rajagiri school of engineering & technology · rajagiri school of engineering & technology...

90
RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Upload: others

Post on 26-Oct-2019

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

RAJAGIRI SCHOOL OF ENGINEERING

& TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY

M.Tech – NETWORK ENGINEERING

CURRICULUM BOOK (KTU)

Page 2: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Vision & Mission of the Institute

Vision: To evolve into a premier technological and research institution, moulding eminent

professionals with creative minds, innovative ideas and sound practical skill, and to

shape a future where technology works for the enrichment of mankind.

Mission: To impart state-of-the-art knowledge to individuals in various technological

disciplines and to inculcate in them a high degree of social consciousness and human

values, thereby enabling them to face the challenges of life with courage and conviction.

Vision & Mission of the Department

Vision: To evolve into a department of excellence in information technology by the creation

and exchange of knowledge through leading edge research, innovation and services,

which will in turn contribute towards solving complex societal problems and thus

building a peaceful and prosperous mankind.

Mission: To impart high quality technical education, research training, professionalism and

strong ethical values in the young minds for ensuring their productive careers in

industry and academia so as to work with a commitment to the betterment of mankind.

Page 3: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

1

KERALA TECHNOLOGICAL UNIVERSITY

CET Campus, Thiruvananthapuram, Kerala -695 016

ORDINANCE

For

Master of Technology - M.Tech.

In exercise of the Powers conferred under Clause 44 of the Ordinance, the Executive Committee of the University hereby promulgate the Ordinance for the University for the Academic Year 2015-2016.

The Academic ordinance will come into effect from the date of publication in the Gazette.

INDEX

01 Admission to the M. Tech. Programme

02 Duration of the Programme

03 Post Graduate Programme Clusters

04 Specialization Streams in M.Tech., Programme

05 M.Tech., Programme Structure

06 Course Registration and Enrolment

07 Recommended Credit distribution over the semesters

08 Academic Assessment/Evaluation

09 Course Completion and earning of credits

10 End Semester and Supplementary Examinations

11 Conduct of End Semester Examination

12 Award of M.Tech., Degree

13 Amendments to Ordinance

14 Miscellaneous provisions

i) Stream of Specializaion

ii) Language of Instruction

iii) Academic Calendar

iv) Eligibility to continue with the programme

v) Seminar

vi) Project work

vii) Faculty Advisor, Class Committee

viii) Award of Grades

ix) Grades and Grade Points

x) Academic Auditing

Page 4: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

2

xi) Revaluation and Grade Improvement

xii) Grade Cards

xiii) Academic Discipline and Malpractices in Examinations

xiv) Student’s Welfare Committee

xv) Grievances and Appeals Committee

xvi) Attendance

xvii) Leave of Absence

xviii) Project Evaluation

xix) Project Work outside the College

Ragging

Calculation of SGPA/CGPA

O-1 Admission to the M. Tech. Programme

Candidates who have been awarded or qualified for the award of the Bachelor’s degree

in Engineering / Technology, from an Institution approved by AICTE are eligible for

admission to the M. Tech., Programme. Eligibility of candidates having MCA/MSc

qualifications will be decided from time to time by following the guidelines issued by All

India Council for Technical Education (AICTE) and the Government of Kerala and notified

separately. Other important eligibility criteria are as listed out by the Director of

Technical Education with the approval of the Government of Kerala.

O-1.1 Candidates qualified in Graduate Aptitude Test in Engineering (GATE ) and

admitted to the M. Tech. programme are eligible to receive Half Time Teaching

Assistantship ( HTTA) as per the rules of the All India Council for Technical

Education (AICTE)/Ministry of Human Resource Development (MHRD).

O-1.2 Sponsored candidates from Industries, R&D organizations, National Laboratories

as well as Educational Institutions, with a bachelor’s degree in engineering

are eligible for admission to the M. Tech. programme.

O-1.3 Foreign nationals whose applications are received through Indian Council

of Cultural Relations, Government of India are also eligible for admission to the M.

Tech. programme.

O-1.4 Announcements for M. Tech. Programmes will be made by the DTE, Government

of Kerala.

O-1.5 Selection of candidates for the M. Tech programme will be done centrally or

monitored by the Directorate of Technical Education as per the guidelines given

on this by the Government of Kerala

Page 5: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

3

O-1.6 The number of candidates to be admitted to each M. Tech stream will be as per

the approval of the University which shall be based on decision on this given by

the All India Council for Technical Education.

O-1.7 Admission will be complete only on meeting all the other requirements

mentioned in the letter of admission and on payment of the fees.

O-1.8 Candidates who have the Associate Membership of Professional Bodies that are

approved by the University and have qualified in GATE shall also be eligible for

admission to the M. Tech. programme.

O-1.9 The reservation policy of the Government of Kerala and the Government of India

shall be followed in admission to the M. Tech. programme.

O-1.10 All admission will be governed by the procedure laid down for this by the Director

of Technical Education, Kerala and the Government of Kerala.

O-1.11 Notwithstanding all that is stated above, the admission policy may be modified

from time to time by the University, particularly to confirm to directions from the

Government of Kerala and the Government of India.

O-2 Duration of the Programme

The normal duration of the M. Tech programme, including the project work, shall be four

semesters.

O-3 Post Graduate Programme Clusters

The University shall identify clusters of colleges offering M. Tech programmes in different streams and allow them to formulate procedures for the smooth conduct of all academic activities associated with the M. Tech programme, in line with the ordinances/regulations of the University. These clusters shall have academic autonomy, regulated by a Cluster level Graduate Committee [CGPC] consisting of all the principals of the colleges in the cluster. The Chairman of CGPC shall be an eminent academician nominated by the Vice Chancellor. The CGPC will be responsible for all academic matters including the curriculum, syllabi, course plans, internal evaluations, end semester examinations, and grading for all streams of M. Tech. programme offered by the colleges in the cluster. The CGPC can formulate additional rules for other academic aspects that are not covered

by this Ordinance.

O-4 Specialization Streams in M. Tech., Programme

The M. Tech. programme streams offered by each cluster as well as the eligibility of

candidates of different B. Tech. branches or having other qualifications, for each of them

shall be approved by the CGPC.

O-5 M. Tech. Programme Structure

Page 6: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

4

i) The M. Tech programme in all streams of specialization will be structured on a

credit based system following the semester pattern with continuous evaluation.

ii) The University permits regular as well as external registration (part time) for those

in employment.

iii) The duration for the M. Tech. programme in all streams of specialization will

normally be 4 semesters. The maximum duration is 6 semesters.

iv) For students admitted on external registration, the normal duration will be 6

semesters. Here the maximum duration is 7 semesters.

v) The University permits a regular student to change over to external registration

during

the programme, under specific circumstances like initiating a start up venture or

to take up a job.

vi) Each semester shall have a minimum of 72 instruction days followed by the end

semester examination.

vii) A common course structure for the M. Tech programmes in all streams of

specialization is to be followed and consists of the following.

Core Courses

Elective Courses

Laboratory Courses

Seminar

Project

viii) Every stream of specialisation in the M. Tech. programme will have a curriculum

and syllabi for the courses. The curriculum should be so drawn up that the

minimum number of credits for successful completion of the M. Tech. programme

in any stream of specialization is not less than 64 and not more than 68.

Ix) Credits are assigned as follows, for one semester

1 credit for each lecture hour per week

1 credit for each tutorial hour per week

1 credit for each laboratory/ practical of 2 or 3 hours per week

2 credits for the seminar

2 credits for Mini Project

6 credits for Project in the 3rd Semester

12 credits for Project in the 4th Semester

x) A pass is mandatory in all core courses. In case of failure in an elective course,

there is the provision to choose another elective listed in the curriculum.

Page 7: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

5

xi) On their request, CGPC shall examine the academic records and permit

candidates with B. Tech (Honours) who have earned credits for any relevant

graduate level courses to transfer credits towards the M. Tech. programme.

Candidates who received B. Tech (Honours) degree just prior to their M. Tech

admission are permitted to transfer up to 9 credits. For those who received the B.

Tech (Honours) degree within three years prior to their M. Tech. admission are

permitted to transfer up to 6 credits.

Xii) The maximum number of lecture based courses and laboratory courses in any

semester shall not exceed 5 and 2 respectively. The maximum credits in a

semester shall be 23.

Xiii) Extension of Programme duration

The normal duration of the programme shall be four semesters.

In case of prolonged illness or other personal exigencies, the university may allow

a student who has earned credits for at least one semester, to extend the

programme up to the maximum duration of six semesters.

Students who have earned credits for the courses listed in the first two semesters

are permitted to transfer their registration as external candidates if they take up a

job. However, they have to complete the programme within six semesters.

O-6. Course Registration and Enrolment

All students have to register for the courses they desire to attend in a semester. Students

admitted to the first semester are advised to register for all courses offered in the first

semester. They do not have to enrol for the semester. All other students are required to

register at the end of the semester for the courses they desire to take in the next

semester. Later they have to enrol for these courses in the new semester based on the

results in the previous semester. This allows them to make minor changes in the list of

courses already registered for. Before enrolment, students should clear all dues including

any fees to be paid and should not have any disciplinary proceedings pending. The dates

for registration and enrolment will be given in the academic calendar. Any late

registration or enrolment, allowed only up to 7 working days from the commencement of

the semester, will attract a late fee.

A student can drop a course or substitute one already registered for by another, for valid

reasons with the approval of the faculty advisor. However this has to be done within 7

working days from the commencement of the semester.

The maximum number of credits a student can register for in a semester is limited to 24.

O-7 Recommended Credit distribution over the semesters

First Semester : 20 to 23 credits Second Semester : 18 to 19 credits Third Semester : 14 credits

Page 8: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

6

Fourth Semester : 12 credits [Project]

O-8. Academic Assessment/Evaluation

The University follows a continuous academic evaluation procedure.

The Assessment procedure and corresponding weights recommended are as

follows:-

For theory courses

i) Two internal tests, each having 15%

ii) Tutorials/Assignments/ Mini projects having 10%

iii) End Semester examination having 60%

All the above are mandatory requirements to earn credits.

Students who have missed either the first or the second test can register with the

consent of the faculty member and the Head of the Department concerned for a

re-test which shall be conducted soon after the completion of the second test and

before the end semester examination. The re-test will cover both the first and the

second test course plans. If a student misses both the scheduled tests, there is no

provision for any retests and zero marks will be given for each test. In case of

serious illness and where the attendance is above 70% the Principal may permit

the conduct of the tests for a student based on his application and other relevant

medical reports. Such cases are to be reported to CGPC.

For Laboratory /Practical courses

i) Practical Records /outputs 40%

ii) Regular Class Viva-Voce 20%

iii) Final Test (Objective) 40%

O-9. Course Completion and earning of credits

Students registered and later enrolled for a course have to attend the course regularly

and meet the attendance rules of the University and appear for all internal evaluation

procedures for the completion of the course. However, earning of credits is only on

completion of the end semester/supplementary examination and on getting a pass

grade. Students, who had completed a course but could not write the end

semester/supplementary examination for genuine health reasons or personal exigencies,

if otherwise eligible are permitted to write the semester examination, at the next

opportunity and earn credits without undergoing the course again. Failed candidates

having more than 45% marks in their internals can also avail of this option. However,

those who are not eligible to appear for the end semester examination have to register

and undergo the course again, whenever it is offered, to earn the credits.

O-10. End Semester and Supplementary Examinations

At the end of the semester, the end semester examination will be conducted in all

courses offered in the semester and will be of three hours duration unless otherwise

specified. Supplementary examinations are to be conducted for eligible candidates

registered for them, before the commencement of the next semester.

O-10.1 Eligibility to write the End Semester Examination and Grading

Page 9: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

7

Eligibility criteria to appear for the semester examination are the attendance

requirements in the course, 45% or more marks in the internal evaluation and

having no pending disciplinary action. The minimum attendance for appearing for

the semester examination is 85% in the course. In case of serious illness there is a

relaxation for attendance [O-14.xvi]. Those who do not meet the eligibility criteria

shall be awarded an FE Grade and have to register again for the course.

A student should have a minimum of 45% marks in the end semester examination

to be eligible for grading in a course. Otherwise he/she will be considered to have

failed in the course and an F grade will be awarded.

O-10.2 Eligibility to write the Supplementary Examination

Only failed students and those who could not write the semester examination due

to health reasons or other personal exigencies that are approved by the Principal

can register for the supplementary examination provided they meet the eligibility

requirements given in O-10.1. Grades awarded in the supplementary

examination will be taken as the semester grades in these courses.

O-11. Conduct of End Semester Examination

The Clusters will prepare the question papers, conduct the end semester examinations,

organize the valuation of the answer scripts, finalise the results and submit it to the

University, as per the academic calendar.

O-12. Award of M. Tech., Degree

The award of the M. Tech. Degree shall be in accordance with the Ordinances and

Procedures given by the University.

A student will be eligible for the award of M. Tech. Degree of the University on

meeting the following requirements;

i) Registered and earned the minimum credits, as prescribed in the

curriculum, for the stream of specialization.

ii) No pending disciplinary action.

O-13. Amendments to Ordinance:

Notwithstanding all that has been stated above, the University has the right to modify any of the above provisions of the ordinance from time to time.

O- 14. Miscellaneous provisions:

i) Stream of Specialization:

The streams of specializations are to be in line with the approval given on this by

the All India Council for Technical Education.

Page 10: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

8

ii) Language of Instruction

Unless otherwise stated, the language of instruction shall be English.

iii) Academic Calendar

The University shall publish in its website the academic calendar for every academic semester indicating the date of commencement of the semester as well as instruction. It will specify the course registration and enrolment dates, the schedule for mandatory internal tests for theory courses, dates by which laboratory/practical evaluations are to be completed, date for finalization of internal marks, last instruction day in the semester, planned schedule of end semester examinations and result declaration as well as approved holidays falling within the semester. Schedules for the supplementary examinations and result declaration dates are to be included in the calendar. Additionally colleges may publish their academic calendar, in line with the University academic calendar, indicating other schedules and events they plan to conduct during the semester.

Iv) Eligibility to continue with the programme

A student has to earn a minimum number of credits in a semester to register for

higher semester courses. This should be at least 2/3rd of the credits for the

courses listed in for the semester. CGPC shall formulate the rules based on this

and spell out the procedure to proceed with the programme.

Failed students who have more than 45% marks in the internal course evaluation

are permitted to write the semester examination without registering and

undergoing the course. Those with less than 45% in internal course evaluation

have to register again for the course, attend the classes and earn the credits.

v) Seminar

Students have to register for the seminar and select a topic in consultation with

any faculty member offering courses for the programme. A detailed write-up on

the topic of the seminar is to be prepared in the prescribed format given by the

Department. The seminar shall be of 30 minutes duration and a committee with

the Head of the department as the chairman and two faculty members from the

department as members shall evaluate the seminar based on the report and

coverage of the topic, presentation and ability to answer the questions put

forward by the committee.

Suggested evaluation procedure:-

Faculty member in charge of the seminar and another faculty member in the

department nominated by the Head of the Department are the evaluators for the

seminar. Distribution of marks for the seminar is as follows.

Marks for the report: 30%

Presentation: 40%

Ability to answer questions on the topic: 30%

Page 11: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

9

vi) Project work

Project work is spread over the third and fourth semesters. Project work is to be

evaluated both in the third and the fourth semesters. Based on these evaluations

the grade is finalised only in the fourth semester.

Project evaluation weights shall be as follows:- For convenience the marks are allotted as follows.

Total marks for the Project: 150

In the 3rd Semester:- Marks:50 Project Progress evaluation details:

Progress evaluation by the Project Supervisor : 20 Marks Presentation and evaluation by the committee : 30 Marks

In the 4th Semester:- Mraks:100

Project evaluation by the supervisor/s : 30 Marks Presentation & evaluation by the Committee : 40 Marks Evaluation by the External expert : 30 Marks

vii) Faculty Advisor, Class Committee

a) Faculty Advisor

The Head of the Department offering the M. Tech. programme shall nominate

senior faculty members as faculty advisors who shall advise the students in

academic matters and support them in their studies. Their role is to help the

students in academics and personal difficulties related to studies. A faculty

advisor may support a group of students in a semester.

b) Class Committees are to be in place for all M. Tech. programs in the college.

Class Committee

All M. Tech streams of specialization will have class committees for each

semester, constituted by the respective Heads of Departments.

The Chairman of the committee shall be a senior faculty member who does not

offer any course for that stream in that semester.

Members:-

i) All faculty members teaching courses for the stream in that semester.

ii) Two student representatives nominated by the Head of the Department,

from the stream.

Class committees shall meet at least thrice in a semester - one in the beginning

and one around the middle of the semester and one at least two weeks before

the semester examinations. These committees should monitor the conduct of the

courses, adherence to the course plan and time schedule, completion of the

Page 12: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

10

syllabus, standards of internal tests and evaluation process and address the

difficulties faced by the students and take suitable remedial actions at the

appropriate time. Before the end semester examination, the committee should

meet without the student representatives and finalise the internal marks. A

report on the student performance in each course should be prepared and

submitted to the CGPC by the colleges.

viii) Award of Grades

Grading is based on the marks obtained by the student in a course. [O-14 ix]

The grade card will only show the grades against the courses the student has

registered.

The semester grade card will show the grade for each registered course, Semester

Grade Point Average (SGPA) for the semester as well as Cumulative Grade Point

Average (CGPA).

ix) Grades and Grade Points

Grades and Grade Points as per UGC guidelines are to be followed by the

University

Grades Grade Point % of Total Marks obtained in the course

O 10 90% and above

A+ 9 85% and above but less than 90%

A 8 80% and above but less than 85%

B+ 7 70% and above but less than 80%

B 6 60% and above but less than 70%

C 5 50% and above but less than 60%

P 4 45% and above but less than 50%

F 0 Less than 45%

FE 0 Failed due to eligibility criteria [O.10.1]

I Course Incomplete

Grade Point Average (GPA) and Cumulative Grade Point Average (CGPA) are

calculated based on the above grading norms and are explained at the end of this

document.

x) Academic Auditing

The University shall have a detailed academic auditing procedure in place

comprising of an internal academic auditing cell within the college and an external

academic auditing for each college. The internal academic auditing cell in each

college shall oversee and monitor all academic activities including all internal

evaluations and semester examinations. This cell is to prepare academic audit

statements for each semester at regular intervals of four weeks of instruction.

These reports are to be presented to the external academic auditor appointed by

Page 13: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

11

the University, who will use it as a reference for his independent auditing and for

the final report to the University.

Academic auditing will cover:-

i) Course delivery covering syllabus, adherence to course plan, quality of

question papers for internal examinations, internal evaluation, laboratory

experiments, practical assignments, mini projects, conduct of practical

classes and their evaluation. Semester examination and academic

performance of the students.

ii) Co-curricular and Extra-curricular activities available for students, and

their organization.

iii) Academic functioning of the college encompassing students, faculty and

college administration covering punctuality, attendance, discipline,

academic environment, academic accountability, academic achievements

and benchmarking.

xi) Revaluation and Grade improvement

There is no provision for revaluation of the semester answer books or for improving the grade.

` Students are permitted to check the answer books of the semester examination,

after the results are declared. Any discrepancies in evaluation could be brought to the notice of the teacher concerned who will initiate appropriate action on this and report to the CGPC for a final decision on this.

xii) Grade Cards

Students who have written the semester examination will be given the grade cards for the registered courses, in every semester by the respective colleges. On earning the required credits for the degree, a consolidated grade sheet for the M. Tech programme will be issued by the University on the recommendation of the respective CGPC. The M. Tech. degree will not have any classification like distinction or first class.

xiii) Academic Discipline and Malpractices in Examinations

Every student is required to observe discipline and decorous behaviour.

Any act of indiscipline, misbehaviour and unfair practice in examinations will be

referred to the Disciplinary Action Committee (DAC). Malpractices in

examinations shall be viewed seriously and any such incident observed or

reported by a faculty member or an invigilator associated with the examinations

shall be reported to the Principle who in turn shall refer it to DAC. On the basis of

the report and evidence available or gathered, DAC shall immediately initiate an

enquiry giving the concerned student a chance to explain his/her case. Based on

this the committee shall recommend the course of action in line with the

guidelines formulated for this by the Controller of Examination of the University

and forward it to the Principal for action.

Page 14: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

12

Actions are to be based on the severity of the offence and are to be dealt with, on a course basis. Guidelines on this shall be given by the Controller of Examination which is to be followed by the Disciplinary Action Committee of the college. DAC shall be headed by a department head and shall have three other faculty

members drawn from different departments as members. In case of malpractices

in end semester examinations, the report given by the college DAC and the action

taken by the Principal shall be intimated to the Controller of Examination of the

University

xiv) Student’s Welfare Committee

Every college shall have a Student’s Welfare Committee, constituted by the

Principal of the college. This committee shall have at least three faculty members

as members and the chairman shall be a senior faculty member in the rank of a

Professor. This committee is entrusted with the task of looking after the welfare

of the students by taking appropriate steps with the concurrence of the principal.

xv) Grievances and Appeals Committee

Each college should have a Grievances Redress Committee constituted by the

Principal to address the grievances of the students and to consider their appeals

on any decisions made by the college. This committee consisting of at least three

faculty members and chaired by a senior professor shall look into student’s

grievances and appeals and give its recommendations to the Principal for action.

xvi) Attendance

Attendance is marked for each course. 85% attendance is mandatory for writing

the semester examination in a course. Students who get Part Time Teaching

Assistantship (PTTA) or Scholarships from the Central or State Governments or

any other agencies are expected to have 100 % attendance. However, under

unavoidable circumstances students are permitted to take leave. Leave is

normally sanctioned for any approved activity taken up by students outside the

college covering sports and other extra-curricular activities. Leave is also

permitted on medical grounds or on personal exigencies. Leave of absence for all

these is limited to 15 % of the academic contact hours for the course.

In case of long illness or major personal tragedies/exigencies the Principal can

relax the minimum attendance requirement to 70%, to write the semester

examination. This is permitted for one or more courses registered in the

semester. The Principal shall keep all records which led to his decision on

attendance, for verification by the Academic Auditor. However this concession is

applicable only to any one semester during the entire programme. In case of

prolonged illness, break of study is permitted up to two semesters which could

extend the programme up to six semesters, the maximum permitted by the

regulations.

Page 15: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

13

xvii) Leave of Absence

Students who desire to take leave have to apply for it to the teacher conducting

the course. This application together with any supporting documents like doctor’s

certificate or other relevant information is to be forwarded to the Head of the

Department with the recommendation of the teacher indicating the total leave of

absence the student has so far availed. Approval for leave is to be given by the

head of the department. After any prolonged medical leave, normally exceeding

five instruction days, on rejoining, the student has to produce the fitness

certificate given by the doctor.

xviii) Project Evaluation

Normally students are expected to do the project within the college. However

they are permitted to do the project in an industry or in a government research

institute under a qualified supervisor from that organization. Progress of the

project work is to be evaluated at the end of the third semester. For this a

committee headed by the head of the department with two other faculty

members in the area of the project and the project supervisor/s. If the project is

done outside the college, the external supervisor associated with the student shall

also be a member of the committee.

Final evaluation of the project will be taken up only if the student has earned all

course credits listed in the first three semesters. Project evaluation shall be done

by the same committee mentioned above with an external expert, either from an

academic/R&D organization or from Industry, as an additional member. Final

project grading shall take into account the progress evaluation done in the third

semester and the project evaluation in the fourth semester. If the quantum of

work done by the candidate is found to be unsatisfactory, the committee may

extend the duration of the project up to one more semester, giving reasons for

this in writing to the student. Normally further extension will not be granted and

there shall be no provision to register again for the project.

Xix) Project work outside the College

While students are expected to do their projects in their colleges, provision is

available for them to do it outside the college either in an industry or in an

institute of repute. This is only possible in the fourth semester and the topic of

investigation should be in line with the project part planned in the 3rd semester.

Student should apply for this through the project supervisor indicating the reason

for this well in advance, preferably at the beginning of the 3rd semester. The

application for this shall include the following:-

Topic of the Project: Project work plan in the 3rd Semester: Reason for doing the project outside: Institution/Organization where the project is to be done:

Page 16: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

14

External Supervisor – Name: Designation: Qualifications: Experience:

Letter of consent of the External Supervisor as well as from the organization is to be obtained.

This application is to be vetted by the head of the department and based on the

decision taken the student is permitted to do the project outside the college.

Ragging

Ragging of any nature is a criminal and non-bailable offence. Involvement in

ragging shall lead to stringent punishment, including imprisonment as per the law

of the land. A student, whose involvement in ragging is established, shall be

summarily dismissed from the college. Each student of the Institute, along with

his/her parent, is required to give an undertaking in this regard and the same is to

be submitted at the time of registration.

Calculation of SGPA/CGPA

Semester Grade Point Average (SGPA) and Cumulative Grade Point Average

(CGPA) are calculated as follows.

SGPA = Σ(Ci×GPi)/ΣCi where Ci is the credit assigned for a course and GPi is the

grade point for that course. Summation is done for all courses registered by the

student in the semester. Here the failed courses are also accounted.

CGPA = Σ(Ci×GPi)/ΣCi where Ci is the credit assigned for a course and GPi is the

grade point for that course. Summation is done for all courses registered by the

student during all the semesters for which the CGPA is needed. Here the failed

courses are also accounted. CGPA of all courses passed may also be given.

Thiruvanthapuram Registrar 26-6-2015

Page 17: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

KERALA TECHNOLOGICAL UNIVERSITY

ERNAKULAM – I CLUSTER

SCHEME AND SYLLABI FOR

M. Tech. DEGREE PROGRAMME IN

NETWORK ENGINEERING (2015 ADMISSION ONWARDS)

Page 18: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 16

SCHEME AND SYLLABI FOR M. Tech. DEGREE PROGRAMME IN

NETWORK ENGINEERING SEMESTER-1

Exam Slot

Course No Name L-T-P Internal Marks

End Semester Exam

Credits Marks

Duration (hrs)

A 06NE6011 Theoretical Foundation in Computer Networking

4-0-0 40 60 3 4

B 06NE6021 Advanced Computer Networks

4-0-0 40 60 3 4

C 06NE6031 Wireless & Adhoc Networks

4-0-0 40 60 3 4

D 06NE6041 Cloud Computing Concepts

3-0-0 40 60 3 3

E 06NE6X51 Elective I 3-0-0 40 60 3 3 06NE6061 Research methodology* 1-1-0 100 0 0 2 06NE6071 Seminar I 0-0-2 100 0 0 2 06NE6081 Network Systems Lab 0-0-3 100 0 0 1

Total Credits 23

Elective – I

06NE6151 Web and Rich Internet Applications

06NE6251 Internetworking Technologies

06NE6351 Multicore Architecture & Programming

06NE6451 Linux Shell Scripting

Page 19: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 17

SEMESTER-2 dddfgdfgdfgd

Exam Slot

Course No Name L-T-P Internal Marks

End Semester Exam

Credits Marks

Duration (hrs)

A 06NE6012 Design of Computer Networks

4-0-0 40 60 3 4

B 06NE6022 Foundations in Big Data Processing

3-0-0 40 60 3 3

C 06NE6032 Enterprise Devices & Networks

3-0-0 40 60 3 3

D 06NE6X42 Elective II 3-0-0 40 60 3 3 E 06NE6X52 Elective III 3-0-0 40 60 3 3 06NE6062 Mini Project 0-0-4 100 0 0 2 06NE6072 Network Simulation Lab 0-0-3 100 0 0 1

Credits 19

Elective – II Elective – III

06NE6142 Modern Concurrent Programming Paradigm

06NE6152 Cyber Physical Systems

06NE6242 Distributed Algorithms 06NE6252 Network Security

06NE6342 High Performance Networks 06NE6352 Advances in Storage Area Networks

06NE6442 Internet Routing Design 06NE6452 Next Generation Internetworking Protocol

Page 20: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 18

SEMESTER-III sdf

Exam Slot

Course No Name L-T-P Internal Marks

End Semester Exam

Credits Marks

Duration (hrs)

A 06NE7X11 Elective IV 3-0-0 40 60 3 3 B 06NE7X21 Elective V 3-0-0 40 60 3 3 06NE7031 Seminar II 0-0-2 100 0 0 2 06NE7041 Project(Phase 1) 0-0-8 50 0 0 6

Credits 14

Elective – IV Elective – V

06NE7111 Big Data Analytics 06NE7121 Software Defined Networking

06NE7211 Concurrent Algorithms and Data Structures

06NE7221 Network Forensics

06NE7311 Social Network Analysis 06NE7321 Cloud Security

06NE7411 Intrusion Detection Systems 06NE7421 Green Computing

Page 21: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 19

SEMESTER-IV sdf

Exam Slot

Course No Name L-T-P Internal Marks

End Semester Exam

Credits Marks

Duration (hrs)

06NE7012 Project(Phase 2) 0-0-21 100 0 0 12 Credits 12

Total Credits for all semesters 68

Page 22: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 20

SEMESTER – I

Page 23: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 21

Course No. Course Name L-T-P-

Credits Year

06NE6011 Theoretical Foundation in Computer Networking 4-0-0-4 2015 Prerequisites : Fundamentals of Algorithm Analysis Course Objectives :

Ability to recognize and formulate network flow problems Knowledge of basic and advanced network flow algorithms

Ability to design resolution approaches to solve non-standard network flow problems Syllabus : Fundamentals on Graph Theory, Network flow problems, Shortest Paths, Maximum Flows, Minimum Cost flows, Minimum Spanning Trees Course Outcome : On successful completion of this course

Know and formulate network flow problems Model decision problems as network flow problems Use base and advanced algorithms to solve network flow problems Ability to identify network flow models scope Ability to explain network flows models and algorithms Ability to learn state-of-art algorithms for network flow problems

Text Book : 1. Ravindra K. Ahuja, Thomas L. Magnanti, James B.Orlin, Network Flows – “Theory, Algorithms

and Applications”, Prentice Hall References :

2. Mokhtar S. Bazaraa, John J. Jarvis, Hanif D. Sherali, “Linear Programming And Network Flows”, John Wiley & Sons, 4th Edition,

3. Gunther Ruhe, Kluwer, “Algorithmic Aspects Of Flows In Networks”, Academic Publishers Group

4. Michael W. Lucas, “Network Flow Analysis”, , No Starch Press 5. Alexander Engau, Vdm Verlag Dr. Muller, “Semi-Simultaneous Flows In Multiple Networks”,

Aktiengesellschaft & Co. Kg 6. Wai-kai Che, John Wiley, “Theory Of Nets: Flows In Network”s, 7. Ulrich Derigs, “Programming In Networks And Graphs: On The Combinatorial Background

And Near-Equivalence Of Network Flow And Matching Algorithms”, 8. Ford L. R. Jr. , Robert G. Bland, Fulkerson D. R, “Flows In Networks”, Princeton University

Press. 9. Alexander Hall, Vdm Verlag Dr. Mueller E. K, “Scheduling And Flow-Related Problems In

Networks” 10. Pioro M, Routing, “Flow And Capacity Design In Communication And Computer Networks”,

Elsevier India Private Limited COURSE PLAN

COURSE NO:

06NE6011

COURSE TITLE: Theoretical Foundation in Computer Networking

(L-T-P :4-0-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

1

Fundamentals on Graph Theory- Network flow problems- Network representations- Complexity Analysis- Developing Polynomial time algorithms- Search Algorithms- Flow Decomposition algorithms

12

30%

2 Shortest Paths: Label Setting Algorithms – Dijkstra’s Algorithm- Dial’s implementation- Heap Implementation- Radix Heap Implementation

6

Page 24: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 22

FIRST INTERNAL EXAMINATION

2

Shortest Paths : Label Correcting Algorithms – Generic Label Correcting algorithms- Special implementations of the modified label correcting algorithm- detecting negative cycles- All pairs shortest path problem

6

30%

3

Maximum Flows : Generic Augmenting path algorithm- Labeling algorithm and Max- Flow Min – cut theorem- Capacity Scaling Algorithm- Distance labels and layered networks- Generic pre flow push algorithm- FIFO pre flow push algorithm

8

SECOND INTERNAL EXAMINATION

3

Minimum Cost flows : Optimality conditions- Cycle canceling algorithm and the integrity property- Successive shortest path algorithm- Primal – dual algorithm- Out – of Kilter Algorithm- Capacity scaling algorithm- Cost scaling algorithm

4

40%

4

Minimum Spanning Trees – Kruskal’s algorithm- Prim’s Algorithm- Sollin’s Algorithm- Convex Cost Flows – Pseudo Polynomial time algorithm- polynomial time algorithm Generalized Flows – Augmented forest structures- determining potentials and flows for an augmented forest structure- generalized network simplex algorithm

12

END SEMESTER EXAM

Page 25: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 23

Course No. Course Title L-T-P-

Credits Year

06NE6021 Advanced Computer Networks 4-0-0-4 2015 Prerequisites : Fundamentals of Computer Networks or Computer Networking programs Course Objectives :

To uncover and understand the current directions of computer networks from literature readings.

To encourage a performance perspective towards analysis of computer and communications networks.

To “fill-in” gaps in students’ networking knowledge Syllabus : Internet Protocol : IPv4 , IP Datagram Formats, Routing and Forwarding, Path Vectors and Policies, End-to-End Protocols, Flow Control, Congestion Control, Congestion-Avoidance Mechanisms Course Outcome : On successful completion of this course

Independently understand basic computer network technology. Identify the different types of network topologies and protocols. Enumerate the layers of TCP/IP and explain the function(s) of each layer. Identify the different types of network devices and their functions within a network Understand and building the skills of subnetting and routing mechanisms. Familiarity with the basic protocols of computer networks, and how they can be used to assist

in network design and implementation. Text Book :

1. The Internet and Its Protocols - A Comparative Approach by ADRIAN FARREL, Elsevier 2. Computer Networks – A Systems Approach by Larry L. Peterson and Bruce S. Davie, The

Morgan Kaufmann Series in Networking, Remote Procedure Call, References :

1. Data networks by D.Berteskas and R Gallagar, Printice Hall 2. Design and Analysis of Communication Networks By V Ahuja , McGraw Hill 3. Kerchenbaum A., “Telecommunication Network Design Algorithms”, Tata McGraw Hill 4. James D.McCabe, Network analysis, Architecture and Design, 2nd Edition, Elsevier, 2003. 5. An Engineering approach to computer Networking by S.Keshav, Pearson education 6. Network Algorithms by George Varghese, Morgan Kaufmann

COURSE PLAN

COURSE NO:

06NE6021

COURSE TITLE: Advanced Computer Networks

(L-T-P :4-0-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

1

Internet Protocol : IPv4 - IP Datagram Formats - Data and Fragmentation - Address Masks- Prefixes- and Subnetworks - Network Address Translation (NAT) - IP Switching and Routing - Local Delivery and Loopbacks - Address Resolution Protocol - Route Control and Recording – ICMP - Discovering Routers - Path MTU Discovery – Multicast - IP Version Six.

13

30%

2

Routing and Forwarding – CIDR - Building and Using a Routing Table - Router IDs- Numbered Links- and Unnumbered Links - Distributing Routing Information - Distance Vectors - Link State Routing

5

FIRST INTERNAL EXAMINATION

Page 26: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 24

2

Path Vectors and Policies - Computing Paths– Routing Information Protocol – OSPF - OSPF – Intermediate System to Intermediate System - Border Gateway Protocol - Multicast Routing - Inter-Gateway Routing Protocol - Inter-Domain Routing Protocol

8

30%

3

End-to-End Protocols : Ports and Addresses - User Datagram Protocol - UDP Message Format - Transmission Control Protocol - Segment Format - Connection Establishment and Termination - Flow Control - Triggering Transmission

9

SECOND INTERNAL EXAMINATION

3

Silly Window Syndrome - Nagle’s Algorithm - Adaptive Retransmission - Karn/Partridge Algorithm - Remote Procedure Call – BLAST – CHAN – SELECT – SunRPC- Stream Control Transmission Protocol - Real-time Transport Protocol.

7

40%

4

Congestion Control : Packet-Switched Network - Connectionless Flows - Issues in Resource Allocation - Fair Resource Allocation - Queuing Disciplines – FIFO - Fair Queuing - TCP Congestion Control - Additive Increase/Multiplicative Decrease - Slow Start - Fast Retransmit and Fast Recovery - Congestion-Avoidance Mechanisms – DECbit - Random Early Detection - Source-Based Congestion Avoidance – Tahoe- Reno- and Vegas- QoS Application Requirements - Real-Time Audio - Taxonomy of Real-Time Applications - Approaches to QoS Support.

13

END SEMESTER EXAM

Page 27: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 25

Course No. Course Title L-T-P-

Credits Year

06NE6031 Wireless & Adhoc Networks 4-0-0-4 2015 Prerequisites : Fundamentals of Wireless Network Course Objectives :

To develop an understanding of modern network architectures from a design and performance perspective.

To introduce the student to the major concepts involved in wide-area networks (WANs), local area networks (LANs) and Wireless LANs (WLANs).

To clarify network terminology. Syllabus : Ad hoc Wireless Networks, Routing Protocols for Ad Hoc Wireless Networks, Multicast Routing in Ad hoc Wireless Networks, Transport Layer and Security Protocols, Security in Ad hoc Wireless Networks, Quality of Service and Energy Management in Ad hoc Wireless Networks Course Outcome : On successful completion of this course

Describe the unique issues in ad-hoc/sensor networks. Describe current technology trends for the implementation and deployment of wireless ad-

hoc/sensor networks. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-

hoc/sensor networks. Discuss the challenges in designing routing and transport protocols for wireless

Adhoc/sensor networks. Comprehend the various sensor network Platforms, tools and applications

Text Books : 1. C. Siva Ram Murthy & B. S. Manoj: Ad hoc Wireless Networks, 2nd Edition, Pearson

Education, 2011

Page 28: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 26

References : 1. Imielinski T. and Korth H.F., “Mobile Computing”, Kluwer Academic Publishers, 1996. 2. William Stallings, “Wireless Communications and Networks”, Prentice Hall, 2004. 3. Clint Smith. P.E., and Daniel Collins, “3G Wireless Networks”, 2nd Edition, Tata

McGraw Hill, 2007. 4. Carlos de Morais Cordeiro and Dharma Prakash Agrawal, “Ad Hoc & Sensor Networks:

Theory and Applications”, World Scientific, 2007. 5. Toh C. K., “Ad Hoc Mobile Wireless Networks Protocols and Systems”, Prentice Hall, PTR,

2001. 6. Yi-Bing and Imrich Chlamtac, “Wireless and Mobile Networks Architectures”, John Wiley &

Sons, 2001. 7. Vijay. K. Garg, “Wireless Communication and Networking”, Morgan Kaufmann

Publishers 8. Ian F. Akyildiz and Mehmet Can Vuran, Wirless Sensor Networks, Wiley

COURSE PLAN COURSE

NO: 06NE6031

COURSE TITLE: Wireless & Adhoc Networks (L-T-P : 4-0-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

1

Ad hoc Wireless Networks: Introduction- Issues in Ad hoc Wireless Networks- Ad hoc Wireless Internet; MAC Protocols for Ad hoc Wireless Networks: Introduction- Issues in Designing a MAC Protocol- Design Goals of MAC Protocols- Classification of MAC protocols- Contention-Based Protocols- Contention-Based Protocols with Reservation Mechanisms- Contention-Based Protocols with Scheduling Mechanisms- MAC Protocols that Use Directional Antennas

13

30%

2

Routing Protocols for Ad Hoc Wireless Networks: Introduction- Issues in Designing a Routing Protocol for Ad hoc Wireless Networks; Classification of Routing Protocols; Table Driven Routing Protocols; On- Demand Routing Protocols- Hybrid Routing Protocols- Hierarchical Routing Protocols and Power-Aware Routing Protocols

5

FIRST INTERNAL EXAMINATION

Page 29: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 27

2

Multicast Routing in Ad hoc Wireless Networks: Introduction- Issues in Designing a Multicast Routing Protocol- Operation of Multicast Routing Protocols- An Architecture Reference Model for Multicast Routing Protocols- Classifications of Multicast Routing Protocols- Tree-Based Multicast Routing Protocols and Mesh-Based Multicast Routing Protocols.

8

30%

3

Transport Layer and Security Protocols for Ad hoc Networks: Introduction- Issues in Designing a Transport Layer Protocol; Design Goals of a Transport Layer Protocol; Classification of Transport Layer Solutions; TCP over Transport Layer Solutions; Other Transport Layer Protocols for Ad hoc Networks

9

SECOND INTERNAL EXAMINATION

3 Security in Ad hoc Wireless Networks- Issues and Challenges in Security Provisioning- Network Security Attacks- Key Management and Secure Touting Ad hoc Wireless Networks.

7

40%

4

Quality of Service and Energy Management in Ad hoc Wireless Networks Introduction- Issues and Challenges in Providing QoS in Ad hoc Wireless Networks- Classification of QoS Solutions- MAC Layer Solutions- Network Layer Solutions; Energy Management in Ad hoc Wireless Networks: Introduction- Need for Energy Management in Ad hoc Wireless Networks- Classification of Energy Management Schemes- Battery Management Schemes- Transmission Management Schemes- System Power Management Schemes.

13

END SEMESTER EXAM

Page 30: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 28

Course No. Course Title L-T-P-

Credits Year

06NE6041 Cloud Computing Concepts 3-0-0-3 2015 Prerequisites : Distributed Computing Course Objectives :

To impart fundamental concepts in the area of cloud computing To impart knowledge in applications of cloud computing

Syllabus : Fundamental Cloud Computing, Fundamental Cloud Security, Cloud Infrastructure Mechanisms, Specialized Cloud Mechanisms, Cloud Architectures, Cloud Delivery Models Course Outcome : On successful completion of this course

Understanding the systems, protocols and mechanisms to support cloud computing Develop applications for cloud computing Understanding the hardware necessary for cloud computing Design and implement a novel cloud computing application

Text Books : 1. Thomas Erl, Zaigham Mahmood, and Ricardo Puttini, Cloud Computing : Concepts,

Technology & Architecture, Prentice Hall, 2013. ISBN-13: 978-0-13-338752-0 References :

1. John W.Rittinghouse and James F.Ransome, “Cloud Computing: Implementation, Management, and Security”, CRC Press, 2010.

2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”,TMH, 2009.

3. Kumar Saurabh, “Cloud Computing – insights into New-Era Infrastructure”, Wiley India,2011.

4. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud” O'Reilly

5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan Kaufmann, 2005.

6. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing – A Business Perspective on Technology and Applications”, Springer.

7. Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure Cloud Computing”, Wiley – India, 2010.

8. Rajkumar Buyya, Christian Vecchiola, S.Thamarai Selvi, ‘Mastering Cloud Computing”, TMGH,2013.

9. Gautam Shroff,Enterprise Cloud Computing,Cambridge University Press,2011 10. Michael Miller, Cloud Computing,Que Publishing,2008 11. Nick Antonopoulos, Cloud computing,Springer Publications,2010

COURSE PLAN COURSE

NO: 06NE6041

COURSE TITLE: Cloud Computing Concepts

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Fundamental Cloud Computing : Business Drivers - Technology Innovations - Basic Concepts and Terminology - Roles and Boundaries - Cloud Characteristics - Cloud Delivery Models - Cloud Deployment Models. Cloud-Enabling Technology - Broadband Networks and Internet Architecture - Data Center Technology - Virtualization Technology - Web Technology - Multitenant Technology - Service Technology.

13 30%

Page 31: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 29

2 Fundamental Cloud Security : Basic Terms and Concepts - Threat Agents - Cloud Security Threats - Additional Considerations

5

FIRST INTERNAL EXAMINATION

2 Cloud Infrastructure Mechanisms : Logical Network Perimeter - Virtual Server - Cloud Storage Device - Cloud Usage Monitor - Resource Replication -

8

30%

3

Specialized Cloud Mechanisms : Automated Scaling Listener - Load Balancer - SLA Monitor- Pay-Per-Use Monitor - Audit Monitor -Failover System – Hypervisor - Resource Cluster - Multi-Device Broker - State Management Database

9

SECOND INTERNAL EXAMINATION

3

Cloud Architectures : Workload Distribution Architecture - Resource Pooling Architecture - Dynamic Scalability Architecture - Elastic Resource Capacity Architecture - Service Load Balancing Architecture - Cloud Bursting Architecture - Elastic Disk Provisioning Architecture - Redundant Storage Architecture - Hypervisor Clustering Architecture - Load Balanced Virtual Server Instances Architecture - Non-Disruptive Service Relocation Architecture - Zero Downtime Architecture - Cloud Balancing Architecture - Resource Reservation Architecture - Dynamic Failure Detection and Recovery Architecture - Bare-Metal Provisioning Architecture - Rapid Provisioning Architecture - Storage Workload Management Architecture

7

40%

4

Cloud Delivery Models The Cloud Provider Perspective : Building IaaS Environments - Equipping PaaS Environments - Optimizing SaaS Environments. Cloud Delivery Models The Cloud Consumer Perspective : Working with IaaS Environments - Working with PaaS Environments - Working with SaaS Services. Cost Metrics and Pricing Models : Business Cost Metrics - Client Database - Cloud Usage Cost Metrics - Network Usage - Server Usage - Cloud Storage Device Usage - Cloud Service Usage

13

END SEMESTER EXAM

Page 32: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 30

Course No. Course Title L-T-P-

Credits Year

06NE6061 Research methodology 1-1-0-2 2015 Prerequisites : Nil Course Objectives :

Understand some basic concepts of research and its methodologies Identify appropriate research topics

Syllabus : Research process, Data collection –Data Analysis, Basic Statistical measures, Ethics of Research, Statistical test of hypothesis, Guidelines for writing a PhD thesis Course Outcome : On successful completion of this course, the student should

Select and define appropriate research problem and parameters Prepare a project proposal(to undertake a project) Organize and conduct research (advanced project) in a more appropriate manner Write a research report and thesis Write a research proposal (grants)

Text Books : 1. Research Methodology By R Panneerselvam - Prentice Hall International 2004 - Eleventh

printing, 2013. 2. Research Methodology By CR Kothari - New Age International publishers Second Revised

Edition, Reprint 2013. References :

1. A beginners guide to uncertainty of measurement by Stephanie Bell, NPL Publishing 2. Research Methodology By Francis C. Dane, Brooks/Cole Publishing Company, California.

COURSE PLAN COURSE

NO: 06NE6061

COURSE TITLE: Research methodology (L-T-P : 1-1-0)

CREDITS:2

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction - Meaning of Research- Objectives- Motivation- Types of Research. Research process- Problem definition-Objectives of Research- Research design- Data collection –Data Analysis –Interpretation of Results- Validation of Results. Formulation of a Research problem.

13

30%

2 Basic Statistical measures - Measures of central tendency – Arithmetic Mean- Median- Mode- Geometric Mean- Harmonic Mean

5

FIRST INTERNAL EXAMINATION

2 Measures of variation – Range- Mean Deviation- Quartile Deviation- Coefficient of Variation and Standard Deviation- Measures of skewness.

8 30%

3 Ethics of Research- Scientific Misconduct- Forms of Scientific Misconduct. Measurement of errors

9

SECOND INTERNAL EXAMINATION

3 Measurement uncertainty. Statistical test of hypothesis- T-test- Z Test- F-test- Chi-square test.

7 40%

Page 33: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 31

4

Guidelines for writing a PhD thesis - Guidelines for writing the abstract- introduction- methodology- results and discussion- conclusion sections of a manuscript. Impact factor-Validity- Merits- limitations. Other measurements of impact. h-index-advantages- criticism of h-index-modification of h-index- Intellectual property rights (IPR)- forms of IPR- patents-copyrights-Trademarks-Industrial design-geographical indication.

13

END SEMESTER EXAM

Page 34: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 32

Course No. Course Title L-T-P-Credits Year

06NE6151 Web and Rich Internet Applications 3-0-0-3 2015

Prerequisites : Fundamentals of Web Application Course Objectives :

Understand the various steps in designing a creative and dynamic website. Syllabus : Introduction: From Browsers to Rich Clients – browser drawbacks, A solution – rich clients, Rich clients today. Course Outcome : On successful completion of this course

Clear understanding of hierarchy of objects in HTML and XML. Finally they can create good, effective and customized websites. Know regarding internet related technologies. Systematic way of developing a website. Design dynamic and interactive web pages by embedding Java Script code in HTML. Know the advantages and use of Web services.

Text Book : 1. HTML 5 Up and Running, Mark Pilgrim, O’REILLY| GOOGLE Press, 2010. 2. Professional AJAX, Nicholas C Zakas et al, 2nd Edition, Wrox publications,2007.

References : 1. Professional Web 2.0 Programming, Eric Van Der VList et al, Wrox Publications, 2007 2. SOA: Concepts, Technology and Design, Thomas Erl, Pearson, 2005

COURSE PLAN COURSE

NO: 06NE6151

COURSE TITLE: Web and Rich Internet Applications (L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction: From Browsers to Rich Clients – browser drawbacks- A solution – rich clients- Rich clients today. Web 1.0: HTML- URLs and HTTP- The WEB Model and REST – resources- representations- state- transfer – using HTTP methods. XML- XPATH and XSLT – XML Support in browsers- XPath support in browsers- XSLT support in Browsers.

9

30%

2

HTML 5: Detecting HTML 5 features – Canvas- video- local storage- web workers- offline applications- geolocation- placeholders- input types. What does it all mean – doctype- root- headers- articles- dates and times- navigation and footers.

5

FIRST INTERNAL EXAMINATION

2

Let’s call it a drawing surface – Simple shapes- canvas- Paths- texts- gradients and images. The past- present and future of local storage for web applications- A Form of madness – place holders- autofocus fields- email- web addresses- numbers as spinboxes and sliders- date and color pickers- search boxes.

4

30%

3 AJAX-I: Basic communication techniques – XHR- AJAX with images- Dynamic script loading- Cache control.

5

SECOND INTERNAL EXAMINATION

3

AJAX patterns: Communication control patterns – predictive fetch- page preloading- submission throttling- periodic refresh- multi-stage download. Fallback patterns. AJAX libraries – JQuery.

4 40%

Page 35: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 33

4

AJAX-II: Syndication with RSS and Atom – RSS- Atom- XParser- Creating a news ticker- Web search with RSS. JSON – Array- object- mixing literals- syntax- encoding/decoding- JSON versus XML- server-side JSON tools. COMET: HTTP streaming – request delays- file modification example- using Iframes- browser-specific approaches- server-sent DOM events- connection management and server-side support. Mashups and Web services: The rise of mashups- geocoding- Google maps API. Introduction to Service Oriented Architecture- Combining protocols to build Web services – clarifying web services- REST Services- WS-* Web services using SOAP and WSDL- REST vs WS-* services.

9

END SEMESTER EXAM

Page 36: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 34

Course No. Course Title L-T-P-

Credits Year

06NE6251 Internetworking Technologies 3-0-0-3 2015 Prerequisites : Network Fundamentals Course Objectives :

Ability to understand socket programming. Learn about routing sockets

Syllabus: Introduction to Socket Programming – Overview of TCP/IP Protocols, Introduction to SCTP, Routing sockets, Broadcasting, Multicasting, Advanced UDP sockets Course Outcome : On successful completion of this course

Implementation of End-to-End protocols Text Book :

1. D.E. Comer, “Internetworking with TCP/IP Vol- III”, (BSD Sockets Version), Second Edition, Pearson Education, 2003.

2. W. Richard Stevens, “Unix Network Programming Vol-I”, Second Edition, Pearson Education, 1998.

References : 1. Michael Donahoo, Kenneth Calvert, “TCP/IP Sockets in C, A practical guide for programmers”,

Second Edition, Elsevier, 2009 2. Forouzan, “ TCP/IP Protocol Suite” Second Edition, Tata MC Graw Hill, 2003.

COURSE PLAN COURSE

NO: 06NE6251

COURSE TITLE: Internetworking Technologies

(L-T-P : 3-1-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to Socket Programming – Overview of TCP/IP Protocols –Introduction to Sockets – Iterative TCP programming – Iterative UDP programming – Concurrent programming – fork and exec - I/O multiplexing – I/O Models – select function – shutdown function – TCP echo Server (with multiplexing) – poll function – TCP echoClient (with Multiplexing) Multiplexing TCP and UDP sockets- Threaded servers – thread creation and termination – TCP echo server using threads – Mutexes – condition variables

9

30%

2

Introduction to SCTP- Interface Modules – SCTP functions- sctp_bindx- sctp_connectx- sctp_getpaddrs- sctp_freepaddrs- sctp_getladdrs- sctp_freeladdrs- sctp_sendmsg-sctp_recvmsg- sctp_opt_info- sctp_peeloff- shutdown – Notifications - Socket options – getsockopt and setsockopt functions- Socket states – generic socket options – IP socket options – ICMP socket options – TCP socket options -.SCTP socket options – fcntl functions.

5

FIRST INTERNAL EXAMINATION

2

Routing sockets – Datalink socket address structure – Reading and writing – sysctl operations – get_ifi_info function – Interface name and index functions- Key Management sockets – Reading and writing – Dumping Security Association Database – Creating static Security Association – Dynamically maintaining SA’s

4 30%

Page 37: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 35

3

Broadcasting – Broadcast addresses – Unicast versus Broadcast – (Client) Application development for broadcasting – Race conditions – Multicasting – Multicast addresses- Multicasting versus Broadcasting on a LAN – Multicasting on a WAN – Source specific Multicast – Multicast socket options – mcast_join- (Client) Application development for multicasting – Receiving IP multicast infrastructure session announcements – Sending and receiving.

5

SECOND INTERNAL EXAMINATION

3

Advanced UDP sockets – Receiving flags- Destination IP address and Interface index – Datagram truncation – Using UDP instead of TCP – Adding reliability to UDP – Binding interface addresses – Concurrent UDP servers – Advanced SCTP sockets

4

40%

4

Partial delivery – Notifications – Unordered data – Binding a subset of addresses – Determining peer and local address information – Finding an association Id given an IP address – Heartbeating and Address failure – Peeling off an association – Controlling timing – Using SCTP instead of TCP – Out of band data – Signal driven I/O.

9

END SEMESTER EXAM

Page 38: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 36

Course No. Course Title L-T-P-Credits Year 06NE6351 Multicore Architecture & Programming 3-0-0-3 2015

Prerequisites : Students are expected to know the C language, and know basics on computer architecture. Course Objectives :

how to organize the computations of the threads in so that they work together and perform the required computations efficiently, making good use of the available hardware resources.

To expose the students to the problems related to multiprocessing

To understand the different types of multi core architectures

Syllabus : Multi-core Architecture, Fundamental Concepts of Parallel Programming, Threading and Parallel Programming, OpenMP, Performance oriented Programming, GPU programming Course Outcome : On successful completion of this course

Point out the salient features of different multi-core architectures and how they exploit parallelism.

Knowledge on architecture of GPUs, warehouse-scale computers and embedded processors. Text Book :

1. Shameem Akhter and Jason Roberts, Multicore Programming , Increased Performance through Software Multi-threading, Intel Press , 2006.

2. Jason Sanders, Jason Sanders, CUDA by Example: An Introduction to General-Purpose GPU Programming, Pearson, 2010

References : 1. John L. Hennessey and David A. Patterson, “ Computer architecture – A quantitative

approach”, Morgan Kaufmann/Elsevier Publishers, 5th. edition, 2011. 2. Peter S. Pacheco, “An introduction to parallel programming”, Morgan Kaufmann, 2011. 3. Michael J Quinn, “Parallel programming in C with MPI and OpenMP”, Tata McGraw Hill,

2003. 4. Shameem Akhter and Jason Roberts, “Multi-core Programming”, Intel Press, 2006. 5. David E. Culler, Jaswinder Pal Singh, “Parallel computing architecture : A hardware/

software approach” , Morgan Kaufmann/Elsevier Publishers, 2004. 6. Wesley Petersen and Peter Arbenz, “Introduction to Parallel Computing”, Oxford University

Press, 2004. COURSE PLAN

COURSE NO:

06NE6351 COURSE TITLE: Multicore Architecture & Programming

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to Multi-core Architecture: Motivation for Concurrency in software- Parallel Computing Platforms- Parallel Computing in Microprocessors- Differentiating Multi-core Architectures from Hyper- Threading Technology- Multi-threading on Single-Core versus Multi-Core Platforms Understanding Performance- System Overview of Threading: Defining Threads- System View of Threads- Threading above the Operating System- Threads inside the OS- Threads inside the Hardware - Case studies – Intel Multi-core architecture – SUN CMP architecture – IBM cell processor – NVIDIA GPU – AMD APU.

9 30%

Page 39: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 37

2

Fundamental Concepts of Parallel Programming: Designing for Threads- Task Decomposition- Data Decomposition- Data Flow Decomposition- Implications of Different Decompositions- Challenges- Parallel Programming Patterns- A Motivating Problem: Error Diffusion- Analysis of the Error Diffusion Algorithm- An Alternate Approach: Parallel Error Diffusion- Other Alternatives.

5

FIRST INTERNAL EXAMINATION

2

Threading and Parallel Programming Constructs: Synchronization- Critical Sections- Deadlock- Synchronization Primitives- Semaphores- Locks- Condition Variables- Messages- Flow Control- based Concepts- Fence- Barrier- Implementation-dependent Threading Features. Threading APIs

4

30%

3

OpenMP: A Portable Solution for Threading: Challenges in Threading a Loop- Loop-carried Dependence- Data-race Conditions- Managing Shared and Private Data- Loop Scheduling and Portioning- Effective Use of Reductions- Minimizing Threading Overhead- Work-sharing Sections

5

SECOND INTERNAL EXAMINATION

3

Performance oriented Programming- Using Barrier and No wait- Interleaving Single-thread and Multi-thread Execution- Data Copy-in and Copy-out- Protecting Updates of Shared Variables- Intel Task queuing Extension to OpenMP- OpenMP Library Functions- OpenMP Environment Variables- Compilation- Debugging- performance.

4

40%

4

GPU programming : The CUDA standard. Kernels and host-device communication. Shared and constant memory- synchronicity and performance. GPU coding restrictions. Overview of Open CL- Open Acc

9

END SEMESTER EXAM

Page 40: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 38

Course No. Course Title L-T-P-Credits Year 06NE6451 Linux Shell Scripting 3-0-0-3 2015

Prerequisites : Operating Systems Concepts Course Objectives :

Perform system administration tasks to manage files, software, storage, users, processes and services.

Write shell scripts for common shell environment. Syllabus : Linux Basics, Managing Users, Boot Loaders, Core System Services, File System, Shell Scripting Basics, Script Control Course Outcome : On successful completion of this course

Ability to perform system administration tasks Ability develop and execute Shell Scripts as per the system level requirements

Text Book : 1. Richard Blum, Linux Command Line and Shell Scripting Bible, Wiley Publishing, Inc 2. WALE SOYINKA, Linux Administration:A Beginner’s Guide, Fifth Edition, McGraw-Hill

References :

1. Linux System Administration Solve Real-life Linux Problems Quickly by Tom Adelstein, Bill Lubanovic. O'Reilly Media, March 2007

2. Essential System Administration : Tools and Techniques for Linux and Unix Administration ( 3rd Edition), Ellen Frisch

COURSE PLAN COURSE

NO: 06NE6451

COURSE TITLE: Linux Shell Scripting (L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Linux Basics: Managing Users- The /etc/passwd File- The /etc/shadow File- The /etc/group File- Pluggable Authentication Modules (PAM)- Commands - useradd- groupadd- usermod-groupmod-userdel-groupdel.Files- File Types- File Ownership- and File Permissions- File Management and Manipulation Commands- Process management commands

9

30%

2

Boot Loaders: GRUB and LILO- Bootstrapping- Init Process- rc Scripts. File System : i-Nodes - Superblocks- ext3 and ReiserFS- Overview of Partitions-Creating Partitions and Logical Volumes

5

FIRST INTERNAL EXAMINATION

2

Core System Services : The /etc/inittab File- The /etc/xinetd.conf File-Enabling/Disabling a Service-Invoking rsyslogd- Log Message Classifications-Format of /etc/rsyslog.conf-The crontab File-Editing the crontab File

4

30%

3

Shell Scripting Basics : Creating a Script File- Using Variables-Redirecting Input and Output- Pipes-Performing Math-Exiting the Script.Using Structured Commands : The if-then-else Statement- Advanced if-then Features- The case Command-The for Command- The C-Style for Command- The while Command- The until Command- Looping on File Data- Controlling the Loop

5

SECOND INTERNAL EXAMINATION

Page 41: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 39

3

Handling User Input : Command Line Parameters- Special Parameter Variables- Working With Options- Understanding Input and Output- Redirecting Output in Scripts- Redirecting Input in Scripts- Using Temporary Files- Logging Messages

4

40%

4

Script Control : Handling Signals- Running Scripts in Background Mode- Running Scripts without a Console- Job Control-nice command- Scheduling a job using the at command- Using the batch command- Starting your scripts at boot. Text Manipulation: The sed editor- The gawk program

9

END SEMESTER EXAM

Page 42: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 40

Course No. Course Title L-T-P-

Credits Year

06NE6071 Seminar I 0-0-2-2 2015 Each student shall present a seminar on any topic of interest related to the core / elective courses offered in the first semester of the M. Tech. Programme. He / she shall select the topic based on the References: from reputed International Journals, preferably IEEE journals. They should get the paper approved by the Programme Co-ordinator / Faculty member in charge of the seminar and shall present it in the class. Every student shall participate in the seminar. The students should undertake a detailed study on the topic and submit a report at the end of the semester. Marks will be awarded based on the topic, presentation, participation in the seminar and the report submitted. Encourage students to convert these seminar topics into a good survey paper or Technical paper.

Page 43: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 41

Course No. Course Title L-T-P-

Credits Year

06NE6081 Network Systems Lab 0-0-3-1 2015 Prerequisites : Computer Networks Course Objectives :

This course teaches an understanding of networks and systems design through hands-on construction and experimentation with real-world implementations.

Syllabus : 1. Familiarization of Wireshark 2. Detailed Study of protocols in TCP/IP model using Wireshark 3. Detailed Study of Subnetting and Supernetting 4. Familiarization of following Linux/Unix network commands

a. Ping b. traceroute c. arp d. route e. netstat f. About /etc folder g. IP Setting /Subnet Masking h. Setting up Hostname/Setting local name resolution

7. Deploy Web, Postgre SQL, Email, DNS, DHCP, SSH FTP,SAMBA and Proxy Servers. Deploy it using virtual machines.

8. Implement LDAP authentication server. Deploy it using virtual machines. 9. Build your own ISP. It should include a DNS, DHCP, Leased Line, PPP, Webserver, Internet

Backbone with appropriate routing protocols. Experiment may be implemented using real systems/Simulators

10. Develop your own LAN with WAN for offshore connectivity. It should employ a firewall/proxy to redirect all external traffic. Use CIDR for forming departments. Experiment may be implemented using real systems/Simulators

11. Network administration and defence a. Measuring Internet topology with BGP Updates b. Characterizing traffic aggregates with Netflow c. Analyzing packet-level traffic with tcpdump

12. Build your own firewall using IPTables. 13. Configure a Distributed Computing Cluster using MPI. Deploy it using virtual machines. 14. Configure a Distributed File System using Hadoop. Deploy it using virtual machines. 15. Familiarization on Open Stack Cloud Computing Tool 16. Familiarization of Open Shift Cloud Computing Tool 17. Familiarization of Google App Engine 5. Socket Programming Experiments on

a. TCP Echo Server, TCP Echo Client b. UDP Echo server, UDP Echo Client c. File Server d. Broadcast, Multicast e. Simple Network Time Protocol f. TCP Iterative Server g. TCP Concurrent Server

Course Outcome : On successful completion of this course

Will Acquire hands on experience on deploying different network and server services. References :

1. WALE SOYINKA, Linux Administration:A Beginner’s Guide, Fifth Edition, McGraw-Hill 2. Tom Adelstein, Bill Lubanovic , Linux System Administration, O’Reilly

Page 44: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 42

Page 45: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 43

SEMESTER – II

Page 46: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 44

Course No. Course Title L-T-P-

Credits Year

06NE6012 Design of Computer Networks 4-0-0-4 2015 Prerequisites : Computer Networks Course Objectives :

To obtain knowledge on major protocols used in computer networks for the design of LAN, WAN and WLAN systems

To analyse and resolve all issues in implementing the selected protocols at LAN, WAN and WLAN designs

To apply the detailed knowledge and understanding of secure network architectures for the design and implementation of firewalls

Syllabus : Overview of Analysis, Architecture and Design Process, Requirement Analysis Process, Developing the requirements specification Individual and Composite Flows, Architecture and design, Design Concepts, Network Management Architecture, Design Concepts. Course Outcome : On successful completion of this course

analyse the use of models for performance measures and performance prediction of advanced data networks;

demonstrate practical ability to design and setup LANs, WANs, and wireless LANs using standard protocols and typical hardware;

make recommendations for network performance improvements; demonstrate practical skills in setting up TCP/IP connections and routing configurations for

different environments; Text Book :

1. Network Analysis, Architecture, and Design By James D. McCabe, Morgan Kaufmann, Third Edition, 2007.ISBN-13: 978-0123704801

References : 1. Computer Networks: A Systems Approach by Larry L. Peterson, Bruce S. Davie - 2007,

Elsevier Inc. 2. Top-down Network Design: [a Systems Analysis Approach to Enterprise Network Design] By

Priscilla Oppenheimer, Cisco Press , 3rd Edition, ISBN-13: 978-1-58720- 283-4 ISBN-10: 1-58720-283-2

3. Integrated Management of Networked Systems: Concepts, Architectures, and Their Operational Application (The Morgan Kaufmann Series in Networking), Heinz-Gerd Hegering, Sebastian Abeck, and Bernhard Neumair, 1999.

4. “Network Design and Management” – by Steven T.Karris, Orchard publications, Second edition, Copyright 2009, ISBN 978-1-934404-15-7

5. “Network Design, Management and Technical Perspective”, Teresa C. Mann-Rubinson and Kornel Terplan, CRC Press, 1999

6. “Ethernet Networks-Design, Implementation, Operation and Management by Gilbert Held,John Wiley and sons, Fourth Edition

7. James Kurose and Keith Ross, “Computer Networking: A Top-Down Approach Featuring theInternet”, 1999

COURSE PLAN COURSE

NO: 06NE6012

COURSE TITLE: Design of Computer Networks

(L-T-P : 4-0-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

Page 47: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 45

1

Overview of Analysis, Architecture and Design Process-System Methodology, Service methodology- Service Description - Service characteristics - Performance Characteristics -Network supportability - Requirement analysis – User Requirements – Application Requirements – Device Requirements – Network Requirements – Other Requirements - Requirement specification and map.

9

30%

2

Requirement Analysis Process – Gathering and Listing Requirements- Developing service metrics – Characterizing behavior – Developing RMA requirements – Developing delay Requirements - Developing capacity Requirements - Developing supplemental performance Requirements – Requirements mapping

5

FIRST INTERNAL EXAMINATION

2

Developing the requirements specification Individual and Composite Flows – Critical Flows - Identifying and developing flows – Data sources and sinks – Flow models- Flow prioritization – Flow specification algorithms – Example Applications of Flow Analysis

4

30%

3

Architecture and design – Component Architectures – Reference Architecture – Architecture Models – System and Network Architecture – Addressing and Routing Architecture – Addressing and Routing Fundamentals – Addressing Mechanisms – Addressing Strategies – Routing Strategies

5

SECOND INTERNAL EXAMINATION

3

Network Management Architecture – Network Management Mechanisms Performance Architecture – Performance Mechanisms – Security and Privacy Architecture – Planning security and privacy Mechanisms

4

40%

4

Design Concepts – Design Process - Network Layout – Design Traceability – Design Metrics – Logical Network Design – Topology Design – Bridging- Switching and Routing Protocols- Physical Network Design – Selecting Technologies and Devices for Campus and Enterprise Networks – Optimizing Network Design

9

END SEMESTER EXAM

Page 48: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 46

Course No. Course Title L-T-P-

Credits Year

06NE6022 Foundations in Big Data Processing 3-0-0-3 2015 Prerequisites : NIL Course Objectives :

The course provides an introduction to Data Science. Syllabus : Introduction to KDD process, Association Rule Mining , Classification vs. Prediction, Support Vector Machines , Cluster Analysis,Hadoop Course Outcome : On successful completion of this course

Understand basic concepts in data mining Learn how to map data mining concepts to big data streams Fundamental knowledge in Big data tool

Text Book : 1. Jiawei Han and Micheline Kamber, “Data Mining Concepts and Techniques” Second Edition,

Elsevier, Reprinted 2008. References :

1. K.P. Soman, Shyam Diwakar and V. Ajay, “Insight into Data mining Theory and Practice”, Easter Economy Edition, Prentice Hall of India, 2006.

2. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice Hall of India, 2006.

3. BERSON, ALEX & SMITH, STEPHEN J, Data Warehousing, Data Mining, and OLAP, TMH Pub. Co. Ltd, New Delhi, 2012

4. Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”, Pearson Education, 2007

5. Tom White, "Hadoop: The Definitive Guide", Third Edition, O'Reilley, 2012. 6. E. Capriolo, D. Wampler, and J. Rutherglen, "Programming Hive", O'Reilley, 2012.

COURSE PLAN COURSE

NO: 06NE6022

COURSE TITLE: Foundations in Big Data Processing

(L-T-P : 3-0-0)

CREDITS:4

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to KDD process – Knowledge Discovery from Databases - Need for Data Preprocessing – Data Cleaning – Data Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation.Association Rule Mining - Mining Frequent Itemsets with and without Candidate Generation - Mining Various Kinds of Association Rules - Constraint- Based Association Mining.

9

30%

2

Classification vs. Prediction – Data preparation for Classification and Prediction – Classification by Decision Tree Induction – Bayesian Classification – Rule Based Classification

5

FIRST INTERNAL EXAMINATION

Page 49: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 47

2

Support Vector Machines – Associative Classification – Lazy Learners – Other Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the Accuracy of a Classifier or Predictor. Cluster Analysis: - Types of Data in Cluster Analysis- A Categorization of Major Clustering Methods – Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based Methods – Model-Based Clustering Methods

4

30%

3

Clustering High- Dimensional Data – Constraint- Based Cluster Analysis – Outlier Analysis. Data format – analyzing data with Hadoop – scaling out – Hadoop streaming – Hadoop pipes.

5

SECOND INTERNAL EXAMINATION

3

Design of Hadoop distributed file system (HDFS) – HDFS concepts – Java interface – data flow- Data Ingest with Flume and Sqoop. Hadoop I/O – data integrity – compression – serialization – Avro – file-based data structures- MapReduce workflows – unit tests with MRUnit – test data and local tests – anatomy of MapReduce job run – classic Map-reduce – YARN – failures in classic Map-reduce and YARN

9

40%

4

job scheduling – shuffle and sort – task execution – MapReduce types – input formats – output formats Introduction to Hbase- Introduction to Cassandra- Introduction to Pig- Hive – data types and file formats – HiveQL data definition – HiveQL data manipulation – HiveQL queries.

4

END SEMESTER EXAM

Page 50: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 48

Course No. Course Title L-T-P-

Credits Year

06NE6032 Enterprise Devices & Networks 3-0-0-3 2015 Prerequisites : Cloud computing Course Objectives :

To attain basic ideas and principles in data center design and management. Syllabus : Introduction to Cloud Networking, Switch Fabric Technology , Cloud Data Center Networking Topologies , Data Center Evolution, Cloud Data Center Networking Topologies, Server Virtualization and Networking, Storage Networks , Software-Defined Networking Course Outcome : On successful completion of this course

Apply the fundamental concepts in datacenters to understand the tradeoffs in power, efficiency and cost.

Discuss system virtualization and outline its role in enabling the cloud computing system model.

Text Book : 1. Gary Lee, “Cloud Networking - Understanding Cloud-based Data Center Networks”, Elsevier,

2014 References :

1. COURSE PLAN

COURSE NO:

06NE6032

COURSE TITLE: Enterprise Devices & Networks

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to Cloud Networking: Networking Basics- The network stack- Packets and frames- Network equipment- Interconnect- Cloud Data Center- Cloud Networking- Characteristics of Cloud Networking- Ethernet usage- Virtualization- Convergence- Scalability- Software. Data Center Evolution: Mainframes to the Cloud: The Data Center Evolution- Computer Networks- Ethernet- Enterprise versus Cloud Data Centers- Movement to the Cloud.

9

30%

2

Switch Fabric Technology: Switch Fabric Architecture Overview- Switch Fabric Topologies- Congestion Management- Flow Control- Traffic Management- Switch Chip Architecture Examples

5

FIRST INTERNAL EXAMINATION

2

Cloud Data Center Networking Topologies: Traditional Multitiered Enterprise Networks- Data Center Network Switch Types, Flat Data Center Networks, Rack Scale Architectures, Network Function Virtualization.

4

30%

3

Data Center Networking Standards: Ethernet Data Rate Standards, Virtual Local Area Networks- Data Center Bridging- Improving Network Bandwidth- Remote Direct Memory Access.

5

SECOND INTERNAL EXAMINATION

3

Server Virtualization and Networking: VM Overview- Virtual Switching- PCI Express- Edge Virtual Bridging- VM Migration. Network Virtualization: Multi-tenant Environments- Traditional Network Tunneling Protocols-

4 40%

Page 51: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 49

VXLAN- NVGRE- Tunnel Locations- Load Balancing

4

Storage Networks: Storage Background- Advanced Storage Technologies- Storage Communication Protocols- Network Convergence- Software-Defined Storage- Storage in Cloud Data Centers. Software-Defined Networking: Data Center Software Background- OpenStack- OpenFlow- Network Function Virtualization- SDN Deployment.

9

END SEMESTER EXAM

Page 52: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 50

Course No.

Course Name L-T-P-

Credits Year

06NE6142 Modern Concurrent Programming Paradigm 3-0-0-3 2015

Prerequisites : NIL Course Objectives :

The course is designed for people who want to gain expertise in their understanding of concurrent programming paradigm.

Syllabus : Design Patterns and MapReduce, Summarization Patterns, Filtering Patterns, Data Organization Patterns, Join Patterns, Metapatterns, Input and Output Patterns, Erlang , Fundamentals on Erlang Programming, Concurrent Programming Course Outcome : On successful completion of this course

Understand about the commonly used Design Patterns in MapReduce Learn the scenarios where to apply those Patterns in real world problems Write mature code using MapReduce Learn the best practices for using MapReduce Fundamental knowledge on Erlang and its use in concurrent programming

Text Book : Donald Miner & Adam Shook , “ MapReduce Design Patterns ” ,Published by O’Reilly Media,

Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. Joe Armstrong, Programming Erlang Software for a Concurrent World, Second Edition, The

Pragmatic Bookshelf References :

1. Jeffy Patton, “User Story Mapping Discover the Whole Story, Build the Right Product ”, O'Reilly Media, September 2014

2. Sandeep Karanth, “Mastering Hadoop”,Packt Publishing Ltd, 29-Dec-2014. 3. Thilina Gunarathne, “Hadoop MapReduce v2 Cookbook - Second Edition”, Packt Publishing

Ltd, 25-Feb-2015 4. Francesco Cesarini and Simon Thompson, Erlang Programming, O’Reilly Media

COURSE PLAN COURSE

NO: 06NE6142

COURSE TITLE: Modern Concurrent Programming Paradigm

L-T-P : 3-0-0

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Design Patterns and MapReduce - Summarization Patterns:Numerical Summarizations - Pattern Description - Numerical Summarization - Filtering Patterns:Filtering-Pattern Description-Filtering Examples-Bloom Filtering-Pattern Description-Bloom Filtering

9

30%

2

Data Organization Patterns: Structured to Hierarchical -Partitioning -Binning-Pattern-Total Order Sorting- Shuffling Join Patterns:Reduce Side Join -Replicated Join -Composite Join-Cartesian Product

4

FIRST INTERNAL EXAMINATION

2

Metapatterns - Job Chaining - Chain Folding - Job Merging

Input and Output Patterns.:Customizing Input and Output in Hadoop-Generating Data- External Source Output- External Source Input- Partition Pruning

5 30%

Page 53: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 51

3

Erlang Programming : Introducing Concurrency - The Shell - Processes- Modules- and Compilation - Basic Concepts - Starting and Stopping the Erlang Shell - Simple Integer Arithmetic – Variables - Floating-Point Numbers – Atoms – Tuples – Lists – Strings

6

SECOND INTERNAL EXAMINATION

3

Modules and Functions - Simple List Processing - List Comprehensions – BIFs – Guards - case and if Expressions - Building Lists in Natural Order – Accumulators - Records and Maps

3

40%

4

Concurrent Programming – Processes - Receive with a Timeout - Selective Receive - Registered Processes - Tail Recursion - Distributed Programming - Models for Distribution - Building the Name Server - Libraries and BIFS for Distributed Programming - Socket-Based Distribution

9

END SEMESTER EXAM

Page 54: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 52

Course No. Course Title L-T-P-

Credits Year

06NE6242 Distributed Algorithms 3-0-0-3 2015 Prerequisites : Basic familiarity with algorithms, including theory. Course Objectives :

The course is intended to give students a thorough introduction to the topic of distributed algorithms with emphasis on principles and theory.

Syllabus : Introduction to model of synchronous distributed computing system, Introduction to model of asynchronous distributed computing system, Resource Allocation. Course Outcome : On successful completion of this course

The student will have developed a working understanding of the distributed problem domain and its main tools and techniques and be able to use these techniques in their own research.

Text Book : 1. Nancy A. Lynch, Morgan,” Distributed Algorithms”, Kaufmann Publishers, Inc

References : 1. 1. Wolfgang Reisig, W. Reisig, “Elements Of Distributed Algorithms: Modeling And Analysis

With Petri Nets”, Springer-verlag 2. Tel Gerard , “Introduction To Distributed Algorithms”, 2nd Edition, Cambridge University

Press 3. Sukumar Ghosh, ”Distributed Systems: An Algorithmic Approach (Hardcover)”, Chapman &

Hall/crc 4. Valmir C. Barbosa,”An Introduction To Distributed Algorithms”, Mit Press 5. Randy Chow, Theodore Johnson, “Distributed Opearating Systems and Algorithm Analysis, ,

Pearson Education 6. Santoro N., Nicola Santoro, “Design And Analysis Of Distributed Algorithms”, Wiley-

interscience 7. Fionnuala O'donnell, Vdm Verlag Dr. Muller, “A Simulated Framework For The Teaching Of

Distributed Algorithms”, Aktiengesellschaft & Co. Kg 8. Ajay D. Kshemkalyani, Mukesh Singhal, “Distributed Computing - Principles, Algorithms, And

Systems”, Cambridge University Press COURSE PLAN

COURSE NO:

06NE6242

COURSE TITLE: Distributed Algorithms

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to model of synchronous distributed computing system- Leader election in a General Network - Simple Flooding Algorithm- Basic Breadth-First Search Algorithm.- Bellman-Ford algorithm.

9

30%

2

Algorithms in Synchronous Networks- Minimum Spanning Tree- Leader Election in a Synchronous Ring - LCR algorithm- HS algorithm- Time Slice Algorithm- Variable Speeds Algorithm- Lower Bound for Comparison-Based Algorithms

5

FIRST INTERNAL EXAMINATION

2 Maximal Independent Set- LubyMIS algorithm. Distributed Consensus with Link Failures and Process Failures – Basics

4 30%

Page 55: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 53

3

Introduction to model of asynchronous distributed computing system- Send/Receive systems- Broadcast systems- Multicast systems- Basic algorithms- Peterson Leader-Election Algorithm- Local Synchronizer- Safe Synchronizer.

5

SECOND INTERNAL EXAMINATION

3

Asynchronous System Model. Shared Memory Systems- Environment Model- Shared Variable Types- Mutual Exclusion - Asynchronous Shared Memory Model- Dijkstra's Mutual Exclusion Algorithm.

4

40%

4

Resource Allocation - Nonexistence of Symmetric Dining Philosophers Algorithms- Right-Left Dining Philosophers Algorithm- mutual exclusion and consensus- relationship between shared memory and network models- asynchronous networks with failures

9

END SEMESTER EXAM

Page 56: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 54

Course No. Course Title L-T-P-

Credits Year

06NE6342 High Performance Networks 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :

To introduce the new developments in modern networking systems, multimedia communications and high speed networks.

Syllabus : Network Performance analysis, Gigabit Ethernet, ADSL and DSL Technologies, Introduction to MPLS and QOS, Network Components of MPLS, Storage and networking concepts, SAN topologies Course Outcome : On successful completion of this course

Describe and interpret the basics of high speed networking technologies. Apply the concept learnt in this course to optimize and troubleshoot high-speed network. Demonstrate the knowledge of network planning and optimization

Text Book : 1. Alex Goldman, “Storage Area Networks Fundamentals”, Cisco Press 2002 2. Storage Area Network Essentials: a Complete Guide to understanding andimplementing

SANs- Richard Barker and Paul Massiglia, John Wiley India References :

1. Storage Networks Explained – Uif Troppens, Raiver Erkens and Wolfgang Muller, John Wiley & Sons, 2003.

2. William Stallings: ISDN And BISDN 3. William Stallings: High Speed Networks 4. M Shwartz: Telecommunication Network Protocol Modeling And Analysis: Addison Wesley 5. Gallangar: Data Networks: Prentice Hall 6. Fred Halsall: Data Communication Computer Networks, And Open Systems: Addison Wesley. 7. Kershanbaum : Telecommunication Network Design Algorithms: MGH 8. Jochetl Schiller: Mobile Communication: Addison Wesley. 9. Tanenbaum: Computer Networks: PHI 10. Johnson: Fast Ethernet 11. Tom Clark, “Designing Storage Area Networks”, Addison-Wesley Professional, 1stedition,

1999 12. Storage Networks: The Complete Reference – Robert Sparding, Tata Mcgraw Hills, 2003.

COURSE PLAN COURSE

NO: 06NE6342

COURSE TITLE: High Performance Networks

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Network Performance analysis : Objectives and requirements for Quality of Service (QoS) in high performance networks. Architecture of high performance networks (HPN)- design issues- protocols for HPN- VHF backbone networks- virtual interface architectures- virtual interface for networking- High-speed switching and routing - internet and PSTN IP switching techniques- SRP protocols- SRP authentication- and key exchange- comparison of TCP/IP- FTP- TELNET- queuing systems- network modeling as a graph

9 30%

Page 57: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 55

2

Gigabit Ethernet : Architecture- standards- interface- applications- network design Frame relay: Frame relay protocols and services- frame relay congestion Control ATM: Architecture- protocol- switching- traffic and congestion control- flow control ATM service categories- ATM in LAN environment- classical IP over ATM

5

FIRST INTERNAL EXAMINATION

2

ADSL and DSL Technologies : Background and technological capabilities- Standards and associations- Architecture. Fiber Optics Communication: GPON (Gigabit capable Passive Optical Network)- SONET/SDH and comparison with other available standards.

4

30%

3

Introduction to MPLS and QOS- Network Components of MPLS- working RSVP protocol- MPLS network Components- MPLS basic working- Applications- IETF approach- RSVP protocol- Integrated & differential Services Framework.

5

SECOND INTERNAL EXAMINATION

3

Storage and networking concepts – SCSI bus architecture – Networking in front of the server – Networking behind the server – Network -attached Storage – Fibre channel internals – Layers – Data encoding – Framing protocol – class of service – flow control – Name and addressing conventions.

4

40%

4

SAN topologies – Point-to Point – Arbitrated Loop – Loop Addressing-Loop Initialization-Port Login-Loop port state machine – Design considerations for Arbitrated Loop –Fabrics – Fabric login – Simple Name Server – State Change Notification – Private Loop Support – Fabric Zoning – Building Extended SANs. Fibre Channel Products – Gigabit Interface Converters (GBICs) – host Bus Adapters – Fibre channel RAID – Fibre channel JBODs – Arbitrated Loop Hubs – hub Architecture – Unmanaged Hubs – Managed Hubs – Switching Hubs – Fabric Switches – Fibre Channel-to-SCSI Bridges – SAN software Products – Problem isolation in SANs – Isolation Techniques – Fibre channel Analyzers.

9

END SEMESTER EXAM

Page 58: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 56

Course No. Course Title L-T-P-

Credits Year

06NE6442 Internet Routing Design 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :

To study the design, operation, and challenges of the Internet as a global network. Syllabus : Routing protocols: framework and principles, Internet routing and Router architectures, Analysis of network algorithms, Quality of service routing, Routing and Traffic engineering Course Outcome : On successful completion of this course

Able to describe the architecture of the Internet. Able to describe the functions performed by routers. Able to describe IP switching and the operation of MPLS

Text Book : 1. Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and

Karthikeyan Ramasamy (Morgan Kaufmann Series in Networking) References :

1. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices George Varghese (Morgan Kaufmann Series in Networking)

2. TCP/IP Protocol Suite, (B.A. Forouzum) Tata McGraw Hill Edition, Third Edition 3. TCP/IP Volume 1,2,3 (N. Richard Steveus Addison Wesley) 4. Computer Networks (A.S. Taueubaum) Pearson Edition, 4th Edition

COURSE PLAN COURSE

NO: 06NE6442

COURSE TITLE: Internet Routing Design

(L-T-P : 3--0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

ROUTING PROTOCOLS: FRAMEWORK AND PRINCIPLES : Routing Protocol- Routing Algorithm- and Routing Table- Routing Information Representation and Protocol Messages- Distance Vector Routing Protocol- Link State Routing Protocol- Path Vector Routing- Protocol- Link Cost.

9

30%

2

INTERNET ROUTING AND ROUTER ARCHITECTURES : Architectural View of the Internet- Allocation of IP Prefixes and AS Number- Policy- Based Routing- Point of Presence- Traffic Engineering Implications- Internet Routing Instability. Router Architectures: Functions- Types- Elements of a Router- Packet Flow- Packet Processing: Fast Path versus Slow Path- Router Architectures

5

FIRST INTERNAL EXAMINATION

2

ANALYSIS OF NETWORK ALGORITHMS : Network Bottleneck- Network Algorithmics- Strawman solutions- Thinking Algorithmically- Refining the Algorithm- Cleaning up- Characteristics of Network Algorithms.

4 30%

Page 59: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 57

3

IP Address Lookup Algorithms : Impact- Address Aggregation- Longest Prefix Matching- Naïve Algorithms- Binary - Multibit and Compressing Multibit Tries- Search by Length Algorithms- Search by Value Approaches- Hardware Algorithms- Comparing Different Approaches IP Packet Filtering and Classification : Classification- Classification Algorithms- Naïve Solutions- Two-Dimensional Solutions- Approaches for d Dimensions-

5

SECOND INTERNAL EXAMINATION

3

QUALITY OF SERVICE ROUTING : QoS Attributes- Adapting Routing: A Basic Framework. Update Frequency- Information Inaccuracy- and Impact on Routing- Dynamic Call Routing in the PSTN- Heterogeneous Service- Single-Link Case- A General Framework for Source-Based QoS Routing with Path Caching - Routing Protocols for QoS Routing.

4

40%

4

ROUTING AND TRAFFIC ENGINEERING : Traffic Engineering of IP/MPLS Networks- VPN Traffic Engineering- Problem Illustration: Layer 3 VPN- LSP Path Determination: Constrained Shortest Path Approach- LSP Path Determination: Network Flow Modeling Approach- Layer 2 VPN Traffic Engineering- Observations and General Modeling Framework- Routing/Traffic Engineering for Voice Over MPLS.

9

END SEMESTER EXAM

Page 60: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 58

Course No. Course Title L-T-P-

Credits Year

06NE6152 Cyber Physical Systems 3-0-0-3 2015 Prerequisites : Nil Course Objectives :

To understand the fundamental and practical issues in designing and analysing cyber-physical systems.

Syllabus : Cyber-Physical Systems Concepts, Modeling Issues in Cyber-Physical Systems, Sensor based Cyber Physical Systems, Civilian cyber-physical system applications, Ubiquitous computing: basics and vision. Course Outcome : On successful completion of this course

Understand the basic principles of Cyber Physical Systems Text Book :

1. Cyber-Physical Systems: Integrated Computing and Engineering Design, Fei Hu CRC Press, 26-Sep-2013

References : 1. Ubiquitous Computing: Smart Devices, Environments and Interactions By Stefan Poslad,John

Wiley & Sons Ltd COURSE PLAN

COURSE NO:

06NE6152

COURSE TITLE: Cyber Physical Systems

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Cyber-Physical Systems Concepts - Cyber-Physical Systems: Design Challenges- Mobile Cyber-Physical Systems DESIGN PRINCIPLES: Cyber-Physical System Controls- Apprenticeship Learning for Cyber-Physical System- Intelligence Application of HDP- HMM in Recognition of Dynamic Hand Gestures.

9

30%

2

Modeling Issues in Cyber-Physical Systems Cyber-Physical System Modeling on Cognitive Unmanned Aerial Vehicle Cyber-Physical System Security—Smart Grid Example

5

FIRST INTERNAL EXAMINATION

2

SENSOR-BASED CYBER-PHYSICAL SYSTEMS: Wireless Sensor and Actuator Networks for Cyber-Physical System Applications-Community Sensing- Wireless Embedded/Implanted Microsystems: Architecture and Security-The Application of Machine Learning in Monitoring Physical Activity with Shoe Sensors

4

30%

3

CIVILIAN CYBER-PHYSICAL SYSTEM APPLICATIONS Energy Efficient Building- Cyber-Physical System for Smart Grid Applications -Cyber-Physical System for Transportation Applications-Video Communications in Unmanned Aerial Vehicle-Based -Cyber- Physical Systems.

5

SECOND INTERNAL EXAMINATION

3

UBIQUITOUS COMPUTING: BASICS AND VISION Ubiquitous Communication -Data Networks -Wireless Data Networks -Universal and Transparent Audio- Video and Alphanumeric Data Network Acces-Ubiquitous Networks -Further Network

4 40%

Page 61: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 59

Design Issues -Service Oriented Networks

4

Management of Smart Devices -Managing Smart Devices in Virtual Environments -Managing Smart Devices in Human User Centred Environments -Ubiquitous System: Challenges and Outlook -Overview of Challenges -Smart Devices -Smart Human Device Interaction -Human Intelligence Versus Machine Intelligence -Social Issues: Promise Versus Peril Case study: Smart city networks

9

END SEMESTER EXAM

Page 62: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 60

Course No. Course Title L-T-P-

Credits Year

06NE6252 Network Security 3-0-0-3 2015 Prerequisites : Basic knowledge of computer networking & Protocols Course Objectives :

Understand security concepts, Ethics in Network Security. Comprehend and apply relevant protocol like SSL, SSH etc.

Syllabus : Security Problem in TCP/IP Protocol Suite, Security at Network Layer, Security at Transport Layer, Security at Application Layer, Firewalls and IDS. Course Outcome : On successful completion of this course

Should be able to identify network security threats and determine efforts to counter them Understand the security in different layers of protocol stack.

Text Book : 1. Stallings, W., “Cryptography and Network Security: Theory and Practice”, Second Edition,

John Wiley. References :

1. “Charles P. Pfleeger “Security in computing”, Pearson Education 2. Stalling W., “Network Security Essentials”, Pearson 3. Garfinkel S., Spafford G., “Practical Unix and Internet Security”, O'Reilly 4. Blacharski D., “Network Security in a Mixed Environment”

Practical Packet Analysis: Using Wireshark to Solve Real-Word Network problems by Chris Sanders

COURSE PLAN COURSE

NO: 06NE6252

COURSE TITLE: Network Security

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Security Problem in TCP/IP Protocol Suite: Identification of Security issues in Ethernet- ARP- IP- TCP- Application and Routing protocols. Security Models: Military and civil security- vulnerability and threat models- End-end security ( COMSEC)- l i n k encryption (TRANSEC)- compartments. Privacy. Authentication. Denial of service. Nonrepudiation. Issues in multi-level secure systems. Internet security models: IPv4/IPv6 encapsulation header

9

30%

2

Security at Network Layer: Routing algorithm vulnerabilities: route and sequence number spoofing- instability and resonance effects. Information hiding: DMZ networks- route aggregation and segregation ICMP redirect hazard: denial of service. ARP hazard: phantom sources- ARP explosions and slow links. Defending against Chernobyl packets and meltdown.

5

FIRST INTERNAL EXAMINATION

2

Fragmentation vulnerabilities and remedies: (ICMP Echo overrun) IPSec: IP Security Overview- IP Security Architecture- Security Associations- Security Association Database- Security Policy Database- Tunnel and Transport mode- AH and ESP- IP and IPv6- Encapsulating Security Payload- Internet Key Exchange

4 30%

Page 63: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 61

3

Security at Transport Layer: SSL and TLS Secure network infrastructure services: DNS, NTP, SNMP, SSL Architecture, SSL/TLS Basic Protocol, SSL Message Formats, Session Resumption, Computing the keys, Client Authentication, PKI as deployed by SSL, Version Numbers, Negotiating Cipher Suites, Negotiating Compression Methods, Exportability, Encoding,

5

SECOND INTERNAL EXAMINATION

3

Mobile systems: Address Export and re-use. Session key management: Blindkey cryptosystems (NTP). Security at Application Layer: PGP- S/MIMIE E-mail security- PGP- PEM- S/MIME- Secure binding of multimedia streams- Secure RTP. Secure RSVP.

4

40%

4

Firewalls and IDS - Firewalls: Network partitioning- firewall platforms- partitioning models and methods- Secure SNMP- Secure routing interoperability: virtual networks (DARTnet/CAIRN). Transparent and opaque network services. Source masking and hidden channels. IDS- Honeypots-Honey nets

9

END SEMESTER EXAM

Page 64: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 62

Course No. Course Title L-T-P-

Credits Year

06NE6352 Advances in Storage Area Networks 3-0-0-3 2015 Prerequisites : Computer Networks, Operating Systems Course Objectives :

To Understand Storage Area Networks characteristics and components. To Define storage management software and its application to storage

Syllabus : Server Centric IT Architecture and its Limitations, I/O Techniques, Network Attached Storage , Storage Virtualization, SAN Architecture, Management of Storage Network. Course Outcome : On successful completion of this course

Understand Storage Area Networks characteristics and components. Familiar with storage virtualization.

Text Book : 1. Ulf Troppens, Rainer Erkens and Wolfgang Muller: Storage Networks Explained, Wiley

India,2013. References :

1. Robert Spalding: “Storage Networks The Complete Reference”, Tata McGraw-Hill, 2011. 2. Marc Farley: Storage Networking Fundamentals – An Introduction to Storage Devices,

Subsystems, Applications, Management, and File Systems, Cisco Press, 2005. 3. Richard Barker and Paul Massiglia: “Storage Area Network Essentials A CompleteGuide to

understanding and Implementing SANs”, Wiley India, 2006. COURSE PLAN

COURSE NO:

06NE6352

COURSE TITLE: Advances in Storage Area Networks

(L-T-P : 3-1-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction: Server Centric IT Architecture and its Limitations; Storage – Centric IT Architecture and its advantages. Case study: Replacing a server with Storage Networks The Data Storage and Data Access problem; The Battle for size and access. Intelligent Disk Subsystems: Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O Channels; JBOD- Storage virtualization using RAID and different RAID levels; Caching: Acceleration of Hard Disk Access; Intelligent disk subsystems- Availability of disk subsystems.

9

30%

2 I/O Techniques: The Physical I/O path from the CPU to the Storage System; SCSI; Fibre Channel Protocol Stack; Fibre Channel SAN; IP Storage.

5

FIRST INTERNAL EXAMINATION

2

Network Attached Storage: The NAS Architecture- The NAS hardware Architecture- The NAS Software Architecture- Network connectivity- NAS as a storage system. File System and NAS: Local File Systems; Network file Systems and file servers; Shared Disk file systems; Comparison of fibre Channel and NAS.

4 30%

Page 65: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 63

3

Storage Virtualization: Definition of Storage virtualization ; Implementation Considerations; Storage virtualization on Block or file level; Storage virtualization on various levels of the storage Network; Symmetric and Asymmetric storage virtualization in the Network.

5

SECOND INTERNAL EXAMINATION

3

SAN Architecture and Hardware devices: Overview- Creating a Network for storage; SAN Hardwaredevices; The fibre channel switch; Host Bus Adaptors; Putting the storage in SAN; Fabric operation from a Hardware perspective. Software Components of SAN: The switch’s Operating system; Device Drivers; Supporting the switch’s components; Configuration options for SANs.

4

40%

4

Management of Storage Network: System Management- Requirement of management System- Support by Management System- Management Interface- Standardized Mechanisms- Property Mechanisms- In-band Management- Use of SNMP- CIM and WBEM- Storage Management Initiative Specification (SMI-S)- CMIP and DMI

9

END SEMESTER EXAM

Page 66: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 64

Course No. Course Name L-T-P-

Credits Year

06NE6452 Next Generation Internetworking Protocol 3-0-0-3 2015 Prerequisites : Computer Networks Course Objectives :

To understand IPv6 Syllabus : Introduction to IPv6, IPv6 Addressing, IPv6 Address Types, ICMPv6 and Neighbor Discovery Protocol, IPv6 Configuration, Introduction to Routing IPv6 Course Outcome : On successful completion of this course

Know and design network with IPv6 Background Justification and Perspective for IPv6

Text Book : 11. Rick Graziani , IPv6 Fundamentals: A Straightforward Approach to Understanding IPv6, Cisco

Press References :

1. Silvia Hagen, IPv6 Essentials, ISBN-13: 978-1449319212, 3rd EditionO’Reilly 2. Edward Horley , Practical IPv6 for Windows Administrators, Apress, ISBN-13: 978-

1430263708, First Edition COURSE PLAN

COURSE NO:

06NE6452 COURSE TITLE: Next Generation Internetworking Protocol

(L-T-P :3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1 Introduction to IPv6 : History of IPv6- Benefits of IPv6- IPv4 Address Depletion- IPv4 Header- IPv6 Header- Comparing IPv4 and IPv6

9 30%

2 IPv6 Addressing- Representation of IPv6 Addresses- Prefix Notation- Global Unicast Address- Subnetting

3

FIRST INTERNAL EXAMINATION

2

IPv6 Address Types : IPv6 Address Space- Unicast Address-Global Unicast Address-Manual Global Unicast Configuration-Dynamic Configuration-Link-local Unicast-Dynamic Link-local Address: EUI-64 109-Randomly Generated Interface IDs-Static Link-local Address-Link-local Addresses and Duplicate Address Detection-Link-local Addresses and Default Gateways- Isolated Link-local Address-Loopback Address-Unspecified Address- Unique Local Address-IPv4 Embedded Address-IPv4-Compatible IPv6 Addresses-IPv4-Mapped IPv6 Addresses-Multicast

6

30%

3 ICMPv6 and Neighbor Discovery Protocol: General Message Format- ICMP Error Messages- Path MTU Discovery ICMP Informational Messages-Neighbor Discovery Protocol

4

SECOND INTERNAL EXAMINATION

3

IPv6 Configuration- Configuring Global Unicast Addresses-Configuring Link-local Addresses- Enabling IPv6 Packet Forwarding and ND Router Advertisements- Tuning Neighbor Discovery Parameters

5 40%

Page 67: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 65

4

Introduction to Routing IPv6- IPv6 Routing Table- Configuring IPv6 Static Routes- RIPng for IPv6- EIGRP for IPv6-OSPFv3 DHCPv6 Services- Basics of Dual-Stack and Tunneling- Basics of Network Address Translation IPv6 to IPv4 (NAT64)

9

END SEMESTER EXAM

Page 68: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 66

Course No. Course Title L-T-P-

Credits Year

06NE6062 Mini Project 0-0-4-2 2015 Each student shall identify a Mini project from networks and related areas . The Mini project work has to be carried out within the department itself. There is a project guide allotted to each student by the head of the division / course coordinator. The project work shall be reviewed and evaluated periodically by the project guide. At the end of the semester, each student shall submit a project report . The project must be evaluated by a team comprising of 3 internal examiners including the project guide,coordinator & a senior faculty member. Encourage students to convert Mini Project work into a good Technical paper.

Page 69: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 67

Course No. Course Title L-T-P-

Credits Year

06NE6072 Network Simulation Lab 0-0-3-1 2015 Prerequisites : Computer Networks, Wireless Sensor Networks, Cloud Computing, Fundamentals of Big Data Processing Course Objectives :

To learn and simulate computer networks using in NS2/ns3/OMNeT++ To learn and simulate cloud computing environment using cloudsim To learn and implement map reduce programs Visualising network data using Gephi

Syllabus : 1. Familiarizing a network simulator tool - OMNeT++/ns3/ns2(least preference) (Select one

for experiments) 2. Simulate a wired network consisting of TCP and UDP Traffic and then calculate their

respective throughput. 3. Compare the behavior of different variants of TCP (Tahoe, Reno, Vegas….) in wired network.

Comparison can be done on the congestion window behavior by plotting graph. 4. Simulation of wireless Ad hoc networks 5. Simulate a wireless network consisting of TCP and UDP Traffic and then calculate their

respective throughput. 6. Familiarization of CloudSim with suitable examples. 7. Modeling and simulation Cloud computing environments, including Data Centers, Hosts and

Cloudlets and perform VM provisioning using CloudSim. (Atleast 3 Experiments) 8. Implementtion of Map Reduce concepts (Atleast 3 Experiments) 9. Familiarization of Graph Visualizing Tool – Gephi. 10. Graph Visualization experiments (Atleast 3 Experiments)

Course Outcome : On successful completion of this course

Simulation experience in NS2/ns3/OMNeT++ Simulation experience in Cloud Sim Basic concepts on Gephi Implement Map-Reduce concept.

References : 1. OMNeT++ Tutorials : https://omnetpp.org/documentation 2. Ns3 Tutorials : https://www.nsnam.org/docs/tutorial/html/ 3. Issariyakul, Teerawat, Hossain, Ekram, Introduction to Network Simulator NS2, Springer 4. CloudSim Official Tutorials - http://www.cloudbus.org/cloudsim/examples.html 5. Gephi Tutorial - http://gephi.github.io/users/ 6. Hadoop Map Reduce Official Tutorial -

http://hadoop.apache.org/docs/r1.2.1/mapred_tutorial.html

Page 70: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 68

SEMESTER – III

Page 71: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 69

Course No. Course Title L-T-P-

Credits Year

06NE7111 Big Data Analytics 3-0-0-3 2015 Prerequisites : Distributed Systems Course Objectives :

To understand about basic concepts of big data analytics. Syllabus : Introduction to BigData Platform, Regression Modeling, Bayesian Modeling, Fuzzy Logic, Search by simulated Annealing, Introduction to Streams Concepts. Course Outcome : On successful completion of this course, the student should

Understand and apply the Big Data Flow to actual projects . Successfully apply appropriate techniques (such as ML) and tools to solve actual Big Data problems (derive value from vast data sets) . Have an in-depth understanding of the Big

Data ecosystem, specifically the Apache projects Understand about different data analysis techniques.

Text Book : 1. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.

References : 1. Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge

University Press, 2012. 2. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams

with Advanced Analytics”, John Wiley & sons, 2012. 3. Glenn J. Myatt, “Making Sense of Data”, John Wiley & Sons, 2007 4. Pete Warden, “Big Data Glossary”, O’Reilly, 2011. 5. Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Second Edition,

Elsevier, Reprinted 2008. 6. Da Ruan, Guoquing Chen, Etienne E.Kerre, Geert Wets, Intelligent Data Mining, Springer,2007 7. Paul Zikopoulos ,Dirk deRoos , Krishnan Parasuraman , Thomas Deutsch , James Giles, David

Corrigan , Harness the Power of Big Data The IBM Big Data Platform, Tata McGraw Hill Publications, 2012

8. Michael Minelli (Author), Michele Chambers (Author), Ambiga Dhiraj (Author) , Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses,Wiley Publications,2013

9. Zikopoulos, Paul, Chris Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, Tata McGraw Hill Publications, 2011

COURSE PLAN COURSE

NO: 06NE7111

COURSE TITLE: Big Data Analytics

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction To Big Data : Introduction to Big Data Platform – Traits of Big data -Challenges of Conventional Systems - Web Data – Evolution Of Analytic Scalability - Analytic Processes and Tools - Analysis vs Reporting - Modern Data Analytic Tools - Statistical Concepts: Sampling Distributions - ReSampling - Statistical Inference - Prediction Error

9

30%

2

Data Analysis : Regression Modeling - Multivariate Analysis - Bayesian Modeling - Inference and Bayesian Networks - Support Vector and Kernel Methods - Analysis of Time Series: Linear Systems Analysis - Nonlinear Dynamics - Rule

5

Page 72: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 70

Induction - FIRST INTERNAL EXAMINATION

2

Neural Networks: Learning And Generalization - Competitive Learning - Principal Component Analysis and Neural Networks - Fuzzy Logic: Extracting Fuzzy Models from Data - Fuzzy Decision Trees - Stochastic Search Methods.

4

30%

3

Search by simulated Annealing – Stochastic- Adaptive search by Evaluation – Evaluation Strategies – Genetic Algorithm – Genetic Programming – Visualization – Classification of Visual Data Analysis Techniques.

5

SECOND INTERNAL EXAMINATION

3

Data Types – Visualization Techniques – Interaction techniques – Specific Visual data analysis Techniques. Introduction To Streams Concepts – Stream Data Model and Architecture - Stream Computing - Sampling Data in a Stream – Filtering Streams – Counting Distinct Elements in a Stream – Estimating Moments.

4

40%

4

Counting Oneness in a Window – Decaying Window - Real time Analytics Platform(RTAP) Applications - Case Studies - Real Time Sentiment Analysis, Stock Market Predictions. Frequent Item sets and Clustering: Mining Frequent Itemsets - Market Based Model – Apriori Algorithm – Handling Large Data Sets in Main Memory – Limited Pass Algorithm – Counting Frequent Itemsets in a Stream – Clustering Techniques – Hierarchical – K-Means – Clustering High Dimensional Data – CLIQUE And PROCLUS – Frequent Pattern based Clustering Methods – Clustering in Non-Euclidean Space – Clustering for Streams and Parallelism.

9

END SEMESTER EXAM

Page 73: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 71

Course No. Course Title L-T-P-

Credits Year

06NE7211 Concurrent Algorithms and Data Structures 3-0-0-3 2015 Prerequisites : Familiarity with standard programming techniques, familiarity with concurrent programming Course Objectives :

For familiarization with concurrent data types and implementation. To understand the importance of mutual exclusion.

Syllabus : Mutual exclusion; correctness conditions for concurrent data types, foundations of shared memory, the relative power of synchronization methods; universality of consensus. Implementing locks, monitors and barriers; implementing concurrent data types such as linked lists, queues, counting and sorting networks, hash tables, skip lists and priority queues. Course Outcome : On successful completion of this course

Understand the importance of mutual exclusion, and different ways to implement it. Understand correctness criteria for concurrent data types. Understand the relative power of different concurrency primitives.

Text Book : 1. “The Art of Multiprocessor Programming “ by Maurice Herlihy and Nir Shavit, revised first

edition, Morgan Kaufman, 2012. References :

1. Data Structures Using C and C++ by Y. Langsam, M. Augenstein & A. Tenenbaum 2. Mark Moir and Nir Shavit (2007). "Concurrent Data Structures". In Dinesh Metha and Sartaj

Sahni. 'Handbook of Data Structures and Applications' (1st ed.). Chapman and Hall/CRC Press. pp. 47–14–47–30.

3. Concurrent Algorithms and Data Structures for Many-Core Processors Daniel Cederman ISBN 978-91-7385-503-7

COURSE PLAN COURSE

NO: 06NE7211

COURSE TITLE: Concurrent Algorithms and Data Structures

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction: Shared Objects and Synchronization-The Producer–Consumer Problem-The Readers–Writers Problem-The Harsh Realities of Parallelization-Parallel Programming. Mutual Exclusion: Time- Critical Sections- 2-Thread Solutions- The Filter Lock- Fairness- Lamport’s Bakery Algorithm- Bounded Timestamps- Lower Bounds on the Number of Locations.

9

30%

2

Concurrent Objects: Concurrency and Correctness- Sequential Objects- Quiescent Consistency- Sequential Consistency- Linearizability- Formal Definitions- Progress Conditions- The Java Memory Model.

5

FIRST INTERNAL EXAMINATION

2

Foundations of Shared Memory: The Space of Registers- Register Constructions- Atomic Snapshots- The Relative Power of Primitive Synchronization Operations- Universality of Consensus

3 30%

3 Spin Locks and Contention: Test-And-Set Locks- queue locks- A Composite Lock- Hierarchical Locks- Monitors and

5

Page 74: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 72

Blocking Synchronization- Monitor Locks and Conditions- Readers–Writers Locks Linked Lists: the Role of Locking: concurrent reasoning; coarse-grained synchronization; ne-grained synchronization; optimistic synchronization; lazy synchronization; non-blocking synchronization.

SECOND INTERNAL EXAMINATION

3

Concurrent Queues and the ABA Problem: bounded partial queue; unbounded total queue; unbounded lock-free queue; memory reclamation and the ABA problem. Concurrent Stacks and Elimination: a lock-free stack; elimination back-off stack.

4

40%

4

Concurrent Hashing and Natural Parallelism: closed-address hash sets (coarse-grained- striped- sharded- refinable); lock-free hash set (recursive split-ordering); open-addressed hash set (sharded; cuckoo hashing). Skiplists and Balanced Search: lock-based concurrent skiplist; lock-free concurrent skiplist. Priority Queues: array-based priority queue; tree-based priority queue; unbounded heap-based priority queue; skiplist-based unbounded priority queue. Barriers: sense-reversing barrier; combining tree barrier; static tree barrier; termination detecting barriers.

10

END SEMESTER EXAM

Page 75: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 73

Course No. Course Title L-T-P-

Credits Year

06NE7311 Social Network Analysis 3-0-0-3 2015 Prerequisites : Internet And Web Technology Course Objectives :

To understand the concepts of Social networks and Web Social Networks To appreciate the modeling and visualizing techniques associated with Social Networks To understand the different techniques used to mine communities from Web Social

Networks To appreciate concepts of evolution and prediction in Social Networks To understand the application of text mining techniques for Content and Opinion mining

Syllabus : Social Networks, Visualizing Online Social Networks, Modelling and aggregating social network data, Aggregating and reasoning with social network data, Framework, Algorithms and Systems for Expert Location in Social Networks, Text Mining in Social Networks Course Outcome : On successful completion of this course

Build a social network data set from existing social networking sites Identify the different components of a web social network that can be used for analyzing and

mining Identify the different data structures and graph algorithms that can be used for web social

network mining Implement a community detection algorithm Process Social Network data using MapReduce paradigm Design an application that uses various aspects of Social Network Mining to improve its

functionality and to harvest information available on the web to build recommender systems Analyze social media data using appropriate data/web mining techniques

Text Book : 1. Charu C. Aggarwal, Social Network Data Analytics, Springer; 2011

References : 1. Peter Mika, Social Networks and the Semantic Web, Springer, 1st edition 2007. 2. Borko Furht, Handbook of Social Network Technologies and Applications, Springer, 1st

edition, 2010. 3. Guandong Xu , Yanchun Zhang and Lin Li, Web Mining and Social Networking – Techniques

and applications, Springer, 1st edition, 2011. 4. Giles, Mark Smith, John Yen, Advances in Social Network Mining and Analysis, Springer, 2010. 5. Ajith Abraham, Aboul Ella Hassanien, Václav Snášel, Computational Social Network Analysis:

Trends, Tools and Research Advances, Springer, 2009. 6. Toby Segaran, Programming Collective Intelligence, O’Reilly, 2012

COURSE PLAN COURSE

NO: 06NE7311

COURSE TITLE: Semantic Web and Social Networks

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to Web - Limitations of current Web – Development of Semantic Web – Emergence of the Social Web – Statistical Properties of Social Networks -Network analysis - Development of Social Network Analysis - Key concepts and measures in network analysis - Discussion networks - Blogs and online communities - Web-based networks.

9 30%

Page 76: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 74

2

Visualizing Online Social Networks - A Taxonomy of Visualizations - Graph Representation - Centrality- Clustering - Node-Edge Diagrams - Visualizing Social Networks with Matrix-Based Representations- Node-Link Diagrams - Hybrid Representations -

5

FIRST INTERNAL EXAMINATION

2

Modelling and aggregating social network data – Random Walks and their Applications –Use of Hadoop and Map Reduce - Ontological representation of social individuals and relationships.

4

30%

3

Aggregating and reasoning with social network data- Advanced Representations - Extracting evolution of Web Community from a Series of Web Archive - Detecting Communities in Social Networks - Evaluating Communities – Core Methods for Community Detection & Mining - Applications of Community Mining Algorithms - Node Classification in Social Networks.

5

SECOND INTERNAL EXAMINATION

3

Evolution in Social Networks – Framework - Tracing Smoothly Evolving Communities - Models and Algorithms for Social Influence Analysis - Influence Related Statistics - Social Similarity and Influence - Influence Maximization in Viral Marketing

4

40%

4

Algorithms and Systems for Expert Location in Social Networks - Expert Location without Graph Constraints - with Score Propagation – Expert Team Formation - Link Prediction in Social Networks - Feature based Link Prediction - Bayesian Probabilistic Models - Probabilistic Relational Models - Text Mining in Social Networks -Opinion extraction – Sentiment classification and clustering - Temporal sentiment analysis - Irony detection in opinion mining - Wish analysis - Product review mining – Review Classification – Tracking sentiments towards topics over time.

9

END SEMESTER EXAM

Page 77: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 75

Course No. Course Title L-T-P-

Credits Year

06NE7411 Intrusion Detection Systems 3-0-0-3 2015 Prerequisites : Network Security Course Objectives :

Understand the concepts of Intrusion Detection System. Understanding on Snort Technology.

Syllabus : IDS,SNORT, Intrusion Prevention Systems, Working with Snort Rules, Using Snort with MySQL. Course Outcome : On successful completion of this course

Learn to configure ID systems (e.g. SNORT) and analyze their output. Text Book :

1. Rafeeq Rehman, Intrusion Detection with SNORT, Apache, MySQL, PHP and ACID, Prentice Hall PTR, 2003.

References : 1. Richard Bejtlich , The Practice of Network Security Monitoring, No Starch Press, 978-1-

59327-509-9 2. Ryan Trost , Practical Intrusion Analysis: Prevention and Detection for the Twenty-First

Century ,Addison-Wesley; ISBN 0-321-59180-1. 3. Michael Rash , Linux Firewalls: Attack detection and Response with iptables, psad, and

fwsnort No Starch Press; ISBN 1-59327-141-7.

COURSE PLAN COURSE

NO: 06NE7411

COURSE TITLE: Intrusion Detection Systems

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction- Some Definitions- Where IDS Should be Placed in Network Topology- Honey Pots- Security Zones and Levels of Trust- IDS Policy- Components of an intrusion detection system - Packet Decoders- Preprocessors- The Detection Engine- Logging and Alerting System- Output Modules- Dealing with Switches- TCP Stream Follow Up- How to Protect IDS Itself- Internal and external threats to data- attacks- need and types of IDS.

9

30%

2

Intrusion Prevention Systems- Network IDSs- Protocol based IDs- Application protocol- host based- hybrid based IDs- architectures- Snort - Snort Installation Scenarios- Test Installation- Single Sensor Production IDS- Single Sensor with Network Management System Integration- Single Sensor with Database and Web Interface.

5

FIRST INTERNAL EXAMINATION

2

Multiple Snort Sensors with Centralized Database- Installing Snort- Running Snort on a Non-Default Interface- Automatic Startup and Shutdown- Running Snort on Multiple Network Interfaces- Location of Snort Files- Snort Modes- Snort Alert Modes- Running Snort in Stealth Mode Working with Snort Rules - TCP/IP Network Layers- CIDR- Structure of a Rule- Rule Headers- Rule Options- The Snort Configuration File- Order of Rules Based upon Action.

4 30%

3 AutomaticallyUpdating Snort Rules- Default Snort Rules and 5

Page 78: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 76

Classes- Sample Default Rules- Writing Good Rules. Plugins- Preprocessors and Output Modules - Preprocessors - HTTP Decode- Port Scanning- The frag2 Module- The stream4 Module- The spade Module- ARP Spoofing- Output Modules - The alert_syslog Output Module.

SECOND INTERNAL EXAMINATION

3

The alert_full Output Module- The alert_fast Output Module- The alert_smb Module- The log_tcpdump Output Module- The XML Output Module- Logging to Databases- CSV Output Module- Unified Logging Output Module- SNMP Traps Output Module- Log Null Output Module- Using BPF Filters. Using Snort with MySQL - Making Snort Work with MySQL- Snort Compilations with MySQL Support- Install MySQL.

4

40%

4

Creating Snort Database in MySQL- Creating MySQL User and Granting Permissions to User and Setting Password- Creating Tables in the Snort Database- Modify snort.conf Configuration File- Starting Snort with Database Support- Logging to Database- Secure Logging to Remote Databases Securely- Using Stunnel, Snort Database Maintenance.

9

END SEMESTER EXAM

Page 79: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 77

Course No. Course Title L-T-P-

Credits Year

06NE7121 Software Defined Networking 3-0-0-3 2015 Prerequisites: Enterprise Devices & Networking Course Objectives :

Introduces an emerging paradigm in computer networking that allows a logically centralized software program to control the behaviour of an entire network.

Syllabus : Basic Packet-Switching Terminology, Software Defined Networking, Open Flow, SDN in the Data Center Course Outcome : On successful completion of this course

Learn Software controlled virtual network devices Knowledge on Mininet and Open Flow

Text Book : 1. Paul Göransson, Chuck Black, Software Defined Networks A Comprehensive Approach,

Elsevier,2014 References :

1. Paul Goransson,Chuck Black, Software Defined Networks: A Comprehensive Approach, 1st Edition, MK

2. Thomas D. Nadeau, SDN: Software Defined Networks, 1st Edition, Oreilly COURSE PLAN

COURSE NO:

06NE7121

COURSE TITLE: Software Defined Networking

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Basic Packet-Switching Terminology- The Modern Data Center- Traditional Switch Architecture- Autonomous and Dynamic Forwarding Tables- Evolution of Switches and Control Planes- Cost- SDN Implications for Research and Innovation- Data Center Innovation- Data Center Needs

9 30%

2 The Evolution of Networking Technology- Forerunners of SDN - Software Defined Networking

5

FIRST INTERNAL EXAMINATION

2

OpenFlow- Sustaining SDN Interoperability- Network Virtualization- Fundamental Characteristics of SDN- SDN Operation- SDN Devices- SDN Controller- SDN Applications- Alternate SDN Methods

4

30%

3

OpenFlow Overview- OpenFlow 1.0 and OpenFlow Basics- OpenFlow 1.1 Additions- OpenFlow 1.2 Additions- OpenFlow 1.3 Additions- OpenFlow Limitations- Potential Drawbacks of Open SDN- SDN via APIs- DN via Hypervisor-Based Overlays- SDN via Opening Up the Device- Network Functions Virtualization- Alternatives Overlap and Ranking

5

SECOND INTERNAL EXAMINATION

3

SDN in the Data Center- Data Center Demands- Tunneling Technologies for the Data Center- Path Technologies in the Data Center- Ethernet Fabrics in the Data Center- SDN Use Cases in the Data Center

4 40%

4 Open SDN versus Overlays in the Data Center- Real-World Data Center- SDN in Other Environments- Wide Area

9

Page 80: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 78

Networks- Service Provider and Carrier Networks- Campus Networks- Hospitality Networks- Mobile Networks- Optical Networks

END SEMESTER EXAM

Page 81: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 79

Course No. Course Title L-T-P-

Credits Year

06NE7221 Network Forensics 3-0-0-3 2015 Prerequisites : Basics of System Administration Course Objectives :

Provide an overview of network security devices and infrastructures, including proxy servers and firewalls.

Describe network security risk and the range of threats. Describe the key network protocols, such as IP, TCP, ARP, ICMP, DNS.

Syllabus : Introduction to Network Forensics, Evidence Acquisition, Traffic Analysis, Statistical Flow Analysis, Intrusion Detection and Analysis , Network Tunneling,Covert Tunneling, Malware Forensics. Course Outcome : On successful completion of this course

Learn how to discuss and describe these common network security and forensic principles and concepts.

Knowledge about key concepts in information security and network forensics. Text Book :

1. Sherri Davidoff, Jonathan Ham, Network Forensics: Tracking Hackers through Cyberspace, Pearson Education, 2012.

References : 1. Katzendbisser, Petitcolas, Information Hiding Techniques for Steganography and Digital

Watermarking, Artech House. 42 2. Peter Wayner,Disappearing Cryptography: Information Hiding, Steganography and

Watermarking 2/e, Elsevier 3. John Vecca, Computer Forensics: Crime scene Investigation, Firewall Media 4. Christopher L.T. Brown, Computer Evidence: Collection and Preservation, Firewall Media

COURSE PLAN COURSE

NO: 06NE7221

COURSE TITLE: Network Forensics

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Introduction to Network Forensics : Concepts in Digital Evidence- Challenges relating to Network Evidence- Network Forensics Investigative Methodology- Technical Fundamentals- Sources of Network-Based Evidence- On the Wire- In the Air- Switches - Routers- DHCP Servers- Name Servers- Authentication Servers- Network Intrusion Detection /Prevention Systems- Firewalls- Web Proxies- Application Servers- Central Log Servers- Evidence Acquisition: Physical Interception-Cables- Radio Frequency- Hubs- Switches- Traffic Acquisition Software- libpcap and WinPcap

9

30%

2

The Berkeley Packet Filter (BPF) Language- tcpdump - Wireshark- tshark- dumpcap- Active Acquisition- Common Interfaces- Inspection Without Access- Strategy. Traffic Analysis : Protocol Analysis- Protocol Analysis Tools- Protocol Analysis Techniques- Packet Analysis- Packet Analysis Tools- Packet Analysis Techniques- Flow Analysis- Flow Analysis Tools- Flow Analysis Techniques- Higher-Layer Traffic Analysis- Common Higher-Layer Protocols- Higher-Layer Analysis Tools- Higher-Layer Analysis

5

Page 82: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 80

Technique

FIRST INTERNAL EXAMINATION

2

Statistical Flow Analysis- Process Overview- Sensors- Sensor Types- Sensor Software- Sensor Placement- Flow Record Export Protocols- NetFlow- IPFIX- sFlow- Collection and Aggregation- Wireless Traffic Capture and Analysis- Spectrum Analysis- Wireless Passive Evidence Acquisition- Common Attacks – Sniffing- Rogue Wireless Access Points- Evil Twin- WEP Cracking- Locating Wireless Devices.

4

30%

3

Network Devices- Intrusion Detection and Analysis : Typical NIDS/NIPS Functionality- Sniffing - Higher-Layer Protocol Awareness- Alerting on Suspicious Bits Modes of Detection- Signature-Based Analysis- Protocol Awareness- Behavioral Analysis- Types of NIDS/NIPSs - NIDS/NIPS Evidence Acquisition - Comprehensive Packet Logging - Event Log Aggregation- Correlation- and Analysis

5

SECOND INTERNAL EXAMINATION

3

Sources of Logs - Operating System Logs - Application Logs Physical Device Logs- Network Equipment Logs- Network Log Architecture- Three Types of Logging Architectures- Remote Logging: Common Pitfalls and Strategies. Switches - Content-Addressable Memory Table- ARP- Switch Evidence- Routers-Types of Routers- Router Evidence- Firewalls -Types of Firewalls - Firewall Evidence. Advanced Topics : Network Tunneling- Tunneling for Functionality- Inter-Switch Link (ISL)- Generic Routing Encapsulation (GRE).

4

40%

4

Tunneling for Confidentiality- Internet Protocol Security (IPsec)- Transport Layer Security (TLS) and Secure Socket Layer (SSL)- Covert Tunneling- Covert Tunneling Strategies - TCP Sequence Numbers - DNS Tunnels - ICMP Tunnels. Malware Forensics- Trends in Malware Evolution- Network Behavior of Malware- Propagation- Command-and-Control Communications- Payload Behavior.

9

END SEMESTER EXAM

Page 83: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 81

Course No. Course Title L-T-P-

Credits Year

06NE7321 Cloud Security 3-0-0-3 2015 Prerequisites : Cloud Computing Course Objectives :

Compare modern security concepts as they are applied to cloud computing Appraise compliance issues that arise from cloud computing

Syllabus : Security concepts, Multi-tenancy issues, Virtualization system-specific attacks, Legal and compliance issues Course Outcome : On successful completion of this course

Understand the basic concepts in cloud security. Learn the methods to improve virtualization security

Text Book : 1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An Enterprise

Perspective on Risks and Compliance O'Reilly Media; 1 edition [ISBN: 0596802765], 2009. References :

1. Ronald L. Krutz, Russell Dean Vines, Cloud Security” [ISBN: 0470589876], 2010. 2. John Rittinghouse, James Ransome, Cloud Computing” CRC Press; 1 edition [ISBN:

1439806802], 2009. 4. J.R. ("Vic") Winkler, Securing the Cloud” Syngress [ISBN: 1597495921] 2011.

3. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing 2009.

4. Vmware VMware Security Hardening Guide White Paper, June 2011 . 5. Cloud Security Alliance 2010, Top Threats to Cloud Computing Microsoft 2013.

COURSE PLAN COURSE

NO: 06NE7321

COURSE TITLE: Cloud Security

(L-T-P : 3-0-0)

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Confidentiality- privacy- integrity- authentication- non-repudiation- availability- access control- defence in depth- least privilege- how these concepts apply in the cloud- what these concepts mean and their importance in PaaS- IaaS and SaaS. e.g. User authentication in the cloud; Cryptographic Systems- Symmetric cryptography- stream ciphers- block ciphers- modes of operation- public-key cryptography- hashing- digital signatures- public-key infrastructures- key management- X.509 certificates- OpenSSL.

9

30%

2

MULTI-TENANCY ISSUES: Isolation of users/VMs from each other. How the cloud provider can provide this; Virtualization System Security Issues- e.g. ESX and ESXi Security- ESX file system security- storage considerations- backup and recovery;

5

FIRST INTERNAL EXAMINATION

2

Virtualization System Vulnerabilities- Management console vulnerabilities- management server vulnerabilities- administrative VM vulnerabilities- guest VM vulnerabilities- hypervisor vulnerabilities- hypervisor escape vulnerabilities- configuration issues- malware (botnets etc).

4 30%

Page 84: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 82

3

VIRTUALIZATION SYSTEM-SPECIFIC ATTACKS: Guest hopping- attacks on the VM (delete the VM- attack on the control of the VM- code or file injection into the virtualized file structure)- VM migration attack- hyper jacking.

5

SECOND INTERNAL EXAMINATION

3 IBM security virtual server protection- virtualization-based sandboxing; Storage Security- HIDPS- log management- Data Loss Prevention. Location of the Perimeter.

4

40%

4

LEGAL AND COMPLIANCE ISSUES: Responsibility- ownership of data- right to penetration test- local law where data is held- examination of modern Security Standards (eg PCIDSS)- how standards deal with cloud services and virtualization- compliance for the cloud provider vs. compliance for the customer.

9

END SEMESTER EXAM

Page 85: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 83

Course No. Course Name L-T-P-

Credits Year

06NE7421 Green Computing 3-0-0-3 2015 Prerequisites : NIL Course Objectives :

Course present the energy management policies at the operating system level that consider performance vs. energy saving tradeoffs.

Syllabus : Low-Power,Massively Parallel,Energy-Efficient Supercomputers:Introduction-Voltage Scaling in Hardware Technologies Course Outcome : On successful completion of this course, the student should

Understand the concepts of technologies that conform to low-power computation Understand green (power-efficient) technologies for components of one single computer,

such as CPU, memory and disk, and appreciate cutting edge designs for these components including memristors

Have a basic understanding of a variety of technologies applied in building a green system (especially green datacentres), including networks, Virtual Machine (VM) management and storage systems

Be able to use a range of tools to help monitor and design green systems Text Book :

1. Wu-chun Feng – “The Green Computing Book: Tackling Energy Efficiency at Large Scale”, CRC Press

References : 1. John W.Rittinghouse and James F.Ransome, “Cloud Computing: Implementation,

Management, and Security”, CRC Press, 2010. 2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical Approach”,TMH,

2009. 3. Kumar Saurabh, “Cloud Computing – insights into New-Era Infrastructure”, Wiley India,2011. 4. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in

the Cloud” O'Reilly 5. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”,

Elsevier/Morgan Kaufmann, 2005. 6. Katarina Stanoevska-Slabeva, Thomas Wozniak, Santi Ristol, “Grid and Cloud Computing – A

Business Perspective on Technology and Applications”, Springer. 7. Ronald L. Krutz, Russell Dean Vines, “Cloud Security – A comprehensive Guide to Secure

Cloud Computing”, Wiley – India, 2010. In Networks” COURSE PLAN

COURSE NO:

6NE7421 COURSE TITLE: Green Computing

L-T-P : 3-0-0

CREDITS:3

Module Contents Content Hours

Sem.Exam Marks:%

1

Low-Power,Massively Parallel,Energy-Efficient Supercomputers:Introduction-Voltage Scaling in Hardware Technologies : Low-Voltage Scaling of Active Devices-On-Chip Digital Noise-Power Delivery- Off-Chip Connections-Cooling-Blue Gene Hardware : Voltage Scaling- Low-Power Floating-Point Units-Power Delivery -Off-Chip Connections-Cooling-System Software:Overview-System Monitoring-Job History-Operational Phases-Applications

9 30%

Page 86: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 84

2

Compiler-Driven Energy Efficiency:Introduction-Energy-Aware I/O Optimizations-Modifying Application Code-Modifying Disk Layout of Data-Energy-Aware NoC Optimization-History -Based Dynamic Link Voltage Scaling-Static Analysis-Based Link Voltage Scaling

4

FIRST INTERNAL EXAMINATION

2

An Adaptive Run-Time System for Improving Energy Efficiency:Introduction-An Adaptive Run-Time System-Evaluation Methodology and setup-Experimental Results-Conclusion-Energy

5

30%

3

Efficient Multithreading through Run-Time Adaptation:Introduction-Run-Time Systems for Power-Performance Adaptation:An Overview-Scalability Prediction: Static Scalability Prediction Models-Dynamic Scalability Prediction Models-Evaluation-Multidimensional Power-Performance Adaptation: Sca Analysis of parallel applications-Run-Time support for Energy-Efficient Multithreading – Intergrating DCT with DVFS Exploring Trade-Offs between Energy Savings and Reliability in Storage Systems:Introduction-Reliability versus Energy-Efficient of storage system

6

SECOND INTERNAL EXAMINATION

3

Current state of the Art:Reliability Improvement Techniques-Redundant Array of Inexpensive Disks-Latent sector errors -Interleaved parity check-Disk Scrubbing-Intradisk Redundancy-Idle Read after Write-Fine-Tuning Intradisk Redundancy and Accelerated Scrubbing-Staggered Scrubbing -Energy Management Technique-High-Energy Consumption of Disk Arrays-Energy Conservation via Disk Block Migration

3

40%

4

Energy-Efficient Virtualized Systems:Introduction-Virtualization and Power management-Benefits of virtualized data center deployments-Virtualization Architectural overview-Power management requirements for virtualized systems-Platform enhancement for energy-aware VM management-Coordinated VM power Management with VirtualPower- VirtualPower architectural Overview-Experimental Results-Paravirtualized Management Interfaces for platform power budgeting-Power Management mechanisms for distributed Virtualized platforms-Experimental Results

9

END SEMESTER EXAM

Page 87: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 85

Course No. Course Title L-T-P-

Credits Year

06NE7031 Seminar II 0-0-2-2 2015 Each student shall present a seminar on any topic of interest related Computer Networks/ Related fields. He / she shall select the topic based which can be extended for their Course Project on the References: from reputed International Journals, preferably IEEE journals. They should get the paper approved by the Programme Co-ordinator / Faculty member in charge of the seminar and shall present it in the class. Every student shall participate in the seminar. The students should undertake a detailed study on the topic and submit a report at the end of the semester. Marks will be awarded based on the topic, presentation, participation in the seminar and the report submitted. Encourage students to convert these seminar topics into a good survey paper or Technical paper.

Page 88: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 86

Course No. Course Title L-T-P-

Credits Year

06NE7041 Project(Phase 1) 0-0-8-6 2015 In Project(Phase 1), the students are expected to select an emerging research area in Network Engineering or related fields, After conducting a detailed literature survey, they should compare and analyze research work done and review recent developments in the area and prepare an initial design of the work to be carried out as Project(Phase 2). It is expected that the students should refer National and International Journals and proceedings of National and International conferences while selecting a topic for their thesis. He/She should select a recent topic from a reputed International Journal, preferably IEEE/ACM. Emphasis should be given for introduction to the topic, literature survey, and scope of the proposed work along with some preliminary work carried out on the thesis topic. Students should submit a copy of Project(Phase 1) thesis report covering the content discussed above and highlighting the features of work to be carried out in Phase-II of the thesis. Students should follow standard practice of thesis writing. Presenting the work, carried out by the students in a National/International Conference is encouraged. The project work has to be carried out within the department itself. There is a project guide allotted to each student by the head of the division / course coordinator. The project work shall be reviewed and evaluated periodically by the project guide. Under special cases, student can carry out a project in a reputed Industry / R&D institutions with the permission of course coordinator / HOD. The candidate should present the current status of the thesis work and the assessment will be made on the basis of the work and the presentation, by a panel of internal examiners in which one will be the internal guide. The examiners should give their suggestions in writing to the students so that it should be incorporated in the Project(Phase 2)of the thesis.

Page 89: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 87

SEMESTER – IV

Page 90: RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY · RAJAGIRI SCHOOL OF ENGINEERING & TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY M.Tech – NETWORK ENGINEERING CURRICULUM BOOK (KTU)

Kerala Technological University Ernakulam Cluster - 1

M.Tech in Network Engineering 88

Course No. Course Title L-T-P-

Credits Year

06NE7012 Project(Phase 2) 0-0-21-12 2015 In the fourth semester, the student has to continue the Project () work and after the successful completion of the work, he / she have to submit a detailed thesis report. The work carried out should lead to a publication in a National / International Conference. They should submit the paper before the evaluation of the thesis and specific weightage will be given to accepted papers in reputed conferences.