0% found this document useful (0 votes)
146 views23 pages

Diploma CSE Syllabus 3rd

Uploaded by

allthing8789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
146 views23 pages

Diploma CSE Syllabus 3rd

Uploaded by

allthing8789
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Jharkhand University of Technology

Ranchi, 834010

Diploma – Computer Science Engineering

SYLLABUS
For Diploma Program in
Computer Science Engineering
(Effective from 2024-25)

DEPARTMENT OF COMPUTER SCIENCE ENGINEERING


(3rd – SEMESTER)
Python Programming
Subject code – CSE301

1. Rationale
Computer programming is the core of the computer science and strong fundamentals of programming can give
competitive edge in this technology driven world. It not only instils coding skills but also enhances problem
solving ability. Python is one of the programming languages which is versatile and feature rich yet simple and easy
to learn, has applications in various domains. Python programming sets the basis for further study of web
development, data science, IoT, machine learning etc.

2. Course Outcomes: At the end of the Course, the student will be able to:
Install the latest version of python distribution and configure it for an appropriate workspace
CO-01
as needed for a given project.
Write a program by selecting python constructs needed to solve a given problem and then code,
CO-02
execute, test and debug the program to obtain the desired result.
CO-03 Demonstrate how a program can be optimized by using modular programming approach.
CO-04 Identify and resolve both syntactical and semantic errors in a given code snippet.

3. Course Content
Tutorial
Lecture Practice
(Activity
(Knowledge Criteria) Criteria) (Performance Criteria)
Week CO PO
Fundamental Concepts:
brief history; features; applications of
python; python distributions; versions;
1. Setup python
python IDEs; Python interpreter;
environment
Execution of python programs,
2. Executing python:
debugging python code; Indentation,
1 1,2 1,4 explore different
Comments; best practices for python
ways to run python
programming;
program
Character set; tokens; keywords,
3. debug python code
variables, naming rules for variables,
Assignment,
Refer Table 1

Basics I/O operations


1. Code, execute and
Input- input (), raw_input() ; output –
2 2,4 1,2,4 debug programs that
print (), formatting output.
a) Use i/o statements
Datatypes
Scalar type: Numeric (int, long, float, b) Evaluate expressions
complex), Boolean, bytes, None; Type and displays
casting formatted output
Operators c) Evaluate expressions
Arithmetic, Comparison/Relational, to examine the
Logical/Boolean, Bitwise; string operator precedence
operators; Expressions and operator
precedence 2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Identify and Code,
execute and debug
programs using
Control Flow: Conditional blocks If
conditional
statement: general format; Multiway
3 2,4 1,2,4 statements.
branching; Sufficient examples;
2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs
using loops.
Control Flow: Loops
2. Code, execute and
While loop: general format; examples
debug programs
For loop: general format, examples.
using loops and
4 2,4 1,2,4 Range();nesting loops and conditional
conditional
statements;
statements
Controlling loop execution: Break,
3. Identify and resolve
continue, pass statements;
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
perform following
Data Collections  set operations
Concept of mutability  set
Set – features, declaration, comprehension
initialization, operations, 2. Code, execute and
comprehension; debug programs to
5 2,4 1,2,4 Tuple-features; declaration, perform following
initialization, basic operations;  basic operations
indexing; slicing; built in functions; on tuples
Nested tuples;  tuple indexing
and slicing
3. Identify and resolve
syntactic and
semantic issues in the
given code snippet
List
1. Write code snippet to
features; declaration, initialization,
perform following on
basic operations; indexing;
List
List iterations; Slicing; built in
6 2,4 1,2,4  basic operations
functions; Nested Lists;
on List
Comprehensions; Applications
 indexing and
slicing
 comprehension
2. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
perform basic
operations on
Dictionary Dictionary
features; declaration, initialization, 2. Code, execute and
basic operations; indexing; debug programs to
7 2,4 1,2,4 adding and removing keys, iterating perform Dictionary
through dictionaries; built in indexing
functions; Comprehensions; Iterating
Applications comprehension
3. Identify and resolve
syntactic and
semantic issues in the
given code snippet

1. Code, execute and


debug programs to
perform string
Arrays and Strings manipulation
Arrays: features; create, initialize, 2. Code, execute and
8 2,4 1,2,4 indexing, traversal, manipulation; debug programs to
Strings: create, assign, indexing, built perform array
in functions; manipulation
3. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Code, execute and
debug programs to
solve the given
problem using built in
functions
2. Code, execute and
debug programs to
solve the given
Functions
problem by defining a
Need of function; types; define
function
function, calling function, function 3. Code, execute and
9 2,3,4 1,2,4 arguments; return and yield; None debug programs to
keyword; Scope of variables; solve the given
Recursion; anonymous functions; problem using
sufficient examples; recursion
4. Define anonymous
function and code to
solve the given
problem
5. Identify and resolve
syntactic and
semantic issues in the
given code snippet
1. Create Modules and
10 2,3,4 1,2,4 Modules and Packages Packages
Why modules? Module creation; 2. Code, execute and
Importing modules; Module debug programs using
Namespace; built in modules
Packages: basics; path setting;
Package init .py Files;
Commonly used modules: Math,
random; Emoji;
1. Code, execute and
debug programs using
NumPy NumPy module.
Brief about NumPy module; NumPy 2. Code, execute and
arithmetic functions; NumPy array debug programs
manipulation functions; NumPy using series.
11 2,3,4 1,2,4 statistical functions; 3. Code, execute and
Pandas debug programs
Introduction, series, data frame; using dataframes.
Create dataframes; formatting data; 4. Identify and resolve
fundamental data frame operations; syntactic and semantic
issues in the
given code snippet
1. write code snippet to
perform following
operations on different
types of files
Files  read file
Concept; features; file operations;  write to file.
2. Write code to
Opening Files; Closing Files; Writing
12 2,3,4 1,2,4 perform file
to Files; operations using
Reading to Files; File methods; dataframes on
Working with files using data frame. different file types.
3. Identify and resolve
syntactic and semantic
issues in the
given code snippet
1. Integrate exception
handling into above
Error and Exception Handling:
code
Python errors; exceptions: built in,
2. Write code snippet to
user defined. How to catch
13 2,3,4 1,2,4 raise exceptions
exceptions?
Raising exceptions; 3. Identify and resolve
syntactic and
semantic issues in the
given code snippet
Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all
possible activities for that course. Student and faculty are encouraged to choose activities that are relevant to the
topic and the availability of such resources at their institution)
Sl no Activity
1. Compare and contrast excel and python
1
2. Identify various python IDEs and identify differences between them.
1. Identify use cases like reading student name and contact details and display in a required
2 format
2. Compare and contrast input () and raw_input() and identify its appropriate use.
3. Identify use of operators and develop algorithms to solve the same
4. Compare and contrast different types of operators
3 1. Identify use cases that involve decision making and develop algorithms to solve the same
1. Identify common syntactical errors when using control flow statements
1. Identify use cases that involve iteration and develop algorithms to solve the same
4 2. Compare and contrast different types of loops
2. Identify common syntactical errors when using loops
1. Identify use cases and solve them using sets
5 2. Identify use cases and solve them using tuples
3. Identify common syntactical errors when working with sets and tuples
1. Identify use cases and solve them using List
6 2. Identify common syntactical errors when working with List
3. Reimplement built in list functions
1. Identify use cases and solve them using dictionary
7 2. Reimplement built in dictionary functions
3. Identify common syntactical errors when working with dictionary
1. Identify use cases and solve them using arrays
8 2. Reimplement built in string functions
3. Identify common syntactical errors when working with arrays and strings
9 1. Optimize previously written programs by using modular programming approach
10 1. Identify and present pros and cons of modules and packages
1. Explore and present python built in modules.
11 1. Identify the applications of Pandas
2. Perform data analysis using Pandas module on a dataset such as .
12 1. Identify use cases on files concept and develop algorithms to solve the same
2. Explore regular expressions and present how they can be used for file manipulation
13 3. Compare and contrast error and exception.
4. Rewrite the programs using exceptions if needed

4. Reference:
Sl. No. Description
1 Core python programming, Wesley J. Chun Publisher: Prentice Hall PTR
2 Fluent Python by Luciano Ramalho
3 https://www.softcover.io/read/e4cd0fd9/conversational-python
4 https://realpython.com/
5 https://www.python-course.eu/
6 https://www.datacamp.com/
7 https://www.w3schools.com/
Computer Hardware, Maintenance and Administration
Subject code – CSE302

1. Rationale
Professional computer maintenance ensures computer hardware and software systems run efficiently to increase
productivity while lowering the chances of downtime. This course aims to help understand the internal working of
computers/laptops and prepare the student for a role as an entry-level IT support technician. This course sets a basis
for different facets of information technology like computer hardware, software, trouble shooting and customer
service.

2. Course Outcomes: At the end of this course, students will be able to:
CO-01 Assemble a computer as per given technical specifications following all necessary safety protocols and
install, configure and setup an administrator for a Windows Operating System.
CO-02 Diagnose a computer using the right diagnostic tools, identify the hardware problem and
troubleshoot to resolve the problem following all safety protocols.
CO-03 Diagnose an installed software using the right diagnostic tools, identify the bug/issue, troubleshoot to
resolve bugs/issues and ensure all data and applications are backed up before
troubleshooting.
CO-04 Explain e-waste protocols to be followed while disposing computer hardware, to ensure compliance
with all required state pollution control board regulations.

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) Criteria) (Performance Criteria)
I/O devices and Interfaces Types 1. Hardware Identification:
of I/O devices and ports on  Computer Case- Types,
astandard PC for connecting I/O Features- Front panel, back
devices. panel; A look inside the
Function of serial port, parallel computer case.
port, and brief principle of  Identify the front and rear
communication through these panel controls andports on a
1,
1 01 ports,types of devices that can be PC cabinet.
4
connected and interface  Identify and understand different
standards. Explain basic cable
Refer Table 1

cables and connectors:Video


types, features and their cables- VGA, HDMI, Mini-
purposes. HDMI, Display port, DVI;
Importance of USB and HDMI Peripheral cables- Serial; Hard
interfaces- Types and Features. drive cables- SATA, PATA, IDE,
Working of Common
Input/Outputdevices- Keyboard, SCSI; Adapters-DVI to
Mouse, display monitor, printer HDMI, USB to ethernet, DVI
and speaker. to VGA.
• Installation of a localprinter.
• Shared printer.
 Installing wireless andcloud
printers.
Power supplies
Safety Basics: safety protocols;
anti- static basic hand tools, Know
the danger of static electricity,
power variation; Precautions to be
taken while mounting and
unmounting power supply into/ 1. Unmount the power supply
from the cabinet;DC power source from PC cabinet.Identify the
to PC - Need for SMPS, types of output connectors.
Specifications, Ratingof SMPS 2. Identify output voltagesusing
based on type of motherboard and color coding.
devices used (AT/ATX, Micro 3. Measure voltage levelsusing
ATX, mini ATX, higher watts multi meter.
2 01 1,4 PSU for gaming PC), color coding
4. Mount the power supply into
adopted, Types of connectors
the PC cabinet, connect
used- ATX, ATX12V, Molex,
different componentsand test
SATA, PCIe;
PC.
Output voltage levels, measuring
5. Trouble shoot Power supply
technique; choosing power
through SMPS fan.
supply based on wattage rating;
6. Diagnose power supply faults
Heat sink; 80 plus rating system;
using PSU Tester.
Modular power supply.
Symptoms of SMPS failure;
Commonproblems from a faulty
SMPS.
Trouble shooting Power supplies.

1. Identify the electrical and


electronic components used in a
Basic Electronics –Electricity,
computer and tabulatethem as
Electrical quantities- Voltage,
active and passive components.
current and resistance; Active
components: Diodes- PN junction 2. Identify the working and non-
working stateof basic
diodes, biasing conditions-
forwardbias and reverse bias, components and semiconductor
devices.
3 1 1,4 transistors- BJT, MOSFET; Passive
components-Resistors, capacitors, 3. Using multi meter- Check
inductors, transformers, sensors, Output voltage ofbasic
and transducers; Integrated Circuits components and
Digital Electronics- PWM, opto- semiconductor devices.
coupler; checking AC to DC 4. Check different voltage levels
converter. of opto-coupler, PWM and
rectifier.

Mother board – Example


Motherboards; Functional 1. Precautions to be takenbefore
description of mother board; removing the mother board
specification and variation. from PC cabinet.
01,03 01, 2. Using the CPUID CPU-Ztool,
4 Form factor- what is
04 find different features of CPU.
Motherboard Form factor?
Types and features of 3. Check the Electric flowpath
Motherboard formfactors- and data flow path
ATX, Micro-ATX, Mini-ITX, 4. Windows resourcemonitor
Nano-ITX, andPico-ITX. 5. Using the CPUID CPU-Ztool,
Functional components of identify the CPU cache features
Motherboard; CPU and CPU of your working system.
socket-Types of sockets; Overview
of microarchitecture of
INTEL and AMD CPU.
1. Identify system faults using
Chipsets- Function, POST diagnosticscard.
Types andFeatures. 2. Understand basic onboard
Buses- System bus architecture configurationsthrough UEFI.
Importance of POST; UEFI – 3. Test different motherboards to
why is itrequired, possible determine support forUEFI
01, 01,
5 configurations through UEFI. 4. Replace the CMOS battery in a
03 04
IDE ports; Methods of adding computer following the
SCSIdrives. procedures.
CMOS battery: Why? Its 5. Understand and modifyBIOS
specifications. Impact of settings and observe the
removingthe battery from mother consequences of CMOS
board. failure.
1. Identify RAM chips and
Memory– Memory Units (B,
HDD/SSD, study their features
KB, MB,GB, TB), memory
and note their technical
locations and address space,
specifications.
01, Access methods, Memory
01, 2. Identify SIMM and DIMM
6 03 Classification.
04 memory modules, their number
Main memory Types and
of pins, specs and type.
Features.Auxiliary memory –
Types and features. Memory 3. Identify the interface type of a
modules. hard drive andconnect it to a
PC for data recovery.

RAM Technology- SDRAM,


DDR, DDR2, DDR3, DDR4 – 1. Use CPUID-CPUZ tool
Clock toidentify capacity,
speed, Bandwidth, Memory speed,technology, and related
speed rating, PCspeed rating; features of RAM.
RAM capacity- single- sided and
double-sided RAM, Channels; 2. Check for RAM and
RAM features- Parity/ECC Motherboard compatibility and
01, RAM, SODIMM, SPDR chip. install additional RAMstick.
7 01,03
04 Mass storage media- Hard
drive, Principle of working, 3. Find on Windows system
reliability, performance, SSD, properties tocheck the RAM for
optical drive; Logical Block correct installation.
Addressing (LBA); Memory
capacity- physical and logical 4. Query the SPD RAM chip to
addressing; M.2 drives, SATA, identify all
NVMe. 5. possible informationusing
Causes of Hard drive failure; CPUID CPUZ.
Signs offailure; Backup and
recovery of data;
Windows Installation –
Overview windows 10; 1. Windows Installation Inspect
general features; Versions; prerequisites for
architecture;prerequisites windows 10 installationon a given
02, computer.
8 for windows 10 installation:
03 2. Perform cleaninstallation.
hardware
compatibility,BIOS 3. Upgrade to windows10.
compatibility, driver 4. Create dual boot for a given
requirements. Clean install of system, learn andrectify errors
windows 10; upgrade to in dual boot.
windows 10; disk partitioning; 5. Practice on recoverypartition.
troubleshooting installation 6. Practice 10 registrytweaks.
problems; Multiple boot 7. Practice disk management
options; windows service packs. utilities.
Imaging: create a Windows
system image; How to
Backup/Restore your Windows
partition with the bootable
image.

File system overview, types,


properties, conversion from
one filesystem to another,
configuration.
Configuring system and data
1. Practice data recoverymethods
recovery: Recover files,
2. Working with task manager to
recover apps and the registry;
01, troubleshoot configuration and
recover windows 10.
otherperformance related issues.
02, Configure and manage
9 3. Working with taskscheduler.
03 windows updates:
4. Customizing windows
auto/manually; testing and
desktop.
troubleshooting updates.
Monitor and manage:
Performance monitoring;
optimizewindows services;
tune scheduled tasks.
Customizing windows desktop.

1. Execute basic commands in


Windows using command
prompt and PowerShell like
Windows Command line; listing the drives in a system,
01, PowerShell; basic commands;
01, creating a new file, removing a
10 04, writing simple PowerShell
03 file or directory, retrieving the
07 scripts. list of processes and services,
File security. etc.,
2. Use command line to encrypt
and decrypt files and folders.
1. Observe the layout of a laptop
and compare it with a desktop.
2. Follow/review manufacturer
Portable computing- maintenance guide forrepair
Troubleshooting and maintenance.
Laptops- I 3. Power Issues: Battery not
Difference between laptop and charging, No power.
desktop Motherboards; Checking 4. Trouble shoot computer hardware
02, Power connector and adaptor pins, issues in the following scenarios-
01,
11 03, AC adapter of Laptop circuit -Unexpected shutdowns.
04
04 diagram, Fault finding; trouble- -Lockups
shooting voltage transfer section, -POST & Boot
AC-DC conversion, Generation of -Continuous reboot
stand by voltage, fault finding- No -No Power
power ON, power switch, Battery -Loud Noises.
charging circuit; -Intermittent devicefailure
-Smoke and burning smell
5. -Indicator lights.
Troubleshooting Laptops- II
Dual MOSFET pin details, Two
N- channel MOSFET in place of 1. Perform the same operations in
dual MOSFET, one p-channel week#7on a laptop.
and one N- channel MOSFET, 2. LCD display trouble-shoot: No
problems and faultfinding; CPU display/dim video/flickering
voltage generation circuits, video.
01, keyboard interface, problem and 3. Wireless troubleshooting:
12 03,
04 fault finding. Touch pad Multiple antennae, check
04,
connector, BIOS details, SATA presence of wireless cards.
HDD 4. Scan and remove malwares in
details, Audio section, internal eachcomputer or mobiledevice.
display, LED screen pin details. 5. Perform Antivirus and anti-
Malware mitigation: introduction, malware updates.
types, symptoms, malware
removal;
E-waste management:
What is EEE and E-waste?
Different scenarios of E-waste
management, StEP initiatives to
solve e-waste problems, impact
of e-waste on health of children  Visit https://greene.gov.in and
and workers. https://kspcb.karnataka.gov.in/ to
E-waste management in find the latest regulations and
India: policies taken up by the
01,
13 EPR and e-waste, the informal Government of India.
04, 04
sector in e-waste management,  Visit a nearby e-waste
Technologies for e-waste management plant and
management, Financing e- understand the management
waste management systems- process.
Key steps, milestones to
achieve a robust
E-waste system.
Case studies.

Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all
possible activities for that course. Student and faculty are encouraged to choose activities that are relevant to the
topic and the availability of such resources at their institution)
SL
Activity
NO
1. Study multipurpose cables used with different models of computers and their
applications.
2. Identify the cables and list the devices that can be connected to computer using these
1
cables.
3. Identify commercially available brands of keyboard, mouse and monitor and their
distinguishable features.
1. Identify preventive measures that help to eliminate or reduce electrostatic discharge.
2. Describe effective ways to reduce the risk of injury or damage while working with respect to
powersupply in computer systems.
2 3. Make your observations on why a technician may choose to use a UPS instead of a surge
suppress or to protect a computer.
4. Identify the components that are powered by the PSU.
5. Identify the common causes of PSU/SMPS failure and explainhow it can be maintained in a
healthy state.
6. Explain the factors on which the PSU wattage is decided.
7. Describe the features of different Power supplies available commercially that support a gaming PC.

1. Calculate the value of resistors onboard using the color code.


3
2. Identify the terminals of a BJT and MOSFET.
1. Identify the units MHz and GHz with respect to CPU.
2. Compare and contrast the characteristics of different motherboard formfactors.
3. Identify and present the factors to select an appropriate Motherboard based on the purpose-Basic
applications, Gaming, Workstations/servers.
4
4. Study the features and specifications of the processors (Intel: Pentium family, dualcore, quad
core, core 2 duo, i3, i5, i7, i9 and AMD processors).
5. Study the CPU benchmarks of the trending processors.
6. Compare features of CPU and GPU.
1. Explain bus standards with respect to evolution, speed, and recent trends (ISA, PCI, AGP).
2. Explain how to clear CMOS password.
3. Explain the importance of UEFI and configuration settings for –
5
a. Overclocking of CPU frequencies
b. Set RAM timings
4. Setting BIOS passwords Specify boot options.
1. Describe the classification of memories.
6
2. Study different types of memory devices and features that are commercially available.
1. Study the characteristics of different types of SSDs.
7 2. Compare DDR4 and DDR5 memory.
3. Study and identify what happens when the hard drive fails.
1. Identify system requirements for Windows 10 installation.
8 2. Study and list the features of different versions of windows 10.
3. Explore file backup in Windows file history feature.
1. Study best practices followed in scheduled backups and scheduled disk maintenance.
9
2. Study the necessity of TPM in Windows 11.
10 1. Compare relative merits and demerits of the two command shells.
1. Relate the components of a laptop to a desktop and compare their features.
11
2. Identify the upgradable and non- upgradable components in laptops.
12 1. Document the common faults that may occur on the motherboard.
1. Study the e-waste rules 2016 and their amendments there-off as prescribed by the Karnataka state
pollution control board and explain the process for the polytechnic to follow safe disposal of e-waste.
2. Study the global e-waste key statistics.
13
3. Sketch the e-waste policies and regulations, you think, must be regulated at each stakeholder’s
level.

4. Reference:
Sl. No. Description
https://www.dell.com/support/kbdoc/en-in/000139662/what-does-the-msconfig-utitility-
1
do-in-windows-7-on-your-dell-pc#TOC
https://www.google.co.in/amp/s/www.ufsexplorer.com/amp/articles/how-to/connect-sata-
2
disks-instruction.php
3 http://www.qiguaninc.com/met/faq/faq35_en.html
4 https://www.ciscopress.com/articles/article.asp?p=2999386&seqNum=3
5 https://www.crucial.in/articles/pc-builders/what-is-computer-hardware
6 https://www.udemy.com
7 https://www.pluralsight.com
Computer Networks
Subject code – CSE303

1. Rationale
The computer networking skills are essential in today's information and communication technology driven world.
It enables students with essential skills and knowledge to explore the world of communication and networking for
further study and career.

2. Course Outcomes: At the end of the course, the student will be able to:
Select an appropriate communication technology for a given network and ensure optimal
CO-01
performance by addressing issues arising from transmission impairments.
CO-02 Design a network for a given specification by using the right network components, devices,
topologies, protocols and software.
CO-03 Design, build, test and troubleshoot a SOHO network for a given premises.
Demonstrate the configuration of IP address, routing, subnetting, client-server interaction (TCP,
CO-04 UDP) and DNS for a given WAN network using a network simulator and troubleshoot common
network issues

3. Course Content
Tutorial
Lecture Practice
(Activity
Week CO PO (Knowledge Criteria) (Performance Criteria)
Criteria)
Electromagnetic waves - Generation of
electromagnetic waves and their
properties
Electromagnetic spectrum -
classification and its applications
Communication Systems - Basic
elements of communication systems 1.Build a circuit to Generate
1, 2 with block diagram, List commonly used and detect of BASK signal
1 01
terms in electronic communication and BFSK signal using
systems, Data representation, Data flow, communication kit.
Modulation, Demodulation
Analog and Digital Signals, Periodic and
Non-Periodic Signals, Sine Wave, Phase,
Wavelength, Digital Signals, Bit-
Refer Table 1

rate, Bit-length.

1. Explore all ISP in your


Transmission Impairment –
2 01 1,2 area/locality and select
Attenuation, Distortion and Noise,
best internet ISP/plan
Performance - Bandwidth, based on cost and
Throughput, Latency, Jitter (Basic performance.
concepts only). 2. Test the download/upload
Transmission Modes – Parallel and speed in your
Serial Transmission. Asynchronous computer/mobile phone also
and Synchronous Transmission. check type, bandwidth and
Satellite communication- ISP.
Introduction, advantages and 3. Explore Bluethooth, Wifi,
disadvantages NFC in your smartphone and
note their key technical
attributes (Radio spectrum
band, range,
pathloss, throughput, mode
etc)
1. My Protocol Rules
Objectives
a) Relate computer network
protocols to the rules that
you use every day for
various forms of
Perspectives on Networking – communication.
End user perspectives on Networking b) Define the rules that
and Internet, Overview of Networking. govern how to
Categories of networks - LAN, MAN, communicate in a group
WAN, Internetworking (Illustrate of students.
Network from LAN connected using a c) Play the communication
HUB to Internetwork). game.
01, 1,
The communication rules (Method, d) List what would happen if
3 language, Confirmation) – Protocols, the sender and receiver did
02 2, 3
the Internet. not agree on the details of
The Network Standard Organizations, the protocol.
Protocol Stack. 2. Manual and Automatic
OSI Model : OSI Layers and Their address assignment
Functions, OSI Layering Concepts and (Windows)
Benefits, OSI Encapsulation a) IPv4 address
Terminology. b) Subnet mask
c) DNS
3. Manual and Automatic
address assignment
(Android)
a) IPv4 address
b) Subnet mask
c) DNS
TCP/IP Networking Model - History
Leading to TCP/IP, Overview of the 1. Organize and play games
TCP/IP Networking Model. to understand working of
TCP/IP Application Layer, HTTP TCP/IP like:
Overview, HTTP Protocol Mechanisms. Create 2 group of students,
TCP/IP Transport Layer, TCP Error each playing role of a layers
Recovery Basics, Same-Layer and of TCP/IP (intermediate
01, 1,
4 Adjacent-Layer Interactions. network devices roles can
02 2, 3
TCP/IP Network Layer, Internet Protocol also be considered).
and the Postal Service, Internet Protocol Start the communication
Addressing Basics, IP Routing Basics. between two with a sender
TCP/IP Link Layer (Data Link Plus and receiver.
Physical), TCP/IP Model and 2. Determine the IP Address
Terminology, Data Configuration of a
Encapsulation Terminology. Computer (Windows) and
Names of TCP/IP Messages. Test the Network Interface
TCP/IP Stack (Ping).
1. Demonstrate working of
Hardware and Software components of common network devices.
Network - Common network devices - 2. Demonstrate different
Computers, Access points, Hub, Switch, network cables and
Router, repeaters, NIC, Modem. connectors.
1,
02, LAN Cables – Co-axial, twisted pair, 3. Install and configure NIC.
5 2,
03 optical fibre, LAN connectors- co-axial 4. Crimping of RJ45: Straight
4,
cable, and twisted pair cable, optical and Cross.
fibre, Connectors, Firewall, Firm wares, a) Punching Cat 6 cable to
ISPs. I/O Box. Use punching tool.
b) Check connectivity
using LAN tester
Overview of network topologies -
Basic topologies- bus, ring, star, mesh 1. Install Network simulator
and hybrid. like Cisco packet tracer.
1, 2. Create simple network in
01, Network Simulator: Network
2, simulator.
6 02 simulator like Packet Tracer,
3, 3. Create and Demonstrate all
Installation, User Interface.
4, possible network topologies
Deploy devices and cables
GUI and CLI Configuration. using simulator.
Configure end Devices
An Overview of LANs - Typical 1. Build a physical Ethernet
SOHO LANs, Typical Enterprise LANs, LAN Network and
The Variety of Ethernet Physical Layer demonstrate file sharing,
Standards, Consistent Behaviour over printer sharing.
All Links Using the Ethernet Data Link
Layer. 2. Install and configure
1, Building Physical Ethernet Networks wireless access point over
02, 2, with UTP - Transmitting Data Using the LAN.
7
03 3, Twisted Pairs, Breaking Down a UTP 3. Use pathping command to
4, Ethernet Link, UTP Cabling Pinouts for find actual path between
10BASE-T and 100BASE-T, Straight- source to destination with
Through Cable Pinout, Crossover Cable information about network
Pinout, Choosing the Right Cable
Pinouts, UTP Cabling Pinouts for latency/delay & network
1000BASE-T, Sending Data in Ethernet loss.
Networks.
Ethernet Data Link Protocols – The 1. Determine the MAC
Rise of Ethernet, The Ethernet MAC Address of a Host(PC and
address and Ethernet Addressing, Phone).
Identifying Network Layer Protocols
with the Ethernet Type Field, Error 2. View Wireless and Wired
Detection with FCS. NIC Information and make a
Encapsulation, Ethernet Frame. table explaining each.
1,
Hierarchical Network Design –
02, 2, 3. Configure and install a
8 Physical and logical addresses, Benefits
03 3, ethernet switch/Hub (Use
of a Hierarchical Design, Access,
4, simulator if hardware
Distribution, and Core layers Sending
devices are not available)
Ethernet Frames with
Switches and Hubs, Sending in Modern 4. Create/model a simple
Ethernet LANs Using Full-Duplex, Ethernet network using 3
Using Half-Duplex with LAN Hubs. hosts and a switch, Observe
Ethernet access layer devices – Hub, traffic behavior on
Switch, The MAC address table, the network and Observer
Ethernet Broadcast and Broadcast data flow of ARP
domain, ARP. broadcasts and pings.

Routing: The Need for Routing - Criteria


1. Build a simple peer-to-
for Dividing the Local Network
peer network and verify
- Now We Need Routing
physical connectivity and
Overview of Network Layer Functions -
Assign various IPv4
Network Layer Routing (Forwarding)
addresses to hosts and
Logic, Host Forwarding Logic: Send the
observe the effects on
Packet to the Default Router, Routing
network communication
Data Across the Network, Delivering
2. Configure IP addresses of a
1, Data to the End Destination, How
02, network (real or simulated)
2, Network Layer Routing Uses LANs and
9 03, and ping across to test and
3, WANs, IP Addressing and How
04 troubleshoot.
4, Addressing Helps IP Routing, Routing
3. Subnetting of a network
Protocols.
(either using real network or
IPv4 Addressing - Rules for IP
in Simulator).
Addresses, Rules for Grouping IP
4. Connect to web server
Addresses, Class A, B, and C IP
using simulator, Observe
Networks, The Actual Class A, B, and C
how packets are sent across
IP Networks, IP Subnetting, How to
the Internet using IP
create subnets, Subnet mask, CIDR,
addresses.
variable length subnet mask.
IPv4 Routing - IPv4 Host Routing,
Router, Forwarding Decisions and the IP
Routing Table, The default gateway, A 1. Implement simple static
Summary of Router Forwarding Logic, routing.
A Detailed Routing Example. 2. Troubleshooting of IP
1, Routing Protocols - IPv4 Routing Addressing-
02, 2, Protocols – static and dynamic. a) Change a routing table
10 03, 3, Other Network Layer Features - entry
04 4, Using Names and the Domain Name b) Wrong address
7 System, The Address Resolution c) incorrect subnet mask
Protocol, ICMP Echo and the ping 3. Configure and test DHCP
Command. on a wireless router (real or
DHCP – Static address assignment, simulated)
Dynamic address assignment, DHCP
servers.
1. Packet Tracer - Examine
Pv4 and IPv6 Address Management - NAT on a Wireless Router
Network Boundaries -Gateways to Other 2. Identify IPv6 Addresses
Networks, Routers as Gateways. a) Identify the different
1, Network Address Translation - types of IPv6 addresses.
02,
11
2, Introduction, NAT operation. b) Examine a host IPv6
03,
3, IPv4 Issues - Need of IPv6, Ipv4 vs network interface and
04
4, IPv6, IPv4 and IPv6 Coexistence. address.
IPv6 features - IPv6 Address c) Practice IPv6 address
Representation. abbreviation.
Concept of Virtual LAN’s(VLAN’s) 3. Setup, configure and test
VPN in your smartphone.
The Client Server relationship –
1. Create a client – server
Client Server interaction. URI, URN,
model in simulator and
URL
1, observe the client
02, TCP/IP Layer 4 Protocols: TCP and
2, interaction between the
12 03, UDP - Transmission Control Protocol,
3, server and PC using packet
04 Multiplexing Using TCP Port Numbers,
4, tracer.
Popular TCP/IP Applications,
2. Observe DNS Name
Connection Establishment and
Resolution
Termination, User Datagram Protocol.
Port Numbers – TCP and UDP. a) Observe the conversion
Socket pairs, the netstat command. of a URL to an IP address.
Application Layer Services - b) Observe DNS lookup
Common Network Application using the nslookup
Services, Domain Name System, command.
Domain Name Translation, DNS 3. Use simulator to
Servers, HTTP, Web Clients and demonstrate Telnet and
Servers, FTP, Virtual Terminals, SSH
Remote Access with Telnet or SSH,
Telnet, Security Issues with Telnet,
SSH, Email- Email protocols, Simple
Mail Transfer Protocol (SMTP), Post
Office Protocol (POP3), Internet
Message Access Protocol (IMAP4).
1. Demonstrate
troubleshooting
Commands with a
scenario- ipconfig, ping ,
netstat, tracert, nslookup.
Troubleshoot Common Network
2. Interpret the output of
Problems - The Troubleshooting
commonly used network
Process, Network Troubleshooting
command line utilities and
Overview, Gather Information - Nature of
Determine which network
problem, Equipment, Configuration and
utility can provide the
Topology, Previous Troubleshooting.
Structured Troubleshooting Methods - necessary information to
1, perform troubleshooting
02, Bottom-Up, Top-Down, Divide-and-
2, activities in a bottom-up
13 03, Conquer, Follow-the-Path, Substitution,
3, troubleshooting strategy
04 Comparison, Educated Guess.
4, 3. Physical Layer
Guidelines for Selecting a
Problems - Common Layer
Troubleshooting Method Troubleshoot
Wireless Issues - Causes of Wireless 1 Problems, how to use the
Issues, Authentication and Association five senses to troubleshoot,
Wireless Router LEDs,
Errors.
Cabling Problems
4. Common Internet
Connectivity Issues - DHCP
Server Configuration Errors,
Check Internet
Configuration, Check
Firewall Settings.

Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not inclusive of all possible
activities for that course. Student and faculty are encouraged to choose activities that are relevant to the topic and
the availability of such resources at their institution)
Sl.
Activity
No
Prepare a report on advanced communication systems and suggest best way to connect remote
1
villages of India.
2 Prepare a report on Communication satellites of Indian Space Research Organization.
3 Prepare a presentation on 5 networking protocols being used in your smart phone.
My Protocol Rules Objectives
4 a) Relate computer network protocols to the rules that you use every day for various forms of
communication.
b) Define the rules that govern how you send and interpret text messages.
c) Explain what would happen if the sender and receiver did not agree on the details of the
protocol.
My Local Network
a) Record all the different network-attached devices in your home or classroom.
5 b) Investigate how each device connects to the network to send and receive information.
c) Create a diagram showing the topology of your network.
d) Label each device with its function within the network.
6 Detailed study of Packet tracer and present the same.
Trace a Route
7 a) Determine network connectivity to a destination host
b) Trace a route to a remote server using tracert
8 Presentation on wireless Ethernet protocols
1. Calculate whether destination address is local or remote using IP address.
9 2. Calculate whether destination address is local or remote using mask.
3. Use logical AND to determine network address
Identify IPv6 Addresses
10 a) Identify the different types of IPv6 addresses.
b) Examine a host IPv6 network interface and address.
c) Practice IPv6 address abbreviation.
11 Prepare a report on ICANN
List the popular port numbers with their use.
12 Prepare e report on popular application layer protocols and present the same.
Identify and correct any misconfiguration of a wireless device ( Scenario : A small business
13 owner learns that a wireless user is unable to access the network. All the PCs are configured with static
IP addressing. Identify and resolve the issue)

4. Reference:
Sl. No. Description
1 www.netcad.com
2 Computer Networks - Behrouz A. Forouzan
3 www.howtonetwork.com
4 vlab.co.in
Database System Concepts and PL/SQL
Subject code – CSE304

1. Rationale
Data, factual information, is the main driving force that is changing the face of our world. Database is an organized
collection of related data which is stored and accessed electronically using a computer. Database management has
evolved from a specialized computer application to a central component of virtually all enterprises, and, as a result,
knowledge about database systems has become an essential part of an education in computer science. SQL is a
powerful language for both querying and updating data in relational databases. Study of SQL empowers students to
implement and work with relational data model.

2. Course Outcomes: At the end of the course, the student will be able to:
Identify the elements of ER model for a given requirement, draw ER diagram and validate with the
CO-01
given requirement.
Translate the given ER diagram to a relational model and verify against integrity constraints. Also
CO-02
refine and normalize the relational database design against first three normal forms.
CO-03 Use appropriate SQL statements to create a database and other DB objects using a DBMS software.
Perform insert, delete and/or update operations on the database and query the database to
CO-04
retrieve the required information using appropriate SQL statements and clauses.

3. Course Content
Tutorial Practice
Lecture
(Activity (Performance
(Knowledge Criteria)
Week CO PO Criteria) Criteria)
Introduction
Overview of DB: why a database? Purpose of
1. Install and setup
database; Classification; Application; DBMS:
DBMS software
features, providers;
such as MySQL,
Functional components of DBMS; Types of
PostgreSQL
1 1 1,4 DBMS architecture;
2. Learn the interface
View of data in DBMS; Database users; Role
and explore the
and responsibilities of DBA;
features of installed
Case study: Example of any database
Refer Table 1

DBMS
application, recruitment database

Database design 1. Identify and ER-


2 1 1,3,4 Data model; types; importance of data modeling; model elements
Overview of database design; phases and draw ER
of database design; database development life diagram for the
cycle; given specifications
Conceptual design: ER-Model: entity: types; using tools.
attribute: types; relationships: types,
constraints, Symbols and Notations;
Case study: conceptual design for a set of
specifications
i. Restaurant
ii. Retail shop
iii. Recruitment
iv. College
v. Library
Relational model: Overview; characteristics; 1. Map ER Model to
Constraints: types; Operations; relational model
3 2 1,3
Advantages and Disadvantages; applications; 2. Identify various
Design anomalies; Features of good DB design; constraints
Functional dependency: overview, rules, types;
Normalization: normalization process; 1. Normalize the
4 2 1,3
importance of normalization;1NF,2NF,3NF above design
Sufficient examples to understand the concept
1. Validate the above
database languages: types, commands/tasks in
design against
each type; Integrity constraints;
5 3 1,4 integrity constraints
MySQL/PostgreSQL: overview; features;
datatypes; Standardization guidelines;
1. Use
MySQL/PostgreSQL
Defining Data: DDL
DDL statements to
CREATE, ALTER, DROP different DB
6 3 1,3,4 create database and
objects; Temporary tables: types, create and
other DB
use; external tables; Managing constraints
objects for above
design
1. Perform single
table and multi
Insert, delete and update data
table insertion
Modifying data: UPDATE and
2. Perform delete and
DELETE
7 3,4 1,3,4 update operations
Update anomalies; impact of constraints Querying
of available data: SELECT; Aliases; sorting data: 3. Querying single
ORDER BY table
4. Sort the result set
of a query
1. Querying single
filtering data: WHERE, AND, OR, row limiting table
8 4 1,4 clause, IN, BETWEEN, LIKE; 2. Filtering data
Joining table: INNER JOIN, LEFT JOIN, 3. query multiple
tables with joins
1. Queries that use set
Grouping data: Aggregate functions, GROUP operators
9 4 1,4 BY, HAVING; 2. Report aggregated
Set operators: UNION, INTERSECT, MINUS; data using group
functions
Subqueries: 1. Write sub queries
Comparator operators; subqueries: Single Row to retrieve
10 4 1,4 Subqueries; Multiple Row Subqueries; correlated information from
subqueries; EXISTS, NOT EXISTS, the created
ANY, ALL, SOME; database
Views: create, drop and update; realization of 1. Create view and
11 4 1,4
views based on single and multiple tables; query
DCL: Controlling user access: Differentiating 2. Create users and
system privileges from object privileges; assign privileges for
Granting privileges on tables DB operations
PL/SQL: variables, datatypes; control
statements (decision making); Stored
1. Create and execute
procedures and Functions
store procedures
12 4 1,4 Concept; syntax and structure of store
2. Create and execute
procedure;
functions
syntax and structure of functions; calling a
function; Examples;
Managing and controlling transactions: 1. Create and execute
Introduction of transaction, ACID properties; transactions
states of transaction; Transaction control; 2. Call previously
Overview of transaction management, using created store
13 4 1,4
transaction control commands: COMMIT, procedure or
ROLLBACK, SAVE POINT, SET function in
transaction
TRANSACTION;
sufficient examples;
Total in hours 39 13 52
*PO = Program outcome as listed and defined in year 1 curriculum

Table 1: Suggestive activities for tutorials (the list is only shared as an example and not
inclusive of all possible activities for that course. Student and faculty are encouraged to
choose activities that are relevant to the topic and the availability of such resources at their
institution)

1. Identify the drawbacks of file system and how DB enables us to overcome them. Identify
1
distinguishable features of each of DBMS available in the market.
1. Transform given n-ary relationship to binary relationship
2 2. Document the steps to create ER diagram.
3. Identify the components of ER model in the given requirements.

3 1. Document the steps to create logical design


2. Discuss and document Codd's 12 rules
4 1. Explore and document other normal forms

5 1. study and present the working of SQL optimizer


2. Learn and report optimization techniques
1. Learn and demonstrate use of DISTINCT, ALL, IS NULL;
6
2. Learn and present RIGHT JOIN;
7 1. Identify the advantages of Cascading Referential Integrity Constraints
8 1. Identify need of subqueries
9 1. identify the advantages and disadvantages of store procedure and functions,
10 1. presentation on the latest developments in research and industry related to this course
11 1. Learn and present need of scalar subqueries
12 1. Learn iterative statements in PL/SQL
1. Does Relational model support storage of unstructured data, if no, what are the alternatives to
13
store unstructured data.

4. Reference:
Sl. No. Description
1 Database System Concepts by Abraham Silberschatz, Henry F. Korth, S . Sudarshan
2 https://binaryterms.com/
3 https://beginnersbook.com/
4 https://www.oracletutorial.com/

5. Equipment/software list

Sl.
Particulars Specification Quantity
No.

1 Computers 20

MySQL workbench/ or equivalent software; Lucid chart,


2
draw.io

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy