I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Enterprise Application Programming Credits(L:T:P): 3:0:1 Type of Course: Lecture & Practical Course Code: 14SIT11 Core/Elective: Core Total Contact Hours:50 COURSE OBJECTIVES: • • • • To gain knowledge about metrics Web Application Development and related terminologies To gain knowledge about persistent framework and other ORM tools. To learn to build solutions using Design Patterns To get introduced to latest WEB frameworks TOPICS MODULE I Web application and java EE 6: Exploring the HTTP Protocol, Introducing web applications, describing web containers, exploring web architecture models, exploring the MVC architecture. Working with servlet 3.0Exploring the features of java servlet, Exploring new features in servlet 3.0, Exploring the servlet API, explain the servlet life cycle, creating a sample servlet, creating a servlet by using annotation, working with servletconfig and servlet context objects, working with the Httpservlet request and Httpservlet response interfaces, Exploring request delegation and request scope, implementing servlet collaboration. 10 hours MODULE II Handling sessions in servlet 3.0: Describing a session, introducing session tracking, Exploring the session tracking, mechanisms, using the java servlet API for session tracking, creating login application using session tracking. Implementing event handling Introducing events, Introducing event handling, working with the servlet events, is developing the online shop web application. Working with java server pages: Introducing JSP technology, Exploring new features of JSP2.1, listing advantages of JSP over java servlet, Exploring the architecture of a JSP page, Describing the life cycle of a JSP page, working with JSP basic tags and implicit objects, working with the action tags in JSP, exploring the JSP unified EL, using functions with EL. 10 hours MODULE III Implementing JSP tag extensions: Exploring the elements of tag extensions, working with classic tag handlers, exploring the tag extensions, working with simple tag handlers. Implementing java server pages standard tag library 1.2: Introducing JSTL, Exploring the tag libraries JSTL, working with the core tag library. Implementing filters: Exploring the need of filters, exploring the working of filters, exploring filters API, configuring a filter, creating a web application using filters, using initializing parameter in filters. 10 hours MODULE IV Persistence Management and Design Patterns : Implementing java persistence using hibernates Introducing hibernate, exploring the architecture of hibernate, downloading hibernate, exploring HQL, understanding hibernate O/R mapping, working with hibernate, Implementing O/R mapping with hibernate. Java EE design patterns: Describing the java EE application architecture, Introducing a design patterns, discussing the role of design patterns, exploring types of patterns. 10 hours 1 I SEM MTECH (IT) MODULE V Web Frameworks: Working with struts 2Introducing struts 2, understanding actions in struts 2.Working with java server faces 2.0: Introducing JSF, Explaining the features of JSF, Exploring the JSF architecture, describing JSF elements, Exploring the JSF request processing life cycle. Working with spring 3.0: Introducing features of the spring framework, exploring the spring framework architecture, exploring dependency injection & inversion of control, exploring AOP with spring, managing transactions. Securing java EE 6 applications: Introducing security in java EE 6, exploring security mechanisms, implementing security on an application server. 10 hours LABORATORY WORK Tools to be used / equivalent : JDK 1.6 apache tomcat server 6.x Mysql 5.x IDE Net Beans , eclipse 1. • • • • • • • • • • Developing the profile management module Implementing logic with servlet. creating the people_ employee servlet. creating the employeeobj class. creating the employeedbmethods class. creating the generated class, creating views. creating the people_ insert JSP page. creating the people_ search JSP page. creating the people_ edit JSP page. creating the people_ list JSP page. creating the people_ profile JSP page. 2. • • • • • • • • • • Developing the recruitment module Registering a new applicant. creating the people_ applicant servlet. creating the applicantDBObj class. creating the applicantDBmethods class. creating the generated class. creating an interface for applicant registration. conducting rounds of test. creating the applicant_ test_ dtl servlet. Designing JSP views. Working of the recruitment module. 3. • • • • • • • Developing the payroll module Updating salary statement, creating the people_ payroll servlet. creating the empsal class. creating the employee agreement class. creating the payrollbean methods class. designing JSP views. creating the people_ agreement JSP page. . 2 I SEM MTECH (IT) • • • Creating the people_ agreement_ edit JSP page. Creating the salary_search.jsp file. Creating the salary_ slip JSP page. COURSE OUTCOMES: Upon Completion of the course, the students should be able to: • Implement a WEB application. • Manage deployment configurations • Implement Security mechanisms Text Book: 1. Kogent learning solution: JAVA SERVER PROGRAMMING JAVA EE6(J2EE 1.6), Dreamtech press 2014 3 I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Data Compression Credits(L:T:P): 4:0:0 Type of Course: Lecture Course Code: 14SIT12 Core/Elective: Core Total Contact Hours:50 Course Objectives: • • To provide students with contemporary knowledge in Data Compression and Coding. To equip students with skills to analyze and evaluate different Data Compression and Coding methods. TOPICS MODULE I Introduction: Compression techniques, modeling and coding mathematical preliminaries for lossless compression: A brief introduction to information theory, models, coding, algorithmic information theory, minimum description length principle. 10 hours MODULE II Huffman Coding: The Huffman coding algorithm, non binary Huffman codes, adaptive Huffman coding, golomb codes, rice codes, Tunstall codes, application of Huffman coding. 10 hours MODULE III Lossless Image Compression: Introduction, CALIC, JPEG-LS, multi resolution approaches, facsimile encoding, MRC-T.44. Mathematical Preliminaries For Lossy Coding: Introduction, distortion criteria, information theory revisited, rate distortion theory, models. 10 hours MODULE IV Wavelet Based Compression: Introduction, wavelets, multi resolution analysis and scaling function, implementation using filters, image compression, embedded zero tree coder, set partitioning in hierarchical trees, JPEG zero. Audio Coding: Introduction , MPEG coding, MPEG advanced audio coding, Dolby AC3(DOLBY DIGITAL) other standards. 10 hours MODULE V Video Compression: Introduction, motion compensation, video signal representation, ITU-T recommendation H.261, model based coding, asymmetric applications, The MPEG-1 video standard, The MPEG-2 video standard, ITU-T recommendation H.263, ITU-T recommendation H.264, MPEG-4 part 1.0 advanced video coding, MPEG-4 part 2 , packet video, ATM networks. 10 hours COURSE OUTCOME: Upon the successful completion of this module a student should be able to: • Explain the evolution and fundamental concepts will Data Compression and Coding techniques. • Analyze the operation of a range of commonly used Coding and Compression techniques • Identify the basic software and hardware tools used for data compression. 4 I SEM MTECH (IT) • Identify what new trends and what new possibilities of data compression are available. TEXT BOOK 1. Introduction to data compression 4th edition, Khalid sayood. ISBN:978-81-312-3408-2 Elsevier. Reprinted 2014. Reference: 1. Data compression, The complete reference. 4th edition. David Salomon. Springer Year 2014. 5 I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Advances in DBMS Credits(L:T:P): 3:0:1 Type of Course: Lecture & Practical. Course Code: 14SIT13 Core/Elective: Core Total Contact Hours:50 COURSE OBJECTIVES: • • • • • • To acquire knowledge on parallel and distributed databases and its applications. To study the usage and applications of Object Oriented database To understand the basic concepts, principles of intelligent databases. To understand the advanced topics data warehousing and mining . To learn emerging and advanced data models To acquire inquisitive attitude towards research topics in databases. TOPICS MODULE I Review of Relational Data Model and Relational Database Constraints: Relational model concepts; Relational model constraints and relational database schemas; Update operations, transactions and dealing 04 Hours with constraint violations. MODULE II Object and Object-Relational Databases: Overview of Object-Oriented Concepts – Objects, Encapsulation, Type and class hierarchies, complex objects; Object model of ODMG, Object definition Language ODL; Object Query Language OQL; Overview of C++ language binding; Conceptual design of Object database. Overview of object relational features of SQL; Object-relational features of Oracle; Implementation and related issues for extended type systems; The nested relational model. 12 Hours MODULE III Parallel and Distributed Databases: Architectures for parallel databases; Parallel query evaluation; Parallelizing individual operations; Parallel query optimizations; Introduction to distributed databases; Distributed DBMS architectures; Storing data in a Distributed DBMS; Distributed catalog management; Distributed Query processing; Updating distributed data; Distributed transactions; Distributed Concurrency control and Recovery. 12 Hours MODULE IV Data Warehousing, Decision Support and Data Mining: Introduction to decision support; OLAP, multidimensional model; Window queries in SQL; Finding answers quickly; Implementation techniques for OLAP; Data Warehousing; Views and Decision support, View materialization, Maintaining materialized views. Introduction to Data Mining; Counting co-occurrences; Mining for rules; Treestructured rules; Clustering; Similarity search over sequences; Incremental mining and data streams; Additional data mining tasks. 14 Hours MODULE V 6 I SEM MTECH (IT) Enhanced Data Models for Some Advanced Applications: Active database concepts and triggers; Temporal, Spatial, and Deductive Databases – Basic concepts. More Recent Applications: Mobile databases; Multimedia databases; Geographical Information Systems; Genome data management. 8 Hours LABORATORY WORK (The following tasks can be implemented on Oracle or any other suitable RDBMS with support for Object features) 1. Develop a database application to demonstrate storing and retrieving of BLOB and CLOB objects. 2. Develop a database application to demonstrate the representation of multivalued attributes, and the use of nested tables to represent complex objects. Write suitable queries to demonstrate their use. 3. Design and develop a suitable Student Database application. One of the attributes to me maintained is the attendance of a student in each subject for which he/she has enrolled. Using TRIGGERS, write active rules to do the following: a. Whenever the attendance is updated, check if the attendance is less than 85%; if so, notify the Head of the Department concerned. b. Whenever, the marks in an Internal Assessment Test are entered, check if the marks are less than 40%; if so, notify the Head of the Department concerned. 4. Design, develop, and execute a program in a language of your choice to implement any one algorithm for mining association rules. Run the program against any large database available in the public domain and discuss the results. COURSE OUTCOMES: Upon completion of the course, the students will be able to • Select the appropriate high performance database like parallel and distributed database • Model and represent the real world data using object oriented database • Embed the rule set in the database to implement data warehousing of mining • Choose and design database for recent applications database for better interoperability TEXT BOOKS: 1. Elmasri and Navathe: Fundamentals of Database Systems, Pearson Education, 2013. 2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd Edition, McGrawHill, 2013. REFERENCE BOOKS: 1. Abraham Silberschatz, Henry F. Korth, S. Sudarshan: Database System Concepts, 6th Edition, McGraw Hill, 2010. 7 I SEM MTECH (IT) Semester I Course Title: Information Storage Management Credits(L:T:P): 4:0:0 Type of Course: Lecture Year: 2014-2015 Course Code: 14SIT14 Core/Elective: Core Total Contact Hours:50 Course Objectives: • To outline basic terminology and components in information storage and retrieval systems • To compare and contrast information retrieval models and internal mechanisms such as Boolean, Probability, and Vector Space Models • To describe current trends in information retrieval such as information visualization. • To understand a backup process and securing and managing storage infrastructure TOPICS: MODULE I Introduction to Information Storage: Information Storage, Evolution of Storage Architecture, Data center Infrastructure, Virtualization and cloud computing. Data Center Environment: Application, Database Management System(DBMS), Host(compute), Connectivity, Storage, Disk Drive Components, Disk Drive Performance, Host Access to Data, Direct-Attached Storage, Storage Design Based On Application, Disk Native Command Queuing, Introduction to Flash Drives, Concept in Practice: VMware ESXi. Data Protection: RAID:RAID Implementation Methods, RAID Array Components, RAID Techniques, RAID levels, RAID Impact on Disk Performance, RAID Comparison, Hot Spares 10 hours MODULE II Intelligent Storage Systems: Components of an Intelligent Storage System, Storage Provisioning, Types of intelligent Storage Systems, Concepts in Practice: EMC Symmetrix and VNX. Fibre Channel Storage Area Networks: Fibre Channel: Overview, The SAN and Its Evolution, Components of FC SAN, FC Connectivity, Switched Fabric Ports, Fibre Channel Architecture, fabric Services, Switched fabric Login Types, Zoning, FC SAN Topologies, Virtualization in SAN, Concepts in Practice: EMC Connectrix and EMC VPLEX.IP SAN and FcoE: iSCSI, FCIP, FcoE. 10 hours MODULE III Network-Attached Storage: General-purpose Servers versus NAS Devices, benefits of NAS, File Systems and network File Sharing. Components of NAS, NAS I/O Operation, NAS Implementations, NAS File-Sharing Protocols, factors Affecting NAS Performance, File-Level Virtualization, Concepts in Practice: EMC Isilon and EMC VNX gateway. Object-Based and unified Storage: Object-Based Storage Devices, Content- Addressed Storage, CAS use Cases, unified Storage, Concepts in Practice: EMC atoms, EMC VNX, and EMC centera. Introduction to Business Continuity. Information Availability, BC Terminology, BC Planning life Cycle, failure Analysis, Business Impact Analysis, BC Technology solutions. 10 hours 8 I SEM MTECH (IT) MODULE IV Backup and Archive : Backup Purpose, Backup Considerations, Backup Granularity, Recovery Considerations, Backup Methods, Backup Architecture, Backup and Restore Operation, Backup Topologies, Backup in NAS Environments, Backup Targets, Data Dedupulication for Backup, Backup in Virtualized Environments, Data Archive, Archiving Solution Architecture, Concepts in Practice: EMC Networker, EMC Avamar, and EMC Data domain. Local Relication: Replication Terminology, Uses of Local Replicas, Replica Consistency, Local Replication Technologies, Tracking Changes to Source and Replica, Restore and Restart Considerations, Creating Multiple Replicas, Local Replication in Virtualized Environment, Concepts in Practice: EMC TimeFinder. Remote Replication: Modes of Remote Replication, Remote Replication Technologies, Three-Site Replication, Data Migration Solutions, Remote Replication and Migration in a Virtualized Environment, Concepts in Practice : EMC SRDF, EMC MirrorView, and EMC RecoverPoint. 10 hours MODULE V Securing the Storage Infrastructure: Information Security Framework, Risk Triad, Storage Security Domains, Security implementations in Storage Networking, Securing Storage Infrastructure in Virtualized and Cloud Environments, Concepts in practice: RSA and VMware Security Products. Managing the Storage Infrastructure: Monitoring the Storage Infrastructure, Storage Infrastructure Management Activities, Storage Infrastructure Management Challenges, Developing an Idea Solution, Information Lifecycle Management, Storage Tiering, Concepts in Practice: EMC Infrastructure. 10 hours COURSE OUTCOMES After completion of this course, the students would be able to • Recognize the role and use of technology in business systems and operations • Identify and describe organizational structure and business processes within these • Implement information systems in industry. • Choose backup method and replication method. • Provide securing of management storage infrastructure. Text Book: 1. EMC2 : Information Storage and Management, Willey India 2013. REFERENCES: 1. EMC Corporation, Information Storage and Management, Wiley, India. 2. Robert Spalding, “Storage Networks: The Complete Reference“, Tata McGraw Hill , Osborne, 2003. 3. Marc Farley, “Building Storage Networks”, Tata McGraw Hill ,Osborne, 2001. 4. Additional resource material on www.emc.com/resource-library/resource-library.esp. 9 I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Client-Server Programming Credits(L:T:P): 4:0:0 Type of Course: Lecture Course Code: 14SIT151 Core/Elective: Elective Total Contact Hours:50 Course Objectives: • To understand Client-Server software, Context Switching and Protocol Software, I/o. • To understand System Calls, Basic I/O Functions available in UNIX • To understand the Socket interface, TCP, UDP in detail. • To understand various Client Software. • To understand the various algorithms issue related to server software design. TOPICS MODULE I The Client Server Model and Software Design: Introduction, Motivation, Terminology and Concepts Concurrent Processing in Client-Server software: Introduction, Concurrency in Networks, Concurrency in Servers, Terminology and Concepts, An example of Concurrent Process Creation, Executing New Code, Context Switching and Protocol Software Design, Concurrency and Asynchronous I/O. Program Interface to Protocols: Introduction, Loosely Specified Protocol Software Interface, Interface Functionality, Conceptual Interface Specification, System Calls, Two Basic Approaches to Network Communication, The Basic I/O Functions available in UNIX, Using UNIX I/O with TCP/IP. 10 hours MODULE II The Socket Interface: Introduction, Berkley Sockets, Specifying a Protocol Interface, The Socket Abstraction, Specifying an End Point Address, A Generic Address Structure, Major System Calls used with Sockets, Utility Routines for Integer Conversion, Using Socket Calls in a Program, Symbolic Constants for Socket Call Parameters. Algorithms and Issues in Client Software Design: Introduction, Learning Algorithms instead of Details, Client Architecture, Identifying the Location of a Server, Parsing an Address Argument, Looking up a Domain Name, Looking up a well-known Port by Name, Port Numbers and Network Byte Order, Looking up a Protocol by Name, The TCP Client Algorithm, Allocating a Socket, Choosing a Local Protocol Port Number, A fundamental Problem in choosing a Local IP Address, Connecting a TCP Socket to a Server, Communicating with the Server using TCP, Reading a response from a TCP Connection, Closing a TCP Connection, Programming a UDP Client, Connected and Unconnected UDP Socket, Using Connect with UDP, Communicating with a Server using UDP, Closing a Socket that uses UDP, Partial Close for UDP, A Warning about UDP Unreliability. 10 hours MODULE III Example Client Software: Introduction, The Importance of Small Examples, Hiding Details, An Example Procedure Library for Client Programs, Implementation of Connect TCP, Implementation of Connect UDP, A Procedure that Forms Connections, Using the Example Library, The DAYTIME Service, Implementation of a TCP Client for DAYTIME, Reading from a TCP Connection, The Time Service, Accessing the TIME Service, Accurate Times and Network Delays, A UDP Client for the TIME Service, The ECHO Service, A TCP Client for the ECHO Service, A UDP Client for the ECHO Service. 10 hours 10 I SEM MTECH (IT) MODULE IV Algorithms and Issues in Server Software Design: Introduction, The Conceptual Server Algorithm, Concurrent Vs Iterative Servers, Connection-Oriented Vs Connectionless Access, Connection-Oriented Servers, Connectionless Servers, Failure, Reliability and Statelessness, Optimizing Stateless Servers, Four Basic Types of Servers, Request Processing Time, Iterative Server Algorithms, An Iterative ConnectionOriented Server Algorithm, Binding to a Well Known Address using INADDR_ANY, Placing the Socket in Passive Mode, Accepting Connections and using them. An Iterative Connectionless Server Algorithm, Forming a Reply Address in a Connectionless Server, Concurrent Server Algorithms, Master and Slave Processes, A Concurrent Connectionless Server Algorithm, A concurrent Connection-Oriented Server Algorithm, Using separate Programs as Slaves, Apparent Concurrency using a Single Process, When to use each Server Types, The Important Problem of Server Deadlock, Alternative Implementations. 10 hours MODULE V Iterative, Connectionless Servers (UDP): Introduction, Creating a Passive Socket, Process Structure, An example TIME Server. Iterative, Connection-Oriented Servers (TCP): Introduction, Allocating a Passive TCP Socket, A Server for the DAYTIME Service, Process Structure, An Example DAYTIME Server, Closing Connections, Connection Termination and Server Vulnerability. Concurrent, ConnectionOriented Servers (TCP): Introduction, Concurrent ECHO, Iterative Vs Concurrent Implementations, Process Structure, An example Concurrent ECHO Server, Cleaning up Errant Processes. 10 hours Course Outcomes: The student will be able to: - - In depth knowledge about Client-Server software, Context Switching and Protocol Software, I/o. Programming System Calls, Basic I/O Functions available in UNIX The Socket interface, TCP, UDP in detail. Pros and cons of Client Software Various applications and their issues. TEXT BOOK: 1. Douglas E.Comer, David L. Stevens: Internetworking with TCP/IP – Vol. 3, Client-Server Programming and Applications, BSD Socket Version with ANSI C, 2nd Edition, Pearson, 2001. 11 I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Advances in Operating Systems Credits(L:T:P): 4:0:0 Type of Course: Lecture Course Code: 14SIT152 Core/Elective: Elective Total Contact Hours:50 Course Objectives: • To learn the fundamentals of Operating Systems • To gain knowledge on Distributed operating system concepts that include architecture, Mutual exclusion algorithms, Deadlock detection algorithms and agreement protocols • To gain insight in to the distributed resource management components viz. the algorithms for implementation of distributed shared memory, recovery and commit protocols • To know the components and management aspects of Real time & Mobile operating Systems. TOPICS MODULE I Operating System Overview, Process description & control Operating System Objectives and Functions, The Evolution of Operating Systems, Major Achievements, Developments Leading to Modern Operating Systems, Microsoft Windows Overview, Traditional UNIX Systems, Modern UNIX Systems, Linux, What is a Process?, Process States, Process Description, Process Control, Execution of the Operating System, Security Issues, UNIX SVR4 Process Management. 10 Hours MODULE II Threads, SMP, and Microkernel, Virtual Memory. Processes and Threads, Symmetric Multiprocessing (SMP), Micro kernels, Windows Vista Thread and SMP Management, Solaris Thread and SMP Management, Linux Process and Thread Management. Hardware and Control Structures, Operating System Software, UNIX and Solaris Memory Management, Linux Memory Management, Windows Vista Memory Management, Summary. 10 Hours MODULE III Multiprocessor and Real-Time Scheduling Multiprocessor Scheduling, Real-Time Scheduling, Linux Scheduling, UNIX PreclsSl) Scheduling, Windows Vista Scheduling, Process Migration, Distributed Global States, Distributed Mutual Exclusion, Distributed Deadlock. 10 Hours MODULE IV Embedded Operating Systems Embedded Systems, Characteristics of Embedded Operating Systems, eCOS, TinyOS, Computer Security Concepts, Threats, Attacks, and Assets, Intruders, Malicious Software Overview, Viruses, Worms, and Bots, Rootkits. 10 Hours 12 I SEM MTECH (IT) MODULE V Kernel Organization Using Kernel Services, Daemons, Starting the Kernel , Control in the Machine , Modules and Device Management, Module Organization, Module Installation and Removal, Process and Resource Management, Running Process Manager, Creating a new Task , IPC and Synchronization, The Scheduler, Memory Manager , The Virtual Address Space, The Page Fault Handler , File Management. The windows NT/2000/XP kernel: Introduction, The NT kernel, Objects , Threads, Multiplication Synchronization, Traps, Interrupts and Exceptions, The NT executive , Object Manager, Process and Thread Manager , Virtual Memory Manager, I/o Manager, The cache Manager , Kernel local procedure calls and IPC, The native API, subsystems. 10 Hours COURSE OUTCOMES -Demonstrate the Mutual exclusion, Deadlock detection and agreement protocols of Distributed operating system - Learn the various resource management techniques for distributed systems - Identify the different features of real time and mobile operating systems -Modify existing open source kernels in terms of functionality or features used. Text Books: 1. William Stallings: Operating Systems: Internals and Design Principles, 6th Edition, Prentice Hall, 2013. 2. Gary Nutt: Operating Systems, 3rd Edition, Pearson, 2014. Reference Books: 1. Silberschatz, Galvin, Gagne: Operating System Concepts, 8th Edition, Wiley, 2008 2. Andrew S. Tanenbaum, Albert S. Woodhull: Operating Systems, Design and Implementation, 3rd Edition, Prentice Hall, 2006. 3. Pradeep K Sinha: Distribute Operating Systems, Concept and Design, PHI, 2007 13 I SEM MTECH (IT) Semester I Year: 2014-2015 Course Title: Service Oriented Architecture Credits(L:T:P): 4:0:0 Type of Course: Lecture Course Code: 14SIT153 Core/Elective: Elective Total Contact Hours:50 COURSE OBJECTIVES: • To understand various architecture for application development • To understand the importance of SOA in Application Integration • To learn web service and SOA related tools • To Learn implementation details of SOA • To understand various case studies TOPICS MODULE I SOA BASICS :Software Architecture – Types of IT Architecture – SOA – Evolution – Key components – perspective of SOA – Enterprise-wide SOA – Architecture – Enterprise Applications – Solution Architecture for enterprise application – Software platforms for enterprise Applications – Patterns for SOA – SOA programming models. 10 hours MODULE II SOA ANALYSIS AND DESIGN: Service-oriented Analysis and Design – Design of Activity, Data, Client and business process services – Technologies of SOA – SOAP – WSDL – JAX – WS – XML WS for .NET – Service integration with ESB – Scenario – Business case for SOA – stakeholder OBJECTIVES – benefits of SPA – Cost Savings. 10 hours MODULE III SOA GOVERNANCE:SOA implementation and Governance – strategy – SOA development – SOA governance – trends in SOA – event-driven architecture – software s a service – SOA technologies – proof-of-concept – process orchestration – SOA best practices. 10 hours MODULE IV SOA IMPLEMENTATION:SOA based integration – integrating existing application – development of web services – Integration - SOA using REST – RESTful services – RESTful services with and without JWS – Role of WSDL,SOAP and Java/XML mapping in SOA – JAXB Data binding. 10 hours MODULE V APPLICATION INTEGRATION:JAX –WS 2.0 client side/server side development – Packaging and Deployment of SOA component – SOA shopper case study –WSDL centric java WS with SOA-J – related software – integration through service composition (BPEL) – case study - current trends. 10 hours 14 I SEM MTECH (IT) COURSE OUTCOMES Students should be able to work with • Comparison of different IT architecture • Analysis and design of SOA based applications • Implementation of web service and realization of SOA • Implementation of RESTful services • Design and implementation of SOA based Application Integration using BPEL Text Book: 1. Shankar Kambhampaly, “Service–Oriented Architecture for Enterprise Applications”, Wiley 2008. REFERENCES: 2. Mark D. Hansen, “SOA using Java Web Services”, Practice Hall, 2007. 3. Waseem Roshen, “SOA-Based Enterprise Integration”, Tata McGraw-HILL, 2009. 15 I SEM MTECH (IT) Semester I Course Title: Distributed Computing Credits(L:T:P): 4:0:0 Type of Course: Lecture Year: 2014-2015 Course Code: 14SIT154 Core/Elective: Elective Total Contact Hours:50 Course Objectives • To learn the basic concepts of DSM & Hardware DSM. • To understand File Sharing, DFS Implementation & Replication in DFS, • To understand the concepts of Cryptography, Secure channels & Access control TOPICS: MODULE I Distributed System management: Introduction, Resource management, Task Assignment Approach, Load-Balancing Approach, Load-Sharing Approach, Process management in a Distributed Environment, Process Migration, Threads, Fault Tolerance. 10 hours MODULE II Distributed Shared Memory: Introduction, Basic Concepts of DSM, Hardware DSM, Design Issue in DSM Systems, Issue in Implementing DSM Systems, Heterogeneous and Other DSM Systems, Case Studies. 10 hours MODULE III Distributed File System: Introduction to DFS, File Models, Distributed File System Design, Semantics of File Sharing, DFS Implementation, File Caching in DFS, Replication in DFS, Case studies.Naming: Introduction, Desirable features of a good naming system, Basic concepts, System-oriented names, Object-locating mechanisms, Issues in designing human-oriented names, Name caches, Naming and security, Case study: Domain name service. 10 hours MODULE IV Security in distributed systems: Introduction, Cryptography, Secure channels, Access control, Security Management, Case studies. 10 hours MODULE V Real-Time Distributed operating Systems: Introduction, Design issues in real-time distributed systems, Real-time communication, Real-time scheduling, Case study: Real-time communication in MARS. Emerging Trends in distributed Computing: Introduction to emerging trends, Grid Computing, SOA, Cloud computing, The future of emerging Trends. 10 hours COURSE OUTCOMES: The student should be able to • Realize shared memory concept. • Advantages of DFS. • Mechanisms to manage security in DS Text Book: 16 I SEM MTECH (IT) 1.Sunitha Mahajan, Seema Shah: Distributing Computing, Published by Oxford University press 2010. Semester I Course Title: Data Compression Laboratory Credits(02)(L:T:P): 0:0:3 Type of Course: Practical Year: 2014-2015 Course Code: 14SIT16 Core/Elective: Core Total Contact Hours:42 Course Objectives: • • • To provide students with contemporary knowledge in Data Compression and Coding. To equip students with skills to analyze and evaluate different Data Compression and Coding methods To be instrumental to handle multi dimension data compression. LABORATORY WORK NOTE: Use appropriate tool/language or package to implement and For programs 5 and 6, MATLAB or any equivalent tools can be used. 1. Write a program to compress a source Text file using Run-length encoding Compression algorithm save the output in a destination file. Decompress the destination file to get the original source file. 2. Write a program to compress a source image file using Run-length encoding Compression algorithm save the output in a destination file. Decompress the destination file to get the original source file. 3. Using a text file compute the probabilities of each letter Pi assume that we need a code word of length [log21/Pi ] to encode the letter i . Determine the number of bits needed to encode the file. Compute the conditional probabilities pi/j of a letter given that the previous letter is j. assume that we need [log21/Pi/j ] to represent a letter i that follows a letter j. Determine the number of bits needed to encode the file. 4. Write a program to Read the string to generate Huffman code and display the code along with the input string (program should be case sensitive). Show all the calculation manually. Verify the results. 5. Write a program to read Huffman codes & compressed string (contains Huffman codes) codes and replaces the code with character (decompression). Display the input string(compressed) and output string (Decompressed). 6. Implement H.264 video compression technique. 7. For a seven level decomposition to a suitable data set find the bit-stream generated by the EZW coder and decodes the same. Verify that you get the original coefficient values. 8. Write a program to Read the string of numbers to generate Rice codes and display the code along with the input string. Verify the results manually. COURSE OUTCOME: Upon the successful completion of this module a student should be able to: • Explain the evolution and fundamental concepts will Data Compression and Coding techniques. 17 I SEM MTECH (IT) • • • Analyze the operation of a range of commonly used Coding and Compression techniques Identify the basic software and hardware tools used for data compression. Identify all possibilities of data compression that are available. 18
© Copyright 2025 ExpyDoc