Semester II: Discipline: Information Technology Stream: IT1
Semester II: Discipline: Information Technology Stream: IT1
Semester II: Discipline: Information Technology Stream: IT1
Semester II
CATEGORY L T P CREDIT
222TIT101 ADVANCED DISCIPLINE CORE 3 0 0 3
MACHINE
LEARNING
Course Outcomes:
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than the
requirements in the appropriate bachelor program
PO4: An ability to apply stream knowledge to design or develop solutions for real
world problems by following the standards
PO6: An ability to engage in life-long learning for the design and development
related to the stream related problems taking into consideration sustainability,
societal, ethical and environmental aspects
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO7
CO 1 √ √ √ √ √ √
CO 2 √ √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √ √ √
Assessment Pattern
Mark distribution
Part A and Part B. Part A shall contain five (numerical) questions (such questions
shall be useful in the testing of knowledge, skills, comprehension, application,
analysis, synthesis, evaluation, and understanding of the students), with one
question from each module, having five marks for each question. Students shall
answer all questions.
Part B shall contain seven questions (such questions shall be useful in the
testing of overall achievement and maturity of the students in a course, through
long answer questions relating to theoretical/practical knowledge, derivations,
problem-solving, and quantitative evaluation), with at least one question from
each module, of which, the student shall answer any five. Each question shall
carry seven marks
INFORMATION TECHNOLOGY
3. Suppose X1, X2, · · · ,Xn are i.i.d. random variables with density function
σ). Find the maximum likelihood estimate of σ
f(x|σ) = 1/2σ exp ³ ((− |x| /σ).
4. Use the method of moment to estimate the parameters µ and σ for the
normal density
7. Suppose that X1, · · · ,Xn form a random sample from a distribution for
which the pdf f(x|θ) is as follows:
Also suppose that the value of θ is unknown (θ > 0). Find the MLE of θ.
1. Given the set of values X = (3, 9, 11, 5, 2)T and Y = (1, 8, 11, 4, 3)T .
Evaluate the regression coefficients.
2. What is meant by kernel trick in context of support vector machines how is
it used to find a SVM classifier?
3. Suppose you are using RBF kernel in SVM with high Gamma value. What
does this signify?
4. What are some ways to choose data for a regression without running into a
multi-collinearity problem?
5. What is the effect of collinearity on Lasso vs Ridge regression? Which is
better in the case of collinearity?
6. Describe various types of regression models based on type of functions.
7. What are the benefits of decision tree pruning? Also mention the different
types of pruning methods.
8. Why doesn't ridge regression force some of the coefficients to be exactly
zero for sufficiently large lambda whereas the LASSO does?
9. Why is it that the lasso, unlike ridge regression, results in coefficient
estimates that are exactly equal to zero?
10. What is the significance of optimal separating hyperplanes in SVM?
11. What is meant by kernel trick in context of support vector machines?
How is it used to find a SVM classifier?
12. Describe the features of soft margin hyperplane and explain how it is
computed.
13. Describe the significance of Kernal functions in SVM. List any two
kernel functions.
14. Explain any two model combination scheme to improve the accuracy
of a classifier.
15. How do we learn the conditional probability tables (CPT) in Bayesian
networks if information about some variables is missing? How are these
variables called?
16. Consider the training data in the following table where Play is a class
attribute. In the table, the Humidity attribute has values “L” (for low) or “H”
(for high), Sunny has values “Y” (for yes) or “N” (for no), Wind has values “S”
(for strong) or “W” (for weak), and Play has values “Yes” or “No”. What is
class label for the following day (Humidity=L, Sunny=N, Wind=W),
according to naïve Bayesian classification?
INFORMATION TECHNOLOGY
1. Cluster the following eight points (with (x, y) representing locations) into
three clusters:
A1(2, 10), A2(2, 5), A3(8, 4), A4(5, 8), A5(7, 5), A6(6, 4), A7(1, 2), A8(4, 9)
Initial cluster centers are: A1(2, 10), A4(5, 8) and A7(1, 2).
The distance function between two points a = (x1, y1) and b = (x2, y2) is defined
as-
Means Algorithm to find the three cluster centers after the second
Use K-Means
iteration.
2. Use K-Means
Means Algorithm to create two clusters-
clusters
16. Consider the two dimensional patterns (2, 1), (3, 5), (4, 3), (5, 6), (6,
7), (7, 8).Compute the principal component using PCA Algorithm.
1. Consider a Machine Learning Model which can detect and hence filter out
all the spams. Let’s take a sample set of 1000 emails. Out of 1000, 100 are
spam and rest 900 are relevant emails. Our Machine Learning Model
predicts 30 as spam and 970 as relevant. Compute precision and recall of
the model. Also draw the confusion matrix.
2. Express the confusion matrix table for two class datasets.
3. Suppose 10000 patients get tested for flu; out of them, 9000 are actually
healthy and 1000 are actually sick. For the sick people, a test was positive
for 620 and negative for 380. For the healthy people, the same test was
INFORMATION TECHNOLOGY
positive for 180 and negative for 8820. Construct a confusion matrix for the
data and compute the precision and recall for the data.
4. With an example classification problem, explain the following terms: a)
Hyper parameters b) Training set c) Validation sets d) Bias e) Variance.
5. What are ROC space and ROC curve in machine learning? In ROC space,
which points correspond to perfect prediction, always positive prediction
and always negative prediction? Why?
INFORMATION TECHNOLOGY
QP CODE:
Name: _________________
PAGES: 4
Max. Marks : 60
Duration: 2.5 Hours
PART A
Part B
9.
a. Also suppose that the values of θ1 and θ2 are unknown ((−∞ < θ1 < θ2
MLE’s of θ1
< ∞). Find the MLE
b. and θ2.
10. Given the data in Table, reduce the dimension from 2 to 1 using the
Principal Component Analysis (PCA) algorithm.
X1 4 8 13 7
X2 11 4 5 14
11. Write and explain the bellman equations for finite horizon MDP.
Explain the optimal policy.
12. Suppose there are three classifiers A,B and C. The (FPR, TPR)
measures of the three classifiers are as follows – A (0, 1), B (1, 1) , C (1,0.5).
Which can be considered as a perfect classifier? Justify your answer
INFORMATION TECHNOLOGY
SYLLABUS
COURSE PLAN
No Topics No. of
Lectures (
40)
Reference Books
Preamble: This course covers Path and Flow Problems which are graph-
theoretical problems that find application in the design of computer networks
and protocols and their solutions. The syllabus includes core topics such as
shortest path problems, maximum flow problems, and minimum cost flow
problems, including novel polynomial-time algorithms for solving these
problems. The last module throws light on how linear programming can be
applied to flow problems.
Course Outcomes: After the completion of the course, the student will be able
to:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √
CO 2 √ √ √ √
INFORMATION TECHNOLOGY
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √ √
Assessment Pattern
Understand 20%
Apply 80%
Analyze
Evaluate
Create
Mark distribution
Seminar/Quiz: 10 Marks
The project shall be done individually. Group projects are not permitted. The
test paper shall include a minimum of 80% of the syllabus.
There shall be two parts; Part A and Part B. Part A shall contain five
(numerical) questions (such questions shall be useful in the testing of
knowledge, skills, comprehension, application, analysis, synthesis, evaluation,
and understanding of the students), with one question from each module,
having five marks for each question. Students shall answer all questions. Part
B shall contain seven questions(such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving, and quantitative evaluation), with at least one question from
each module, of which, the student shall answer any five. Each question shall
carry seven marks.
INFORMATION TECHNOLOGY
1. State and
nd prove the flow decomposition theorem.
2. Taking node 1 as the source, run the Dijkstra’s algorithm on the network
shown below:
5. State the LPP formulation of the weighted bipartite matching problem. How
can it be solved?
10. How are the leaving and entering arcs chosen in the network simplex
algorithm?
12. Illustrate the generic augmenting path algorithm on the network shown
below:
INFORMATION TECHNOLOGY
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
Reference Books
3. Operations Research, Prem Kumar Gupta and Dr. D.S. Hira, S Chand Publishers, 2007
4. Linear programming and network flows, Mokhtar S. Bazaraa, John J. Jarvis, Hanif D.
Sherali. John Wiley& Sons, 2009
INFORMATION TECHNOLOGY
PROGRAM
ELECTIVE III
INFORMATION TECHNOLOGY
Bloom's
CO No. Course Outcomes (CO) Category
Level
CO 1 Make use of complex network concepts in Level3:
analysing and modelling real-world phenomena. Apply
CO 2 Identify the role of fitness in the formation of Level4:
complex networks. Apply
CO 3 Interpret the evolving network model. Level4:
Apply
CO 4 Identify the presence of communities in complex Level 4:
networks. Apply
CO 5 Analyse patterns of virus spreading in biological Level4:
and cyber worlds. Analyse
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher
than the requirements in the appropriate bachelor’s program
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 - - ✓ ✓ ✓ - -
CO 2 - - ✓ ✓ ✓ - -
CO 3 - - ✓ ✓ ✓ - -
CO 4 ✓ ✓ ✓ ✓ ✓ - -
CO 5 ✓ ✓ ✓ ✓ ✓ ✓ -
Assessment Pattern
Apply 100%
Analyse
Evaluate
Create
Mark distribution
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly. For
example, if the average end-semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
Name: _____________
PART A
PART B
Barabási Model.
SYLLABUS
Studies of the Internet and World Wide Web based on Complex Networks,
Social networks- Personal relations- Acquaintances, Sexual relations,
Trust, Movie actors, Sports, Scientific collaboration, Citations, Music,
Terrorism networks, Communication Networks- Electronic mail, Telephone
Computer science- Software architecture, Data sharing, Circuits
Reference Books
1. A-L. Barabási , Network Science,Cambridge University Press 2016,
Available online:http://barabasi.com/networksciencebook/
INFORMATION TECHNOLOGY
2. Costa, L.D.F., Oliveira Jr, O.N., Travieso, G., Rodrigues, F.A., Villas
Boas, P.R., Antiqueira, L., Viana, M.P. and Correa Rocha, L.E., 2011.
Analyzing and modeling real-world phenomena with complex networks:
a survey of applications. Advances in Physics, 60(3), pp.329-412.
3. M.E.J. Newman, Networks - An introduction, Oxford University Press,
2010.
4. D. Easley and J. Kleinberg, Networks, Crowds and Markets, Cambridge
University Press.
5. R. Cohen and S. Havlin, Complex Networks - Structure, Robustness
and Function, Cambridge University Press, 2010.
INFORMATION TECHNOLOGY
COURSE PLAN
No Topic No. of
Lectures
40 Hours
1 Analyzing and modelling real-world phenomena
with complex networks- survey of selected 10 Hours
applications
1.1 Studies of Internet and World Wide Web based on 2 Hours
Complex Networks
1.2 Social networks- Personal relations- Acquaintances,
Sexual relations, Trust, Movie actors, Sports, 2Hours
Scientific collaboration
2 Fitness 6 Hours
2.1 Bianconi-Barabási Model 1Hour
2.2 Degree Dynamics, Degree Distribution 1 Hour
2.3 Measuring Fitness, behavioural basis for attachment 1 Hour
proportional to fitness
2.4 The Fitness of a Web Document, The Fitness of a 1Hour
Scientific Publication,
2.5 Bose-Einstein Condensation in Networks 2 Hours
3 Evolving Networks 6 Hours
3.1 Initial Attractiveness, Internal Links 1 Hour
3.2 Phase Transitions Induced by Node Removal 2 Hours
3.3 Accelerated Growth, Aging, The Impact of Aging 2 Hours
3.4 Topological Diversity, Modelling Diversity. 1 Hour
4 Communities 9 Hours
4.1 Basics of Communities, Hierarchical Clustering 2 Hours
4.2 Agglomerative Procedures: The Ravasz Algorithm 1 Hour
4.3 Divisive Procedures: the Girvan-Newman Algorithm 1 Hours
4.4 Hierarchy in Real Networks, Modularity 2 Hours
4.5 Overlapping Communities 1Hour
INFORMATION TECHNOLOGY
Preamble: This course brings together several key big data technologies
used for storage, analysis and manipulation of data.
Course Outcomes: After the completion of the course the student will be
able to:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
Assessment Pattern
Understand 20%
Apply 80%
Analyse
Evaluate
Create
Mark distribution
1. Write Pig Latin script to count the number of occurrences of each word in
QP CODE:
222EIT001
Max. Marks : 60
Duration: 2.5 Hours
PART A
Part B
(Answer any five questions. Each question carries 7 marks)
execution?
9. Compute the second moment and third moment of the stream 3, (7)
1, 4, 1, 3, 4, 2, 1, 2. Use as many estimation variables as number
of unique elements in that stream.
11. Assuming you are given a dataset containing grades of all (7)
students under a university since 2015, how do you write a Pig
Latin script to generate a report of pass percentage of each
college for each year? Explain the script in detail.
12. Explain Hive data types and file formats in detail. (7)
INFORMATION TECHNOLOGY
SYLLABUS
Module 1
Introduction to big data: Types of big data, 5 v’s of big data, Big data
architecture, Introduction to big data analytics, Life cycle of Big data
analytics, Holistic view of analytics, Big data analytical method, Analytic
Processes and Analytic Tools - Analysis vs Reporting.
Module 2:
Module 3
Module 4
INFORMATION TECHNOLOGY
Module 5:
Pig Latin-Advanced pig Latin, developing and testing PigLatin scripts, Map
Reduce Integration.
Hive: Data types and file formats, HiveQL data definition, HiveQL data
manipulation, HiveQL queries,HiveQL views, HiveQL Indexes, functions.
INFORMATION TECHNOLOGY
COURSE PLAN
No Topic No. of
Lectures
(40)
1.3 Introduction to big data analytics, Life cycle of Big data 1 hour
analytics
1.9 Data privacy and ethics – privacy landscape, global privacy 1 hour
principles
3.8 Case Study: IBM Infosphere Big Insights and Streams 1 hour
5.1 Pig Latin , Developing and testing Pig Latin scripts 1 hour
References
Preamble: This course will enable the students to understand the ethical
issues in computing, code of conduct in the computing profession, intellectual
property rights issues, cybercrimes and cyber laws in India.
Course Outcomes:
Program Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √
CO 2 √ √
CO 3 √
CO 4 √ √ √ √
CO 5 √
Assessment Pattern
Understand 80%
Apply 20%
INFORMATION TECHNOLOGY
Analyze
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
MODEL QUESTIONS:
CO 1:
CO 2:
1. How can you protect the intellectual property rights of a computer software?
CO 3:
CO 4:
CO 5:
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
(40)
3.2 Hacking 3
Reference Books
Course Outcomes:
CO 4 Explain the information technology act and legal frame work for
the right to privacy, data security, and data protection (Level:
Understand)
Program Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √
CO 2 √ √ √ √
CO 3 √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √
Assessment Pattern
Understand 100%
Apply
Analyze
INFORMATION TECHNOLOGY
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
B shall contain seven questions (such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving and quantitative evaluation), with a minimum one question
from each module of which student shall answer any five. Each question shall
carry seven marks.
INFORMATION TECHNOLOGY
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
(40)
Reference Books
222EIT004 DESIGN
ESIGN AND ANALYSIS CATEGORY L T P CREDIT
OF NETWORKS PROGRAMME 3 0 0 3
ELECTIVE 3
Preamble:
This course helps the learner to inspire the students to learn the subject of
theoretical foundations in computer networking and understand the
fundamental concepts in design of networking also introduce the purpose of
analysing different concept of network and routing protocols
Course Outcomes:
CO 1 Analyse
nalyse user requi
requirement, Application Analyse
Requirement, Device requirement and Network
Requirement
CO 2 Analyse flows through a given Network Analyse
Architecture
CO 3 Identify the architecture for network Apply
management
CO 4 Choose performance, security and privacy Apply
architecture
CO 5 Applying Interconnection Mechanism to the Apply
pply
design.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly. For
example if the average end semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
2. Which flow models apply to each set of flows described below? Justify.
4. Describe the term Physical Security. With a neat diagram explain the
areas of anetwork where you can implement Physical Security
(4)
8. Suppose your institution has the below shown departments and labs.
It has been given a Class B network of address 142.118.0.0. Perform
VLSM on it and provide one subnet to each labs. (7)
INFORMATION TECHNOLOGY
IT 4 900
CCF 1 2000
EE 3 200
ECE 6 90
ME 5 150
CE 10 400
(4)
(7)
INFORMATION TECHNOLOGY
SYLLABUS
MODULE-1 (8 hours)
MODULE-2 (8 hours)
MODULE-3 (8 hours)
MODULE-4 (8 hours)
MODULE-5 (8 hours)
COURSE PLAN
No Topic No. of
Lectures
1 Introduction, Requirement Analysis
1.1 Overview of Analysis 1
1.2 Architecture and Design Processes-Performance 1
Characteristics.
1.3 Requirement analysis - User Requirement 1
Application Requirement- Device Requirement 1
Network Requirement- Other Requirement. 1
1.4 Gathering and Listing Requirements 1
Developing RMA, Delay and Capacity Requirements 2
2 Flow Analysis
2.1 Individual and Composite flow 1
Critical Flow 1
2.2 Flow models 1
Flow Specification 1
2.3 Network Architecture 1
Component Architecture 1
Reference Architecture, Architectural Models. 2
3 Network Management Architecture
3.1 Addressing Mechanisms- Classful Addressing – 1
Subnetting 1
Variable length Subnetting – Supernetting 1
Private Addressing and NAT
3.2 Routing Mechanisms, Addressing Strategies 1
Routing Strategies, Architectural Consideration. 1
3.3 Network management 1
Network management Mechanisms 1
Architectural Considerations. 1
4 Performance Architecture, Security and Privacy Architecture
4.1 Performance Mechanisms 1
Quality Services, Service level Arrangements 1
Architectural Consideration 1
4.2 Evaluation of Performance Mechanisms 1
Internal Relationship 1
External Relationship. 1
4.3 Security and privacy Plan- Administration, Security 1
and privacy Mechanisms
Architectural considerations- Evaluation of Security 1
Mechanisms
INFORMATION TECHNOLOGY
5 Interconnecting Technologies
5.1 Developing Criteria for Technology Evaluation 2
Making Technology Choices for the Network Design. 2
5.2 Shared Medium, 1
Switching, hybrid Mechanism 1
5.3 NHRP-MPOA 1
Applying Interconnection Mechanisms to the Design. 1
Reference Books
Course Outcomes: After the completion of the course the student will be
able to:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √ √ √
CO 2 √ √ √ √
CO 3 √ √ √ √
CO 4 √ √ √ √
CO 5 √ √ √ √ √
Assessment Pattern
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly. For
example, if the average end semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
SYLLABUS
Module – 1 (8 hours)
Module – 2 (8 hours)
MODULE: 3 (7 hours)
MODULE: 4 (8 hours)
MODULE: 5 (8 hours)
COURSE PLAN
No Topic No. of
Lectures
(40)
Module – 1 (8 hours)
Module – 2 (8 hours)
MODULE: 3 (8 hours)
MODULE: 5 (8 hours)
Reference Books
2. L. Kleinrock, Queueing Systems vol I & II , John Wiley and Sons, 1975.
PROGRAM
ELECTIVE IV
INFORMATION TECHNOLOGY
Preamble:
The syllabus is designed with the view of preparing the students capable of
understanding the virtualization techniques. The students will learn about
network, server, and storage virtualization.
Course Outcomes:
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher
than the requirements in the appropriate bachelor program
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Mark distribution
INFORMATION TECHNOLOGY
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly.
INFORMATION TECHNOLOGY
For example, if the average end-semester mark % for a core course is 40,
then the maximum eligible mark % for an elective course is 40+20 = 60 %.
Max. Marks: 60
Duration: 2.5 Hours
PART A
Part B
(Answer any five questions. Each question carries 7 marks)
6. Briefly explain different desktop virtualization scenarios with appropriate
diagrams.
7. Discuss in detail, storage, network, and desktop virtualization.
8. How is Virtualization architecture different from traditional architecture?
What are the different virtualization architectures? Explain with diagrams
and examples.
9. What are the business cases for server virtualization?Explain the list of
factors to be considered in choosing an appropriate server virtualization
platform
10. Define the following in the context of network device virtualization:
a. Virtual LAN (VLAN)
b. Virtual routing and forwarding (VRF)
c. Virtual forwarding instance (VFI)
d. Virtual firewall context
INFORMATION TECHNOLOGY
11. Assume an airport used by several airlines and having several common
facilities.
(ii) List different roles that could be played by virtualization in this scenario.
(iii) List and describe the different virtualization technologies which will be
involved.
SYLLABUS
Module 1
INTRODUCTION TO VIRTUALIZATION (8 hours)
System Architectures (Layers-interfaces-API-ABI-ISA) –Virtual Machine
INFORMATION TECHNOLOGY
COURSE PLAN
No Topic No. of
Lectures
(40)
INFORMATION TECHNOLOGY
Course Outcomes:
PO3:An
An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than
the requirements in the appropriate bachelor program
PO4:An
An ability to apply stream knowledge to design or develop solutions for
real world problems by following the standards
PO5:An
An ability to identify, select and apply appropriate techniques, resources
art tool to model, analyse and solve practical engineering
and state-of-the-art
problems.
PO6:An
An ability to engage in life-long
life learning for the design and development
related to the stream related problems taking into consideration
sustainability, societal, ethical and environmental aspects
PO7:An
An ability to develop cognitive load management skills related to project
focus on Entrepreneurship and Industry
management and finance which focus
relevance.
Mapping of course outcomes with program outcomes
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Analyse
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
numerical/short answer questions with one question from each module, having
five marks for each question (such questions shall be useful in the testing of
knowledge, skills, comprehension, application, analysis, synthesis, evaluation
and understanding of the students). Students shall answer all questions. Part
B shall contain seven questions (such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving and quantitative evaluation), with a minimum one question
from each module of which student shall answer any five. Each question shall
carry seven marks.
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded to
a student for each elective course shall be normalized accordingly.
INFORMATION TECHNOLOGY
9. (a) Define a utility token and indicate how it differs from a (7)
SoV/MoE token
SYLLABUS
COURSE PLAN (For 3-credit courses, the content can be for 40 hours, and for
2-credit courses, the content can be for 26 hours. The audit course in the third
semester can have content for 30 hours).
No Topic No. of
Lectures
Reference Books
INFORMATION TECHNOLOGY
Course Outcomes:
PO3:An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than
the requirements in the appropriate bachelor program
PO4:An
An ability to apply stream knowledge to design or develop solutions
solution for
real world problems by following the standards
PO5:An
An ability to identify, select and apply appropriate techniques, resources
art tool to model, analyse and solve practical engineering
and state-of-the-art
problems.
PO6:An life-long learning for the design and development
An ability to engage in life
related to the stream related problems taking into consideration
sustainability, societal, ethical and environmental aspects
PO7:An
An ability to develop cognitive load management skills related to project
d finance which focus on Entrepreneurship and Industry
management and
relevance.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Understand 40%
Apply 60%
Analyze
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded to
a student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
Max. Marks : 60
Duration: 2.5 Hours
PART A
Answer All Questions. Each Question Carries 5 Marks (5x5=25)
1. What are the limitations of the current Web? Explain the (5)
development of the Semantic Web and the emergence of the Social
Web
2. Illustrate Ontological representation of social relationships (5)
3. Enumerate the different dimensions of social capital and their (5)
related concepts and measures.
Part B
(Answer any five questions. Each question carries 7 marks)
6. (a) Briefly explain the following: (7)
i) Electronic discussion networks
ii) Blogs and online communities
iii)Web-based Networks
iv) Personal Networks
(b) How will you extract the evolution of the Web Community from
a series of Web Archives?
INFORMATION TECHNOLOGY
7. (a) Explain how communities evolve into the learning process as (7)
smoothly evolving constellations of interacting entities.
11. (a) Explain how to apply node classification to large social (7)
networks.
SYLLABUS
COURSE PLAN
No. of
No Topic
Lectures
What are the pull/push factors that affects mobility of highly skilled
individuals (e.g., professionals on LinkedIn, researchers on MAG)?
Is it possible to identify bots by the patterns of their online activities?
What is an echo-chamber and how can we track it on Twitter?
Reference Books
1. Guandong Xu ,Yanchun Zhang and Lin Li, ―Web Mining and Social
Networking – Techniques and applications‖, First Edition, Springer, 2011.
Course Outcomes: After the completion of the course the student will be
able to
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher
than the requirements in the appropriate bachelor program
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
Assessment Pattern
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40,
then the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
Part B
IoT. Suggests IoT applications that are can make use of these
channel coding techniques and why?
9. Using a suitable example, show the use of Reinforced learning
technique can be applied in wireless networks.
10. Illustrate the concept of federated learning for privacy
preservation in edge networks.
11. a. Why channel access mechanisms are considered the most
often addressed topic concerning the improvement of Wi-Fi
performance with ML?
b. What Wi-Fi channel access parameters should be optimized
to improvement of Wi-Fi performance with ML?
12. How does 6G provides massive ultra-reliable and low-latency
communications? Suggest technologies that can support
URLLC supporting future IoT services through low-latency and
reliable connectivity
INFORMATION TECHNOLOGY
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
40
Hours
1 Internet of Things (IoT) for Next-Generation Smart Systems
1.1 Introduction, Background 1 Hour
1.2 Motivation and Overview 1 Hour
1.3 Vision and Development of 5G-Enabled IoT From 5G 2 Hours
Cellular Technologies
1.4 Artificial Intelligence Driven Use Cases for 5G-IoT 2 Hours
Networks
1.5 Challenges and Issues. 1 Hour
2 Cellular, Wide-Area, and Non-Terrestrial IoT
2.1 Introduction, Key Performance Indicators. 1 Hour
2.2 Enabling Access Solutions, Channel Code Design 2 Hours
2.3 Massive Connectivity, IoT Security, Deep Learning for IoT 2 Hours
2.4 NTN Integration into IoT Networks 2 Hour
2.5 Remaining Challenges and Future Directions 1 Hour
3 Machine Learning Techniques for Next-Generation Networks
3.1 Applying machine learning techniques for caching in 2 Hours
next-generation edge networks – Introduction,
Fundamentals of edge networks and 5G technologies
3.2 Taxonomy of ML based edge caching, State-of-the-art: 2 Hours
machine learning based caching
3.3 Comparison of ML based edge caching techniques, 1 Hours
Research challenges and future directions.
3.4 Swarm intelligence for next-generation networks – 2 Hours
Introduction, Swarm intelligence: An overview, SI for
spectrum management and resource allocation
3.5 SI for wireless caching and edge computing, SI for 1 Hours
network security
INFORMATION TECHNOLOGY
References:
1. K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi and M. Mustaqim, "Internet
of Things (IoT) for Next-Generation Smart Systems: A Review of Current
Challenges, Future Trends and Prospects for Emerging 5G-IoT
Scenarios," in IEEE Access, vol. 8, pp. 23022-23040, 2020, doi:
10.1109/ACCESS.2020.2970118.
2. M. Vaezi et al., "Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on
5G Advances and the Road Toward 6G," in IEEE Communications Surveys
& Tutorials, vol. 24, no. 2, pp. 1117-1174, Secondquarter 2022, doi:
10.1109/COMST.2022.3151028.
3. Junaid Shuja, Kashif Bilal, Waleed Alasmary, Hassan Sinky, Eisa
Alanazi, “Applying machine learning techniques for caching in next-
generation edge networks: A comprehensive survey”, in Journal of
INFORMATION TECHNOLOGY
Course Outcomes:
Program Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √
CO 2 √ √ √ √
CO 3 √ √ √
CO 4 √ √ √
CO 5 √ √ √
Assessment Pattern
Understand 80%
INFORMATION TECHNOLOGY
Apply 20%
Analyze
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
five marks for each question (such questions shall be useful in the testing of
knowledge, skills, comprehension, application, analysis, synthesis, evaluation
and understanding of the students). Students shall answer all questions. Part
B shall contain seven questions (such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving and quantitative evaluation), with a minimum one question
from each module of which student shall answer any five. Each question shall
carry seven marks.
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded to
a student for each elective course shall be normalized accordingly.
MODEL QUESTIONS:
For assessing CO 1:
For assessing CO 2:
2. Compare Montgomery’s Algorithm and LSB first algorithm., used for the
Scalar Multiplication.
For assessing CO 3:
For assessing CO 4:
INFORMATION TECHNOLOGY
1. Explain the hardware obfuscation design flow and the application of iterative
ranking algorithm in the design flow.
For assessing CO 5:
6. Explain the Block cipher technique, clearly indicating the inner structure
of a blockcipher with a diagram.
7. Explain FPGA island-style architecture and the logic block with a neat
sketch.
8. Show how Theoretical Cache Trace Attack is possible on a DES
implementation.
9. Explain the concept of CDFG Obfuscation Methodology
10. Explain about the designer-embedded Trojan in the hardware
implementation of the AES cryptographic hardware.
11. Explain how PUFs can be used in Cryptographic Key Generation
hardware.
12. Analyse the effect of hardware Trojans on circuit reliability.
INFORMATION TECHNOLOGY
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
1 Preliminaries(8 Hours)
3.3 DES 1
INFORMATION TECHNOLOGY
Reference Books
Course Outcomes: After the completion of the course the student will be
able to
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher
than the requirements in the appropriate bachelor program
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1
CO 2
CO 3
CO 4
CO 5
CO 6
Assessment Pattern
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded
to a student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40,
then the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
2. Three types of coal, C1, C2, and C3, are pulverized and mixed to produce
50 tons per hour needed to power a plant for generating electricity. The
burning of coal emits sulfur oxide (in parts per million) which must meet
the EPA specifications of no more than 2000 parts per million. The
following table summarizes the data of the situation:
1. Four factories are engaged in the production of four types of toys. The
following table lists the toys that can be produced by each factory.
INFORMATION TECHNOLOGY
All toys require approximately the same per-unit labor and material. The
daily capacities of the four factories are 250, 180, 300, and 200 toys,
respectively. The daily demands for the four toys are 200, 150, 350, and
100 units, respectively. Determine the factories’ production schedules
that will most satisfy the demands for the four toys.
2. Consider the LP
Maximize 𝒛 = 𝑪𝑿 subject to 𝑨𝑿 ≤ 𝒃, 𝑿 ≥ 𝟎, where 𝒃 ≥ 𝟎
INFORMATION TECHNOLOGY
requirements per unit are reduced, it is expected that the profit per unit of
𝒙𝒋 will also be reduced to of its original value. Will these changes make𝒙𝒋 a
2. A tourist in New York City uses local transportation to visit 8 sites. The
start and end and the order in which the sites are visited are
unimportant. What is important is to spend the least amount of money on
transportation. Matrix 𝐶 below provides the fares in dollars between
the different locations.
The tourist is budgeting $120 for cab cost to all eight sites. Is this a
realistic expectation?
INFORMATION TECHNOLOGY
Distribution Area
1 2 3
Part B
(Answer any five questions. Each question carries 7 marks)
6. Determine the optimum solution for each of the following LPs by (7)
enumerating all the basic solutions.
Maximize 𝑧 = 2𝑥 − 4𝑥 + 5𝑥 − 6𝑥
Subject to
𝑥 + 4𝑥 − 2𝑥 + 8𝑥 ≤2
−𝑥 + 2𝑥 + 3𝑥 + 4𝑥 ≤ 1
𝑥 ,𝑥 ,𝑥 ,𝑥 ≥ 0
7. For the network in figure below, find the shortest routes between (7)
every two nodes. The distances (in miles) are given on the arcs. Arc
(3, 5) is directional—no traffic is allowed from node 5 to node 3. All
the other arcs allow two-way traffic. Use Floyd’s algorithm to
determine the shortest route between any two nodes in the
network.
9. In the following LP, compute the entire simplex tableau associated (7)
with 𝑋 = (𝑥 , 𝑥 , 𝑥 ) .
INFORMATION TECHNOLOGY
Minimize 𝑧 = 2𝑥 + 𝑥
subject to
3𝑥 + 𝑥 − 𝑥 = 2
4𝑥 + 3𝑥 − 𝑥 = 4
𝑥 + 2𝑥 + 𝑥 = 2
𝑥 ,𝑥 ,𝑥 ,𝑥 ,𝑥 ≥ 0
10. Three orchards supply crates of oranges to four retailers. The daily (7)
demand amounts at the four retailers are 150, 150, 400, and 100
crates, respectively. Supplies at the three orchards are dictated by
available regular labour and are estimated at 150, 200, and 250
crates daily. The transportation costs per crate from the orchards
to the retailers are given in Table 2. Formulate the problem as a
transportation model. Solve the problem.
Retailer
1 2 3 4
11. A book salesperson who lives in Basin must call once a month on (7)
four customers located in Wald, Bon, Mena, and Kiln before
returning home to Basin. The following table gives the distances in
miles among the different cities. The objective is to minimize the
total distance travelled by the salesperson. Write down the LP for
computing a lower-bound estimate on the optimum tour length.
A1 5 50 50
A2 1 1 1
A3 10 1 10
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures 40
Hours
1 Modelling with Linear Programming
1.1 Two-Variable LP Model, Graphical LP Solution, LP 2 Hours
Model in Equation Form, Transition from Graphical
to Algebraic Solution. The Simplex Method - Iterative
Nature of the Simplex Method, Computational
Details of the Simplex Algorithm.
1.2 Artificial Starting Solution - M-Method, Two-Phase 2 Hours
Method. Special Cases in the Simplex Method –
Degeneracy, Alternative Optima, Unbounded
Solution, Infeasible Solution.
1.3 Sensitivity Analysis - Algebraic Sensitivity Analysis— 1 Hours
Changes in the Right-Hand Side, Objective Function.
1.4 Definition of the Dual Problem. Primal–Dual 2 Hours
Relationships - Simplex Tableau Layout, Optimal
Dual Solution.
2 Transportation and Network Model
2.1 Definition of the Transportation Model, Non- 1Hour
traditional Transportation Models.
2.2 The Transportation Algorithm - Determination of the 2Hours
Starting Solution, Iterative Computations of the
Transportation Algorithm,
2.3 Simplex Method Explanation of the Method of 1Hour
Multipliers.
2.4 The Assignment Model - The Hungarian Method. 1Hour
2.5 Scope and Definition of Network Models, Minimal 2 Hours
Spanning Tree Algorithm, Shortest-Route Problem -
Examples of the Shortest-Route Applications.
INFORMATION TECHNOLOGY
Reference Books
INTERDISCIPLINARY
ELECTIVE
INFORMATION TECHNOLOGY
CATEGORY L T P CREDIT
IOT BASED
SMART 3 0 0 3
222EIT012 INTERDISCIP
SYSTEMS
LINARY
ELECTIVE
reamble:
This course is aimed at providing an introduction to the field of IoT and
IoT-based smart systems. The course provides a detailed discussion on the types
and uses of sensors used in IoT. The protocols and standards used in IoT is also
discussed along with potential IoT applications.
CourseOutcomes:
After the completion of the course, the student will be able to
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 ✔ ✔ ✔ ✔
CO 2 ✔ ✔ ✔ ✔ ✔ ✔
CO 3 ✔ ✔ ✔ ✔
CO 4 ✔ ✔ ✔ ✔ ✔ ✔ ✔
Assessment Pattern
Understand 80%
Apply 20%
Analyse
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
shall contain seven questions (such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving and quantitative evaluation), with a minimum one question from
each module of which student shall answer any five. Each question shall carry
seven marks.
Note: The marks obtained for the ESE for an elective course shall not exceed 20%
over the average ESE mark % for the core courses. ESE marks awarded to a
student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40, then the
maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
QPCODE: RegNo:
Name:
222EIT012
PART A
1. What is M2Mcommunication?
2. List the different types of data which are generated at loT devices.
PART B
12. Using an example application, compare and contrast Web of Things and
Internet of Things.
INFORMATION TECHNOLOGY
SYLLABUS
Module I (7 Hours)
Fundamentals of IoT : Evaluation of Internet of Things – Enabling Technologies,
IoT Architecture: oneM2M, IoT World Forum (IoTWF), Alternative IoT Models -
Simplified IoT Architecture and Core loT Functional Stack – Fog, Edge and Cloud
in IoT, Functional Block of IoT Ecosystem –Sensors, Actuators, and Smart
Objectives – Open Hardware Platforms for loT.
Module II (8 Hours)
Sensors Classification, Performance and Types, Error Analysis: Characteristics
Optical Sources and Detectors, Electronic and Optical properties of
semiconductor as sensors, LED, Semiconductor lasers, Fiber optic sensors,
Thermal detectors, Photo multipliers, Photoconductivedetectors, Photodiodes,
Avalanche photodiodes, CCDs, Acoustic sensors – Microphones –
Resistive, Capacitive, Piezoelectric, Fiber optic, solid state – Electrect
microphone.
Module III (9 Hours)
Electromagnetic velocity sensor, Doppler with sound, light Accelerometer
characteristics, capacitive, piezo –resistive, piezoelectric accelerometer, thermal
accelerometer, rotor, monolithic and optical gyroscope. Flow sensors: Pressure
gradient technique, Thermal transport, Ultrasonic, Electromagnetic and Laser
anemometer. Microflow sensor, Coriolis mass flow and Drag flow sensor.
Temperature sensors –Thermoresistive, Thermoelectric,
Semiconductor and Optical. Piezoelectric temperature sensor.
Module IV (8 Hours)
IoT Protocols and Standards : Application Layer Protocols: CoAP, MQTT,
Service discovery – mDNS.Service layer and Security protocols : M2M, OMA,
IPSec, Secure DNS Routing over Low Power and Lossy Network (RPL). Data
Link Layer Protocols - WiFi, Bluetooth Low Energy, Zigbee Smart Energy.
Module V (8 Hours)
IoT Applications : Smart and Connected Cities: Street Layer, City Layer, Data
Center Layer and Services Layer, Street Lighting, Smart Parking Architecture
and Smart Traffic Control – Smart Transportation – connected car.Case studies:
IoT for health care, agriculture, smart meters, M2M, Web of things, Cellular IoT,
Industrial IoT, Industry 4.0
INFORMATION TECHNOLOGY
COURSE PLAN
No Topic No. of
Lectures
Fundamentals of IoT (7 Hours)
1
flow sensor.
Temperature sensors – Thermo- 2
3.4
resistive, Thermoelectric,
Semiconductor and Optical.
3.5 Piezoelectric temperature sensor. 1
IoT Protocols and Standards (8 Hours)
4
Reference Books
Course Outcomes:
Program Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √ √
CO 2 √ √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √ √ √
Assessment Pattern
Understand 60%
Apply 40%
Analyze
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
five marks for each question (such questions shall be useful in the testing of
knowledge, skills, comprehension, application, analysis, synthesis, evaluation
and understanding of the students). Students shall answer all questions. Part
B shall contain seven questions (such questions shall be useful in the testing of
overall achievement and maturity of the students in a course, through long
answer questions relating to theoretical/practical knowledge, derivations,
problem-solving and quantitative evaluation), with a minimum one question
from each module of which student shall answer any five. Each question shall
carry seven marks.
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded to
a student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
1. What do you mean when you say that a system is secure? Explain.
2. Explain with an example, how non-malicious program errors become a
threat to security.
3. Differentiate between the types of program security flaws.
4. Explain the two-phase database update with an example.
5. Explain the different types of Intrusion Detection Systems.
SYLLABUS
COURSE PLAN
No Topic No. of
Lectures
5.5 Firewalls 1
Reference Books:
Course Outcomes:
PO3: An ability to demonstrate a degree of mastery over the area as per the
specialization of the program. The mastery should be at a level higher than the
requirements in the appropriate bachelor program.
PO6: An ability to engage in life-long learning for the design and development
related to the stream related problems taking into consideration sustainability,
societal, ethical and environmental aspects.
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 √ √ √ √ √
CO 2 √ √ √ √ √
CO 3 √ √ √ √ √
CO 4 √ √ √ √ √
CO 5 √ √ √ √ √
INFORMATION TECHNOLOGY
Assessment Pattern
Understand 80%
Apply 20%
Analyze
Evaluate
Create
Mark distribution
Test paper (one only, and shall include a minimum of 80% 10 Marks
of the syllabus):
Note: The marks obtained for the ESE for an elective course shall not exceed
20% over the average ESE mark % for the core courses. ESE marks awarded to
a student for each elective course shall be normalized accordingly.
For example, if the average end-semester mark % for a core course is 40, then
the maximum eligible mark % for an elective course is 40+20 = 60 %.
INFORMATION TECHNOLOGY
SYLLABUS
Basic Terms and Concepts in Security, Threat Agents, Cloud Security Threats,
Identity Management and access Control, Cloud Security Working Groups,
Elements of Cloud Security Model, Cloud Security Reference Model, Examining
Cloud Security against Traditional Computing.
Amazon web services (AWS):- Amazon Elastic Compute Cloud, Amazon Storage
Systems, Database Services of AWS, Amazon CDN Service: CloudFront, Google
Cloud:- Google’s IaaS Offerings, Google’s PaaS Offering, Google’s SaaS
Offerings, Microsoft Azure:- Azure Virtual Machine, Azure Storage, Azure
Database Services, Azure Content Delivery Network, Mobile Cloud Computing:-
Introduction, Limitations, Offloading of Tasks, Integration of Cloud Computing
into Mobile Computing, Benefits, IoT:- Smart Objects, Fog Computing, Benefits
of IoT.
INFORMATION TECHNOLOGY
COURSE PLAN
No Topic No. of
Lectures
Reference Books
MINIPROJECT
INFORMATION TECHNOLOGY
The progress of the mini project is evaluated based on three reviews, two
interim reviews and a final review. A report is required at the end of the
semester.
LABORATORY
INFORMATION TECHNOLOGY
Course Outcomes:
PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7
CO 1 ✓ ✓ ✓
CO 2 ✓ ✓ ✓
CO 3 ✓ ✓ ✓
INFORMATION TECHNOLOGY
CO 4 ✓ ✓ ✓
CIE: 100%
Attendance: 10%
References
1. https://www.suse.com/documentation/sles11/book_sle_admin/data/sec_a
pache2_ssl.html
2. http://linuxconfig.org/apache-web-server-ssl-authentication
INFORMATION TECHNOLOGY
3. http://www.tomcatexpert.com/knowledge-base/using-openssl-onfigure-ssl-
certificates- tomcat
4. http://linuxcommand.org/man_pages/openssl1.html
5. https://www.owasp.org/index.php/Digital_Signature_Implementation_in_J
ava
6. https://www.openssl.org/docs/apps/smime.html
7. http://fedoraproject.org/wiki/How_to_edit_iptables_rules
8. https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html
9. https://www.frozentux.net/iptables-tutorial/iptables-tutorial.html
10. http://nmap.org/bennieston-tutorial/