Semester I Year: 2014-2015 TOPICS MODULE I MODULE II

I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Enterprise Application Programming
Credits(L:T:P): 3:0:1
Type of Course: Lecture & Practical
Course Code: 14SIT11
Core/Elective: Core
Total Contact Hours:50
COURSE OBJECTIVES:
•
•
•
•
To gain knowledge about metrics Web Application Development and related terminologies
To gain knowledge about persistent framework and other ORM tools.
To learn to build solutions using Design Patterns
To get introduced to latest WEB frameworks
TOPICS
MODULE I
Web application and java EE 6: Exploring the HTTP Protocol, Introducing web applications,
describing web containers, exploring web architecture models, exploring the MVC architecture. Working
with servlet 3.0Exploring the features of java servlet, Exploring new features in servlet 3.0, Exploring the
servlet API, explain the servlet life cycle, creating a sample servlet, creating a servlet by using annotation,
working with servletconfig and servlet context objects, working with the Httpservlet request and
Httpservlet response interfaces, Exploring request delegation and request scope, implementing servlet
collaboration.
10 hours
MODULE II
Handling sessions in servlet 3.0: Describing a session, introducing session tracking, Exploring the
session tracking, mechanisms, using the java servlet API for session tracking, creating login application
using session tracking. Implementing event handling Introducing events, Introducing event handling,
working with the servlet events, is developing the online shop web application. Working with java
server pages: Introducing JSP technology, Exploring new features of JSP2.1, listing advantages of JSP
over java servlet, Exploring the architecture of a JSP page, Describing the life cycle of a JSP page,
working with JSP basic tags and implicit objects, working with the action tags in JSP, exploring the JSP
unified EL, using functions with EL.
10 hours
MODULE III
Implementing JSP tag extensions: Exploring the elements of tag extensions, working with classic tag
handlers, exploring the tag extensions, working with simple tag handlers. Implementing java server
pages standard tag library 1.2: Introducing JSTL, Exploring the tag libraries JSTL, working with the
core tag library. Implementing filters: Exploring the need of filters, exploring the working of filters,
exploring filters API, configuring a filter, creating a web application using filters, using initializing
parameter in filters.
10 hours
MODULE IV
Persistence Management and Design Patterns : Implementing java persistence using hibernates
Introducing hibernate, exploring the architecture of hibernate, downloading hibernate, exploring HQL,
understanding hibernate O/R mapping, working with hibernate, Implementing O/R mapping with
hibernate. Java EE design patterns: Describing the java EE application architecture, Introducing a
design patterns, discussing the role of design patterns, exploring types of patterns.
10 hours
1
I SEM MTECH (IT)
MODULE V
Web Frameworks: Working with struts 2Introducing struts 2, understanding actions in struts
2.Working with java server faces 2.0: Introducing JSF, Explaining the features of JSF, Exploring the
JSF architecture, describing JSF elements, Exploring the JSF request processing life cycle. Working with
spring 3.0: Introducing features of the spring framework, exploring the spring framework architecture,
exploring dependency injection & inversion of control, exploring AOP with spring, managing
transactions. Securing java EE 6 applications: Introducing security in java EE 6, exploring security
mechanisms, implementing security on an application server.
10 hours
LABORATORY WORK
Tools to be used / equivalent : JDK 1.6 apache tomcat server 6.x Mysql 5.x IDE Net Beans , eclipse
1.
•
•
•
•
•
•
•
•
•
•
Developing the profile management module
Implementing logic with servlet.
creating the people_ employee servlet.
creating the employeeobj class.
creating the employeedbmethods class.
creating the generated class, creating views.
creating the people_ insert JSP page.
creating the people_ search JSP page.
creating the people_ edit JSP page.
creating the people_ list JSP page.
creating the people_ profile JSP page.
2.
•
•
•
•
•
•
•
•
•
•
Developing the recruitment module
Registering a new applicant.
creating the people_ applicant servlet.
creating the applicantDBObj class.
creating the applicantDBmethods class.
creating the generated class.
creating an interface for applicant registration.
conducting rounds of test.
creating the applicant_ test_ dtl servlet.
Designing JSP views.
Working of the recruitment module.
3.
•
•
•
•
•
•
•
Developing the payroll module
Updating salary statement,
creating the people_ payroll servlet.
creating the empsal class.
creating the employee agreement class.
creating the payrollbean methods class.
designing JSP views.
creating the people_ agreement JSP page.
.
2
I SEM MTECH (IT)
•
•
•
Creating the people_ agreement_ edit JSP page.
Creating the salary_search.jsp file.
Creating the salary_ slip JSP page.
COURSE OUTCOMES:
Upon Completion of the course, the students should be able to:
• Implement a WEB application.
• Manage deployment configurations
• Implement Security mechanisms
Text Book:
1. Kogent learning solution: JAVA SERVER PROGRAMMING JAVA EE6(J2EE 1.6), Dreamtech
press 2014
3
I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Data Compression
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Course Code: 14SIT12
Core/Elective: Core
Total Contact Hours:50
Course Objectives:
•
•
To provide students with contemporary knowledge in Data Compression and Coding.
To equip students with skills to analyze and evaluate different Data Compression and
Coding methods.
TOPICS
MODULE I
Introduction: Compression techniques, modeling and coding mathematical preliminaries for
lossless compression: A brief introduction to information theory, models, coding, algorithmic
information theory, minimum description length principle.
10 hours
MODULE II
Huffman Coding: The Huffman coding algorithm, non binary Huffman codes, adaptive
Huffman coding, golomb codes, rice codes, Tunstall codes, application of Huffman coding.
10 hours
MODULE III
Lossless Image Compression: Introduction, CALIC, JPEG-LS, multi resolution approaches,
facsimile encoding, MRC-T.44. Mathematical Preliminaries For Lossy Coding: Introduction,
distortion criteria, information theory revisited, rate distortion theory, models.
10 hours
MODULE IV
Wavelet Based Compression: Introduction, wavelets, multi resolution analysis and scaling
function, implementation using filters, image compression, embedded zero tree coder, set
partitioning in hierarchical trees, JPEG zero. Audio Coding: Introduction , MPEG coding,
MPEG advanced audio coding, Dolby AC3(DOLBY DIGITAL) other standards.
10 hours
MODULE V
Video Compression: Introduction, motion compensation, video signal representation, ITU-T
recommendation H.261, model based coding, asymmetric applications, The MPEG-1 video
standard, The MPEG-2 video standard, ITU-T recommendation H.263, ITU-T recommendation
H.264, MPEG-4 part 1.0 advanced video coding, MPEG-4 part 2 , packet video, ATM networks.
10 hours
COURSE OUTCOME:
Upon the successful completion of this module a student should be able to:
• Explain the evolution and fundamental concepts will Data Compression and Coding techniques.
• Analyze the operation of a range of commonly used Coding and Compression techniques
• Identify the basic software and hardware tools used for data compression.
4
I SEM MTECH (IT)
•
Identify what new trends and what new possibilities of data compression are available.
TEXT BOOK
1. Introduction to data compression 4th edition, Khalid sayood.
ISBN:978-81-312-3408-2
Elsevier. Reprinted 2014.
Reference:
1. Data compression, The complete reference. 4th edition. David Salomon. Springer Year
2014.
5
I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Advances in DBMS
Credits(L:T:P): 3:0:1
Type of Course: Lecture & Practical.
Course Code: 14SIT13
Core/Elective: Core
Total Contact Hours:50
COURSE OBJECTIVES:
•
•
•
•
•
•
To acquire knowledge on parallel and distributed databases and its applications.
To study the usage and applications of Object Oriented database
To understand the basic concepts, principles of intelligent databases.
To understand the advanced topics data warehousing and mining .
To learn emerging and advanced data models
To acquire inquisitive attitude towards research topics in databases.
TOPICS
MODULE I
Review of Relational Data Model and Relational Database Constraints: Relational model concepts;
Relational model constraints and relational database schemas; Update operations, transactions and dealing
04 Hours
with constraint violations.
MODULE II
Object and Object-Relational Databases: Overview of Object-Oriented Concepts – Objects,
Encapsulation, Type and class hierarchies, complex objects; Object model of ODMG, Object definition
Language ODL; Object Query Language OQL; Overview of C++ language binding; Conceptual design of
Object database. Overview of object relational features of SQL; Object-relational features of Oracle;
Implementation and related issues for extended type systems; The nested relational model.
12 Hours
MODULE III
Parallel and Distributed Databases: Architectures for parallel databases; Parallel query evaluation;
Parallelizing individual operations; Parallel query optimizations; Introduction to distributed databases;
Distributed DBMS architectures; Storing data in a Distributed DBMS; Distributed catalog management;
Distributed Query processing; Updating distributed data; Distributed transactions; Distributed
Concurrency control and Recovery.
12 Hours
MODULE IV
Data Warehousing, Decision Support and Data Mining: Introduction to decision support; OLAP,
multidimensional model; Window queries in SQL; Finding answers quickly; Implementation techniques
for OLAP; Data Warehousing; Views and Decision support, View materialization, Maintaining
materialized views. Introduction to Data Mining; Counting co-occurrences; Mining for rules; Treestructured rules; Clustering; Similarity search over sequences; Incremental mining and data streams;
Additional data mining tasks.
14 Hours
MODULE V
6
I SEM MTECH (IT)
Enhanced Data Models for Some Advanced Applications: Active database concepts and triggers;
Temporal, Spatial, and Deductive Databases – Basic concepts. More Recent Applications: Mobile
databases; Multimedia databases; Geographical Information Systems; Genome data management.
8 Hours
LABORATORY WORK
(The following tasks can be implemented on Oracle or any other suitable RDBMS with support for
Object features)
1. Develop a database application to demonstrate storing and retrieving of BLOB and CLOB objects.
2. Develop a database application to demonstrate the representation of multivalued attributes, and the use
of nested tables to represent complex objects. Write suitable queries to demonstrate their use.
3. Design and develop a suitable Student Database application. One of the attributes to me maintained is
the attendance of a student in each subject for which he/she has enrolled. Using TRIGGERS, write active
rules to do the following:
a. Whenever the attendance is updated, check if the attendance is less than 85%; if so, notify the Head of
the Department concerned.
b. Whenever, the marks in an Internal Assessment Test are entered, check if the marks are less than 40%;
if so, notify the Head of the Department concerned.
4. Design, develop, and execute a program in a language of your choice to implement any one algorithm
for mining association rules. Run the program against any large database available in the public domain
and discuss the results.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
• Select the appropriate high performance database like parallel and distributed database
• Model and represent the real world data using object oriented database
• Embed the rule set in the database to implement data warehousing of mining
• Choose and design database for recent applications database for better interoperability
TEXT BOOKS:
1. Elmasri and Navathe: Fundamentals of Database Systems, Pearson Education, 2013.
2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition, McGrawHill, 2013.
REFERENCE BOOKS:
1. Abraham Silberschatz, Henry F. Korth, S. Sudarshan: Database System Concepts, 6th Edition,
McGraw Hill, 2010.
7
I SEM MTECH (IT)
Semester I
Course Title: Information Storage Management
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Year: 2014-2015
Course Code: 14SIT14
Core/Elective: Core
Total Contact Hours:50
Course Objectives:
• To outline basic terminology and components in information storage and retrieval
systems
• To compare and contrast information retrieval models and internal mechanisms such as
Boolean, Probability, and Vector Space Models
• To describe current trends in information retrieval such as information visualization.
• To understand a backup process and securing and managing storage infrastructure
TOPICS:
MODULE I
Introduction to Information Storage: Information Storage, Evolution of Storage Architecture,
Data center Infrastructure, Virtualization and cloud computing. Data Center Environment:
Application, Database Management System(DBMS), Host(compute), Connectivity, Storage,
Disk Drive Components, Disk Drive Performance, Host Access to Data, Direct-Attached
Storage, Storage Design Based On Application, Disk Native Command Queuing, Introduction to
Flash Drives, Concept in Practice: VMware ESXi. Data Protection: RAID:RAID
Implementation Methods, RAID Array Components, RAID Techniques, RAID levels, RAID
Impact on Disk Performance, RAID Comparison, Hot Spares
10 hours
MODULE II
Intelligent Storage Systems: Components of an Intelligent Storage System, Storage
Provisioning, Types of intelligent Storage Systems, Concepts in Practice: EMC Symmetrix and
VNX. Fibre Channel Storage Area Networks: Fibre Channel: Overview, The SAN and Its
Evolution, Components of FC SAN, FC Connectivity, Switched Fabric Ports, Fibre Channel
Architecture, fabric Services, Switched fabric Login Types, Zoning, FC SAN Topologies,
Virtualization in SAN, Concepts in Practice: EMC Connectrix and EMC VPLEX.IP SAN and
FcoE: iSCSI, FCIP, FcoE.
10 hours
MODULE III
Network-Attached Storage: General-purpose Servers versus NAS Devices, benefits of NAS,
File Systems and network File Sharing. Components of NAS, NAS I/O Operation, NAS
Implementations, NAS File-Sharing Protocols, factors Affecting NAS Performance, File-Level
Virtualization, Concepts in Practice: EMC Isilon and EMC VNX gateway. Object-Based and
unified Storage: Object-Based Storage Devices, Content- Addressed Storage, CAS use Cases,
unified Storage, Concepts in Practice: EMC atoms, EMC VNX, and EMC centera. Introduction
to Business Continuity. Information Availability, BC Terminology, BC Planning life Cycle,
failure Analysis, Business Impact Analysis, BC Technology solutions.
10 hours
8
I SEM MTECH (IT)
MODULE IV
Backup and Archive : Backup Purpose, Backup Considerations, Backup Granularity, Recovery
Considerations, Backup Methods, Backup Architecture, Backup and Restore Operation, Backup
Topologies, Backup in NAS Environments, Backup Targets, Data Dedupulication for Backup,
Backup in Virtualized Environments, Data Archive, Archiving Solution Architecture, Concepts
in Practice: EMC Networker, EMC Avamar, and EMC Data domain. Local Relication:
Replication Terminology, Uses of Local Replicas, Replica Consistency, Local Replication
Technologies, Tracking Changes to Source and Replica, Restore and Restart Considerations,
Creating Multiple Replicas, Local Replication in Virtualized Environment, Concepts in Practice:
EMC TimeFinder. Remote Replication: Modes of Remote Replication, Remote Replication
Technologies, Three-Site Replication, Data Migration Solutions, Remote Replication and
Migration in a Virtualized Environment, Concepts in Practice : EMC SRDF, EMC MirrorView,
and EMC RecoverPoint.
10 hours
MODULE V
Securing the Storage Infrastructure: Information Security Framework, Risk Triad, Storage
Security Domains, Security implementations in Storage Networking, Securing Storage
Infrastructure in Virtualized and Cloud Environments, Concepts in practice: RSA and VMware
Security Products. Managing the Storage Infrastructure: Monitoring the Storage
Infrastructure, Storage Infrastructure Management Activities, Storage Infrastructure
Management Challenges, Developing an Idea Solution, Information Lifecycle Management,
Storage Tiering, Concepts in Practice: EMC Infrastructure.
10 hours
COURSE OUTCOMES
After completion of this course, the students would be able to
• Recognize the role and use of technology in business systems and operations
• Identify and describe organizational structure and business processes within these
• Implement information systems in industry.
• Choose backup method and replication method.
• Provide securing of management storage infrastructure.
Text Book:
1.
EMC2 : Information Storage and Management, Willey India 2013.
REFERENCES:
1. EMC Corporation, Information Storage and Management, Wiley, India.
2. Robert Spalding, “Storage Networks: The Complete Reference“, Tata McGraw Hill , Osborne,
2003.
3. Marc Farley, “Building Storage Networks”, Tata McGraw Hill ,Osborne, 2001.
4. Additional resource material on www.emc.com/resource-library/resource-library.esp.
9
I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Client-Server Programming
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Course Code: 14SIT151
Core/Elective: Elective
Total Contact Hours:50
Course Objectives:
• To understand Client-Server software, Context Switching and Protocol Software, I/o.
• To understand System Calls, Basic I/O Functions available in UNIX
• To understand the Socket interface, TCP, UDP in detail.
• To understand various Client Software.
• To understand the various algorithms issue related to server software design.
TOPICS
MODULE I
The Client Server Model and Software Design: Introduction, Motivation, Terminology and Concepts
Concurrent Processing in Client-Server software: Introduction, Concurrency in Networks,
Concurrency in Servers, Terminology and Concepts, An example of Concurrent Process Creation,
Executing New Code, Context Switching and Protocol Software Design, Concurrency and Asynchronous
I/O. Program Interface to Protocols: Introduction, Loosely Specified Protocol Software Interface,
Interface Functionality, Conceptual Interface Specification, System Calls, Two Basic Approaches to
Network Communication, The Basic I/O Functions available in UNIX, Using UNIX I/O with TCP/IP.
10 hours
MODULE II
The Socket Interface: Introduction, Berkley Sockets, Specifying a Protocol Interface, The Socket
Abstraction, Specifying an End Point Address, A Generic Address Structure, Major System Calls used
with Sockets, Utility Routines for Integer Conversion, Using Socket Calls in a Program, Symbolic
Constants for Socket Call Parameters. Algorithms and Issues in Client Software Design: Introduction,
Learning Algorithms instead of Details, Client Architecture, Identifying the Location of a Server, Parsing
an Address Argument, Looking up a Domain Name, Looking up a well-known Port by Name, Port
Numbers and Network Byte Order, Looking up a Protocol by Name, The TCP Client Algorithm,
Allocating a Socket, Choosing a Local Protocol Port Number, A fundamental Problem in choosing a
Local IP Address, Connecting a TCP Socket to a Server, Communicating with the Server using TCP,
Reading a response from a TCP Connection, Closing a TCP Connection, Programming a UDP Client,
Connected and Unconnected UDP Socket, Using Connect with UDP, Communicating with a Server using
UDP, Closing a Socket that uses UDP, Partial Close for UDP, A Warning about UDP Unreliability.
10 hours
MODULE III
Example Client Software: Introduction, The Importance of Small Examples, Hiding Details, An
Example Procedure Library for Client Programs, Implementation of Connect TCP, Implementation of
Connect UDP, A Procedure that Forms Connections, Using the Example Library, The DAYTIME
Service, Implementation of a TCP Client for DAYTIME, Reading from a TCP Connection, The Time
Service, Accessing the TIME Service, Accurate Times and Network Delays, A UDP Client for the TIME
Service, The ECHO Service, A TCP Client for the ECHO Service, A UDP Client for the ECHO Service.
10 hours
10
I SEM MTECH (IT)
MODULE IV
Algorithms and Issues in Server Software Design: Introduction, The Conceptual Server Algorithm,
Concurrent Vs Iterative Servers, Connection-Oriented Vs Connectionless Access, Connection-Oriented
Servers, Connectionless Servers, Failure, Reliability and Statelessness, Optimizing Stateless Servers, Four
Basic Types of Servers, Request Processing Time, Iterative Server Algorithms, An Iterative ConnectionOriented Server Algorithm, Binding to a Well Known Address using INADDR_ANY, Placing the Socket
in Passive Mode, Accepting Connections and using them. An Iterative Connectionless Server Algorithm,
Forming a Reply Address in a Connectionless Server, Concurrent Server Algorithms, Master and Slave
Processes, A Concurrent Connectionless Server Algorithm, A concurrent Connection-Oriented Server
Algorithm, Using separate Programs as Slaves, Apparent Concurrency using a Single Process, When to
use each Server Types, The Important Problem of Server Deadlock, Alternative Implementations.
10 hours
MODULE V
Iterative, Connectionless Servers (UDP): Introduction, Creating a Passive Socket, Process Structure, An
example TIME Server. Iterative, Connection-Oriented Servers (TCP): Introduction, Allocating a Passive
TCP Socket, A Server for the DAYTIME Service, Process Structure, An Example DAYTIME Server,
Closing Connections, Connection Termination and Server Vulnerability. Concurrent, ConnectionOriented Servers (TCP): Introduction, Concurrent ECHO, Iterative Vs Concurrent Implementations,
Process Structure, An example Concurrent ECHO Server, Cleaning up Errant Processes.
10 hours
Course Outcomes:
The student will be able to:
-
-
In depth knowledge about Client-Server software, Context Switching and Protocol Software, I/o.
Programming System Calls, Basic I/O Functions available in UNIX
The Socket interface, TCP, UDP in detail.
Pros and cons of Client Software Various applications and their issues.
TEXT BOOK:
1. Douglas E.Comer, David L. Stevens: Internetworking with TCP/IP – Vol. 3, Client-Server
Programming and Applications, BSD Socket Version with ANSI C, 2nd Edition, Pearson, 2001.
11
I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Advances in Operating Systems
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Course Code: 14SIT152
Core/Elective: Elective
Total Contact Hours:50
Course Objectives:
• To learn the fundamentals of Operating Systems
• To gain knowledge on Distributed operating system concepts that include architecture,
Mutual exclusion algorithms, Deadlock detection algorithms and agreement protocols
• To gain insight in to the distributed resource management components viz. the algorithms
for implementation of distributed shared memory, recovery and commit protocols
• To know the components and management aspects of Real time & Mobile operating
Systems.
TOPICS
MODULE I
Operating System Overview, Process description & control
Operating System Objectives and Functions, The Evolution of Operating Systems, Major
Achievements, Developments Leading to Modern Operating Systems, Microsoft Windows
Overview, Traditional UNIX Systems, Modern UNIX Systems, Linux, What is a Process?, Process
States, Process Description, Process Control, Execution of the Operating System, Security Issues,
UNIX SVR4 Process Management.
10 Hours
MODULE II
Threads, SMP, and Microkernel, Virtual Memory.
Processes and Threads, Symmetric Multiprocessing (SMP), Micro kernels, Windows Vista Thread
and SMP Management, Solaris Thread and SMP Management, Linux Process and Thread
Management. Hardware and Control Structures, Operating System Software, UNIX and Solaris Memory
Management, Linux Memory Management, Windows Vista Memory Management, Summary.
10 Hours
MODULE III
Multiprocessor and Real-Time Scheduling
Multiprocessor Scheduling, Real-Time Scheduling, Linux Scheduling, UNIX PreclsSl) Scheduling,
Windows Vista Scheduling, Process Migration, Distributed Global States, Distributed Mutual
Exclusion, Distributed Deadlock.
10 Hours
MODULE IV
Embedded Operating Systems
Embedded Systems, Characteristics of Embedded Operating Systems, eCOS, TinyOS, Computer Security
Concepts, Threats, Attacks, and Assets, Intruders, Malicious Software Overview, Viruses, Worms, and
Bots, Rootkits.
10 Hours
12
I SEM MTECH (IT)
MODULE V
Kernel Organization
Using Kernel Services, Daemons, Starting the Kernel , Control in the Machine , Modules and Device
Management, Module Organization, Module Installation and Removal, Process and Resource
Management, Running Process Manager, Creating a new Task , IPC and Synchronization, The Scheduler,
Memory Manager , The Virtual Address Space, The Page Fault Handler , File Management.
The windows NT/2000/XP kernel: Introduction, The NT kernel, Objects , Threads, Multiplication
Synchronization, Traps, Interrupts and Exceptions, The NT executive , Object Manager, Process and
Thread Manager , Virtual Memory Manager, I/o Manager, The cache Manager , Kernel local procedure
calls and IPC, The native API, subsystems.
10 Hours
COURSE OUTCOMES
-Demonstrate the Mutual exclusion, Deadlock detection and agreement protocols of Distributed
operating system
- Learn the various resource management techniques for distributed systems
- Identify the different features of real time and mobile operating systems
-Modify existing open source kernels in terms of functionality or features used.
Text Books:
1. William Stallings: Operating Systems: Internals and Design Principles, 6th Edition, Prentice Hall,
2013.
2. Gary Nutt: Operating Systems, 3rd Edition, Pearson, 2014.
Reference Books:
1. Silberschatz, Galvin, Gagne: Operating System Concepts, 8th Edition, Wiley, 2008
2. Andrew S. Tanenbaum, Albert S. Woodhull: Operating Systems, Design and Implementation, 3rd
Edition, Prentice Hall, 2006.
3. Pradeep K Sinha: Distribute Operating Systems, Concept and Design, PHI, 2007
13
I SEM MTECH (IT)
Semester I
Year: 2014-2015
Course Title: Service Oriented Architecture
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Course Code: 14SIT153
Core/Elective: Elective
Total Contact Hours:50
COURSE OBJECTIVES:
• To understand various architecture for application development
• To understand the importance of SOA in Application Integration
• To learn web service and SOA related tools
• To Learn implementation details of SOA
• To understand various case studies
TOPICS
MODULE I
SOA BASICS :Software Architecture – Types of IT Architecture – SOA – Evolution – Key
components – perspective of SOA – Enterprise-wide SOA – Architecture – Enterprise
Applications – Solution Architecture for enterprise application – Software platforms for
enterprise Applications – Patterns for SOA – SOA programming models.
10 hours
MODULE II
SOA ANALYSIS AND DESIGN: Service-oriented Analysis and Design – Design of Activity,
Data, Client and business process services – Technologies of SOA – SOAP – WSDL – JAX –
WS – XML WS for .NET – Service integration with ESB – Scenario – Business case for SOA –
stakeholder OBJECTIVES – benefits of SPA – Cost Savings.
10 hours
MODULE III
SOA GOVERNANCE:SOA implementation and Governance – strategy – SOA development –
SOA governance – trends in SOA – event-driven architecture – software s a service – SOA
technologies – proof-of-concept – process orchestration – SOA best practices.
10 hours
MODULE IV
SOA IMPLEMENTATION:SOA based integration – integrating existing application –
development of web services – Integration - SOA using REST – RESTful services – RESTful
services with and without JWS – Role of WSDL,SOAP and Java/XML mapping in SOA – JAXB
Data binding.
10 hours
MODULE V
APPLICATION INTEGRATION:JAX –WS 2.0 client side/server side development –
Packaging and Deployment of SOA component – SOA shopper case study –WSDL centric java
WS with SOA-J – related software – integration through service composition (BPEL) – case
study - current trends.
10 hours
14
I SEM MTECH (IT)
COURSE OUTCOMES
Students should be able to work with
• Comparison of different IT architecture
• Analysis and design of SOA based applications
• Implementation of web service and realization of SOA
• Implementation of RESTful services
• Design and implementation of SOA based Application Integration using BPEL
Text Book:
1. Shankar Kambhampaly, “Service–Oriented Architecture for Enterprise Applications”, Wiley
2008.
REFERENCES:
2. Mark D. Hansen, “SOA using Java Web Services”, Practice Hall, 2007.
3. Waseem Roshen, “SOA-Based Enterprise Integration”, Tata McGraw-HILL, 2009.
15
I SEM MTECH (IT)
Semester I
Course Title:
Distributed Computing
Credits(L:T:P): 4:0:0
Type of Course: Lecture
Year: 2014-2015
Course Code: 14SIT154
Core/Elective: Elective
Total Contact Hours:50
Course Objectives
• To learn the basic concepts of DSM & Hardware DSM.
• To understand File Sharing, DFS Implementation & Replication in DFS,
• To understand the concepts of Cryptography, Secure channels & Access control
TOPICS:
MODULE I
Distributed System management: Introduction, Resource management, Task Assignment
Approach, Load-Balancing Approach, Load-Sharing Approach, Process management in a
Distributed Environment, Process Migration, Threads, Fault Tolerance.
10 hours
MODULE II
Distributed Shared Memory: Introduction, Basic Concepts of DSM, Hardware DSM, Design
Issue in DSM Systems, Issue in Implementing DSM Systems, Heterogeneous and Other DSM
Systems, Case Studies.
10 hours
MODULE III
Distributed File System: Introduction to DFS, File Models, Distributed File System Design,
Semantics of File Sharing, DFS Implementation, File Caching in DFS, Replication in DFS, Case
studies.Naming: Introduction, Desirable features of a good naming system, Basic concepts,
System-oriented names, Object-locating mechanisms, Issues in designing human-oriented
names, Name caches, Naming and security, Case study: Domain name service.
10 hours
MODULE IV
Security in distributed systems: Introduction, Cryptography, Secure channels, Access control,
Security Management, Case studies.
10 hours
MODULE V
Real-Time Distributed operating Systems: Introduction, Design issues in real-time distributed
systems, Real-time communication, Real-time scheduling, Case study: Real-time communication
in MARS. Emerging Trends in distributed Computing: Introduction to emerging trends, Grid
Computing, SOA, Cloud computing, The future of emerging Trends.
10 hours
COURSE OUTCOMES:
The student should be able to
• Realize shared memory concept.
• Advantages of DFS.
• Mechanisms to manage security in DS
Text Book:
16
I SEM MTECH (IT)
1.Sunitha Mahajan, Seema Shah: Distributing Computing, Published by Oxford University press
2010.
Semester I
Course Title: Data Compression Laboratory
Credits(02)(L:T:P): 0:0:3
Type of Course: Practical
Year: 2014-2015
Course Code: 14SIT16
Core/Elective: Core
Total Contact Hours:42
Course Objectives:
•
•
•
To provide students with contemporary knowledge in Data Compression and Coding.
To equip students with skills to analyze and evaluate different Data Compression and Coding
methods
To be instrumental to handle multi dimension data compression.
LABORATORY WORK
NOTE: Use appropriate tool/language or package to implement and For programs 5 and 6,
MATLAB or any equivalent tools can be used.
1. Write a program to compress a source Text file using Run-length encoding Compression algorithm
save the output in a destination file. Decompress the destination file to get the original source file.
2. Write a program to compress a source image file using Run-length encoding Compression
algorithm save the output in a destination file. Decompress the destination file to get the original
source file.
3. Using a text file compute the probabilities of each letter Pi assume that we need a code word of
length [log21/Pi ] to encode the letter i . Determine the number of bits needed to encode the file.
Compute the conditional probabilities pi/j of a letter given that the previous letter is j. assume that we
need [log21/Pi/j ] to represent a letter i that follows a letter j. Determine the number of bits needed to
encode the file.
4. Write a program to Read the string to generate Huffman code and display the code along with the
input string (program should be case sensitive). Show all the calculation manually. Verify the results.
5. Write a program to read Huffman codes & compressed string (contains Huffman codes) codes and
replaces the code with character (decompression). Display the input string(compressed) and output
string (Decompressed).
6. Implement H.264 video compression technique.
7. For a seven level decomposition to a suitable data set find the bit-stream generated by the EZW
coder and decodes the same. Verify that you get the original coefficient values.
8. Write a program to Read the string of numbers to generate Rice codes and display the code along
with the input string. Verify the results manually.
COURSE OUTCOME:
Upon the successful completion of this module a student should be able to:
• Explain the evolution and fundamental concepts will Data Compression and Coding techniques.
17
I SEM MTECH (IT)
•
•
•
Analyze the operation of a range of commonly used Coding and Compression techniques
Identify the basic software and hardware tools used for data compression.
Identify all possibilities of data
compression that are available.
18