BOS CSE Cyber Security (02!05!25)
BOS CSE Cyber Security (02!05!25)
(Full time)
Department of Computer Science and Engineering
CYBER SECURITY
4 Years B.Tech. Course Structure (2025-26)
(Effective for students admitted into I Year from Academic Year 2024-2025
onwards
&
B.Tech.(Lateral Entry Scheme)
(Effective for the students admitted into II Year through Lateral Entry Scheme
from the Academic Year 2025-2026 onwards)
Department of Computer Sciences and Engineering
(CYBER SECURITY)
(Applicable from the academic year 2025-26 onwards)
Course Course
S. No Category Code Title L T P Credits
1 BS Discrete Mathematics & Graph Theory 3 0 0 3
Universal Human Values–
2 HSMC Understanding Harmony & Human 2 1 0 3
Ethical Conduct
3 ES Digital Logic & Computer Organization 3 0 0 3
Advance Data Structures & Algorithm
4 PC Analysis 3 0 0 3
Object-Oriented Programming Through
5 PC Java 3 0 0 3
Advanced Data Structures and Algorithm
6 PC 0 0 3 1.5
Analysis Lab
Course Course
S. No. Category Code Title L T P Credits
Managerial Economics and
BS Financial Analysis Business 2 0 0 2
1 Environment Organizational
Behavior
2 HSMC Number Theory & Applications 3 0 0 3
3 ES Operating Systems 3 0 0 3
5 PC Computer Networks 3 0 0 3
Course Objectives:
Course Outcomes:
After completion of the course, students will be able to
CO1: Illustrate advanced tree data structures and their applications. (L2)
CO2: Understand graph data structures, traversals, and their contextual applications. (L2)
CO3: Use data structures in the design and implementation of algorithms. (L3)
CO4: Recommend suitable data structures based on the problem requirements. (L4)
CO5: Analyze algorithms in terms of time and space complexities. (L4)
UNIT–I:
Introduction to Algorithm Analysis, Space and Time Complexity analysis, Asymptotic Notations.
AVL Trees– Creation, Insertion, Deletion operations and Applications B-Trees – Creation, Insertion,
Deletion operations and Applications
UNIT–II:
Heap Trees(Priority Queues)–Min and Max Heaps, Operations and Applications Graphs –
Terminology, Representations, Basic Search and Traversals, Connected Components and Bi
connected Components, applications Divide and Conquer: The General Method, Quick Sort, Merge
Sort, Strassen‘ matrix multiplication, Convex Hull
UNIT–III:
Greedy Method: General Method, Job Sequencing with deadlines, Knapsack Problem, Minimum cost
spanning trees, Single Source Shortest Paths Dynamic Programming: General Method, All pairs
shortest paths, Single Source Shortest Paths– General Weights (Bellman Ford Algorithm), Optimal
Binary Search Trees, 0/1 Knapsack, String Editing, Travelling Salesperson problem
UNIT–IV:
Backtracking: General Method, 8-Queens Problem, Sum of Subsets problem, Graph Coloring, 0/1
Knapsack Problem Branch and Bound: The General Method,0/1KnapsackProblem, Travelling Sales
person problem
UNIT – V:
NPH ard and NP Complete Problems: Basic Concepts, Cook‘s theorem NP Hard Graph Problems:
Clique Decision Problem (CDP), Chromatic Number Decision Problem (CNDP), Traveling
Salesperson Decision Problem (TSP) NP Hard Scheduling Problems: Scheduling Identical Processors,
Job Shop Scheduling
Text books:
1. Fundamentals of Data Structures in C++,Horowitz, Ellis; Sahni, Sartaj; Mehta, Dinesh,2nd
Edition Universities Press, 2008.
2. Computer Algorithms in C++, Ellis Horowitz, SartajSahni, Sanguthevar Rajasekaran,2nd
Edition University Press, 2008.
Reference Books:
1. Data Structures and program design in C, Robert Kruse, 2e,Pearson Education Asia, 2006
2. An introduction to Data Structures with applications, Trembley & Sorenson, 2e, McGraw Hill,
2017
3. The Art of Computer Programming, Vol.1: Fundamental Algorithms, Donald E Knuth,
Addison- Wesley, 1997.
4. DataStructuresusingC&C++:Langsam,Augenstein&Tanenbaum,Pearson,1995
5. Algorithms + Data Structures & Programs, N. Wirth, PHI, 1988.
6. Fundamentals of Data Structures in C++: Horowitz Sahni & Mehta, Galgottia Pub, 1984.
7. Data structures in Java, Thomas Standish, Pearson Education Asia, 1941.
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 3 3
CO2 3 2 2 2 2 0 0 0 0 1 0 1 3 3
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 3 0 0 0 0 1 0 1 3 3
CO5 3 3 3 3 3 0 0 0 0 1 0 1 3 3
Avg 3.0 2.6 2.6 2.6 2.4 0 0 0 0 1.0 0 1.0 3.0 3.0
Course Objectives:
Identify Java language components and how they work together in applications
Learn the fundamentals of object-oriented programming in Java, including defining
classes, invoking methods, using class libraries.
Learn how to extend Java classes with inheritance and dynamic binding and how to
use exception handling in Java applications
Understand how to design applications with thread sin Java
Understand how to use Java apis for program development
Course Outcomes:
After completion of the course, students will be able to
CO1: Understand Java fundamentals including OOP principles, control flow, data handling, and
program structure (L2)
CO2: Implement OOP features, constructor overloading, recursion, static/final attributes, this
keyword, and access control (L3)
CO3: Implement arrays using OOP concepts and use arrays as vectors (L3)
CO4: Demonstrate Java Packages, Exception Handling, I/O, and File Handling for real-world
applications (L3)
CO5: Design and develop applications using strings, multithreading, JDBC, and JavaFX (L5)
UNIT-I:
Object Oriented Programming: Basic concepts, Principles, Program Structure in Java:
Introduction, Writing Simple Java Programs, Elements or Tokens in Java Programs, Java
Statements, Command Line Arguments, User Input to Programs, Escape Sequences Comments,
Programming Style.
Data Types, Variables, and Operators: Introduction, Data Types in Java, Declaration of Variables,
Data Types, Type Casting, Scope of Variable Identifier, Literal Constants, Symbolic Constants,
Formatted Output with printf() Method, Static Variables and Methods, Attribute Final
Introduction to Operators, Precedence and Associativity of Operators, Assignment Operator
(=), Basic Arithmetic Operators, Increment (++) and Decrement (- -) Operators, Ternary
Operator, Relational Operators, Boolean Logical Operators, Bitwise Logical Operators.
Control Statements: Introduction, if Expression, Nested if Expressions, if–else Expressions,
Ternary Operator? Switch Statement, Iteration Statements, while Expression, do–while Loop, for
Loop, Nested for Loop, for–Each for Loop, Break Statement, and Continue Statement.
UNIT-II:
Classes and Objects: Introduction, Class Declaration and Modifiers, Class Members, Declaration
of Class Objects, Assigning One Object to Another, Access Control for Class Members,
Accessing Private Members of Class, Constructor Methods for Class, Overloaded Constructor
Methods, Nested Classes, Final Class and Methods, Passing Arguments by Value and by
Reference, Keyword this.
Methods: Introduction, Defining Methods, Overloaded Methods, Overloaded Constructor Methods
Class Objects as Parameters in Methods, Access Control, Recursive Methods, Nesting of
Methods, Overriding Methods, Attributes Final and Static.
UNIT-III:
Arrays: Introduction, Declaration and Initialization of Arrays, Storage of Array in Computer
Memory, Accessing Elements of Arrays, Operations on Array Elements, Assigning Array to
Another Array, Dynamic Change of Array Size, Sorting of Arrays, Search for Values in Arrays,
Class Arrays, Two-dimensional Arrays, Arrays of Varying Lengths, Three-dimensional Arrays,
Arrays as Vectors.
Inheritance: Introduction, Process of Inheritance, Types of Inheritances, Universal Super Class-
Object Class, Inhibiting Inheritance of Class Using Final, Access Control and Inheritance,
Multilevel Inheritance, Application of Keyword Super, Constructor Method and Inheritance,
Method Overriding, Dynamic Method Dispatch, Abstract Classes, Interfaces and Inheritance.
Interfaces: Introduction, Declaration of Interface, Implementation of Interface, Multiple
Interfaces, Nested Interfaces, Inheritance of Interfaces, Default Methods in Interfaces, Static
Methods In Interface, Functional Interfaces, Annotations.
UNIT-IV:
Packages and Java Library: Introduction, Defining Package, Importing Packages and Classes
into Programs, Path and Class Path, Access Control, Packages in Java SE, Java. lang Package and
its Classes, Class Object, Enumeration, class Math, Wrapper Classes, Auto-boxing and Auto-
unboxing, Java util Classes and Interfaces, Formatter Class, Random Class, Time Package, Class
Instant (java. time. Instant), Formatting for Date/Time in Java, Temporal Adjusters Class,
Temporal Adjusters Class.
Exception Handling: Introduction, Hierarchy of Standard Exception Classes, Keywords throws
and throw, try, catch, and finally Blocks, Multiple Catch Clauses, Class Throw able, Unchecked
Exceptions, Checked Exceptions.
Java I/O and File: Java I/O API, standard I/O streams, types, Byte streams, Character streams,
Scanner class, Files in Java (Text Book 2)
UNIT-V:
String Handling in Java: Introduction, Interface Char Sequence, Class String, Methods for
Extracting Characters from Strings, Comparison, Modifying, Searching, Class String Buffer.
Multi-threaded Programming: Introduction, Need for Multiple Threads, Multithreaded
Programming for Multi-core Processor, Thread Class, Main Thread- Creation of New Threads,
Thread States, Thread Priority-Synchronization, Deadlock and Race Situations, Inter-thread
Communication - Suspending, Resuming, and Stopping of Threads.
Java Database Connectivity: Introduction, JDBC Architecture, Installing MySQL and MySQL
Connector/J, JDBC Environment Setup, Establishing JDBC Database Connections, Result Set
Interface
Java FX GUI: Java FX Scene Builder, Java FX App Window Structure, displaying text and
image, event handling, laying out nodes in scene graph, mouse events (Text Book 3)
Text Books:
1. JAVA one step ahead, Anitha Seth, B.L.Juneja, 1e,Oxford, 2017.
2. Joy with JAVA, Fundamentals of Object Oriented Programming, Debasis Samanta,
Monalisa Sarma, Cambridge, 2023.
3. Java 9 for Programmers, Paul Deitel, Harvey Deitel,4th Edition, Pearson, 2018.
References Books:
1. The Complete Reference Java, Herbert Schildt, 11th edition, TMH, 2019.
2. Introduction to Java programming, Y Daniel Liang,7th Edition, Pearson, 2008.
Online Resources:
1. https://nptel.ac.in/courses/106/105/106105191/
2. https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_0128804645476188163
47_shared/overview
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 3 3 3 2 0 0 0 0 1 0 1 2 2
CO3 3 2 2 2 2 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO5 3 3 3 3 3 0 0 0 0 1 0 1 3 3
Avg 3.0 2.6 2.6 2.6 2.2 0 0 0 0 1.0 0 1.0 2.6 2.6
Course Outcomes:
After completion of the course, students will be able to
CO1: Design and develop programs solving real-world problems using popular algorithm
design methods. (L5)
CO2: Demonstrate and implement operations on non-linear data structures like AVL trees, B-
trees, heaps, and graphs. (L3)
CO3: Critically assess design choices and implementation strategies of algorithms and data
structures. (L5)
CO4: Utilize and compare data structures and algorithms to optimize solutions and evaluate
performance. (L4)
Sample Programs:
1. Construct an AVL tree for a given set of elements that are stored in a file. And
implement insert and delete operations on the constructed tree. Write the contents of
tree into a new file using in-order.
2. ConstructB-Treeanorderof5withasetof100randomelementsstoredinarray. Implement
searching, insertion and deletion operations.
3. Construct Min and Max Heap using arrays, delete any element and display the content of
the Heap.
4. Implement BFT and DFT for given graph, when graphis represented by
a) Adjacency Matrix b)Adjacency Lists
Reference Books:
1. Fundamentals of Data Structures in C++, Horowitz Ellis, Sahni Sartaj, Mehta, Dinesh, 2nd
Edition, Universities Press, 2006.
2. Computer Algorithms /C++Ellis Horowitz, Sartaj Sahni, Sanguthevar Rajasekaran,2nd
Edition, University Press, 2008.
3. Data Structures and program design in C, Robert Kruse,1e, Pearson Education Asia, 1997.
4. An introduction to Data Structures with applications, Trembley & Sorenson, McGraw
Hill, 1984
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 0 0 0 0 1 0 1 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 1 3 3
CO3 3 3 3 3 3 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 3 0 0 0 0 1 0 1 3 3
Avg 3.0 2.75 3.0 2.75 2.75 0.0 0.0 0.0 0.0 1.0 0.0 1.0 2.75 2.75
Course Objectives:
The aim of this courses to
Sample Experiments:
Exercise–1:
1. Write a JAVA program to display default value of all primitive data type of JAVA
2. Write a java program that display the roots of a quadratic equation a x2+bx=0. Calculate
the discriminate D and basing on value of D, describe the nature of root.
Exercise-2
1. Write a JAVA program to search for an element in a given list of elements using binary
search mechanism.
2. Write a JAVA program to sort for an element in a given list of elements using bubble sort
3. Write a JAVA program using String Buffer to delete, remove character.
Exercise-3
1. Write a JAVA program to implement class mechanism. Create a class, methods andinvoke
them inside main method.
2. Write a JAVA program implements method overloading.
3. Write a JAVA program to implement constructor.
4. Write a JAVA program to implement constructor over loading.
Exercise-4
1. Write a JAVA program to implement Single Inheritance
2. Write a JAVA program to implement multi level Inheritance
3. Write a JAVA program for abstract class to find areas of different shapes
Exercise-5
1. Write a J AVA program give example for ―super‖ keyword.
2. Write a JAVA program to implement Interface. What kind of Inheritance can be
achieved?
3. WriteaJAVA programthat implementsRuntimepolymorphism
Exercise-6
1. Write a JAVA program that describes exception handling mechanism
2. Write a JAVA program Illustrating Multiple catch clauses
3. Write a JAVA program for creation of Java Built-in Exceptions
4. Write a JAVA program for creation of User Defined Exception
Exercise-7
1. Write a JAVA program that creates threads by extending Thread class. First thread display
―Good Morning ―every 1 sec, the second thread displays ―Hello ―every 2 seconds and the
third display ―Welcome‖ every 3 seconds, (Repeat the same by implementing Runnable)
2. Write a program illustrating is Alive and join ()
3. Write a Program illustrating DaemonThreads.
4. Write a JAVA program Producer Consumer Problem
Exercise–8
1. Write a JAVA program that import and use the user defined packages
2. With out writing any code, build a GUI that display text in label an damage in an Image
View (use Java FX)
3. Build a Tip Calculate or app using several Java FX component sand learn how to respond
to user interactions with the GUI
Exercise–9
1. Write a java program that connects to a data base using JDBC
2. Write a java program to connect to a data base using JDBC and insert values into it.
3. Write a java program to connect to a data base using JDBC and delete values from it
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO3 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO4 3 3 3 3 2 0 0 0 0 1 0 1 3 3
Avg 3.0 2.5 2.5 2.5 2.0 0.0 0.0 0.0 0.0 1.0 0.0 1.0 2.5 2.5
Dr G. Jaya Suma Dr K. Venkata Rao Dr CH Ramesh
University Nominee Subject Expert Subject Expert
PYTHON PROGRAMMING
(Skill Enhancement Course)
Course Objectives:
The main objectives of the course are to
Course Outcomes:
After completion of the course, students will be able to
CO1: Showcase adept command of Python syntax including variables, data types, control structures,
functions, modules, and exception handling. (L3)
CO2: Apply Python programming concepts to solve diverse computational problems. (L3)
CO3: Understand and apply OOP principles in Python including classes, inheritance, polymorphism,
and encapsulation. (L3)
CO4: Become proficient in using Python libraries and frameworks such as JSON, XML, NumPy, and
pandas. (L3)
CO5: Exhibit competence in implementing and manipulating fundamental Python data structures like
lists, tuples, sets, and dictionaries. (L3)
UNTI-I:
History of Python Programming Language, Thrust Areas of Python, Installing Anaconda Python
Distribution, Installing and Using Jupyter Notebook Parts of Python Programming Language:
Identifiers, Keywords, Statements and Expressions, Variables, Operators, Precedence and
Associativity, Data Types, Indentation, Comments, Reading Input, Print Output, Type Conversions,
the type () Function and Is Operator, Dynamic and Strongly Typed Language. Control Flow
Statements: if statement, if-else statement, if...elif…else, Nested if statement, while Loop, for Loop,
continue and break Statements, Catching Exceptions Using try and except Statement.
Sample Experiments:
UNIT-II:
Functions: Built-In Functions, Commonly Used Modules, Function Definition and Callingthe
function, return Statement and void Function, Scope and Lifetime of Variables, Default
Parameters, Keyword Arguments, *args and **kwargs, Command Line Arguments. Strings:
Creating and Storing Strings, Basic String Operations, Accessing Characters inString by Index
Number, String Slicing and Joining, String Methods, Formatting Strings. Lists: Creating Lists,
Basic List Operations, Indexing and Slicing in Lists, Built-In Functions Used on Lists, List
Methods, del Statement.
Sample Experiments:
1. Write a program to define a function with multiple return values.
2. Write a program to define a function using default arguments.
3. Write a program to find thelength ofthe string without using any library functions.
4. Write a program to check if the sub string is present in a given string or not.
5. Write a program to perform the given operations on a list:
i. Addition
ii. Insertion iii.slicing
6. Write a program to perform any 5 built-in functions by taking any list.
UNIT-III:
Dictionaries: Creating Dictionary, Accessing and Modifying key: value Pairs in Dictionaries,
Built-In Functions Used on Dictionaries, Dictionary Methods, del Statement.Tuples and Sets:
Creating Tuples, Basic Tuple Operations, tuple() Function, Indexing and Slicing in Tuples,
Built-In Functions Used on Tuples, Relation between Tuples and Lists, Relation between
Tuples and Dictionaries, Using zip() Function, Sets, Set Methods, Frozen set.
Sample Experiments:
1. Write a program to create tuples (name, age, address, college) for atleast members and
concatenate the tuples and print the concatenated tuples.
2. Write a program to count the number of vowels in a string (No control flow allowed).
3. Write a program to check if a given key exists in a dictionary or not.
4. Write a program to addanewkey- value pair to an existing dictionary.
5. Write a program to sum all the items in a given dictionary.
UNIT-IV:
Files: Types of Files, Creating and Reading TextData, File Methods to Read and Write Data,
Reading and Writing Binary Files, Pickle Module, Reading and Writing CSV Files, Pythons
and so. path Modules. Object-Oriented Programming: Classes and Objects, Creating Classes in
Python, Creating Objects in Python, Constructor Method, Classes with Multiple Objects, Class
Attributes Vs Data Attributes, Encapsulation, Inheritance, Polymorphism.
Sample Experiments:
1. Write a program to sort words in a file and put them in another file. The output file
should have only lower-case words, so any upper-case words from source must be
lowered.
2. Python program to print each line of a file in reverse order.
3. Python program to compute the number of characters, words and lines in a file.
4. Write a program to create, display, append, insert and reverse the order of the items in
the array.
5. Write a program to add, transpose and multiply two matrices.
6. Write a Python program to create a class that represents a shape. Include methods to
calculate its area and perimeter. Implement subclasses for different shapes like circle,
triangle, and square.
UNIT-V:
Introduction to Data Science: Functional Programming, JSON and XML in Python, NumPy
with Python, Pandas.
Sample Experiments:
1. Python program to check whether a JSON string contains complex object or not.
2. Python Program to demonstrate NumPy arrays creation using array() function.
3. Python program to demonstrate use of ndim, shape, size, d type.
4. Python program to demonstrate basics licing ,integer and Boolean indexing.
5. Python program to find min, max, sum, and cumulative sum of array
6. Create a dictionary with at least five keys and each key represent value as a list where
this list contains at least ten values and convert this dictionary as a pandas data frame
and explore the data through the data frame as follows:
a) Apply head () function to the pandas data frame
b) Perform various data selection operations on Data Frame
7. Select any two columns from the above data frame, and observe the change in one
attribute with respect to other attribute with scatter and plot operations in matplotlib
Reference Books:
1. Introduction to Python Programming, Gowrishankar S,Veena A.,CRC Press., 2018
2. Python Programming, S Sridhar, J Indumathi, V M Hariharan, 2ndEdition, Pearson,
2024
3. Introduction to Programming Using Python, Y.Daniel Liang, Pearson, 2012.
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 3 2 3 2 2 0 0 0 0 1 0 1 2 2
CO5 3 3 3 3 2 0 0 0 0 1 0 1 3 3
Avg 2.8 2.4 2.6 2.4 2.0 0 0 0 0 1.0 0 1.0 2.4 2.4
Dr G. Jaya Suma Dr K. Venkata Rao Dr CH Ramesh
University Nominee Subject Expert Subject Expert
Course Objectives:
Course Outcomes
After completion of the course, students will be able to
CO1: Describe basics of operating systems and mechanisms for process, thread management,
and communication. (L2)
CO2: Understand core OS concepts including process management, memory management, file
systems, and protection. (L2)
CO3: Apply process scheduling algorithms and synchronization techniques to improve system
performance. (L3)
CO4: Illustrate deadlock conditions and evaluate possible solutions. (L3)
CO5: Analyze memory management techniques and allocation policies. (L4)
UNIT-I
Operating Systems Overview: Introduction, Operating system functions, Operating systems
operations, Computing environments, Free and Open-Source Operating Systems System
Structures: Operating System Services, User and Operating-System Interface, system calls,
Types of System Calls, system programs, Operating system Design andImplementation,
Operating system structure, Building and Booting an Operating System, Operating system
debugging
UNIT-II
Processes: Process Concept, Process scheduling, Operations on processes, Inter-process
communication. Threads and Con currency: Multi-threading models, Thread libraries,
threading issues. CPU Scheduling: Basic concepts, Scheduling criteria, Scheduling
algorithms, multiple processor scheduling.
UNIT– III
Synchronization Tools: The Critical Section Problem, Peterson‘s Solution, Mutex Locks,
Semaphores, Monitors, Classic problems of Synchronization.
Deadlocks: system Model, Deadlock characterization, Methods for handling Deadlocks,
Deadlock prevention, Deadlock avoidance, Deadlock detection, Recovery from Deadlock.
UNIT-IV
Memory-Management Strategies: Introduction, Contiguous memory allocation, Paging,
Structure of the Page Table, Swapping. Virtual Memory Management: Introduction, Demand
paging, Copy-on-write, Page replacement, Allocation of frames, Thrashing Storage
Management: Overview of Mass Storage Structure, HDD Scheduling.
UNIT-V
File System: File System Interface: File concept, Access methods, Directory Structure; File
system Implementation: File-system structure, File-system Operations, Directory
implementation, Allocation method, Free space management; File-System Internals: File-
System Mounting, Partitions and Mounting, File Sharing. Protection: Goals of protection,
Principles of protection, Protection Rings, Domain of protection, Access matrix.
Text Books:
1. Operating System Concepts, SilberschatzA, Galvin PB, Gagne G, 10thEdition, Wiley,
2018.
2. Modern Operating Systems, TanenbaumA S,4thEdition, Pearson, 2016
Reference Books:
1. Operating Systems -Internals and Design Principles, Stallings W, 9thedition, Pearson,
2018
2. Operating Systems: A Concept Based Approach,D.MDhamdhere,3rdEdition,
McGraw- Hill, 2013
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO5 2 2 3 3 3 0 0 0 0 1 0 1 3 3
Avg 2.8 2.4 2.6 2.6 2.2 0 0 0 0 1.0 0 1.0 2.6 2.6
Introduce database management systems and to give a good formal foundation on the
relational model of data and usage of Relational Algebra
Introduce the concepts of basic SQL as a universal Data base language
Demonstrate the principles behind systematic data base design approaches by
covering conceptual design, logical design through normalization
Provide an overview of physical design of a database system, by discussing Database
indexing techniques and storage techniques
Course Outcomes:
After completion of the course, students will be able to
UNIT-I:
Introduction: Database system, Characteristics (Database Vs File System), Database Users,
Advantages of Database systems, Database applications. Brief introduction of different Data
Models; Concepts of Schema, Instance and data independence; Three tier schema architecture
for data independence; Database system structure, environment, Centralized and Client
Server architecture for the database. Entity Relationship Model: Introduction, Representation
of entities, attributes, entity set, relationship, relationship set, constraints, sub classes, super
class, inheritance, specialization, generalization using ER Diagrams.
UNIT-II:
Relational Model: Introduction to relational model, concepts of domain, attribute, tuple,
relation, importance of null values, constraints (Domain, Key constraints, integrity
constraints) and their importance, Relational Algebra, Relational Calculus. BASIC SQL:
Simple Database schema, data types, table definitions (create, alter), different DML
operations (insert, delete, update).
UNIT-III:
SQL: Basic SQL querying (select and project) using where clause, arithmetic & logical
operations, SQL functions (Date and Time, Numeric, String conversion) Creating tables with
relationship, implementation of key and integrity constraints, nested queries, sub queries,
grouping, aggregation, ordering, implementation of different types of joins, view(updatable
and non-updatable), relational set operations.
UNIT-IV:
Schema Refinement (Normalization): Purpose of Normalization or schema refinement,
concept of functional dependency, normal forms based on functional dependency Lossless
join and dependency preserving decomposition, (1NF, 2NF and 3 NF), concept of surrogate
key, Boyce-Coded normal form (BCNF), MVD, Fourth normal form(4NF), Fifth Normal
Form (5NF).
UNIT-V:
Transaction Concept: Transaction State, ACID properties, Concurrent Executions,
Serializability, Recoverability, Implementation of Isolation, Testing for Serializability, lock
based, time stamp based, optimistic, concurrency protocols, Deadlocks, Failure
Classification, Storage, Recovery and Atomicity, Recovery algorithm.
Introduction to Indexing Techniques: B+ Trees, operations on B+Trees, Hash Based
Indexing:
Text Books:
1) Database Management Systems, 3rd edition, Raghurama Krishnan, Johannes Gehrke,
TMH, 2002 (For Chapters 2, 3, 4)
2) Data base System Concepts, 5thedition, Silberschatz, Korth, Sudarsan, TMH,
2005 (For Chapter 1 and Chapter 5)
Reference Books:
1) Introduction to Data base Systems, CJ Date, 8thedition, Pearson, 2003.
2) Data base Management System Ramez Elmasri, Shamkant B. Navathe, 6thedition,
Pearson, 2010.
3) Database Principles Fundamentals of Design Implementation and Management,
Corlos Coronel, Steven Morris, Peter Robb, 10th edition, Cengage Learning, 2022
1) https://nptel.ac.in/courses/106/105/106105175/
2) https://infyspringboard.onwingspan.com/web/en/app/toc/lex_auth_0127580666728202
2456_shared/overview
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 1 3 3
CO3 3 3 3 2 2 0 0 0 0 1 0 1 2 2
CO4 3 3 3 3 2 0 0 0 0 1 0 1 2 2
CO5 3 2 3 3 2 0 0 0 0 1 0 1 3 3
Avg 3.0 2.4 2.8 2.4 2.0 0 0 0 0 1.0 0 1.0 2.4 2.4
Dr G. Jaya Suma Dr K. Venkata Rao Dr CH Ramesh
University Nominee Subject Expert Subject Expert
COMPUTER NETWORKS
Course Objectives:
The main objectives of the courses to
Course Outcomes:
After completion of the course, students will be able to
CO1: Identify software and hardware components of a computer network. (L2)
CO2: Explain the functionality of each layer in a computer network. (L2)
CO3: Identify and analyze flow control, congestion control, and routing issues. (L4)
CO4: Analyze and interpret the effectiveness of routing protocols. (L4)
CO5: Choose appropriate transport protocols based on application requirements. (L4)
UNIT-I:
Introduction: Types of Computer Networks, Broadband Access Networks, Mobile and
Wireless Access Networks, Content Provider Networks, Transit networks, Enterprise
Networks, Network technology from local to global, Personal Area Networks, Local Area
Networks, Home Networks, Metropolitan Area Networks, Wide Area Networks,
Internetworks, Network Protocols, Design Goals, Protocol Layering, Connections and
Reliability, Service Primitives, The Relationship of Services to Protocols ,Reference Models,
The OSI Reference Model, The TCP/IP Reference Model, A Critique of the OSI Model and
Protocols, A Critique of the TCP/IP Reference Model and Protocols.
UNIT-II:
The Data Link Layer: Guided Transmission Media, Persistent Storage, Twisted Pairs,
Coaxial Cable, Power Lines, Fiber Optics, Data Link Layer Design Issues, Services Provided
To The Network Layer, Framing Error Control, Flow Control, Error Detection And
Correction, Error-Correcting Codes, Error-Detecting Codes, Elementary Data Link
Protocols, Initial Simplifying Assumptions Basic Transmission And Receipt, Simplex
Link-Layer Protocols, Improving Efficiency, Bidirectional Transmission, Multiple
Frames In Flight, Examples Of Full-Duplex, Sliding Window Protocols, The Channel
Allocation Problem, Static Channel Allocation, Assumptions For Dynamic Channel
Allocation, Multiple Access Protocols, Aloha, Carrier Sense Multiple Access Protocols,
Collision-Free Protocols, Limited Contention Protocols, Wireless LAN Protocols,
Ethernet, Classic Ethernet Physical Layer, Classic Ethernet Mac Sub layer Protocol,
Ethernet Performance, Switched Ethernet, Fast Ethernet, Giga bit Ethernet, 10-
Gigabit Ethernet, 40-And100-Gigabit Ethernet, Retrospective On Ethernet.
UNIT-III:
The Network Layer: Network Layer Design Issues, Store-And-Forward Packet Switching,
Services Provided To The Transport Layer, Implementation Of Connectionless Service,
Implementation Of Connection-Oriented Service, Comparison Of Virtual-Circuit And
Datagram Networks, Routing Algorithms In A Single Network, The Optimality Principle,
Shortest Path Algorithm, Flooding, Distance Vector Routing, Link State Routing,
Hierarchical Routing Within a Network, Broadcast Routing, Multicast Routing, Anycast
Routing, Traffic Management at The Network Layer, The Need for Traffic Management:
Congestion, Approaches To Traffic Management, Internetworking, Internetworks: An
Overview, How Networks differ, Connecting Heterogeneous Networks, Connecting
Endpoints Across Heterogeneous Networks, Internetwork Routing: Routing Across Multiple
Networks Supporting Different Packet Sizes: Packet Fragmentation, The Network Layer In
The Internet, The IP Version 4 Protocol, IP Addresses, IP Version 6, Internet Control
Protocols, Label Switching and MPLS, OSPF—An Interior Gateway Routing Protocol,
BGP—The Exterior Gateway Routing Protocol, Internet Multicasting.
UNIT-IV:
The Transport Layer: The Transport Service, Services Provided To The Upper Layers,
Transport Service Primitives, Berkeley Sockets, An Example Of Socket Programming: An
Internet File Server, Elements Of Transport Protocols, Addressing, Connection
Establishment, Connection Release, Error Control And Flow Control, Multiplexing, Crash
Recovery, Congestion Control, Desirable Bandwidth Allocation, Regulating The Sending
Rate, Wireless Issues, The Internet Transport Protocols: UDP, Introduction To UDP, Remote
Procedure Call, Real-Time Transport Protocols, The Internet Transport Protocols: TCP,
Introduction To TCP, The TCP Service Model, The TCP Protocol, The TCP SegmentHeader,
TCP Connection Establishment, TCP Connection Release.
UNIT-V:
The Application Layer: Electronic Mail, Architecture and Services, The User Agent,
Message Formats, Message Transfer, Final Delivery, The World Wide Web, Architectural
Overview, Static Web Objects, Dynamic Web Pages and Web Applications, HTTP and
HTTPS, Web Privacy, Content Delivery, Content and Internet Traffic, Server Farms and Web
Proxies, Content Delivery Networks, Peer-To-Peer Networks, Evolution of The Internet.
Text Books:
Reference Books:
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 1 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO5 2 2 3 3 3 0 0 0 0 1 0 1 3 3
Avg 2.8 2.4 2.8 2.6 2.2 0 0 0 0 1.0 0 1.0 2.6 2.6
Course Outcomes:
CO1: Understand the working of wired and wireless networks. (L2)
CO2: Develop scripts to simulate wired and wireless networks. (L3)
CO3: Analyze data traffic using network analysis tools. (L4)
CO4: Develop Java programs and utilize networking commands proficiently for client-server
communication and network troubleshooting. (L3)
List of Activities/ Experiments:
1. Study different types of Network cables (Copper and Fiber) and prepare cables
(Straight and Cross) to connect Two or more systems. Use crimping tool to connect
jacks. Use LAN tester to connect the cables. - Install and configure Network Devices:
HUB, Switch and Routers. Consider both manageable and non-manageable switches.
Do the logical configuration of the system. Set the bandwidth of different ports. -
Install and Configure Wired and Wireless NIC and transfer files between systems in
Wired LAN and Wireless LAN. Consider both adhoc and infrastructure mode of
operation.
2. Work with the commands Ping, Tracert, Ipconfig, pathing, telnet, ftp, getmac, ARP,
Hostname, Nbtstat, netdiag, and Ns lookup
3. Find all the IP addresses on your network. Unicast, Multicast, and Broadcast on your
network.
4. Use Packet tracer software to build network topology and configure using Distance
vector routing protocol.
5. Use Packet tracer software to build network topology and configure using Link State
routing protocol.
6. Using JAVARMI Write a program to implement Basic Calculator.
7. Implement a Chatting application using JAVA TCP and UDP sockets.
8. Hello command is used to know whether the machine at the other end is working or
not. Echo command issued to measure the round-trip time to neighbor. Implement
Hello and Echo commands using JAVA.
9. Using Wireshark perform the following operations:
- Inspect HTTP Traffic
- Inspect HTTP Traffic from a Given IP Address,
- Inspect HTTP Traffic to a Given IP Address,
- Reject Packets to Given IP Address,
- Monitor Apache and My SQL Network Traffic.
10. Install Network Simulator 2/3.Create a wired network using dumb bell topology.
Attach agents, generate both FTP and CBR traffic, and transmit the traffic. Vary the data rates
and evaluate the performance using metrics throughput, delay, jitter and packet loss.
11. Create a static wireless network. Attach agents, generate both FTP and CBR traffic,
and transmit the traffic. Varythedatarates and evaluate the performance using metric
throughput, delay, jitter and packet loss.
12. Create a mobile wireless network. Attach agents, generate both FTP and CBR traffic,
and transmit the traffic. Varythedatarates and evaluate the performance using metric
throughput, delay, jitter and packet loss.
Reference Books:
1. A Lab-Based Approach‖, Shivendra S.Panwar, Shiwen Mao, Jeong- dong Ryoo, and
YihanLi, ―TCP/IP Essentials: Cambridge University Press, 2004.
2. Cisco Networking Academy Program, Cisco Networking Academy, ―CCNA1 and
CCNA2 Companion Guide‖, 3rd edition, 2003.
3. ―Java Network Programming‖, Elloitte Rusty Harold, 3rd edition, O‘REILLY, 2011.
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 0 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 0 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 0 3 3
CO4 2 2 3 3 3 0 0 0 0 1 0 0 3 3
Avg 2.8 2.25 2.75 2.5 2.25 0.0 0.0 0.0 0.0 1.0 0.0 0.0 2.5 2.5
Course Outcomes:
After completion of the course, students will be able to
CO1: Utilize DDL, DML, and DCL commands effectively within a database environment. (L3)
CO2: Construct and execute queries and develop application programs using PL/SQL. (L3)
CO3: Analyze requirements and design Procedures, Functions, Cursors, and Triggers to automate tasks
and optimize database functionality. (L4)
CO4: Establish database connectivity using JDBC (Java Database Connectivity). (L3)
Sample Experiments:
1. Creation, altering and dropping of tables and inserting rows into a table (use
constraints while creating tables) examples using SELECT command.
2. Queries (along with sub Queries) using ANY, ALL, IN, EXISTS, NOTEXISTS,
UNION, INTERSET, Constraints. Example: - Select the roll number and name of the
student who secured fourth rank in the class.
3. Queries using Aggregate functions (COUNT, SUM, AVG, MAX and MIN), GROUP
BY, HAVING and Creation and dropping of Views.
4. Queries using Conversion functions (tochar, to number and to date), string functions
(Concatenation, lpad, rpad, ltrim, rtrim, lower, upper, initcap, length, sub strand instr),
date functions (Sysdate, next_day, add months, last day, months between, least, greatest,
trunc, round, to_char, to date)
5.
i. Create a simple PL/SQL program which includes declaration section,
executable section and exception–Handling section (Ex. Student marks can be
selected from the table and printed for those who secured first class and an
exception can be raised if no records were found)
ii. Insert data into student table and use COMMIT, ROLLBACK and
SAVEPOINT in PL/SQL block.
6. Develop a program that includes the features NESTED IF, CASE and CASE
expression. The program can be extended using the NULLIF and COALESCE
functions.
7. Program development using WHILE LOOPS, numeric FOR LOOPS, nested loops
using ERROR Handling, BUILT –IN Exceptions, USE defined Exceptions, RAISE-
APPLICATION ERROR.
8. Programs development using creation of procedures, passing parameters IN and OUT
of PROCEDURES.
9. Program development using creation of stored functions, invoke functions in SQL
Statements and write complex functions.
10. Develop programs using features parameters in a CURSOR, FOR UPDATE
CURSOR, WHERE CURRENT of clause and CURSOR variables.
11. Develop Programs using BEFORE and AFTER Triggers, Row and Statement
Triggers and INSTEAD OF Triggers
12. Create a table and perform this arch operation on table using indexing and non-
indexing techniques.
13. Write a Java program that connect sto a data base using JDBC
14. Write a Java program to connect to a data base using JDBC and insert values into it
15. Write a Java program to connect to a data base using JDBC and delete values from it
Reference Books:
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 3 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 1 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 2 2 3 3 3 0 0 0 0 1 0 1 3 3
Avg 2.8 2.2 3.0 2.5 2.2 0.0 0.0 0.0 0.0 1.0 0.0 1.0 2.5 2.5
Dr G. Jaya Suma Dr K. Venkata Rao Dr CH Ramesh
University Nominee Subject Expert Subject Expert
Course Objectives:
Sample Experiments:
4. Selector forms
a. Write a program to apply different types of selector forms
i. Simple selector (element, id, class, group, universal)
ii. Combinatory selector (descendant, child, adjacent sibling, general sibling) iii.
Pseudo-class selector
iv. Pseudo-element selector
v. Attribute selector
5. CSS with Color, Back ground, Font, Text and CSS Box Model
a. Write a program to demonstrate the various ways you can reference a color in CSS.
b. Write a CSS rule that places a back ground image half way down the page, tiltingit
horizontally. The image should remain in place when the user scrolls up or down.
c. Write a program using the following terms related to CSS font and text:
i. font-size ii. font-weight iii. font-style
iv. text-decoration v. text-transformation VI. Text-alignment
d. Write a program, to explain the import acne of CSS Box model using
i. Content ii. Border iii. Margin iv. padding
Text Books:
1. John Dean, Web Programming with HTML5, CSS and Java Script, Jones & Bartlett
Learning, 2019.
Reference Books:
1. Programming the World Wide Web, Robet W Sebesta,7th Edition, Pearson, 2013.
2. Pro MERN Stack: Full Stack Web App Development with Mongo, Express, React,
and Node, Vasan Subramanian, 2nd edition, A Press, O‘Reilly, 2015.
Online Learning Resources:
https://www.w3schools.com/htmlhttps://www.w3schools.com/
csshttps://www.w3schools.com/js/https://www.w3schools.com
/nodejshttps://www.w3schools.com/typescript
Course Program
Outcomes Specific
Program Outcomes(POs)
(COs) Outcomes
(PSOs)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 0 0 0 0 1 0 1 2 2
CO2 3 2 3 2 2 0 0 0 0 1 0 1 2 2
CO3 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO4 3 3 3 3 2 0 0 0 0 1 0 1 3 3
CO5 2 2 3 3 3 0 0 0 0 1 0 1 3 3
Avg 2.8 2.4 2.8 2.6 2.2 0 0 0 0 1.0 0 1.0 2.6 2.6