying a view of more than one table.
Working with Numbers :
Displaying Numbers, Arithmetic Expressions
Functions and Operators:
Number Functions - sin(), cos(), tan(), sqrt(), Aggregate functions –count(), avg() Conversion functions – to_char(), to_date(), NVL(), Date
Functions – sysdate(), months_between(), add_moths(), Arithmetic, Logical and set Operators
Transaction control statements:
Commit, rollback, savepoint
Triggers:
Trigger definition – Trigger Events - Built-in Trigger – User defined Trigger – database triggers
Introduction :
variables – literals – data types – advantages of PL/SQL
Control statements :
if ; iterative control – loop, while, for , goto ; exit when
Cursors :
Types – implicit, explicit – parameterized cursors – cursor attributes
Exceptions:
Types – internal , user-defined , handling exceptions – raise statement
PL/SQL tables and records:
Declaring PL/SQL tables - referring PL/SQL tables, inserting and fetching rows using PL/SQL table, deleting rows; records - declaration of
records - deleting records
Sub programs:
Functions - procedures - in, out, inout parameters; purity functions - packages - package specification - advantages of packages - private and public items -
cursors in packages.
Data warehousing :
Definition - DSS and EIS ( Definition) - Characteristics and functioning and architecture of Data Warehousing - Data marts - Data warehousing Life
Cycle - data modeling (Multidimensional Database) for data warehousing - Building of data warehouse - OLAP, MOLAP, ROLAP - Data warehouse and views - Future open issue for data warehouse
Data Mining :
What is data mining Technology - Relationship to Data warehousing - Association rules - Classification - Clustering - Approaches to data mining problems -
Applications of Data mining problem - Commercial tools of data mining - Knowledge Discovery
Reference Books:
- Database Management System - Date ,C.J., Galgotia Publications
- Fundamentals of Database System - Elmasri, R.A.,Navathe, Shyam B. Narosa Publishing House.
- Database Management System - Post, Gerald V ,Tata McGraw-Hill, 2004
- An introduction to Database Systems - Bipin C Desai Galgotia Publications ( P) Ltd., 2005
- Database system concepts - Abraham Silberschatz, Henry F Korth and Sudharshan S Mc Graw Hill Publishin Company Limited, 2004
- Database Management Systems - Raghu Ramakrishnan Mc Graw Hill Publishing Company Limited, 2004
No comments:
Post a Comment