JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERINGCOURSE STRUCTURE & SYLLABUS M.Tech
--- Content provided by FirstRanker.com ---
CSE for COMPUTER NETWORKS Programme(Applicable for batches admitted from 2019-2020)
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaI-SEMESTER
Course
Cate
--- Content provided by FirstRanker.com ---
S.NoCourses
L T P C
Code
gory
--- Content provided by FirstRanker.com ---
Program Core-11
MTCN1101
Transport
Control
--- Content provided by FirstRanker.com ---
Protocol/InternetProtocol PC
3
0 0
3
--- Content provided by FirstRanker.com ---
(TCP/IP)Program Core-2
2
MTCN1102
PC
--- Content provided by FirstRanker.com ---
30 0
3
Advanced Data Structures
Program Elective-1
--- Content provided by FirstRanker.com ---
1. Software Define Networks3
MTCN1103
2.
PE
--- Content provided by FirstRanker.com ---
30 0
3
Network Coding Theory
3. Adhoc & Sensor Networks
--- Content provided by FirstRanker.com ---
Program Elective-21. Distributed Systems
4
MTCN1104
PE
--- Content provided by FirstRanker.com ---
30 0
3
2. Grid and Cluster Computing
3. Wireless Networks
--- Content provided by FirstRanker.com ---
5MTCN1105
Research Methodology and IPR
CC
2
--- Content provided by FirstRanker.com ---
0 02
Laboratory-1
6
MTCN1106
--- Content provided by FirstRanker.com ---
TransportControl
Protocol/Internet
Protocol LB
0
--- Content provided by FirstRanker.com ---
0 42
(TCP/IP) Lab
Laboartory-2
7
--- Content provided by FirstRanker.com ---
MTCN1107LB
0
0 4
2
--- Content provided by FirstRanker.com ---
Advanced Data Structures Lab8
MTCN1108
Audit Course-1*
AC
--- Content provided by FirstRanker.com ---
20 0
0
Total Credits
18
--- Content provided by FirstRanker.com ---
*Student has to choose any one audit course listed below.
II- SEMESTER
Course
--- Content provided by FirstRanker.com ---
CateS.No
Courses
L T P C
Code
--- Content provided by FirstRanker.com ---
goryProgram Core-3
1
MTCN1201
PC
--- Content provided by FirstRanker.com ---
30 0 3
Network Security
Program Core-4
2
--- Content provided by FirstRanker.com ---
MTCN1202PC
3
0 0 3
Wireless Sensor Networks
--- Content provided by FirstRanker.com ---
Program Elective-31. Web Security
3
MTCN1203
2.
--- Content provided by FirstRanker.com ---
PE3
0 0 3
Internet of Things
3. Intrusion Detection & Prevention Systems
--- Content provided by FirstRanker.com ---
Program Elective-41. Firewall & VPN Security
4
MTCN1204
2.
--- Content provided by FirstRanker.com ---
PE3
0 0 3
Machine Learning
3. Service Oriented Architecture
--- Content provided by FirstRanker.com ---
Laboratory-35
MTCN1205
LB
0
--- Content provided by FirstRanker.com ---
0 4 2Network Security Lab
Laboartory-4
6
MTCN1206
--- Content provided by FirstRanker.com ---
LB0
0 4 2
Advanced Network Programming Lab
7
--- Content provided by FirstRanker.com ---
MTCN1207Mini Project with Seminar
MP
0
0 0 2
--- Content provided by FirstRanker.com ---
8MTCN1208
Audit Course-2
AC
2
--- Content provided by FirstRanker.com ---
0 0 0Total Credits
18
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
*Student has to choose any one audit course listed below.
Audit Course 1 & 2:
1. English for Research Paper Writing
5. Constitution of India
--- Content provided by FirstRanker.com ---
2. Disaster Management6. Pedagogy Studies
3. Sanskrit for Technical Knowledge
7. Stress Management by Yoga
4. Value Education
--- Content provided by FirstRanker.com ---
8. Personality Development through LifeEnlightenment Skills
III-SEMESTER
S.
Course
--- Content provided by FirstRanker.com ---
CateCourses
L T P C
No
Code
--- Content provided by FirstRanker.com ---
goryProgram Elective-5
1. Trustworthy Computing
2. Advanced Storage Area Networks
1 MTCN2101 3.
--- Content provided by FirstRanker.com ---
PE 3 0 0 3Cloud Computing
4. MOOCs-1 (NPTEL/SWAYAM)-12 Week Program related to
the programme which is not listed in the course structure
Open Elective
--- Content provided by FirstRanker.com ---
1. MOOCs-2 (NPTEL/SWAYAM)-Any 12 Week Course on2 MTCN2102
Engineering /Management/ Mathematics offered by other than OE 3 0 0 3
parent department
2. Course offered by other departments in the college
--- Content provided by FirstRanker.com ---
3 MTCN2103 Dissertation-I/Industrial Project #0 0 20 10
Total Credits
16
#Students going for Industrial Project/Thesis will complete these courses through MOOCs
--- Content provided by FirstRanker.com ---
IV-SEMESTER
Course
Cate
S.No
--- Content provided by FirstRanker.com ---
CoursesL T P
C
Code
gory
--- Content provided by FirstRanker.com ---
1MTCN2201
Dissertation-II
0 0 32 16
Total Credits
--- Content provided by FirstRanker.com ---
16Open Electives offered by the Department of CSE for other Departments Students
01. Python Programming
02. Principles of Cyber Security
03. Internet of Things
--- Content provided by FirstRanker.com ---
04. Artificial Intelligence and Machine LearningJAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Transport Control Protocol/Internet Protocol (MTCN1101)
--- Content provided by FirstRanker.com ---
Course Objectives:? Student able to learn about the protocols which are using in the current scenario.
? To learn and understand client server relations and OSI programming Implementation of the
socket and IPC.
Course Outcomes:
--- Content provided by FirstRanker.com ---
? Explain OSI Model and Standard Internet Protocols? How to handle server process termination
? Acquire the knowledge of Elementary TCP sockets and I/O Multiplexing and socket
? Demonstrate the concepts of FIFOs streams messages and Remote logins.
UNIT-I: Introduction to Network Programming: OSI model, Unix standards, TCP and UDP &
--- Content provided by FirstRanker.com ---
TCP connection establishment and Format, Buffer sizes and limitation, standard internet services,Protocol usage by common internet application.
UNIT-II: TCP client server: Introduction, TCP Echo server functions, Normal startup, terminate
and signal handling server process termination, Crashing and Rebooting of server host shutdown of
server host.
--- Content provided by FirstRanker.com ---
UNIT-III: Sockets: Address structures, value ? result arguments, Byte ordering and manipulationfunction and related functions Elementary TCP sockets ? Socket, connect, bind, listen, accept, fork
and exec function, concurrent servers. Close function and related function.
I/O Multiplexing and socket options: I/O Models, select function, Batch input, shutdown function,
poll function, TCP Echo server, getsockopt and setsockopt functions. Socket states, Generic socket
--- Content provided by FirstRanker.com ---
option IPV6 socket option ICMPV6 socket option IPV6 socket option and TCP socket options.UNIT-IV: Elementary UDP sockets: Introduction UDP Echo server function, lost datagram,
summary of UDP example, Lack of flow control with UDP, determining outgoing interface with
UDP.
--- Content provided by FirstRanker.com ---
Elementary name and Address conversions: DNS, gethost by Name function, Resolver option,Function and IPV6 support, uname function, other networking information.
UNIT-V: IPC- Introduction, File and record locking, Pipes, FIFOs streams and messages, Name
spaces, system IPC, Message queues, Semaphores. Remote Login: Terminal line disciplines,
--- Content provided by FirstRanker.com ---
Pseudo-Terminals, Terminal modes, Control Terminals, rlogin Overview, RPC TransparencyIssues.
Text Books:
1. UNIX Network Programming, Vol. I, SocketsAPI, 2nd Edition. - W.Richard Stevens, Pearson
Edn. Asia.
--- Content provided by FirstRanker.com ---
2. UNIX Network Programming, 1st Edition, - W.Richard Stevens. PHI.Reference Books:
1. UNIX Systems Programming using C++ T CHAN, PHI.
2. UNIX for Programmers and Users, 3rd Edition Graham GLASS, King abls, Pearson Education
3. Advanced UNIX Programming 2nd Edition M. J. ROCHKIND, Pearson Education
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Advanced Data Structures (MTCN1102)
Course Objective:
--- Content provided by FirstRanker.com ---
? The student should be able to choose appropriate data structures, understand theADT/libraries, and use it to design algorithms for a specific problem
? Students should be able to understand the necessary mathematical abstraction to solve
problems
? To familiarize students with advanced paradigms and data structure used to solve
--- Content provided by FirstRanker.com ---
algorithmic problems? Student should be able to come up with analysis of efficiency and proofs of correctness
Course Outcomes:
? Develop and analyze algorithms for red-black trees, B-trees and Splay trees.
? Develop algorithms for text processing applications.
--- Content provided by FirstRanker.com ---
? Identify suitable data structures and develop algorithms for computational geometryproblems.
? Understand the implementation of symbol table using hashing techniques.
UNIT-I: Dictionaries-Definition, Dictionary Abstract Data Type, and Implementation of
Dictionaries. Hashing: Review of Hashing, Hash Function, Collision Resolution Techniques in
--- Content provided by FirstRanker.com ---
Hashing, Separate Chaining, Open Addressing, Linear Probing, Quadratic Probing, DoubleHashing, Rehashing, Extendible Hashing.
UNIT-II: Skip Lists- Need for Randomizing Data Structures and Algorithms, Search and Update
Operations on Skip Lists, Probabilistic Analysis of Skip Lists, Deterministic Skip Lists
UNIT-III: Trees-Binary Search Trees, AVL Trees, Red Black Trees, 2-3 Trees, B-Trees, Splay
--- Content provided by FirstRanker.com ---
TreesUNIT-IV: Text Processing: Sting Operations, Brute-Force Pattern Matching, The Boyer- Moore
Algorithm, The Knuth-Morris-Pratt Algorithm, Standard Tries, Compressed Tries, Suffix Tries, The
Huffman Coding Algorithm, The Longest Common Subsequence Problem (LCS), Applying
Dynamic Programming to the LCS Problem
--- Content provided by FirstRanker.com ---
UNIT-V: Computational Geometry: One Dimensional Range Searching, Two Dimensional RangeSearching, Constructing a Priority Search Tree, Searching a Priority Search Tree, Priority Range
Trees, Quad-trees, k-D Trees. Recent Trends in Hashing, Trees, and various computational
geometry methods for efficiently solving the new evolving problem
Text Books:
--- Content provided by FirstRanker.com ---
1. Data Structures: A Pseudo-code Approach, 2/e, Richard F.Gilberg, Behrouz A.Forouzon,Cengage
2. Data Structures, Algorithms and Applications in Java, 2/e, Sartaj Sahni, University Press
Reference Books:
--- Content provided by FirstRanker.com ---
1. Mark Allen Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Pearson, 2004.2. M T Goodrich, Roberto Tamassia, Algorithm Design, John Wiley, 2002.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Software Defined Networks (MTCN11XX)Course Objectives
? To develop knowledge in networking fundamentals
? To gain conceptual understanding of Software Defined Networks (SDN)
? To study industrial deployment use-cases of SDN
--- Content provided by FirstRanker.com ---
Course Outcomes? To develop conceptual design of SDN solutions
? To apply network virtualisation for industry standard solutions
? To solve industry case-studies based on SDN
--- Content provided by FirstRanker.com ---
UNIT-I: Introduction to Networking: OSI layers; TCP/IP Protocol Suite; Distance vector and linkstate routing algorithms, Network protocols (ARP, BGP, OSPF, RIP, ICMP) and network
topologies.
UNIT-II: Introduction to SDN: Overview; History and evolution of SDN; Architecture of SDN;
SDN Flavors; Scalability (Data Centers, Service provider networks, ISP Automation); Reliability
--- Content provided by FirstRanker.com ---
(QoS, and Service Availability); Consistency (Configuration management, and Access ControlViolations); Opportunities and Challenges;
UNIT-III: Control and Data Plane Separation: Introduction to OpenFlow; History and evolution;
Control and data plane separation; virtual networking; Use-cases (Network Access Control, Virtual
Customer Edge, Datacenter Optimization); Control and Data Plane Separation: Introduction to
--- Content provided by FirstRanker.com ---
OpenFlow; History and evolution; Control and data plane separation; virtual networking; Use-cases(Network Access Control, Virtual Customer Edge, Datacenter Optimization);
UNIT-IV: Network Virtualization: Abstraction of Physical Network (constrained forwarding
model, distributed state, detailed configuration); components of a virtual network (Virtual Switch,
Bridge, Host-virtual adapter, NAT device, DHCP server, Network adapter); Network as a Service
--- Content provided by FirstRanker.com ---
(NaaS)UNIT-IV: Applications of SDN: Network management; Resource utilization; Network
service chaining; Bandwidth calendaring and Network programmability.SDN Design and
Development: Mininet; Applications; Network Virtual Machines; SDN Controller (POX,
Floodlight, OpenDayLight; Applicability of OpenFlow protocols in SDN Controllers
--- Content provided by FirstRanker.com ---
Text Books:1. Ying-Dar Lin, Ren-Hung Hwang, and Fred Baker, "Computer Networks: An Open Source
Approach", McGraw-Hill Science/Engineering/Math, 2011.
2. Paul Goransson
and
--- Content provided by FirstRanker.com ---
Chuck Black, "SoftwareDefined Networks:
A
Comprehensive Approach", Morgan Kaufmann, 2014.
Reference Books:
--- Content provided by FirstRanker.com ---
1. Siamak Azodolmolky, "Software Defined Networking with OpenFlow", Packt Publishing,2013
2. Kingston Smiler, "OpenFlow? Cookbook", Packt Publishing, 2015
3. Doug Marschke, Jeff Doyle, Pete Moyer, "Software Defined Networking (SDN): Anatomy
of OpenFlow? Volume I". Lulu Publishing Services, 2015
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Network Coding Theory ( MTCN11XX)
Course Objectives:
--- Content provided by FirstRanker.com ---
? Learn the fundamentals of network coding theory.? Understand the performance parameters required for network coding.
? Gain the knowledge of the network coding design methods.
? Learn different approaches for the network coding.
? Understand error correction and detection methods of adversarial errors.
--- Content provided by FirstRanker.com ---
Course Outcomes:
? Demonstrate knowledge and understanding of the fundamentals of Network Coding Theory.
? Summarize all the performance parameters and resources for network coding.
? Construct the network code for different networks.
--- Content provided by FirstRanker.com ---
? Deal with different approaches of Network Coding in lossy and lossless networks.? Deal with multiple sources network coding and detect adversarial errors.
UNIT?I: Introduction- A historical Perspective, Network Coding; Network Coding Benefits:
Throughput, Robustness, Complexity, Security; Network Model, Main Theorem of Network
Multicast: The Min-Cut Max-flow Theorem, The Main network coding Theorem, Theoretical
--- Content provided by FirstRanker.com ---
Framework for Network Coding: A Network Multicast Model, algebraic Framework, CombinatorialFramework, Information-Theoretic Framework, Types of Routing and coding.
UNIT ? II: Throughput Benefits of Network Coding- Throughput Measures, Linear Programming
Approach, Configurations with Large Network Coding Benefits, Configurations with Small
Network Coding Benefits, Undirected Graphs, Networks with Delay and Cycles: Dealing with
--- Content provided by FirstRanker.com ---
Delay, Optimizing for Delay, Dealing with Cycles. Resources for Network Coding: Bounds onCode Alphabet Size, Bounds on the Number of Coding Points, Coding with Limited Resources.
UNIT-III: Network Code Design Methods for Multicasting- Common initial procedure,
centralized algorithms, decentralized algorithms, scalability to network changes. Single-Source
Linear Network Coding-Acyclic Networks, Linear network code, Desirable properties of a linear
--- Content provided by FirstRanker.com ---
network code, Existence and construction, Algorithm refinement for multicast. Cyclic Networks-Delay-Free Cyclic Code, Non-equivalence between local and global descriptions, Convolutional
network code, decoding of convolutional network code.
UNIT-IV: Inter-Session Network Coding- Scalar and vector linear network coding, Fractional
--- Content provided by FirstRanker.com ---
coding problem formulation, Insufficiency of linear network coding, Information theoreticapproaches: Multiple unicast networks, Constructive approaches- Pairwise XOR coding in
wireline networks, XOR coding in wireless networks. Network Coding in Lossy Networks-
Random linear network coding, Coding theorems: Unicast connections, Multicast connections,
Error exponents for Poisson traffic with i.i.d. losses. Subgraph Selection- Flow-based
--- Content provided by FirstRanker.com ---
approaches: Intra-session coding, Computation-constrained coding, Inter-session coding; Queue-Length-Based approaches: Intra-session network coding for multicast sessions, Inter-session
coding.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
UNIT-V: Multiple Sources Network Coding- Superposition coding and max-flow bound;
--- Content provided by FirstRanker.com ---
Network Codes for Acyclic Networks- Achievable information rate region, Inner bound Rin,Outer bound Rout, RLP ? An explicit outer bound. Security against adversarial Errors- Error
Correcting bounds for centralized network coding, Distributed random network coding and
polynomial-complexity error correction, Detection of adversarial errors: Model and problem
formulation, Detection probability.
--- Content provided by FirstRanker.com ---
Text Books:1. Raymond W. Yeung, Shuo-Yen Robert Li, Ning Cai, Zhen Zhang, "Network Coding
Theory", Now publishers Inc, 2006, ISBN: 1-933019-24-7.
2. Christina Fragouli, Emina Soljanin, "Network Coding Fundamentals", Now publishers Inc,
2007, ISBN: 978-1-60198-032-8.
--- Content provided by FirstRanker.com ---
Reference Books:1. Tracey Ho, Desmond Lun, "Network Coding: An Introduction", Cambridge University Press,
2008, ISBN: 978-0-521-87310-9.
2. Muriel Medard, Alex Sprintson, "Network Coding: Fundamentals and Applications", 1st
Edition, 2012, Academic Press, Elsevier, ISBN: 978-0-12-380918-6.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Adhoc & Sensor Networks (MTCN11XX)
Course Objectives:
--- Content provided by FirstRanker.com ---
? Acquire the knowledge of various techniques in mobile networks/Adhoc networks and sensorbased networks.
? The objective of this course is to facilitate the understanding of Infrastructure less networks and
their importance in the future directions for wireless communications
--- Content provided by FirstRanker.com ---
Course Outcomes:? Explain the Fundamental Concepts and applications of ad hoc and wireless sensor networks
? Describe the MAC protocol issues of ad hoc networks
? Describe routing protocols for ad hoc wireless networks with respect to TCP design issues
? Explain the concepts of network architecture and MAC layer protocol for WSN
--- Content provided by FirstRanker.com ---
? Discuss the WSN routing issues by considering QoS measurementsUNIT I: Introduction to Ad Hoc Wireless Networks- Cellular and Ad Hoc Wireless Networks,
Characteristics of MANETs, Applications of MANETs, Issues and Challenges of MANETs, Ad Hoc
Wireless Internet, MAC protocols for Ad hoc Wireless Networks- Issues, Design Goals and
Classifications of the MAC Protocols
--- Content provided by FirstRanker.com ---
UNIT II: Routing Protocols for Ad Hoc Wireless Networks- Issues in Designing a Routing Protocol,Classifications of Routing Protocols, Topology-based versus Position-based Approaches, Issues and
design goals of a Transport layer protocol, Classification of Transport layer solutions, TCP over Ad hoc
Wireless Networks, Solutions for TCP over Ad Hoc Wireless Networks, Other Transport layer
protocols.
--- Content provided by FirstRanker.com ---
UNIT III: Security protocols for Ad hoc Wireless Networks- Security in Ad hoc Wireless Networks,
Network Security Requirements, Issues and Challenges in Security Provisioning, Network Security
Attacks, Key Management, Secure Routing in Ad hoc Wireless Networks, Cooperation in MANETs,
Intrusion Detection Systems.
--- Content provided by FirstRanker.com ---
UNIT IV: Basics of Wireless Sensors and Applications- The Mica Mote, Sensing and Communication
Range, Design Issues, Energy Consumption, Clustering of Sensors, Applications, Data Retrieval in
Sensor Networks-Classification of WSNs, MAC layer, Routing layer, Transport layer, High-level
application layer support, Adapting to the inherent dynamic nature of WSNs.
--- Content provided by FirstRanker.com ---
UNIT V: Security in WSNs- Security in WSNs, Key Management in WSNs, Secure Data Aggregation
in WSNs, Sensor Network Hardware-Components of Sensor Mote, Sensor Network Operating Systems?
TinyOS, LA-TinyOS, SOS, RETOS, Imperative Language-nesC, Dataflow style language: TinyGALS,
Node-Level Simulators, NS-2 and its sensor network extension, TOSSIM.
--- Content provided by FirstRanker.com ---
Text Books:
1. Ad Hoc Wireless Networks ? Architectures and Protocols, C. Siva Ram Murthy, B. S. Murthy,
Pearson Education, 2004
2. Ad Hoc and Sensor Networks ? Theory and Applications, Carlos Corderio Dharma P.Aggarwal,
--- Content provided by FirstRanker.com ---
3. World Scientific Publications / Cambridge University Press, March 20064. Wireless Sensor Networks ? Principles and Practice, Fei Hu, Xiaojun Cao, An Auerbach book, CRC
Press, Taylor & Francis Group, 2010
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaReference Books:
1. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,
--- Content provided by FirstRanker.com ---
Elsevier Science imprint, Morgan Kauffman Publishers, 2005, rp20092. Wireless Ad hoc Mobile Wireless Networks ? Principles, Protocols and Applications, Subir Kumar
Sarkar, et al., Auerbach Publications, Taylor & Francis Group, 2008
3. Ad hoc Networking, Charles E.Perkins, Pearson Education, 2001
4. Wireless Ad hoc Networking, Shih-Lin Wu, Yu-Chee Tseng, Auerbach Publications, Taylor &
--- Content provided by FirstRanker.com ---
Francis Group, 2007JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
--- Content provided by FirstRanker.com ---
CI Year - I Semester
3
0
--- Content provided by FirstRanker.com ---
03
Distributed Systems (MTCN11XX)
Course Objectives
? Students will get exposure to various Distributed Systems and their architectures
--- Content provided by FirstRanker.com ---
? Students will get exposed to Remote Invocation and Distributed file systems.? Students will learn the different communication mechanisms and its advantages and
disadvantages.
? Students will get exposure on transaction management and Replication.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Explain resource sharing in distributed systems and different system models used to construct
Distributed system network between systems
? Illustrate Distributed Objects and Remote Invocation
? Explore functional distributed file systems
--- Content provided by FirstRanker.com ---
? Explain Distributed Transaction management, Coordination and Agreement between distributedprocesses
? Design a distributed system that fulfills requirements with regards to key distributed systems
properties (such as scalability, transparency, etc)
UNIT I: Characterization of Distributed Systems: Introduction, Examples of Distributed Systems,
--- Content provided by FirstRanker.com ---
Resource Sharing and The Web, Challenges. (6 hours) System Models: Introduction, ArchitecturalModels- Software Layers, System Architecture, Variations, Interface and Objects, Design Requirements
for Distributed Architectures, Fundamental Models- Interaction Model, Failure Model, Security Model.
UNIT II: Distributed Objects and Remote Invocation: Introduction, Communication between
Distributed Objects- Object Model, Distributed Object Modal, Design Issues for RMI, Implementation of
--- Content provided by FirstRanker.com ---
RMI, Distributed Garbage Collection; Remote Procedure Call, Events and Notifications, Case Study:JAVA RMI
UNIT III: Distributed File Systems: Introduction, File Service Architecture; Peer-to-Peer Systems:
Introduction, Napster and its Legacy, Peer-to-Peer Middleware, Routing Overlays.
UNIT IV: Coordination and Agreement: Introduction, Distributed Mutual Exclusion, Elections,
--- Content provided by FirstRanker.com ---
Multicast Communication.UNIT V: Transactions & Replications: Introduction, System Model and Group Communication,
Concurrency Control in Distributed Transactions, Distributed Dead Locks, Transaction Recovery;
Replication-Introduction, Passive (Primary) Replication, Active Replication.
Text Books:
--- Content provided by FirstRanker.com ---
1. George Coulouris, Jean Dollimore, Tim Kindberg, "Distributed Systems- Concepts and Design",Fourth Edition, Pearson Publication
2. Ajay D Kshemkalyani, Mukesh Sighal, "Distributed Computing, Principles, Algorithms and
Systems", Cambridge
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Grid and Cluster Computing ( MTCN11XX)
Course Objectives:
--- Content provided by FirstRanker.com ---
? To get introduced to the terminology and concepts of Data center, Grid computing architecture.? To learn about grid computing tool kits and standards, SOA, OGSA and GT4
? To know about issues in grid data bases.
? To get introduced to cluster computing and also to get exposure of cluster objectives, architecture
and applications.
--- Content provided by FirstRanker.com ---
Course Outcomes:
? Ability to grasp the importance of grid and cluster computing in today's network centric world. To
learn basics of grid computing architecture.
? Ability to understand about grid computing tool kits and SOA.
--- Content provided by FirstRanker.com ---
? Ability to explain several grid computing frameworks and standards.? Ability to understand grid and data bases.
? Ability to grasp the significance of cluster computing and its architecture.
? Ability to fully appreciate the early cluster architectures and interconnections.
UNIT-I Introduction : The Data Centre, the Grid and the Distributed / High Performance Computing,
--- Content provided by FirstRanker.com ---
Cluster Computing and Grid Computing, Metacomputing ? the Precursor of Grid Computing, Scientific,Business and e-Governance Grids, Web Services and Grid Computing, Business Computing and the Grid
? a Potential Win ? win Situation, eGovernance and the Grid. Technologies and Architectures for Grid
Computing : Clustering and Grid Computing, Issues in Data Grids, Key Functional Requirements in Grid
Computing, Standards for Grid Computing, Recent Technological Trends in Large Data Grids, World
--- Content provided by FirstRanker.com ---
Wide Grid Computing ActivitiesUNIT-II: Organizations and Projects: Standard Organizations, Organizations Developing Grid
Computing Tool Kits, Framework, and Middleware, Grid Projects and Organizations Building and Using
Grid Based Solutions, Commercial Organizations Building and Using Grid Based Solutions. Web
Services and the Service Oriented Architecture (SOA) :History and Background, Service Oriented
--- Content provided by FirstRanker.com ---
Architecture, How a Web Service Works, SOAP and WSDL, Description, Creating Web Services, ServerSide.
UNIT-III: OGSA and WSRF: OGSA for Resource Distribution, Stateful Web Services in OGSA,
WSRF (Web Services Resource Framework), Resource Approach to Stateful Services, WSRF
Specification. Globus Toolkit : History of Globus Toolkit, Versions of Globus Toolkit, Applications of
--- Content provided by FirstRanker.com ---
GT4- Cases, GT4-Approaches and Benefits, Infrastructure Management, Monitoring and Discovery,Security, Data, Choreography and Coordination, Main Features of GT4 Functionality ? a Summary, GT4
Architecture, GT4 Command Line Programs, GT4 Containers
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
UNIT-IV: The Grid and the Databases: Issues in Database Integration with the Grid, The
Requirements of a Grid-enabled Database, Storage Request Broker (SRB), How to Integrate the
Databases with the Grid?, The Architecture of OGSA-DAI for Offering Grid Database Services, What is
Cluster Computing: Approaches to Parallel Computing, How to Achieve Low Cost Parallel Computing
--- Content provided by FirstRanker.com ---
through Clusters, Definition and Architecture of a Cluster, What is the Functionality a Cluster can Offer?Categories of Clusters Cluster Middleware: An Introduction: Levels and Layers of Single System Image
(SSI), Cluster Middleware Design Objectives, Resource Management and Scheduling.
UNIT-V: Early Cluster Architectures and High Throughput Computing Clusters: Early Cluster
Architectures, High Throughput Computing Clusters, Condor Networking, Protocols & I/O for Clusters :
--- Content provided by FirstRanker.com ---
Networksand
Interconnection/Switching
Devices,
Design
--- Content provided by FirstRanker.com ---
Issuesin
Interconnection
Networking/Switching, Design Architecture-General Principles and Tradeoffs, HiPPI, ATM
(Asynchronous Transmission Mode), Myrinet, Memory Channel (MC), Gigabit Ethernet
--- Content provided by FirstRanker.com ---
Text Book:1. C.S.R.Prabhu ? "Grid and Cluster Computing"-PHI(2008)
Reference Book:
1. Jankiram, "Grid Computing Models : A Research Monograph", TMH (2005)
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Wireless Networks ( MTCN11XX)
--- Content provided by FirstRanker.com ---
Course Objectives:
? The students should get familiar with the wireless/mobile market and the future needs and
challenges.
? To get familiar with key concepts of wireless networks, standards, technologies and their basic
--- Content provided by FirstRanker.com ---
Operations.? To learn how to design and analyze various medium access.
? To learn how to evaluate MAC and network protocols using network simulation software tools.
? The students should get familiar with the wireless/mobile market and the future needs and
challenges
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? Demonstrate advanced knowledge of networking and wireless networking and understand various
types of wireless networks, standards, operations and use cases.
? Be able to design WLAN, WPAN, WWAN, Cellular based upon underlying propagation and
--- Content provided by FirstRanker.com ---
performance analysis.? Demonstrate knowledge of protocols used in wireless networks and learn simulating wireless
networks.
? Design wireless networks exploring trade-offs between wire line and wireless links.
? Develop mobile applications to solve some of the real-world problems.
--- Content provided by FirstRanker.com ---
UNIT-I: Introduction- Wireless Networking Trends, Key Wireless Physical Layer Concepts, MultipleAccess Technologies - CDMA, FDMA, TDMA, Spread Spectrum technologies, Frequency reuse, Radio
Propagation and Modelling, Challenges in Mobile Computing: Resource poorness, Bandwidth, energy
etc. Wireless Local Area Networks- IEEE 802.11 Wireless LANs Physical & MAC layer, 802.11 MAC
Modes (DCF& PCF) IEEE 802.11 standards, Architecture & protocols, Infrastructure vs. Adhoc Modes,
--- Content provided by FirstRanker.com ---
Hidden Node & Exposed Terminal Problem, Problems, Fading Effects in Indoor and outdoor WLANs,WLAN Deployment issues.
UNIT?II: Wireless Cellular Networks-1G and 2G, 2.5G, 3G, and 4G, Mobile IPv4, Mobile IPv6, TCP
over Wireless Networks, Cellular architecture, Frequency reuse, Channel assignment strategies, Handoff
--- Content provided by FirstRanker.com ---
strategies, Interference and system capacity, Improving coverage and capacity in cellular systems, Spreadspectrum Technologies.
UNIT-III: WiMAX (Physical layer, Media access control, Mobility and Networking), IEEE802.22
Wireless Regional Area Networks, IEEE 802.21 Media Independent Handover Overview, Wireless
Sensor Networks: Introduction, Application, Physical, MAC layer and Network Layer, Power
--- Content provided by FirstRanker.com ---
Management, Tiny OS Overview.UNIT?IV: Wireless PANs-Bluetooth AND Zigbee, Introduction to Wireless Sensors.
UNIT?V: Security-Security in wireless Networks Vulnerabilities, Security techniques, Wi-Fi Security,
--- Content provided by FirstRanker.com ---
DoS in wireless communication. Advanced Topics:IEEE 802.11x and IEEE 802.11i standards, Introduction to Vehicular Adhoc Networks
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Text Books:
1. Schiller J., Mobile Communications, Addison Wesley, 2000.
2. Stallings W., Wireless Communications and Networks, Pearson Education 2005
--- Content provided by FirstRanker.com ---
Reference Books:
1. Stojmenic Ivan, Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons
Inc, 2002
2. Yi Bing Lin and Imrich Chlamtac, Wireless and Mobile Network Architectures, John Wiley and
--- Content provided by FirstRanker.com ---
Sons Inc, 20003. Pandya Raj, Mobile and Personal Communications Systems and Services, PHI, 2000
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
--- Content provided by FirstRanker.com ---
CI Year - I Semester
2
0
--- Content provided by FirstRanker.com ---
02
RESEARCH METHODOLOGY AND IPR
UNIT 1:
--- Content provided by FirstRanker.com ---
Meaning of research problem, Sources of research problem, Criteria Characteristics of a good researchproblem, Errors in selecting a research problem, Scope and objectives of research problem. Approaches
of investigation of solutions for research problem, data collection, analysis, interpretation, Necessary
instrumentations
UNIT 2:
--- Content provided by FirstRanker.com ---
Effective literature studies approaches, analysis Plagiarism, Research ethics, Effective technical writing,how to write report, Paper Developing a Research Proposal, Format of research proposal, a presentation
and assessment by a review committee
UNIT 3:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of Patenting and
--- Content provided by FirstRanker.com ---
Development: technological research, innovation, patenting, development. International Scenario:International cooperation on Intellectual Property. Procedure for grants of patents, Patenting under PCT.
UNIT 4:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications.
--- Content provided by FirstRanker.com ---
UNIT 5:New Developments in IPR: Administration of Patent System. New developments in IPR; IPR of
Biological Systems, Computer Software etc. Traditional knowledge Case Studies, IPR and IITs.
REFERENCES:
(1) Stuart Melville and Wayne Goddard, "Research methodology: an introduction for science &
--- Content provided by FirstRanker.com ---
engineering students'"(2) Wayne Goddard and Stuart Melville, "Research Methodology: An Introduction"
(3) Ranjit Kumar, 2nd Edition, "Research Methodology: A Step by Step Guide for beginners"
(4) Halbert, "Resisting Intellectual Property", Taylor & Francis Ltd ,2007.
(5) Mayall, "Industrial Design", McGraw Hill, 1992.
--- Content provided by FirstRanker.com ---
(6) Niebel, "Product Design", McGraw Hill, 1974.(7) Asimov, "Introduction to Design", Prentice Hall, 1962.
(8) (8) Robert P. Merges, Peter S. Menell, Mark A. Lemley, " Intellectual Property in New
Technological Age", 2016.
(9) T. Ramappa, "Intellectual Property Rights Under WTO", S. Chand, 2008
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - I Semester
--- Content provided by FirstRanker.com ---
00
4
2
Transport Control Protocol/Internet Protocol (TCP/IP) Lab ( MTCN1106)
--- Content provided by FirstRanker.com ---
Course Objectives:
From the course the student will learn
? To understand the working principle of various communication protocols.
? To analyze the various routing algorithms and know the concept of data transfer between
--- Content provided by FirstRanker.com ---
nodes.? Able to analyse a communication system by separating out the different functions provided
by the network, and understand that there are fundamental limits to any communications
system;
? Understand the general principles behind multiplexing, addressing, routing, reliable
--- Content provided by FirstRanker.com ---
transmission and other stateful protocols as well as specific examples of each& understandwhat FEC is and how CRCs work
? Aable to compare communications systems in how they solve similar problems
? View of both the internal workings of the Internet and of a number of common Internet
applications and protocols.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Demonstrate data link layer functionalities.
? Develop the client server application using socket programming.
? Choose routing protocols to solve real world problems.
? Evaluate FTP, DNS/ HTTP of application layer functionalities.
--- Content provided by FirstRanker.com ---
Experiment 1
Implementation of Stop & Wait Protocol and Sliding Window Protocol.
Experiment 2
Study of Socket Programming and Client Server model.
--- Content provided by FirstRanker.com ---
Experiment 3Write a code simulating ARP /RARP protocols.
Experiment 4
Write a code simulating PING and TRACEROUTE commands.
--- Content provided by FirstRanker.com ---
Experiment 5Create a socket for HTTP for web page upload and download.
Experiment 6
Write a program to implement RPC (Remote Procedure Call).
--- Content provided by FirstRanker.com ---
Experiment 7Implementation of Subnetting .
Experiment 8
Applications using TCP Sockets like
--- Content provided by FirstRanker.com ---
a. Echo client and echo server b. Chatc. File Transfer
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Experiment 9
--- Content provided by FirstRanker.com ---
Applications using TCP and UDP Sockets likea.DNS b. SNMP
c. File Transfer
Experiment 10
--- Content provided by FirstRanker.com ---
Study of Network simulator(NS) and Simulation of Congestion Control Algorithms using NS.Experiment 11
Configure a DNS server.
--- Content provided by FirstRanker.com ---
Experiment 12Implement the client for Simple Mail Transfer Protocol (SMTP).
Experiment 13
Configure a mail server for IMAP/POP protocols and write a simple SMTP client to send and receive
--- Content provided by FirstRanker.com ---
mails.Experiment 14
Configuring a Cisco Router as a DHCP Server.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
--- Content provided by FirstRanker.com ---
CI Year - I Semester
0
0
--- Content provided by FirstRanker.com ---
42
Advanced Data Structures Lab ( MTCN1107)
Course Objectives:
From the course the student will learn
--- Content provided by FirstRanker.com ---
? Knowing about oops concepts for a specific problem.? Various advanced data structures concepts like arrays, stacks, queues, linked lists, graphs and
trees.
Course Outcomes:
--- Content provided by FirstRanker.com ---
? Identify classes, objects, members of a class and relationships among them needed for a specificproblem.
? Examine algorithms performance using Prior analysis and asymptotic notations.
? Organize and apply to solve the complex problems using advanced data structures (like arrays,
stacks, queues, linked lists, graphs and trees.)
--- Content provided by FirstRanker.com ---
? Apply and analyze functions of DictionaryExperiment 1:
Implement Multi stacks.
--- Content provided by FirstRanker.com ---
Experiment 2:Implement Double Ended Queue (Dequeues) & Circular Queues.
Experiment 3:
Implement various Recursive operations on Binary Search Tree.
Experiment 4:
--- Content provided by FirstRanker.com ---
Implement various Non-Recursive operations on Binary Search Tree.Experiment 5:
Implement BFS for a Graph
Experiment 6:
Implement DFS for a Graph.
--- Content provided by FirstRanker.com ---
Experiment 7:Implement Merge & Heap Sort of given elements.
Experiment 8:
Implement Quick Sort of given elements.
Experiment 9:
--- Content provided by FirstRanker.com ---
Implement various operations on AVL trees.Experiment 10:
Implement B: Tree operations.
Experiment 11:
--- Content provided by FirstRanker.com ---
Implementation of Binary trees and Traversals (DFT, BFT)JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Experiment 12:
Implement Krushkal's algorithm to generate a min-cost spanning tree.
Experiment 13:
Implement Prim's algorithm to generate a min-cost spanning tree.
--- Content provided by FirstRanker.com ---
Experiment 14:Implement functions of Dictionary using Hashing.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
C
--- Content provided by FirstRanker.com ---
I Year - II Semester3
0
0
--- Content provided by FirstRanker.com ---
3Network Security
Course Objectives:
To learn the basics of security and various types of security issues.
? To study different cryptography techniques available and various security attacks.
--- Content provided by FirstRanker.com ---
? Explore network security and how they are implemented in real world.? To get an insight of various issues of Web security and biometric authentication.
Course Outcomes: At the end of the course, student will be able to
? To understand basics of security and issues related to it.
--- Content provided by FirstRanker.com ---
? Understanding of biometric techniques available and how they are used in today's world.? Security issues in web and how to tackle them.
? Learn mechanisms for transport and network security.
UNIT?I: Data security- Security Attacks, Security Services, Security Mechanisms, A Model for
Network Security, Standards, Review of cryptography- Symmetric Encryption Principles, Symmetric
--- Content provided by FirstRanker.com ---
Block Encryption Algorithms, Random and Pseudorandom Numbers, Stream Ciphers and RC4, CipherBlock Modes of Operation, Public Key Cryptography Principles, Public-Key Cryptography Algorithms.
UNIT?II: Authentication- Approaches to Message Authentication, Secure Hash Functions, Message
Authentication Codes, non-repudiation and message integrity, Digital signatures and certificates.
--- Content provided by FirstRanker.com ---
Protocols using cryptography (example Kerberos), X.509 Certificate, Federated identity management.UNIT?III: Network security- Firewalls- The Need for Firewalls, Firewall Characteristics, Types of
Firewalls, Firewall Basing, Firewall Location and Configurations, Proxy-Servers, Network intrusion
detection, Transport security- Mechanisms of TLS, SSL, IPSec- IP Security Policy, Encapsulating
--- Content provided by FirstRanker.com ---
Security Payload.UNIT?IV: Web security ? The Web Protocols, Risks to the Clients, Risks to the Server, Web Servers vs
Firewalls, The Web and Databases, SQL injection, XSS, etc, Software security and buffer overflow,
Malware types and case studies. Access Control, firewalls and host/network intrusion detection.
--- Content provided by FirstRanker.com ---
UNIT?V: Biometric Authentication- Secure E-Commerce (ex. SET), Smart Cards, Security in WirelessCommunication, IDS- Types of IDSs, Administering an IDS Malicious Software- Types of Malicious
Software, Viruses, Virus Countermeasure.
Text Books:
1. Network Security Essentials: Applications and Standards, 4E, William Stallings, Prentice Hall, 2011
--- Content provided by FirstRanker.com ---
2. Firewalls and Internet Security, W. R. Cheswick and S. M. Bellovin, Addison Wesley, 2003.Reference Books:
1. Cryptography and Network Security, 4E, W. Stallings, , Prentice Hall, 2005.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - II Semester
3
--- Content provided by FirstRanker.com ---
00
3
Wireless Sensor Networks
--- Content provided by FirstRanker.com ---
Course Objectives:? Understanding of the various security attacks and knowledge to recognize and remove common
coding errors that lead to vulnerabilities.
? Knowledge of outline of the techniques for developing a secure application.
? Recognize opportunities to apply secure coding principles.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
?
Explain common wireless sensor node architectures.
?
--- Content provided by FirstRanker.com ---
Be able to carry out simple analysis and planning of WSNs.?
Demonstrate knowledge of MAC protocols developed for WSN.
?
Demonstrate knowledge of routing protocols developed for WSN.
--- Content provided by FirstRanker.com ---
?Explain mobile data-centric networking principles.
?
Be familiar with WSN standards.
--- Content provided by FirstRanker.com ---
UNIT-I: Characteristics Of WSN: Characteristic requirements for WSN - Challenges for WSNs ?WSN vs Adhoc Networks - Sensor node architecture ? Commercially available sensor nodes ?Imote,
IRIS, Mica Mote, EYES nodes, BTnodes, TelosB, Sunspot -Physical layer and transceiver design
considerations in WSNs, Energy usage profile, Choice of modulation scheme, Dynamic modulation
scaling, Antenna considerations.
--- Content provided by FirstRanker.com ---
UNIT-II: Medium Access Control Protocols: Fundamentals of MAC protocols - Low duty cycle
protocols and wakeup concepts - Contentionbased protocols - Schedule-based protocols - SMAC -
BMAC - Traffic-adaptive medium access protocol (TRAMA) - The IEEE 802.15.4 MAC protocol.
--- Content provided by FirstRanker.com ---
UNIT-III: Routing And Data Gathering Protocols Routing Challenges and Design Issues in WirelessSensor Networks, Flooding and gossiping ? Data centric Routing ? SPIN ? Directed Diffusion ? Energy
aware routing - Gradient-based routing - Rumor Routing ? COUGAR ? ACQUIRE ? Hierarchical
Routing - LEACH, PEGASIS ? Location Based Routing ? GF, GAF, GEAR, GPSR ? Real Time routing
Protocols ? TEEN, APTEEN, SPEED, RAP - Data aggregation - data aggregation operations -
--- Content provided by FirstRanker.com ---
Aggregate Queries in Sensor Networks - Aggregation Techniques ? TAG, Tiny DB.UNIT-IV: Embedded Operating Systems: Operating Systems for Wireless Sensor Networks ?
Introduction - Operating System Design Issues - Examples of Operating Systems ? TinyOS ? Mate ?
MagnetOS ? MANTIS - OSPM - EYES OS ? SenOS ? EMERALDS ? PicOS ? Introduction to Tiny OS
--- Content provided by FirstRanker.com ---
? NesC ? Interfaces and Modules- Configurations and Wiring - Generic Components -Programming inTiny OS using NesC, Emulator TOSSIM.
UNIT-V: Applications Of WSN: WSN Applications - Home Control - Building Automation -
Industrial Automation - Medical Applications - Reconfigurable Sensor Networks - Highway Monitoring
--- Content provided by FirstRanker.com ---
- Military Applications - Civil and Environmental Engineering Applications - Wildfire Instrumentation -Habitat Monitoring - Nanoscopic Sensor Applications ? Case Study: IEEE 802.15.4 LR-WPANs
Standard - Target detection and tracking - Contour/edge detection - Field sampling.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Text Books1.Kazem Sohraby, Daniel Minoli and Taieb Znati, " Wireless Sensor Networks Technology, Protocols,
and Applications", John Wiley & Sons, 2007.
2.Holger Karl and Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks", John
Wiley & Sons, Ltd, 2005.
--- Content provided by FirstRanker.com ---
Reference Books
1.K. Akkaya and M. Younis, "A survey of routing protocols in wireless sensor networks", Elsevier Ad
Hoc Network Journal, Vol. 3, no. 3, pp. 325--349
2.Philip Levis, " TinyOS Programming" 3.Anna Ha?c, "Wireless Sensor Network Designs", John Wiley
--- Content provided by FirstRanker.com ---
& Sons Ltd,--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
30
0
3
Web Security
--- Content provided by FirstRanker.com ---
Course Objectives:? Underlying security principles of the web
? Overview of concrete threats against web applications
? Insights into common attacks and countermeasures
? Current best practices for secure web applications
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to
? Demonstrate security concepts, security professional roles, and security resources in the context
of systems and security development life cycle
? Justify applicable laws, legal issues and ethical issues regarding computer crime
--- Content provided by FirstRanker.com ---
? Explain the business need for security, threats, attacks, top ten security vulnerabilities, and securesoftware development
? Apply information security policies, standards and practices, the information security blueprint
? Analyze and describe security requirements for typical web application scenario
UNIT?I: Introduction- A web security forensic lesson, Web languages, Introduction to different web
--- Content provided by FirstRanker.com ---
attacks. Overview of N-tier web applications, Web Servers-Apache, IIS.UNIT?II: Securing the Communication Channel- Understanding the dangers of an insecure
communication channel. Practical advice on deploying HTTPS, and dealing with the impact on your
application. Insights into the latest evolutions for HTTPS deployments.
--- Content provided by FirstRanker.com ---
UNIT?III: Web Hacking Basics: HTTP & HTTPS URL, Web under the Cover Overview of Javasecurity Reading the HTML source, Applet Security Servlets Security Symmetric and Asymmetric
Encryptions, Network security Basics, Firewalls & IDS.
UNIT?IV: Securely Handling Un-Trusted data:
--- Content provided by FirstRanker.com ---
Investigation of injection attacks over time. Understanding the cause behind both server-side and client-side injection attacks. Execution of common injection attacks, and implementation of various defences.
UNIT?V: Preventing unauthorized access: Understanding the interplay between authentication,
authorization and session management. Practical ways to secure the authentication process, prevent
authorization bypasses and harden session management mechanisms, Securing Large Applications, Cyber
--- Content provided by FirstRanker.com ---
Graffiti.Text Books:
1. McClure, Stuart, Saumil Shah, and Shreeraj Shah. Web Hacking: attacks and defense. Addison
Wesley. 2003.
2. Garms, Jess and Daniel Somerfield. Professional Java Security. Wrox. 2001.
--- Content provided by FirstRanker.com ---
Reference Books (e-books):1. Collection
of
Cryptography
Web
--- Content provided by FirstRanker.com ---
Sites,Publications,
FAQs,
and
Reference
--- Content provided by FirstRanker.com ---
Books::http://world.std.com/~franl/crypto.html2. FAQ: What is TLS/SSL? http://www.mail.nih.gov/user/faq/tlsssl.htm
3. The Open SSL Project (SDKs for free download): http://www.openssl.org/
4. Windows & .NET security updates Web site: http://www.ntsecurity.net/
--- Content provided by FirstRanker.com ---
5. Preventing Unauthorized access Web site: https://www.edx.org/course/web-security-fundamentalsJAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
30
0
3
Internet of Things
--- Content provided by FirstRanker.com ---
Course Objectives:? To Understand Smart Objects and IoT Architectures.
? To learn about various IOT-related protocols
? To build simple IoT Systems using Arduino and Raspberry Pi.
? To understand data analytics and cloud in the context of IoT
--- Content provided by FirstRanker.com ---
? To develop IoT infrastructure for popular applications.Course Outcomes:
After the completion of the course, student will be able to
? Summarize on the term 'internet of things' in different contexts.
? Analyze various protocols for IoT.
--- Content provided by FirstRanker.com ---
? Design a PoC of an IoT system using Rasperry Pi/Arduino? Apply data analytics and use cloud offerings related to IoT.
? Analyze applications of IoT in real time scenario
UNIT I:
FUNDAMENTALS OF IoT: Evolution of Internet of Things, Enabling Technologies, IoT
--- Content provided by FirstRanker.com ---
Architectures,oneM2M, IoT World Forum ( IoTWF ) and Alternative IoT models, Simplified IoTArchitecture and Core IoT Functional Stack, Fog, Edge and Cloud in IoT, Functional blocks of an IoT
ecosystem, Sensors, Actuators, Smart Objects and Connecting Smart Objects
UNIT II:
--- Content provided by FirstRanker.com ---
IoT PROTOCOLS: IT Access Technologies: Physical and MAC layers, topology and Security of IEEE802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and Lora WAN, Network Layer: IP versions,
Constrained Nodes and Constrained Networks, Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing
over Low Power and Lossy Networks, Application Transport Methods: Supervisory Control and Data
Acquisition, Application Layer Protocols: CoAP and MQTT. Bluetooth Smart Connectivity-Overview,
--- Content provided by FirstRanker.com ---
Key Versions, BLE-Bluetooth Low Energy Protocol, Low Energy Architecture.UNIT III:
DESIGN AND DEVELOPMENT: Design Methodology, Embedded computing logic, Microcontroller,
System on Chips, IoT system building blocks, Arduino, Board details, IDE programming, Raspberry Pi,
--- Content provided by FirstRanker.com ---
Interfaces and Raspberry Pi with Python Programming.UNIT IV:
Arm Based Embedded System Design: ARM Cortex-A class processor, Embedded Devices-ARM
Cortex-M Class processor, Networking-Bluetooth Smart Technology
--- Content provided by FirstRanker.com ---
Introduction to embedded systems: CPUs vs MCU's vs Embedded Systems, Examples, Options forBuilding Embedded Systems, Features of Embedded Systems, Building Embedded Systems, Building
Embedded Systems using MCUs, Introduction to mbedTM Platform
UNIT V:
--- Content provided by FirstRanker.com ---
CASE STUDIES/INDUSTRIAL APPLICATIONS: Cisco IoT system, IBM Watson IoT platform,Manufacturing, Converged Plant wide Ethernet Model (CPwE), Power Utility Industry, Grid Blocks
Reference Model, Smart and Connected Cities: Layered architecture, Smart Lighting, Smart Parking
Architecture and Smart Traffic Control.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
--- Content provided by FirstRanker.com ---
1. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things,David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, Cisco
Press, 2017
2. The Definative Guide to ARM Cortex-MR3 and M4 Processor, 3rd Edition, Joseph Yiu
Reference Books:
--- Content provided by FirstRanker.com ---
1. Internet of Things ? A hands-on approach, Arshdeep Bahga, Vijay Madisetti, Universities Press,2015
2. The Internet of Things ? Key applications and Protocols, Olivier Hersent, David Boswarthick,
Omar Elloumi and Wiley, 2012 (for Unit 2).
3. "From Machine-to-Machine to the Internet of Things ? Introduction to a New Age of
--- Content provided by FirstRanker.com ---
Intelligence", Jan Ho? ller, Vlasios Tsiatsis, Catherine Mulligan, Stamatis, Karnouskos, StefanAvesand. David Boyle and Elsevier, 2014.
4. Architecting the Internet of Things, Dieter Uckelmann, Mark Harrison, Michahelles and Florian
(Eds), Springer, 2011.
5. Recipes to Begin, Expand, and Enhance Your Projects, 2nd Edition, Michael Margolis, Arduino
--- Content provided by FirstRanker.com ---
Cookbook and O'Reilly Media, 2011.6. Cortex?A
series
Programmer's
Guide
--- Content provided by FirstRanker.com ---
forARMv7-A
by
Arm
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0013d/index.htmlc
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
C
--- Content provided by FirstRanker.com ---
I Year - II Semester3
0
0
--- Content provided by FirstRanker.com ---
3Intrusion Detection & Prevention Systems
Course Objectives:
? Understand when, where, how, and why to apply Intrusion Detection tools and techniques
--- Content provided by FirstRanker.com ---
in order to improve the security posture of an enterprise.? Apply knowledge of the fundamentals and history of Intrusion Detection in order to avoid
common pitfalls in the creation and evaluation of new Intrusion Detection Systems
? Analyze intrusion detection alerts and logs to distinguish attack types from false alarms
Course Outcomes:
--- Content provided by FirstRanker.com ---
? Explain the fundamental concepts of Network Protocol Analysis and demonstrate the skill tocapture and analyze network packets.
? Use various protocol analyzers and Network Intrusion Detection Systems as security tools to
detect network attacks and troubleshoot network problems.
UNIT-I: History of Intrusion detection, Audit, Concept and definition, Internal and external threats to
--- Content provided by FirstRanker.com ---
data, attacks, Need and types of IDS, Information sources Host based information sources, Networkbased information sources.
UNIT-II: Intrusion Prevention Systems, Network IDs protocol based Ids, Hybrid IDs, Analysis
schemes, thinking about intrusion. A model for intrusion analysis, techniques Responses requirement of
responses, types of responses mapping responses to policy Vulnerability analysis, credential analysis non
--- Content provided by FirstRanker.com ---
credential analysis.UNIT-III: Introduction to Snort, Snort Installation Scenarios, Installing Snort, Running Snort on
Multiple, Network
Interfaces, Snort Command Line Options. Step-By-Step Procedure to Compile and
Install Snort Location of Snort Files, Snort Modes Snort Alert Modes.
--- Content provided by FirstRanker.com ---
UNIT-IV: Working with Snort Rules, Rule Headers, Rule Options, The Snort Configuration File etc.Plugins, Preprocessors and Output Modules, Using Snort with MySQL.
UNIT-V: Using ACID and Snort Snarf with Snort, Agent development for intrusion detection,
Architecture models of IDs and IPs.
Text Books:
--- Content provided by FirstRanker.com ---
1. Rafeeq Rehman : " Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID,"1st Edition, Prentice Hall , 2003.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaReferences:
1. Christopher Kruegel,Fredrik Valeur, Giovanni Vigna: "Intrusion Detection and Correlation Challenges
--- Content provided by FirstRanker.com ---
and Solutions", 1st Edition, Springer, 2005.2. Carl Endorf, Eugene Schultz and Jim Mellander " Intrusion Detection & Prevention", 1st Edition, Tata
McGraw-Hill, 2004.
3. Stephen Northcutt, Judy Novak : "Network Intrusion Detection", 3rd Edition, New Riders Publishing,
2002
--- Content provided by FirstRanker.com ---
4. T. Fahringer, R. Prodan, "A Text book on Grid Application Development and ComputingEnvironment". 6th Edition, KhannaPublihsers, 2012.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
T
--- Content provided by FirstRanker.com ---
PC
I Year - II Semester
3
--- Content provided by FirstRanker.com ---
00
3
Firewall and VPN Security
--- Content provided by FirstRanker.com ---
Course Objectives:
? Identify and assess current and anticipated security risks and vulnerabilities
? Develop a network security plan and policies
? Establish a VPN to allow IPSec remote access traffic
--- Content provided by FirstRanker.com ---
? Monitor, evaluate and test security conditions and environment? Develop critical situation contingency plans and disaster recovery plan
? Implement/test contingency and backup plans and coordinate with stakeholders
? Monitor, report and resolve security problems
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
? To show the fundamental knowledge of Firewalls and it types? Construct a VPN to allow Remote Access, Hashing, connections with Cryptography and VPN
Authorization
? Elaborate the knowledge of depths of Firewalls, Interpreting firewall logs, alerts, Intrusion and
Detection
--- Content provided by FirstRanker.com ---
? Infer the design of Control Systems of SCAD, DCS, PLC's and ICS's? Evaluate the SCADA protocols like RTU, TCP/IP, DNP3, OPC,DA/HAD
UNIT?I: Firewall Fundamentals: Introduction, Types of Firewalls, Ingress and Egress Filtering, Types
of Filtering, Network Address Translation (NAT), Application Proxy, Circuit Proxy, Content Filtering,
--- Content provided by FirstRanker.com ---
Software versus Hardware Firewalls, IPv4 versus IPv6 Firewalls, Dual-Homed and Triple-HomedFirewalls, Placement of Firewalls.
UNIT?II: VPN Fundamentals: VPN Deployment Models and Architecture, Edge Router, Corporate
Firewall, VPN Appliance, Remote Access, Site-to-Site, Host-to-Host, Extranet Access, Tunnel versus
Transport Mode, The Relationship Between Encryption and VPNs, Establishing VPN Connections with
--- Content provided by FirstRanker.com ---
Cryptography, Digital Certificates, VPN Authorization.UNIT?III: Exploring the Depths of Firewalls: Firewall Rules, Authentication and Authorization,
Monitoring and Logging, Understanding and Interpreting Firewall Logs and Alerts, Intrusion Detection,
Limitations of Firewalls, Downside of Encryption with Firewalls, Firewall Enhancements, and
Management Interfaces.
--- Content provided by FirstRanker.com ---
UNIT? IV: Overview of Industrial Control Systems: Overview of SCADA, DCS, and PLCs, ICSOperation, Key ICS Components, Control Components, Network Components, SCADA Systems,
Distributed Control Systems, Programmable Logic Controllers, Industrial Sectors and Their
Interdependencies.
--- Content provided by FirstRanker.com ---
UNIT? V: SCADA Protocols: Modbus RTU, Modbus TCP/IP, DNP3, DNP3 TCP/IP, OPC, DA/HAD,SCADA protocol fuzzing, Finding Vulnerabilities in HMI: software- Buffer Overflows, Shell code.
Previous attacks Analysis- Stuxnet, Duqu.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaText Books:
1. Michael Stewart "Network Security, Firewalls, and VPNs" Jones & Bartlett Learning September
--- Content provided by FirstRanker.com ---
2010.2. T. Macaulay and B. L. Singer, Cyber security for Industrial Control Systems: SCADA, DCS, PLC,
HMI, and SIS, Auerbach Publications, 2011.
3. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information Infrastructure
Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
--- Content provided by FirstRanker.com ---
Reference Books:1. J. Lopez, R. Setola, and S. Wolthusen, Critical Infrastructure Protection Information Infrastructure
Models, Analysis, and Defense, Springer-Verlag Berlin Heidelberg, 2012.
2. Robert Radvanovsky and Jacob Brodsky, editors. Handbook of SCADA/Control Systems Security.
CRC Press, 2013.
--- Content provided by FirstRanker.com ---
3. A.W. Colombo, T. Bangemann, S. Karnouskos, S. Delsing, P. Stluka, R. Harrison, et al. Industrialcloud-based cyber-physical systems Springer International Publishing, 2014.
4. D. Bailey, Practical SCADA for Industry. Burlington, MA: Newnes, 2003.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
30
0
3
--- Content provided by FirstRanker.com ---
Machine LearningCourse Objectives:
? To be able to formulate machine learning problems corresponding to different
applications.
--- Content provided by FirstRanker.com ---
? To understand a range of machine learning algorithms along with their strengths andweaknesses.
? To understand the basic theory underlying machine learning.
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Student should be able to understand the basic concepts such as decision trees andneural networks.
? Ability to formulate machine learning techniques to respective problems.
? Apply machine learning algorithms to solve problems of moderate complexity.
UNIT ? I: Introduction: An illustrative learning task, and a few approaches to it. What is
--- Content provided by FirstRanker.com ---
known from algorithms? Theory, Experiment. Biology. Psychology. Overview of Machinelearning, related areas and applications. Linear Regression, Multiple Regression, Logistic
Regression,logistic functions, Concept Learning: Version spaces. Inductive Bias. Active
queries. Mistake bound/ PAC model. basic results. Overview of issues regarding data
sources, success criteria.
--- Content provided by FirstRanker.com ---
UNIT ?II: Decision Tree Learning- Minimum Description Length Principle. Occam'srazor. Learning with active queries Introduction to information theory, Decision Trees,
Cross Validation and Over fitting. Neural Network Learning: Perceptions and gradient
descent back propagation, multilayer networks and back propagation.
UNIT ?III: Sample Complexity and Over fitting: Errors in estimating means. Cross
--- Content provided by FirstRanker.com ---
Validation and jackknifing VC dimension. Irrelevant features: Multiplicative rules forweight tuning., Support Vector Machines: functional and geometric margins, optimum
margin classifier, constrained optimization, Lagrange multipliers, primal/dual problems,
KKT conditions, dual of the optimum margin classifier, soft margins, and kernels. Bayesian
Approaches: The basics Expectation Maximization. Bayes theorem, Na?ve Bayes Classifier,
--- Content provided by FirstRanker.com ---
Markov models,Hidden Markov Models.UNIT--IV: Instance-based Techniques: Lazy vs. eager generalization. K nearestneighbor,
case- based reasoning. Clustering and Unsupervised Learning: K-means clustering,
Gaussian mixture density estimation, model selection.
UNIT--V: Genetic Algorithms: Different search methods for induction - Explanation-based
--- Content provided by FirstRanker.com ---
Learning: using prior knowledge to reduce sample complexity. Dimensionality reduction:feature selection, principal component analysis, linear discriminant analysis, factor analysis,
independent component analysis, multidimensional scaling, manifold learning
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Text Books:
--- Content provided by FirstRanker.com ---
1. Tom Michel, Machine Learning, McGraw Hill, 19972. Trevor Has tie, Robert Tibshirani & Jerome Friedman. The Elements of
Statically Learning, Springer Verlag, 2001
Reference Books:
1. Machine Learning Methods in the Environmental Sciences, Neural Networks,
--- Content provided by FirstRanker.com ---
William W Hsieh, Cambridge Univ Press.2. Richard o. Duda, Peter E. Hart and David G. Stork, pattern classification, John
Wiley & Sons Inc.,2001
3. Chris Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Service Oriented ArchitectureCourse Objectives:
? Expose students to component architecture & service orientation
? Expose students to architectural paradigms of service oriented architecture.
--- Content provided by FirstRanker.com ---
? Expose students to different technologies that make dynamic service oriented architectureapplications possible.
Course Outcomes:
? Explain in detail the basic paradigm and merits of service oriented architecture.
--- Content provided by FirstRanker.com ---
? Explain the considerations and circumstances for building applications using service orientedarchitecture.
? Able to fully understand the concept of enterprise service bus.
UNIT-I: Software Architecture: Need for Software Architecture, Objectives of Software architecture,
Types of IT Architecture, Architectural patterns and styles Service-Oriented Architecture: Service
--- Content provided by FirstRanker.com ---
orientation in daily life, Evolution of SOA, Drivers for SOA, Dimensions of SOA, Key components ofSOA, Perspectives of SOA.
UNIT-II: Enterprise wide SOA: Considerations for Enterprise wide SOA, Strawman architecture,
Enterprise SOA layers, Application development process, SOA methodology for enterprise. Enterprise
Applications: Architectural considerations, Solution architecture for enterprise applications, solution
--- Content provided by FirstRanker.com ---
architecture for enterprise.UNIT-III: Web services Overview: Heterogeneity problem, XML, SOAP, WSDL, UDDI registry,WS-
1 Basic profile Enterprise Service Bus : Routing and Scalable connectivity, Protocol transformation,
Data/message transformation, core functionalities, optional features, logical components, deployment
configurations, types of ESBs, Practical usage scenarios.
--- Content provided by FirstRanker.com ---
UNIT-IV: Service Oriented Analysis and Design: Need for models, principles of service design,design of activity services, design of data, client and business process services SOA Governance,
Security and Implementation: SOA governance, SOA security,approach for enterprise wide SOA
implementation
UNIT-V: Technologies for SOA: XML : Namespaces, schemas, processing/passing models SOAP :
--- Content provided by FirstRanker.com ---
messages, elements, attributes and processing model, message exchange types ,HTTP binding WSDL :containment structure, elements of abstract description, elements of the implementation part, logical
relationships, SOAP binding UDDI Registry: Basic data model, tmodel, categorization and identification
schemes, binding template, use of WSDL in the UDDI registry
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Text Books:
1.SOA Based Enterprise Integration : A step by step guide to services based application integration ?
WaseemRoshen, Tata Mc-Graw Hill Edition.
2. Service Oriented Architecture for Enterprise and Cloud applications ? Second edition ? Shankar
--- Content provided by FirstRanker.com ---
Kambhampaty- Wiley IndiaReference Books:
1. "Introduction to service oriented modeling"-Service oriented Modeling: Service analysis, design and
architecture ? Wiley & Sons.
2. Service Oriented Architecture : Concepts, technology and design-Thomas Erl-Pearson Education
--- Content provided by FirstRanker.com ---
20053. SOA and Cloud computing :Practices,patterns and technologies ? Anthony Assi,TouficBobez, Nitin
Gandhi-Prentice Hall/Pearson PTR
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
--- Content provided by FirstRanker.com ---
CI Year - II Semester
0
0
--- Content provided by FirstRanker.com ---
42
Network Security Lab
Course Objectives:
--- Content provided by FirstRanker.com ---
? To know about various encryption techniques.? To understand the concept of Public key cryptography.
? To study about message authentication and hash functions
? To impart knowledge on Network security
--- Content provided by FirstRanker.com ---
Course Outcomes:? Classify the symmetric encryption techniques
? Illustrate various Public key cryptographic techniques
? Evaluate the authentication and hash algorithms.
? Discuss authentication applications
--- Content provided by FirstRanker.com ---
? Summarize the intrusion detection and its solutions to overcome the attacks.? Basic concepts of system level security
Experiment 1:
Write a C program that contains a string (char pointer) with a value \Hello World'. The program should
XOR each character in this string with 0 and displays the result.
--- Content provided by FirstRanker.com ---
Experiment 2:Write a C program that contains a string (char pointer) with a value \Hello World'. The program should
AND or and XOR each character in this string with 127 and display the result
Experiment 3:
Write a Java program to perform encryption and decryption using the following algorithms:
--- Content provided by FirstRanker.com ---
a) Ceaser Cipherb) Substitution Cipher
c) Hill Cipher
Experiment 4:
Write a Java program to implement the DES algorithm logic
--- Content provided by FirstRanker.com ---
Experiment 5:Write a C/JAVA program to implement the BlowFish algorithm logic
Experiment 6:
Write a C/JAVA program to implement the Rijndael algorithm logic.
Experiment 7:
--- Content provided by FirstRanker.com ---
Using Java Cryptography, encrypt the text "Hello world" using BlowFish. Create your own key usingJava keytool.
Experiment 8:
Write a Java program to implement RSA Algorithm
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Experiment 9:
Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript. Consider the
end user as one of the parties (Alice) and the JavaScript application as other party (bob).
--- Content provided by FirstRanker.com ---
Experiment 10:Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
Experiment 11:
Calculate the message digest of a text using th
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
I Year - II Semester
--- Content provided by FirstRanker.com ---
0
0
4
2
--- Content provided by FirstRanker.com ---
Advanced Network Programming LabCourse Objectives:
? To write, execute and debug c programs which use Socket API.
? To understand the use of client/server architecture in application development
--- Content provided by FirstRanker.com ---
? To understand how to use TCP and UDP based sockets and their differences.? To get acquainted with unix system internals like Socket files, IPC structures.
? To Design reliable servers using both TCP and UDP sockets
Course Outcomes:
? Understand and explain the basic concepts of Grid Computing;
--- Content provided by FirstRanker.com ---
? Explain the advantages of using Grid Computing within a given environment;? Prepare for any upcoming Grid deployments and be able to get started with a potentially
available Grid setup.
? Discuss some of the enabling technologies e.g. high-speed links and storage area networks.
? Build computer grids.
--- Content provided by FirstRanker.com ---
Experiment 1:Understanding and using of commands like ifconfig, netstat, ping, arp, telnet, ftp, finger,
traceroute, whoisetc. Usage of elementary socket system calls (socket (), bind(), listen(),
accept(),connect(),send(),recv(),sendto(),recvfrom()).
Experiment 2:
--- Content provided by FirstRanker.com ---
Implementation of Connection oriented concurrent service (TCP).Experiment 3:
Implementation of Connectionless Iterative time service (UDP).
Experiment 4:
Implementation of Select system call.
--- Content provided by FirstRanker.com ---
Experiment 5:Implementation of gesockopt (), setsockopt () system calls.
Experiment 6:
Implementation of getpeername () system call.
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Experiment 7:
Implementation of remote command execution using socket system calls.
--- Content provided by FirstRanker.com ---
Experiment 8:Implementation of Distance Vector Routing Algorithm.
Experiment 9:
Implement the following:
i. SMTP
--- Content provided by FirstRanker.com ---
ii. FTPiii. HTTP
iv. RAS Algorithm
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaL
T
P
--- Content provided by FirstRanker.com ---
CII Year - I Semester
3
0
--- Content provided by FirstRanker.com ---
03
Trustworthy Computing
Course Objectives:
? To make students realize the practical risks and concerns in network security
--- Content provided by FirstRanker.com ---
? To introduce a coherent framework for understanding network security? To introduce the field's essential security concepts and techniques used to secure a network
? To expose the students to new state-of-the-art research topics in network security
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Demonstrate the knowledge of cryptography, network security concepts and applications.? Ability to apply security principles in system design.
? Ability to identify and investigate vulnerabilities and security threats and mechanisms to
counter them.
UNIT?I: Introduction: Computer Security Concepts, The OSI Security Architecture, Security
--- Content provided by FirstRanker.com ---
Attacks, Security Services, Security Mechanisms, A Model for Network Security, Standards,Symmetric Encryption and Message Confidentiality: Symmetric Encryption Principles,
Symmetric Block Encryption Algorithms, Random and Pseudorandom Numbers, Stream Ciphers
and RC4, Cipher Block Modes of Operation.
UNIT-II: Public-Key Cryptography and Message Authentication: Approaches to Message
--- Content provided by FirstRanker.com ---
Authentication, Secure Hash Functions, Message Authentication Codes, Public-KeyCryptography Principles, Public-Key Cryptography Algorithms, Digital Signatures.
UNIT ? III: Key Distribution and User Authentication: Symmetric Key Distribution Using
Symmetric Encryption, Kerberos, Key Distribution Using Asymmetric Encryption, X.509
Certificates, Public-Key Infrastructure.
--- Content provided by FirstRanker.com ---
UNIT ? IV: Electronic Mail Security: Pretty Good Privacy, S/MIME, Domain Keys IdentifiedMail. IP Security: IP Security Overview, IP Security Policy, Encapsulating Security Payload,
Combining Security Associations, Internet Key Exchange, Cryptographic Suites.
UNIT ? V: Intruders: Intruders, Intrusion Detection, Password Management, Malicious
Software: Types of Malicious Software, Viruses, Virus Countermeasures, Worms, Distributed
--- Content provided by FirstRanker.com ---
Denial of Service Attacks, Firewalls: The Need for Firewalls, Firewall Characteristics, Types ofFirewalls, Firewall Basing, Firewall Location and Configurations.
Text Book:
1. Network Security Essentials: Applications and Standards (4th edition) (Paperback), William
Stallings, Prentice Hall, 2010, ISBN: 978-0136108054
--- Content provided by FirstRanker.com ---
Reference Book:
1. Trusted Computing, Tsinghua University Tsinghua University Press, Dengguo Feng, O' Relly,
2017
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
L
--- Content provided by FirstRanker.com ---
TP
C
II Year - I Semester
--- Content provided by FirstRanker.com ---
30
0
3
Advanced Storage Area Networks
--- Content provided by FirstRanker.com ---
Course Objectives:
? To understand the fundamentals of storage centric and server centric systems
? To understand the metrics used for Designing storage area networks
? To understand the RAID concepts
--- Content provided by FirstRanker.com ---
? To enable the students to understand how data centre's maintain the data with the concepts ofbackup mainly remote mirroring concepts for both simple and complex systems
Course Outcomes: The students should be able to:
? Identify the need for performance evaluation and the metrics used for it
--- Content provided by FirstRanker.com ---
? Apply the techniques used for data maintenance.? Realize storage virtualization concept,
? Develop techniques for evaluating policies for LUN masking, file systems.
UNIT-I: Introduction: Server Centric IT Architecture and its Limitations; Storage ? Centric IT
--- Content provided by FirstRanker.com ---
Architecture and its advantages. Case study: Replacing a server with Storage Networks The Data Storageand Data Access problem; The Battle for size and access. Intelligent Disk Subsystems: Architecture of
Intelligent Disk Subsystems; Hard disks and Internal I/O Channels; JBOD, Storage virtualization using
RAID and different RAID levels; Caching: Acceleration of Hard Disk Access; Intelligent disk subsystems,
Availability of disk subsystems.
--- Content provided by FirstRanker.com ---
UNIT-II: I/O Techniques: The Physical I/O path from the CPU to the Storage System; SCSI; FibreChannel Protocol Stack; Fibre Channel SAN; IP Storage. Network Attached Storage: The NAS
Architecture, The NAS hardware Architecture, The NAS Software Architecture, Network connectivity,
NAS as a storage system. File System and NAS: Local File Systems; Network file Systems and file
servers; Shared Disk file systems; Comparison of fibre Channel and NAS.
--- Content provided by FirstRanker.com ---
UNIT-III: Storage Virtualization: Definition of Storage virtualization ; Implementation Considerations;Storage virtualization on Block or file level; Storage virtualization on various levels of the storage
Network; Symmetric and Asymmetric storage virtualization in the Network
UNIT-IV: SAN Architecture and Hardware devices: Overview, Creating a Network for storage; SAN
Hardware devices; The fibre channel switch; Host Bus Adaptors; Putting the storage in SAN; Fabric
--- Content provided by FirstRanker.com ---
operation from a Hardware perspective. Software Components of SAN: The switch's Operating system;Device Drivers; Supporting the switch's components; Configuration options for SANs.
UNIT-V: Management of Storage Network: System Management, Requirement of management
System, Support by Management System, Management Interface, Standardized Mechanisms, Property
--- Content provided by FirstRanker.com ---
Mechanisms, In-band Management, Use of SNMP, CIM and WBEM, Storage Management InitiativeSpecification (SMI-S), CMIP and DMI, Optional Aspects of the Management of Storage Networks
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaText Book:
1. Ulf Troppens, Rainer Erkens and Wolfgang Muller: Storage Networks Explained,
Wiley India, 2013.
--- Content provided by FirstRanker.com ---
Reference Books:1. Robert Spalding: "Storage Networks The Complete Reference", Tata McGraw-Hill, 2011.
2. Marc Farley: Storage Networking Fundamentals ? An Introduction to Storage Devices,
Subsystems, Applications, Management, and File Systems, Cisco Press, 2005.
3. Richard Barker and Paul Massiglia: "Storage Area Network Essentials A Complete Guide to
--- Content provided by FirstRanker.com ---
understanding and Implementing SANs", Wiley India, 2000JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
II Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Cloud ComputingCourse Objectives:
From the course the student will learn
? The student will also learn how to apply trust-based security model to real-world security problems.
--- Content provided by FirstRanker.com ---
? An overview of the concepts, processes, and best practices needed to successfully secureinformation within Cloud infrastructures.
? Students will learn the basic Cloud types and delivery models and develop an understanding of the
risk and compliance responsibilities and Challenges for each Cloud type and service delivery
model.
--- Content provided by FirstRanker.com ---
Course Outcomes:? Analyze the Cloud computing setup with it's vulnerabilities and applications using different
architectures.
? Design different workflows according to requirements and apply map reduce programming
model.
--- Content provided by FirstRanker.com ---
? Apply and design suitable Virtualization concept, Cloud Resource Management and designscheduling algorithms.
? Create combinatorial auctions for cloud resources and design scheduling algorithms for
computing clouds
? Assess cloud Storage systems and Cloud security, the risks involved, its impact and develop
--- Content provided by FirstRanker.com ---
cloud applicationUNIT?I: Introduction- Network centric computing, Network centric content, peer-to ?peer systems, cloud
computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud
computing, Parallel and Distributed Systems- Introduction, architecture, distributed systems,
--- Content provided by FirstRanker.com ---
communication protocols, logical clocks, message delivery rules, concurrency, model concurrency withPetri Nets.
UNIT-II: Cloud Infrastructure- At Amazon, The Google Perspective, Microsoft Windows Azure, Open
Source Software Platforms, Cloud storage diversity, Intercloud, energy use and ecological impact,
--- Content provided by FirstRanker.com ---
responsibility sharing, user experience, Software licensing, Cloud Computing- Applications andParadigms: Challenges for cloud, existing cloud applications and new opportunities, architectural styles,
workflows, The Zookeeper, The Map Reduce Program model, HPC on cloud, biological research.
UNIT-III: Cloud Resource virtualization- Virtualization, layering and virtualization, virtual machine
--- Content provided by FirstRanker.com ---
monitors, virtual machines, virtualization- full and para, performance and security isolation, hardwaresupport for virtualization, Case Study: Xen, vBlades, Cloud Resource Management and Scheduling-
Policies and Mechanisms, Applications of control theory to task scheduling, Stability of a two-level
resource allocation architecture, feedback control based on dynamic thresholds, coordination, resource
bundling, scheduling algorithms, fair queuing, start time fair queuing, cloud scheduling subject to
--- Content provided by FirstRanker.com ---
deadlines, Scheduling Map Reduce applications, Resource management and dynamic application scaling.UNIT-IV: Storage Systems- Evolution of storage technology, storage models, file systems and database,
distributed file systems, general parallel file systems. Google file system., Apache Hadoop, BigTable,
Amazon Simple Storage Service(S3), Cloud Security- Cloud security risks, security ? atop concern for
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, Indiacloud users, privacy and privacy impact assessment, trust, OS security, Virtual machine security,
Security risks.
UNIT-V: Cloud Application Development- Amazon Web Services- EC2, instances, connecting clients,
--- Content provided by FirstRanker.com ---
security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu 10.04,Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud service for
adaptive data streaming, Google- Google App Engine, Google Web Toolkit, MicroSoft- Azure Services
Platform, Windows live, Exchange Online, Share Point Services, Microsoft Dynamics CRM.
--- Content provided by FirstRanker.com ---
Text Books:1.
Cloud Computing, Theory and Practice, Dan C Marinescu,MK Elsevier
2.
Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH
--- Content provided by FirstRanker.com ---
Reference Books:
1.
Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya,
Christen vecctiola, S Tammaraiselvi
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
LT
P
C
II Year - I Semester
--- Content provided by FirstRanker.com ---
3
0
0
3
--- Content provided by FirstRanker.com ---
Python ProgrammingCourse Objectives:
? Knowledge and understanding of the different concepts of Python.
? Using the GUI Programming and Testing in real-time applications.
--- Content provided by FirstRanker.com ---
? Using package Python modules for reusability.Course Outcomes: At the end of the course, student will be able to
? Demonstrate and comprehend the basics of python programming.
? Demonstrate the principles of structured programming and be able to describe, design, implement,
and test structured programs using currently accepted methodology.
--- Content provided by FirstRanker.com ---
? Explain the use of the built-in data structures list, sets, tuples and dictionary.? Make use of functions and its applications.
? Identify real-world applications using oops, files and exception handling provided by python.
UNIT?I: Introduction- History of Python, Python Language, Features of Python, Applications of
--- Content provided by FirstRanker.com ---
Python, Using the REPL (Shell), Running Python Scripts, Variables, Assignment, Keywords, Input-Output, Indentation.
UNIT?II: Types, Operators and Expressions-Types - Integers, Strings, Booleans; Operators-
Arithmetic Operators, Comparison (Relational) Operators, Assignment Operators, Logical Operators,
Bitwise Operators, Membership Operators, Identity Operators, Expressions and order of evaluations,
--- Content provided by FirstRanker.com ---
Control Flow- if, if-elif-else, for, while, break, continue, pass.UNIT?III: Data Structures-Lists - Operations, Slicing, Methods; Tuples, Sets, Dictionaries, Sequences,
Comprehensions.
UNIT?IV: Functions- Defining Functions, Calling Functions, Passing Arguments, Keyword Arguments,
--- Content provided by FirstRanker.com ---
Default Arguments, Variable-length arguments, Anonymous Functions, Fruitful Functions(FunctionReturning Values), Scope of the Variables in a Function - Global and Local Variables, Modules: Creating
modules, import statement, from.. import statement, name spacing, Python packages, Introduction to PIP,
Installing Packages via PIP, Using Python Packages Error and Exceptions: Difference between an error
and Exception, Handling Exception, try except block, Raising Exceptions, User Defined Exceptions.
--- Content provided by FirstRanker.com ---
UNIT?V: Object Oriented Programming OOP in Python-Classes, 'self variable', Methods,Constructor Method, Inheritance, Overriding Methods, Datahiding,
Brief Tour of the Standard Library - Operating System Interface - String Pattern Matching, Mathematics,
Internet Access, Dates and Times, Data Compression, Multithreading, GUI Programming, Turtle
Graphics, Testing: Why testing is required ?, Basic concepts of testing, Unit testing in Python, Writing
--- Content provided by FirstRanker.com ---
Test cases, Running Tests.Text Books:
1. Fundamentals of Python First Programs, Kenneth. A. Lambert, Cengage
2. Introduction to Programming Using Python, Y. Daniel Liang, Pearson
--- Content provided by FirstRanker.com ---
Reference Books:1. Introduction to Python Programming, Gowrishankar.S, Veena A, CRC Press
2. Think Python, Allen Downey, Green Tea Press
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
3.
Core Python Programming, W. Chun, Pearson
L
T
--- Content provided by FirstRanker.com ---
PC
II Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Principles of Cyber Security
--- Content provided by FirstRanker.com ---
Course Objectives:? To learn threats and risks within context of the cyber security architecture.
? Student should learn and Identify security tools and hardening techniques.
? To learn types of incidents including categories, responses and timelines for response.
Course Outcomes: At the end of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Apply cyber security architecture principles.? Demonstrate the risk management processes and practices.
? Appraise cyber security incidents to apply appropriate response
? Distinguish system and application security threats and vulnerabilities.
? Identify security tools and hardening techniques
--- Content provided by FirstRanker.com ---
UNIT?I: Introduction to Cyber security- Cyber security objectives, Cyber security roles, Differencesbetween Information Security & Cyber security. Cyber security Principles- Confidentiality, integrity,
&availability Authentication & non repudiation.
UNIT?II: Information Security (IS) within Lifecycle Management-Lifecycle management landscape,
Security architecture processes, Security architecture tools, Intermediate lifecycle management concepts,
--- Content provided by FirstRanker.com ---
Risks & Vulnerabilities-Basics of risk management, Operational threat environments, Classes of attacks.UNIT?III: Incident Response- Incident categories, Incident response Incident recovery. Operational
security protection: Digital and data assets, ports and protocols, Protection technologies, Identity and
access Management, configuration management.
UNIT?IV: Threat Detection and Evaluation (DE): Monitoring- Vulnerability Management, Security
--- Content provided by FirstRanker.com ---
Logs and Alerts, Monitoring Tools and Appliances. Analysis- Network traffic Analysis, packet captureand analysis
UNIT?V: Introduction to backdoor System and security-Introduction to metasploit, Backdoor,
demilitarized zone(DMZ),Digital Signature, Brief study on Harding of operating system.
--- Content provided by FirstRanker.com ---
Text Books:1. NASSCOM: Security Analyst Student Hand Book, Dec 2015
2. Information Security Management Principles, Updated Edition, David Alexander, Amanda
Finch, David Sutton, BCS publishers, June 2013
--- Content provided by FirstRanker.com ---
Reference Books:1. Cyber Security Fundamentals-Cyber Security, Network Security and Data Governance Security, 2nd
Edition, ISACA Publishers
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
C
--- Content provided by FirstRanker.com ---
II Year - I Semester3
0
0
--- Content provided by FirstRanker.com ---
3Internet of Things
Course Objectives:
? To Understand Smart Objects and IoT Architectures.
? To learn about various IOT-related protocols
--- Content provided by FirstRanker.com ---
? To build simple IoT Systems using Arduino and Raspberry Pi.? To understand data analytics and cloud in the context of IoT
? To develop IoT infrastructure for popular applications.
Course Outcomes:
After the completion of the course, student will be able to
--- Content provided by FirstRanker.com ---
? Summarize on the term 'internet of things' in different contexts.? Analyze various protocols for IoT.
? Design a PoC of an IoT system using Rasperry Pi/Arduino
? Apply data analytics and use cloud offerings related to IoT.
? Analyze applications of IoT in real time scenario
--- Content provided by FirstRanker.com ---
UNIT I: Fundamentals of IoT: Evolution of Internet of Things, Enabling Technologies, IoTArchitectures,oneM2M, IoT World Forum ( IoTWF ) and Alternative IoT models, Simplified IoT Architecture and
Core IoT Functional Stack, Fog, Edge and Cloud in IoT, Functional blocks of an IoT ecosystem, Sensors,
Actuators, Smart Objects and Connecting Smart Objects
UNIT II: IoT Protocols: IT Access Technologies: Physical and MAC layers, topology and Security of IEEE
--- Content provided by FirstRanker.com ---
802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and Lora WAN, Network Layer: IP versions, ConstrainedNodes and Constrained Networks, Optimizing IP for IoT: From 6LoWPAN to 6Lo, Routing over Low Power and
Lossy Networks, Application Transport Methods: Supervisory Control and Data Acquisition, Application Layer
Protocols: CoAP and MQTT. Bluetooth Smart Connectivity-Overview, Key Versions, BLE-Bluetooth Low Energy
Protocol, Low Energy Architecture.
--- Content provided by FirstRanker.com ---
UNIT III: Design And Development: Design Methodology, Embedded computing logic, Microcontroller, Systemon Chips, IoT system building blocks, Arduino, Board details, IDE programming, Raspberry Pi, Interfaces and
Raspberry Pi with Python Programming.
UNIT IV: Arm Based Embedded System Design: ARM Cortex-A class processor, Embedded Devices-ARM
Cortex-M Class processor, Networking-Bluetooth Smart Technology Introduction to embedded systems: CPUs
--- Content provided by FirstRanker.com ---
vs MCU's vs Embedded Systems, Examples, Options for Building Embedded Systems, Features of EmbeddedSystems, Building Embedded Systems, Building Embedded Systems using MCUs, Introduction to mbedTM
Platform
UNIT V: Case Studies/Industrial Applications: Cisco IoT system, IBM Watson IoT platform, Manufacturing,
Converged Plant wide Ethernet Model (CPwE), Power Utility Industry, Grid Blocks Reference Model, Smart and
--- Content provided by FirstRanker.com ---
Connected Cities: Layered architecture, Smart Lighting, Smart Parking Architecture and Smart Traffic Control.Text Books:
a. IoT Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things, David Hanes,
Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, Cisco Press, 2017
b. The Definative Guide to ARM Cortex-MR3 and M4 Processor, 3rd Edition, Joseph Yiu
--- Content provided by FirstRanker.com ---
Reference Books:i. Internet of Things ? A hands-on approach, Arshdeep Bahga, Vijay Madisetti, Universities Press, 2015
2. The Internet of Things ? Key applications and Protocols, Olivier Hersent, David Boswarthick, Omar Elloumi and
Wiley, 2012 (for Unit 2).
2. "From Machine-to-Machine to the Internet of Things ? Introduction to a New Age of Intelligence", Jan Ho? ller,
--- Content provided by FirstRanker.com ---
Vlasios Tsiatsis, Catherine Mulligan, Stamatis, Karnouskos, Stefan Avesand. David Boyle and Elsevier, 2014.3. Architecting the Internet of Things, Dieter Uckelmann, Mark Harrison, Michahelles and Florian (Eds),
Springer, 2011.
4. Recipes to Begin, Expand, and Enhance Your Projects, 2nd Edition, Michael Margolis, Arduino Cookbook and
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaO'Reilly Media, 2011.
5. Cortex?A
series
--- Content provided by FirstRanker.com ---
Programmer'sGuide
for
ARMv7-A
by
--- Content provided by FirstRanker.com ---
Armhttp://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0013d/index.htmlc
L
T
--- Content provided by FirstRanker.com ---
PC
II Year - I Semester
3
--- Content provided by FirstRanker.com ---
00
3
Artificial Intelligence and Machine Learning
--- Content provided by FirstRanker.com ---
Course Objectives:? To learn the basic concepts and techniques of AI and machine learning
? To explore the various mechanism of Knowledge and Reasoning used for building expert system.
? To become familiar with supervised and unsupervised learning models
? To design and develop AI and machine learning solution using modern tools.
--- Content provided by FirstRanker.com ---
Course Outcomes: At the end of the course, student will be able to? Explain the fundamentals of AI and machine learning.
? Identify an appropriate AI problem solving method and knowledge representation technique.
? Identify appropriate machine learning models for problem solving.
? Design and develop the AI applications in real world scenario.
--- Content provided by FirstRanker.com ---
? Compare the relationship between AI, ML, and Deep Learning,UNIT? I: Introduction to AI- Definition, Problem, State space representation. Intelligent Systems:
Categorization of Intelligent System, Components of AI Program, Foundations of AI, Applications of AI,
Current trends in AI, Intelligent Agents: Anatomy, structure, Types.
--- Content provided by FirstRanker.com ---
UNIT? II: Problem solving-Solving problem by Searching: Problem Solving Agent, FormulatingProblems. Uninformed Search Methods: Breadth First Search (BFS), Depth First Search (DFS), Depth
Limited Search, Depth First Iterative Deepening (DFID), Informed Search Methods- Greedy best first
Search, A* Search, Memory bounded heuristic Search. Local Search Algorithms and Optimization
Problems- Hill climbing search Simulated annealing and local beam search.
--- Content provided by FirstRanker.com ---
UNIT ? III: Knowledge and Reasoning-Knowledge based Agents, The Wumpus World, andPropositional logic. First Order Logic- Syntax and Semantic, Inference in FOL, Forward chaining,
backward Chaining, Knowledge Engineering in First-Order Logic, Unification and Resolution.
UNIT ? IV: Concepts of Machine learning -Supervised, unsupervised, semi-supervised, Rote learning,
Reinforcement learning, Issues, steps and applications, Designing a learning System. Case study- hand
--- Content provided by FirstRanker.com ---
written digit recognition, stock price prediction. Learning Models- Decision tree learning. ProbabilisticModels, Deterministic Models, Hidden Markov Model, Reinforcement Learning-Model based learning,
Temporal Difference Learning, Generalization, Partially Observable States.
UNIT ? V: Artificial Neural Network: Introduction, neural network representation, Problems for neural
network learning, perception, multilayer network & Back propagation Algorithm. Deep learning-
--- Content provided by FirstRanker.com ---
Definition, relationship between AI, ML, and Deep Learning, Trends in Deep Learning.Text Books:
1. Artificial Intelligence and Machine Learning, 1st Edition, Vinod Chandra S.S., Anand Hareendran S,
2014
2. Artificial Intelligence: A Modern Approach, Second Edition, Pearson Education, Stuart J. Russell,
--- Content provided by FirstRanker.com ---
Peter Norvig, 2002JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
3.
--- Content provided by FirstRanker.com ---
Machine Learning, McGraw-Hill Education, Tom M. Mitchell, 19974. Introduction to machine learning, 2nd edition, The MIT Press, Ethem Alpaydin 2010
Reference Books:
1. PROLOG Programming for Artificial Intelligence", Third Edition, Pearson Education, Ivan Bratko,
2002
--- Content provided by FirstRanker.com ---
2. Artificial Intelligence, Third Edition, McGraw Hill Education, Elaine Rich and Kevin Knight, 20173. Data Mining Concepts and Techniques, Morgann Kaufmann Publishers, Han Kamber, 2011
4. Machine learning with R, 2nd Edition, Brett Lantz, 2015
5. Genetic Algorithms: Search, Optimization and Machine Learning, Davis E. Goldberg, Addison
Wesley, N.Y., 1989
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
L
T
P
C
--- Content provided by FirstRanker.com ---
IV Semester0
0
32
--- Content provided by FirstRanker.com ---
16(DISSERTATION) DISSERTATION PHASE ? I AND PHASE ? II
Syllabus Contents:
The dissertation / project topic should be selected / chosen to ensure the satisfaction of the urgent need to
establish a direct link between education, national development and productivity and thus reduce the gap
--- Content provided by FirstRanker.com ---
between the world of work and the world of study. The dissertation should have the following? Relevance to social needs of society
? Relevance to value addition to existing facilities in the institute
? Relevance to industry need
? Problems of national importance
--- Content provided by FirstRanker.com ---
? Research and development in various domainThe student should complete the following:
? Literature survey Problem Definition
? Motivation for study and Objectives
? Preliminary design / feasibility / modular approaches
--- Content provided by FirstRanker.com ---
? Implementation and Verification? Report and presentation
The dissertation stage II is based on a report prepared by the students on dissertation allotted to them. It
may be based on:
? Experimental verification / Proof of concept.
--- Content provided by FirstRanker.com ---
? Design, fabrication, testing of Communication System.? The viva-voce examination will be based on the above report and work.
Guidelines for Dissertation Phase ? I and II at M. Tech. (Electronics):
? As per the AICTE directives, the dissertation is a yearlong activity, to be carried out and
evaluated in two phases i.e. Phase ? I: July to December and Phase ? II: January to June.
--- Content provided by FirstRanker.com ---
? The dissertation may be carried out preferably in-house i.e. department's laboratories andcenters OR in industry allotted through department's T & P coordinator.
? After multiple interactions with guide and based on comprehensive literature survey, the student
shall identify the domain and define dissertation objectives. The referred literature should
preferably include IEEE/IET/IETE/Springer/Science Direct/ACM journals in the areas of
--- Content provided by FirstRanker.com ---
Computing and Processing (Hardware and Software), Circuits-Devices and Systems,Communication-Networking and Security, Robotics and Control Systems, Signal Processing
and Analysis and any other related domain. In case of Industry sponsored projects, the relevant
application notes, while papers, product catalogues should be referred and reported.
? Student is expected to detail out specifications, methodology, resources required, critical issues
--- Content provided by FirstRanker.com ---
involved in design and implementation and phase wise work distribution, and submit theproposal within a month from the date of registration.
? Phase ? I deliverables: A document report comprising of summary of literature survey, detailed
objectives, project specifications, paper and/or computer aided design, proof of
concept/functionality, part results, A record of continuous progress.
--- Content provided by FirstRanker.com ---
? Phase ? I evaluation: A committee comprising of guides of respective specialization shall assessthe progress/performance of the student based on report, presentation and Q &A. In case of
unsatisfactory performance, committee may recommend repeating the Phase-I work.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
? During phase ? II, student is expected to exert on design, development and testing of the
proposed work as per the schedule. Accomplished results/contributions/innovations should be
published in terms of research papers in reputed journals and reviewed focused conferences OR
IP/Patents.
--- Content provided by FirstRanker.com ---
? Phase ? II deliverables: A dissertation report as per the specified format, developed system inthe form of hardware and/or software, a record of continuous progress.
? Phase ? II evaluation: Guide along with appointed external examiner shall assess the
progress/performance of the student based on report, presentation and Q &A. In case of
unsatisfactory performance, committee may recommend for extension or repeating the work
--- Content provided by FirstRanker.com ---
Course Outcomes:At the end of this course, students will be able to
1. Ability to synthesize knowledge and skills previously gained and applied to an in-depth study
and execution of new technical problem.
2. Capable to select from different methodologies, methods and forms of analysis to produce a
--- Content provided by FirstRanker.com ---
suitable research design, and justify their design.3. Ability to present the findings of their technical solution in a written report.
4. Presenting the work in International/ National conference or reputed journals.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: ENGLISH FOR RESEARCH PAPER WRITING
Course objectives:
--- Content provided by FirstRanker.com ---
Students will be able to:1. Understand that how to improve your writing skills and level of readability
2. Learn about what to write in each section
3. Understand the skills needed when writing a Title Ensure the good quality of paper at very
first-time submission
--- Content provided by FirstRanker.com ---
Syllabus
Units
CONTENTS
Ho
--- Content provided by FirstRanker.com ---
urs1
Planning and Preparation, Word Order, Breaking up long sentences, 4
Structuring Paragraphs and Sentences, Being Concise
and Removing Redundancy, Avoiding Ambiguity and Vagueness
--- Content provided by FirstRanker.com ---
2Clarifying Who Did What, Highlighting Your Findings, Hedging and 4
Criticising, Paraphrasing and Plagiarism, Sections of a Paper,
Abstracts. Introduction
3
--- Content provided by FirstRanker.com ---
Review of the Literature, Methods, Results, Discussion,4
Conclusions, The Final Check.
4
key skills are needed when writing a Title, key skills are needed when 4
--- Content provided by FirstRanker.com ---
writing an Abstract, key skills are needed when writing anIntroduction, skills needed when writing a Review of the Literature,
5
skills are needed when writing the Methods, skills needed when 4
writing the Results, skills are needed when writing the Discussion,
--- Content provided by FirstRanker.com ---
skills are needed when writing the Conclusions6
useful phrases, how to ensure paper is as good as it could possibly 4
be the first- time submission
--- Content provided by FirstRanker.com ---
Suggested Studies:1. Goldbort R (2006) Writing for Science, Yale University Press (available on Google
Books)
2. Day R (2006) How to Write and Publish a Scientific Paper, Cambridge University Press
3. Highman N (1998), Handbook of Writing for the Mathematical Sciences, SIAM.
--- Content provided by FirstRanker.com ---
Highman'sbook .4. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: DISASTER MANAGEMENT
--- Content provided by FirstRanker.com ---
Course Objectives: -Students will be able to:
1. learn to demonstrate a critical understanding of key concepts in disaster risk reduction and
--- Content provided by FirstRanker.com ---
humanitarian response.2. critically evaluate disaster risk reduction and humanitarian response policy and practice
from multiple perspectives.
3. develop an understanding of standards of humanitarian response and practical relevance
in specific types of disasters and conflict situations.
--- Content provided by FirstRanker.com ---
4. critically understand the strengths and weaknesses of disaster management approaches,planning and programming in different countries, particularly their home country or the
countries
they work in
Syllabus
--- Content provided by FirstRanker.com ---
Units CONTENTSHours
1
Introduction
4
--- Content provided by FirstRanker.com ---
Disaster: Definition, Factors And Significance; Difference BetweenHazard And Disaster; Natural And Manmade Disasters: Difference,
Nature, Types And Magnitude.
2
Repercussions Of Disasters And Hazards: Economic Damage, Loss 4
--- Content provided by FirstRanker.com ---
Of Human And Animal Life, Destruction Of Ecosystem.Natural Disasters: Earthquakes, Volcanisms, Cyclones, Tsunamis,
Floods, Droughts And Famines, Landslides And Avalanches, Man- made
disaster: Nuclear Reactor Meltdown, Industrial Accidents, Oil Slicks And
Spills, Outbreaks Of Disease And Epidemics, War And
--- Content provided by FirstRanker.com ---
Conflicts.3
Disaster Prone Areas In India
4
Study Of Seismic Zones; Areas Prone To Floods And Droughts,
--- Content provided by FirstRanker.com ---
Landslides And Avalanches; Areas Prone To Cyclonic And CoastalHazards With Special Reference To Tsunami; Post-Disaster Diseases
And Epidemics
4
Disaster Preparedness And Management
--- Content provided by FirstRanker.com ---
4Preparedness: Monitoring Of Phenomena Triggering A Disaster Or
Hazard; Evaluation Of Risk: Application Of Remote Sensing, Data From
Meteorological And Other Agencies, Media Reports:
Governmental And Community Preparedness.
--- Content provided by FirstRanker.com ---
5Risk Assessment
4
Disaster Risk: Concept And Elements, Disaster Risk Reduction, Global
And National Disaster Risk Situation. Techniques Of Risk Assessment,
--- Content provided by FirstRanker.com ---
Global Co-Operation In Risk Assessment And Warning, People'sParticipation In Risk Assessment. Strategies for Survival.
6
Disaster Mitigation
4
--- Content provided by FirstRanker.com ---
Meaning, Concept And Strategies Of Disaster Mitigation, EmergingTrends In Mitigation. Structural Mitigation And Non-Structural Mitigation,
Programs Of Disaster Mitigation In India.
Suggested Readings:
--- Content provided by FirstRanker.com ---
1. R. Nishith, Singh AK, "Disaster Management in India: Perspectives, issues and strategies"'New Royal book Company.
2. Sahni, PardeepEt.Al. (Eds.)," Disaster Mitigation Experiences And Reflections", Prentice Hall
Of India, New Delhi.
3. Goel S. L. , Disaster Administration And Management Text And Case Studies" ,Deep &Deep
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
Publication Pvt. Ltd., New Delhi.
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: SANSKRIT FOR TECHNICAL KNOWLEDGE
--- Content provided by FirstRanker.com ---
Course Objectives
1. To get a working knowledge in illustrious Sanskrit, the scientific language in the world
2. Learning of Sanskrit to improve brain functioning
3. Learning of Sanskrit to develop the logic in mathematics, science & other subjects
--- Content provided by FirstRanker.com ---
enhancing the memory power4. The engineering scholars equipped with Sanskrit will be able to explore the huge
knowledge from ancient literature
Syllabus
--- Content provided by FirstRanker.com ---
Unit ContentHours
1
Alphabets in Sanskrit,
4
--- Content provided by FirstRanker.com ---
Past/Present/Future Tense,Simple Sentences
2
Order
4
--- Content provided by FirstRanker.com ---
Introduction of rootsTechnical information about Sanskrit Literature
3
Technical concepts of Engineering-Electrical,
4
--- Content provided by FirstRanker.com ---
4Technical concepts of Engineering - Mechanical.
4
5
Technical concepts of Engineering - Architecture.
--- Content provided by FirstRanker.com ---
46
Technical concepts of Engineering ? Mathematics.
4
--- Content provided by FirstRanker.com ---
Suggested reading1. "Abhyaspustakam" ? Dr.Vishwas, Samskrita-Bharti Publication, New Delhi
2. "Teach Yourself Sanskrit" Prathama Deeksha-Vempati Kutumbshastri, Rashtriya Sanskrit
Sansthanam, New Delhi Publication
3. "India's Glorious Scientific Tradition" Suresh Soni, Ocean books (P) Ltd., New Delhi.
--- Content provided by FirstRanker.com ---
Course OutputStudents will be able to
1. Understanding basic Sanskrit language
2. Ancient Sanskrit literature about science & technology can be understood
3. Being a logical language will help to develop logic in students
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: VALUE EDUCATION
--- Content provided by FirstRanker.com ---
Course ObjectivesStudents will be able to
1. Understand value of education and self- development
2. Imbibe good values in students
--- Content provided by FirstRanker.com ---
3. Let the should know about the importance of characterSyllabus
Unit Content
Hours
--- Content provided by FirstRanker.com ---
1Values and self-development ?Social values and individual attitudes. Work 4
ethics, Indian vision of humanism.
Moral and non- moral valuation. Standards and principles.
Value judgements
--- Content provided by FirstRanker.com ---
2Importance of cultivation of values.
4
Sense of duty. Devotion, Self-reliance. Confidence, Concentration.
Truthfulness, Cleanliness.
--- Content provided by FirstRanker.com ---
Honesty, Humanity. Power of faith, National Unity.Patriotism.Love for nature ,Discipline
3
Personality and Behavior Development - Soul and Scientific attitude. 4
Positive Thinking. Integrity and discipline.
--- Content provided by FirstRanker.com ---
Punctuality, Love and Kindness.Avoid fault Thinking.
4
Free from anger, Dignity of labour.
4
--- Content provided by FirstRanker.com ---
Universal brotherhood and religious tolerance.True friendship.
Happiness Vs suffering, love for truth.
Aware of self-destructive habits.
Association and Cooperation.
--- Content provided by FirstRanker.com ---
Doing best for saving nature5
Character and Competence ?Holy books vs Blind faith.
4
Self-management and Good health.
--- Content provided by FirstRanker.com ---
Science of reincarnation.Equality, Nonviolence ,Humility, Role of Women.
6
All religions and same message.
4
--- Content provided by FirstRanker.com ---
Mind your Mind, Self-control.Honesty, Studying effectively
Suggested reading
1 Chakroborty, S.K. "Values and Ethics for organizations Theory and practice", Oxford
--- Content provided by FirstRanker.com ---
University Press, New DelhiCourse outcomes
Students will be able to 1.Knowledge of self-development
2.Learn the importance of Human values 3.Developing the overall personality
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaAUDIT 1 and 2: CONSTITUTION OF INDIA
--- Content provided by FirstRanker.com ---
Course Objectives:
Students will be able to:
--- Content provided by FirstRanker.com ---
1. Understand the premises informing the twin themes of liberty and freedom from a civilrights perspective.
2. To address the growth of Indian opinion regarding modern Indian intellectuals'
constitutional role and entitlement to civil and economic rights as well as the
emergence of nationhood in the early years of Indian nationalism.
--- Content provided by FirstRanker.com ---
3. To address the role of socialism in India after the commencement of the BolshevikRevolution in 1917 and its impact on the initial drafting of the Indian Constitution.
Syllabus
Units Content
Hours
--- Content provided by FirstRanker.com ---
History of Making of the Indian Constitution:1
History
4
Drafting Committee, ( Composition & Working)
--- Content provided by FirstRanker.com ---
Philosophy of the Indian Constitution:2
Preamble Salient Features
4
Contours of Constitutional Rights & Duties:
--- Content provided by FirstRanker.com ---
Fundamental RightsRight to Equality
Right to Freedom
3
Right against Exploitation
--- Content provided by FirstRanker.com ---
4Right to Freedom of Religion
Cultural and Educational Rights
Right to Constitutional Remedies
Directive Principles of State Policy
--- Content provided by FirstRanker.com ---
Fundamental Duties.Organs of Governance:
Parliament
Composition
Qualifications and Disqualifications
--- Content provided by FirstRanker.com ---
Powers and Functions4
Executive
4
President
--- Content provided by FirstRanker.com ---
GovernorCouncil of Ministers
Judiciary, Appointment and Transfer of Judges, Qualifications
Powers and Functions
Local Administration:
--- Content provided by FirstRanker.com ---
District's Administration head: Role and Importance,5
Municipalities: Introduction, Mayor and role of Elected Representative,
CE of Municipal Corporation.
4
--- Content provided by FirstRanker.com ---
Pachayati raj: Introduction, PRI: ZilaPachayat.Elected officials and their roles, CEO ZilaPachayat: Position and role.
Block level: Organizational Hierarchy (Different departments),
Village level: Role of Elected and Appointed officials,
Importance of grass root democracy
--- Content provided by FirstRanker.com ---
Election Commission:Election Commission: Role and Functioning.
6
Chief Election Commissioner and Election Commissioners.
4
--- Content provided by FirstRanker.com ---
State Election Commission: Role and Functioning.Institute and Bodies for the welfare of SC/ST/OBC and women.
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Suggested reading
--- Content provided by FirstRanker.com ---
1. The Constitution of India, 1950 (Bare Act), Government Publication.2. Dr. S. N. Busi, Dr. B. R. Ambedkar framing of Indian Constitution, 1st Edition, 2015.
3. M. P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis, 2014.
4. D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
--- Content provided by FirstRanker.com ---
Course Outcomes:Students will be able to:
1. Discuss the growth of the demand for civil rights in India for the bulk of Indians before the
arrival of Gandhi in Indian politics.
2. Discuss the
--- Content provided by FirstRanker.com ---
intellectual origins ofthe
framework of
argument
that
--- Content provided by FirstRanker.com ---
informedthe conceptualization of social reforms leading to revolution in India.
3. Discuss the circumstances surrounding the foundation of the Congress Socialist Party
[CSP] under the leadership of Jawaharlal Nehru and the eventual failure of the proposal of
direct elections through adult suffrage in the Indian Constitution.
--- Content provided by FirstRanker.com ---
4. Discuss the passage of the Hindu Code Bill of 1956.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
--- Content provided by FirstRanker.com ---
KAKINADA ? 533 003, Andhra Pradesh, IndiaAUDIT 1 and 2: PEDAGOGY STUDIES
--- Content provided by FirstRanker.com ---
Course Objectives:
Students will be able to:
--- Content provided by FirstRanker.com ---
4. Review existing evidence on the review topic to inform programme design andpolicy making undertaken by the DfID, other agencies and researchers.
5. Identify critical evidence gaps to guide the development.
Syllabus
Units Content
--- Content provided by FirstRanker.com ---
HoursIntroduction and Methodology:
Aims and rationale, Policy background, Conceptual framework and
1
--- Content provided by FirstRanker.com ---
terminology4
Theories of learning, Curriculum, Teacher education.
Conceptual framework, Research questions.
Overview of methodology and Searching.
--- Content provided by FirstRanker.com ---
Thematic overview: Pedagogical practices are being used by teachers in2
formal and informal classrooms in developing countries.
4
Curriculum, Teacher education.
--- Content provided by FirstRanker.com ---
3Evidence on the effectiveness of pedagogical practices
Methodology for the in depth stage: quality assessment of included
studies.
How can teacher education (curriculum and practicum) and the school
--- Content provided by FirstRanker.com ---
curriculum and guidance materials best support effective pedagogy?4
Theory of change.
Strength and nature of the body of evidence for effective pedagogical
4
--- Content provided by FirstRanker.com ---
practices.4
Pedagogic theory and pedagogical approaches.
Teachers' attitudes and beliefs and Pedagogic strategies.
Professional development: alignment with classroom practices and follow-
--- Content provided by FirstRanker.com ---
up supportPeer support
4
5
Support from the head teacher and the community.
--- Content provided by FirstRanker.com ---
Curriculum and assessmentBarriers to learning: limited resources and large class sizes
6
Research gaps and future directions
4
--- Content provided by FirstRanker.com ---
Research designContexts
Pedagogy
Teacher education
Curriculum and assessment
--- Content provided by FirstRanker.com ---
Dissemination and research impact.JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
Suggested reading
--- Content provided by FirstRanker.com ---
1. Ackers J, Hardman F (2001) Classroom interact
ion in Kenyan primary schools, Compare,
31 (2): 245-261.
--- Content provided by FirstRanker.com ---
2. Agrawal M (2004) Curricular reform in schools: The importance of evaluation, Journal ofCurriculum Studies, 36 (3): 361-379.
3. Akyeampong K (2003) Teacher training in Ghana - does it count? Multi-site teacher
education research project (MUSTER) country report 1. London: DFID.
4. Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning
--- Content provided by FirstRanker.com ---
of basic maths and reading in Africa: Does teacher preparation count? InternationalJournal Educational Development, 33 (3): 272?282.
5. Alexander RJ (2001) Culture and pedagogy: International comparisons in primary
education. Oxford and Boston: Blackwell.
6. Chavan M (2003) Read India: A mass scale, rapid, `learning to read' campaign.
--- Content provided by FirstRanker.com ---
7. www.pratham.org/images/resource%20working%20paper%202.pdf.Course Outcomes:
Students will be able to understand:
1. What pedagogical practices are being used by teachers in formal and informal
--- Content provided by FirstRanker.com ---
classrooms in developing countries?2. What is the evidence on the effectiveness of these pedagogical practices, in what
conditions, and with what population of learners?
3. How can teacher education (curriculum and practicum) and the school curriculum and
guidance materials best support effective pedagogy?
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
AUDIT 1 and 2: STRESS MANAGEMENT BY YOGA
--- Content provided by FirstRanker.com ---
Course Objectives
--- Content provided by FirstRanker.com ---
1. To achieve overall health of body and mind2. To overcome stress
Syllabus
Unit Content
Hours
--- Content provided by FirstRanker.com ---
1 Definitions of Eight parts of yog. ( Ashtanga )5
2 Yam and Niyam. Do`s and Don't's in life.
5
Ahinsa, satya, astheya, bramhacharya and aparigraha
--- Content provided by FirstRanker.com ---
3 Yam and Niyam. Do`s and Don't's in life.5
Shaucha, santosh, tapa, swadhyay, ishwarpranidhan
4 Asan and Pranayam
5
--- Content provided by FirstRanker.com ---
Various yog poses and their benefits for mind & body5 Regularization of breathing
techniques and its effects-Types of 4
pranayam
--- Content provided by FirstRanker.com ---
Suggested reading1. `Yogic Asanas for Group Tarining-Part-I" : Janardan Swami YogabhyasiMandal, Nagpur
2. "Rajayoga or conquering the Internal Nature" by Swami Vivekananda, Advaita
Ashrama (Publication Department), Kolkata
Course Outcomes:
--- Content provided by FirstRanker.com ---
Students will be able to:1. Develop healthy mind in a healthy body thus improving social health also
2. Improve efficiency
--- Content provided by FirstRanker.com ---
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY: KAKINADA
KAKINADA ? 533 003, Andhra Pradesh, India
--- Content provided by FirstRanker.com ---
--- Content provided by FirstRanker.com ---
AUDIT 1 and 2: PERSONALITY DEVELOPMENT THROUGH LIFE ENLIGHTENMENTSKILLS
Course Objectives
1. To learn to achieve the highest goal happily
2. To become a person with stable mind, pleasing personality and determination
--- Content provided by FirstRanker.com ---
3. To awaken wisdom in studentsSyllabus
Unit
Content
Hours
--- Content provided by FirstRanker.com ---
1Neetisatakam-Holistic development of personality
4
Verses- 19,20,21,22 (wisdom)
Verses- 29,31,32 (pride & heroism)
--- Content provided by FirstRanker.com ---
Verses- 26,28,63,65 (virtue)2
Neetisatakam-Holistic development of personality
4
Verses- 52,53,59 (dont's)
--- Content provided by FirstRanker.com ---
Verses- 71,73,75,78 (do's)3
Approach to day to day work and duties.
4
Shrimad Bhagwad Geeta : Chapter 2-Verses 41, 47,48,
--- Content provided by FirstRanker.com ---
4Chapter 3-Verses 13, 21, 27, 35, Chapter 6-Verses 5,13,17, 23, 4
35,
Chapter 18-Verses 45, 46, 48.
5
--- Content provided by FirstRanker.com ---
Statements of basic knowledge.4
Shrimad Bhagwad Geeta: Chapter2-Verses 56, 62, 68
Chapter 12 -Verses 13, 14, 15, 16,17, 18
6
--- Content provided by FirstRanker.com ---
Personality of Role model. Shrimad Bhagwad Geeta: Chapter2-4Verses 17, Chapter 3-Verses 36,37,42,
Chapter 4-Verses 18, 38,39
Chapter18 ? Verses 37,38,63
Suggested reading
--- Content provided by FirstRanker.com ---
1. "Srimad Bhagavad Gita" by Swami Swarupananda Advaita Ashram (Publication Department),Kolkata
2. Bhartrihari's Three Satakam (Niti-sringar-vairagya) by P.Gopinath, Rashtriya Sanskrit
Sansthanam, New Delhi.
Course Outcomes
--- Content provided by FirstRanker.com ---
Students will be able to1. Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
achieve the highest goal in life
2. The person who has studied Geeta will lead the nation and mankind to peace and prosperity
3. Study of Neetishatakam will help in developing versatile personality of students
--- Content provided by FirstRanker.com ---
***