B. Tech - CSE - Syllabus 2019-20 V7.0 Final
B. Tech - CSE - Syllabus 2019-20 V7.0 Final
for
Books:
1. C Programming by Deital and Deital.
2. Programming in ANSI C, E. Balaguruswamy, 5th Edition McGraw Hill.
3. The C Programming Language, Brian W. Kernighan, Dennis M. Ritchie, Prentice Hall.
4. Programming With C, Byron Gottfried, McGraw Hill.
Books:
1. C Programming by Deital and Deital.
2. Schaum's Outline of Programming with C by Byron Gottfried
3. Programming in ANSI C by E. Balagurusamy
2|Page
CS11102 Introduction to Computer Systems 2-0-0 2
Module 1 [6L]: Number System and Codes: Data Representation, Concept of Radix and
Representation of Numbers in Radix r with Special Case of r=2, 8, 10 and 16; Conversion from
Radix r1 to Radix r2; General Concept of r’s and (r-1)’s Complements; Signed and Unsigned
Representation of Integer, 1’s, 2’s Complement and Floating Point and their Machine
Representation. Binary Arithmetic; Character Representation-ASCII, EBDIC, UNICODE.
Module 3 [6L]: Introduction: Stored Program Architecture of Computers and Block Diagram,
Evolution of Processors (In terms of word Length & Speed, Instructions per Second), Hardware
and Software, Classification of Computer System, Computer Architecture- RISC vs CISC,
Concept of Primary & Secondary Memory, Storage Devices Classification, Hierarchy, Working
Principle, Access Methods, Structure of Hard Disk System & Organization of Data; Cache
Memory.
Books:
1. Computer Fundamentals by P. K. Sinha & Priti Sinha, BPB Publications, 1992.
2. Introduction to Computers by Norton Peter, 4th Ed., TMH, 2001
3. Fundamentals of Computers by Reema Thareja, Oxford University Press, 2014.
4. Introduction to Computers by V. Raja Raman, PHI,
5. Introduction to Computers by Alex Leon & Mathews Leon, Vikas Publishing House, 1999.
6. Comdex Computer Kit by Vikas Gupta, Wiley Dreamtech, Delhi, 2004
3|Page
Second Semester
Module 2 [6L]: Sorting, Searching; Sorting techniques- need; Types of Sorting, selection sort,
Quick Sort; Searching techniques: need; Linear Search, Binary Search; Implementation and
Applications of all.
Module 5[8L]: Introduction to Machine Learning, Artificial Intelligence and Fuzzy logic,
Internet of Things, Natural Language Processing, Big Data, Mobile Computing, Cloud
Computing.
Books:
1. Data structures in C by H. Sahani
2. Computer Networking: A Top-Down Approach Featuring Internet by J. F. Kurose and
K. W. Ross, 3/e, Pearson Education, 2005.
3. Machine Learning by Tom Mitchel, TMH
Reference:
4. Data Structures by Tanenbum
5. Data Communications and Networking by Forouzan
4|Page
CS12201 Computing Laboratory 0-0-2 1
1) You are required to write the programs in c on the integer array for following operations
a. To insert the elements in the integer array and to display the number of negative elements
of the array and also to display the prime elements of the array.
b. Write function that can find the largest element in the array. Array must be used as
parameter.
c. Write a program that invokes the above function (b) to find the largest element and print it
out.
d. Write function that can find the largest element in the integer array using pointer arithmetic.
e. Write a program that invokes the above (d) function to find the largest element and displays
the result out.
3) Write a program in c that receives a number n and return a pointer to the character string
containing the name of the corresponding month.
4) You are required to define a structure named UP with the following three members:
A character array city[] to store names.
A long integer to store the population of the city.
A float member to store the literacy level.
Then write a program to do the following:
a. To read the details of 5 cities randomly using an array variable.
b. To sort the list alphabetically.
c. To sort the list based on literacy level.
d. To sort the list based on population.
e. To display the sorted lists.
5) As you have studied structure and pointer in the last semester. You are required to write
programs using structure containing a pointer member name to represent the information
about a person.
a. Toread the information about a person and to print it on the screen.
b. To initialize data of several employees and print it in tabular format. Use the function
emp_print() the data of a single employee.
c. To create and print a list of persons and their mobile number. Use nested structure and
pointer members.
6. Write a program to implement a single link list to perform the following operations
a. Insertion at the beginning, at end and at any position of the list.
b. Deletion at the beginning, at end and at any position of the list.
c. Traverse the single link list
7. Write a program to implement stack using static and dynamic representation and perform
Insertion and Deletion.
8. Write a program to implement queue using static and dynamic representation and perform
Insertion and Deletion.
9. Write a program to implement binary tree using link list.
10. Write a program to implement linear and binary search.
11. Write a program to sort a list of elements using bubble sort and selection sort.
5|Page
Third Semester
Books:
1. Data Structures Using C by Aaron M. Tenenbaum, Y. Langsam, Moshe J. Augenstein.
2. Data structures and Algorithms with Object oriented design paterns in C++ by Bruno R.
Preiss.
3. Data Structures and Program Design in C by Robert L. Kruse
4. Fundamental of data Structure in C by E. Horowitz, S. Sahni and S. Anderson-Freed.
5. Data Structures and Algorithms by A. V Aho, J. D Ullman and J. E Hopcroft, Addison
Wesley.
6|Page
CS13102 Data Communications 3-0-0 3
Module 1[9L]: Introduction- Computer Networks and Internet philosophy; Data
Communication, Data Transmission Modes, Signaling and Transmission, Types Communication
Channels, Periodic Analog Signals, Digital signals, Transmission Impairments, Bandwidth and
Data Rate Limits, Communication Line performances. Digital Transmission, Bandwidth
Utilization: Multiplexing, Spread Spectrum.
Module 2[9L]: Concept of Layering, TCP/IP and OSI Layering Models, Transmission Media:
Guided Media, Unguided Media, Fibre-optic cables, Telephone Line and Modems. Switching:
Circuit Switched Networks, Packet Switching, and Structure of a Switch. Delay and loss,
Communication Process, the network edges: Distributed Systems and Networks, Peer to Peer
and Client Server Networks, Network Topologies, Network Components, Connections.
Module 3[9L]: Data Link Layer: Link Layer Services, Link Layer Addressing: MAC Addresses,
ARP, RARP, DHCP. Error Detection and Correction Techniques: Introduction, Block Coding,
Cyclic Codes, Checksum, Forward Error Correction. Framing Techniques, Flow and Error
Control protocols: Simplest and Stop & Wait protocol, Sliding Window Protocol.
Module 4 [9L]: MAC: Access Control Protocols: Random Access Protocols, Controlled Access
Protocols, Fast access technologies, Ethernet, Hubs, Bridges, Gateway, Repeaters, Switches,
PPP, MPLS, and VLAN. Token Rings (IEEE 802.5).
Books:
1. Computer Networking: A Top-Down Approach Featuring Internet by J. F. Kurose and K.
W. Ross, 3/e, Pearson Education, 2005.
2. Data Communications and Networking by Behrouz A. Forouzan, Fifth Edition, 2013
3. Data and Computer Communications by William Stallings, Eighth Edition, 2012
4. Computer Networks, A systems Approach by Peterson L.L. & Davie B.S, 3/e, Harcourt
Asia, 2003.
5. Computer Networks by Andrew S. Tanenbaum, 3/E, PHI, 1996.
7|Page
CS13103 Digital Logic Design 3-0-0 3
Module 1 [10L]: Review of number systems and Boolean algebra: postulates and theorems,
constants, variables and functions, switching algebra, Boolean Functions and Logical Operations.
Karnaugh Map: prime cubes, Minimum Sum of Products and Product of Sums. Quine-
McCluskey algorithm, prime implicant chart, cyclic prime implicant chart, Petrick’s method.
Module 3 [10L]: Introduction to Sequential Circuits: Latches and Flip-Flops (RS, JK, D, T and
Master Slave). Design of a Clocked Flip-Flop – Flip-flop conversion - Practical Clocking Aspects
Concerning Flip-Flops. Multivibrator and its type. Counters: Design of single mode counters and
multimode counters – Ripple Counters – Synchronous Counters. Shift registers – Shift Register
counters – Random Sequence Generators.
Module 4 [6L]: Digital Logic Families – Fundamentals Of RTL, DTL, ECL, And TTL.
Characteristics of Logic Families and its Comparison: Speed And Propagation Delay, Transition
Time, Fan in, Fan out, Power Dissipation, and Noise Immunity. Basic CMOS Inverter Circuit,
Inverter Using NMOS. Interfacing Between Different Logic Families.
Books:
1. Digital Fundamentals by T. L. Floyd, R. P. Jain, 8/e, Pearson Education, 2006.
2. Fundamentals of Logic Design by C. H. Roth, Jr., L. L. Kinney, 6/e, Cengage Learning, 2009.
3. Digital Design by M. M. Mano, M. D.Ciletti, 4/e, Pearson Education, 2008.
4. Digital Integrated Electronics by Taub and Schilling, MGH,1998.
5. Digital Systems - Principles and Applications by R. J. Tocci and N. S. Widner, Prentice Hall,
10th Ed., 2007.
6. Digital Design: Principles and Practices by J. F. Wakerly, Prentice-Hall, 2nd Ed., 2002
7. Contemporary Logic Design by R. Katz, Addison Wesley, 1993.
8|Page
CS13104 Object Oriented System Design 3-0-0 3
Module 1[8L]: Concepts of Object-Oriented Programming: Procedure Oriented
Programming, Object Oriented Programming. Properties of Object-oriented models. Concepts
of Classes and Objects, Nature of an object, Nature of a class, Relationships among objects and
classes. Modeling techniques of classes and objects. Paradigms of Object oriented
programming. Overview of abstraction. Information hiding. Polymorphism. Method
Overloading. Inheritance. Method overriding. Dynamic Binding. Message Passing. Exceptions
and Exception handling. Container classes. Object Oriented Design – Process, Exploration and
Analysis. Benefits of Object-Oriented Programming.
Module 2[9L]: Fundamentals of Java: Basics of Java: JVM and Bytecode, Advantages of
Java. Data types, variables, expressions. Control Statements. Type conversion and casting.
Automatic type promotion. Implementation of Object-Oriented Programming using Java:
Java Classes and Objects, Declaring objects, Constructors. this pointer. Garbage Collection.
finalize() method. Method and constructor overloading. Nested and Inner class. Inheritance:
Implementation of inheritance. super pointer. Multilevel class hierarchy. Method overriding.
Abstract classes. Interfaces. Packages.
Module 3[10L]: Intermediate Java: Exception Handling: Fundamentals. try and catch
keywords. Nested try. throw, throws, finally keywords. Java’s built-in exceptions and creating
custom exceptions. Multithreaded Programming: Basic concept of threading, Java thread
model. The main thread. Creating custom thread. isAlive() and join() methods. Thread
priorities. Synchronization. Suspending, Resuming and Stopping threads. The Concurrent API.
Module 4[9L]: Advanced Java: Java IO and Applets: Reading and Writing to Console.
PrintWriter class. Reading and Writing to files. Formatting output. Automatically closing a file.
Applet Fundamentals. Generics and Lambda Expressions: Generic class, Bounded types.
Wildcard arguments. Creating generic methods. Generic Class Hierarchies. Lambda
Expressions. Method references.
Books:
1. Object-Oriented Analysis and Design with Applications by Grady Booch et. al.
2. Object-Oriented Modeling and Design With UML by Blaha, Rumbaugh
3. Java: The Complete Reference 9th Edition by Herbert Schildt
4. Effective Java by Joshua Bloch
9|Page
CS13105 Computational Mathematics 3-1-0 4
Module 1 [7L]: Number Theory
Integers, Divisibility, Prime Numbers, Primality Testing, Unique Factorization, Chinese
Remainder Theorem, Congruence, Quadratic Congruence, Exponential and Logarithm, Discrete
Logarithms, Quadratic Reciprocity, Diophantine Equations and Arithmetic Functions, Modular
Arithmetic, GF(2n) Fields, P≠NP Conjecture, 1-way Functions.
Books:
1. Introduction to Graph Theory by Douglas B. West, Prentice Hall India.
2. Numerical Methods for Scientific and Engineering Computation by S. R. K. Iyengar and R.
K. Jain, Mahinder Kumar Jain, New Age International.
3. Engineering Mathematics by BS Grewal.
4. Discrete Mathematics by S Sarkar
10 | P a g e
CS13106 Computational Logic 2-0-0 2
Module 1 [8L] Propositional logic, syntax of propositional logic, semantics of propositional
logic, truth tables and tautologies, tableaus, soundness theorem, finished sets, completeness
theorem. Inference in Propositional Logic.
Module 2 [8L] Predicate logic, syntax of predicate logic, free and bound variables, semantics of
predicate logic, graphs, tableaus, soundness theorem, finished sets, completeness theorem,
equivalence relations, order relations. Inference in Predicate Logic.
Books:
1. Mathematical Logic and Computability by Jerome Keisler and H. Joel Robbin, McGraw-
Hill International Editions, 1996
2. Computational Complexity by Papadimitriou. C. H., Addison Wesley, 1994.
3. Logic for Computer Science: Foundations of Automatic Theorem Proving by Gallier, J. H.,
1986.
11 | P a g e
For B.Tech (ECE)
Books:
1. Data Structures Using C by Aaron M. Tenenbaum, Y. Langsam, Moshe J. Augenstein.
2. Data structures and Algorithms with Object oriented design paterns in C++ by Bruno R.
Preiss.
3. Data Structures and Program Design in C by Robert L. Kruse
4. Fundamental of data Structure in C by E. Horowitz, S. Sahni and S. Anderson-Freed.
5. Data Structures and Algorithms by A. V Aho, J. D Ullman and J. E Hopcroft, Addison
Wesley.
12 | P a g e
Fourth Semester
Module 4[5L]: QoS issues in networks, Wireless Networks, WSNs, MANETs, VANETs.
Books:
1. Computer Networking: A Top-Down Approach Featuring Internet by J. F. Kurose and K.
W. Ross, 3/e, Pearson Education.
2. Data Communications and Networking by Behrouz A. Forouzan, Fifth Edition, 2013
3. Data and Computer Communications by William Stallings, Eighth Edition, 2012
4. Computer Networks, A systems Approach by Peterson L.L. & Davie B.S, 3/e, Harcourt
Asia, 2003.
5. Computer Networks by Andrew S. Tanenbaum, 3/E, PHI, 1996.
13 | P a g e
CS 14201 Computer Networks Laboratory 3-0-0 3
Practical: Protocol simulation; Socket programming; Program development for ftp, SNMP, SMTP,
etc; Exercises in network programming;
Experiment 1: Implementation of basic Client Server program using TCP Socket (Eg. Day time
server and client).
Experiment 2: Implementation of basic Client Server program using UDP Socket.
Experiment 3: Implementing a program with TCP Server and UDP Client.
Experiment 4: Implementation of TCP Client Server program with concurrent connection from
clients.
Experiment 5: Implementing fully concurrent application with a TCP server acting as a directory
server and client programs allowing concurrent connection and message transfer (Eg. Chat system).
Experiment 6: Fully decentralized application like a Peer to Peer system. This program is to
implement without a designated Sever as in the case of experiment 5.
Experiment 7: Experiments with open source firewall/proxy packages like iptables,ufw, squid etc.
Experiment 8: Experiments with Emulator like Netkit, Emulab etc.
Experiment 9: Experiments with Simulator like NS2, NCTU NS etc.
Books:
1. Unix Network Programming – Networking APIs: Sockets and XTI by W. Rıchard Stevens,
Volume 1, 2nd Edition, Pearson Education, 2004.
2. Unix Network Programming – Inter process Communications by W. Rıchard Stevens,
Volume 2, 2nd Edition, Pearson Education, 2004.
3. Linux Socket Programming by Example by Warren W. Gay, 1st Edition, Que Press, 2000.
4. Beej's Guide to Network Programming by Brian Hall, http://beej.us/guide/bgnet/
5. Java Network Programming by Elliotte Rusty Harold, 3rd Edition, O’Reilly, 2004.
14 | P a g e
CS14102 Operating System 3-0-0 3
Module 1 [7L]: Introduction and Process Management: Introduction and need of operating
system, layered architecture, logical structure of operating system, OS services, kernel, system
calls, firmware, BIOS, bootloader. Process model, creation, termination, states transitions,
hierarchy, context switching, process implementation, process control block, basic system calls,
Linux and Windows. Threads: Threads - processes versus threads, threading, kernel and user
level threads, thread usage, benefits, and multi-threading.
Module 3[7L]: Deadlock: System model, resource types, deadlock problem, methods for
deadlock handling, detection. Deadlock prevention, avoidance, recovery from deadlock.
Memory Management: Memory management - concepts, functions, logical and physical
address space, address binding, degree of multiprogramming, swapping, static & dynamic
loading. Memory allocation schemes - first fit, next fit, best fit, worst fit and quick fit. Free
space management - bitmap, link list/free list, buddy’s system, memory protection and sharing,
relocation and address translation.
Module 4[7L]: Virtual Memory: Virtual Memory - concept, virtual address space, pure
paging scheme. Segmentation, segmentation with paging scheme, hardware support and
implementation details, memory fragmentation, demand paging, pre-paging, page fault
frequency, thrashing. Page replacement algorithms - optimal, MRU, LRU, Belady’s anomaly,
design issues for paging system. Page size, separate instruction and data spaces, shared pages,
cleaning policy, TLB. Inverted page table, I/O interlock, program structure, page fault handling.
Basic idea of MM in Linux.
Module 5[7L]: File System and Storage: File System - concepts, naming, attributes,
operations, types, structure. File organization and access (Sequential, Direct, Index and
Sequential) methods. Memory mapped files, directory structures – file system mounting, file
sharing, path name, directory operations. Overview of file system in Linux and windows.
Allocation of Disk space, Input/output subsystems - concepts, functions/goals, input/output
devices- block and character. Spooling, disk structure and operation, disk attachment, disk
storage capacity. Disk scheduling algorithm need & type. Introduction to RAID system.
Books:
1. Operating System Concepts by A. Silbersehatz and J. L. Peterson, Wiley.
2. Operating System by Dhamdhere, TMH.
3. Operating Systems by W. Stalling,
15 | P a g e
CS14202 Operating System Laboratory 2-0-0 2
Theory: Unix system programming fundamentals and system calls.
Practical:
1. Linux shell programming, Inter process communication-Pipes, semaphores, Shared
memory and Message passing Loading executable programs into memory and execute
System Call implementation-read(), write(), open () and close().
2. Multiprogramming-Memory management- Implementation of Fork(), Wait(), Exec() and
Exit() System calls.
3. Implementation of algorithms: scheduling and memory management skills.
4. File system implementation-demand paging - page fault exception – page replacement
policy.
5. Implementation of Synchronization primitives -Semaphore, Locks and Conditional
Variables Build Networking facilities – Mailbox.
References:
1. Operating Systems by Gary J. Nutt, Pearson Education, 3/e, 2004.
2. Understanding the Linux Kernel by Daniel P Bovet , Marco Cesati, O'Reilly Media,
(3/e), 2005
16 | P a g e
CS14103 Design and Analysis of Algorithms 3-0-0 3
Module 1[10L]: Introduction – Properties of an algorithm, Algorithm analysis, Computational
Complexities – Time and Space complexities, Growth of functions, Big-oh, Big-omega, Big-
theta, small-oh, small-omega notations. Concept of upper and lower bound (Best, average, and
Worst case analysis). Master’s theorem, Recurrence relation and computation of complexities.
Divide-and-Conquer – The philosophy behind the divide-and-conquer, Analyzing Divide-and-
Conquer algorithms – recursion tree technique, substitution method. Example problems – Merge
sort, Maximum sum subarray, Strassen’s Matrix multiplication.
Module 2[9L]: Analysis of searching and sorting algorithms using recurrence relation, Medians
and Order Statistics. Multi-Way Search Tree: B-Tree, B+ Tree, Height-balanced tree: AVL Tree.
Module 3[10L]: Greedy Algorithm – The idea. Example problems – fractional knapsack
problem, activity selection problems, Huffman coding. Analysis. Dynamic Programming – The
idea. Designing the equation. Bottom-up and Top-down approach. Example problems – rod
cutting, coin change, matrix-chain multiplication, longest common subsequence, Kadane’s
algorithm. Knapsack problem – 0/1, integer. Overview of Backtracking: N-queen problem,
graph coloring problem, Overview of Branch-and-Bound.
Module 4[8L]: Review and complexity analysis of graph traversals – DFS, BFS. Disjoint-set.
Detecting cycle in a graph. Shortest-path problems – Single source shortest path – Bellman-
Ford, Dijkstra. All pair shortest path – Floyd-Warshall. Spanning Tree – Definition, Minimum
Spanning-tree algorithm – Prim, Kruskal.
Books:
1. Introduction to Algorithms by Cormen, Leiserson, Rivest, Stein, Prentice-Hall.
2. Fundamentals of Computer Algorithms by Ellis Horowitz, Sartaj Sahni
3. Algorithm Design - John Kleinberg.
17 | P a g e
CS14104 Computer Organization and Architecture 3-0-0 3
Module 1 [9L]: Introduction to Advance Micro processor family starting from 8086 onwards to
modern processors. Architecture of 8086; BUS concepts and organization, multiplexing and
demultiplexing of Buses, addressing modes, basic instruction formats (including three, two, one
and zero addressing instruction); Bus organization and concept of memory segmentation.
(Simple programming exercise as class assignment), concept of I/O operations and memory
mapped I/O.
Module 2 [9L]: Basic organization of the CPU and block level description of the functional unit
from execution point of view, complete instruction execution, concept of Fetch, Decode and
Execution cycle with the help of timing diagram. Data Representation – Basic formats, fixed and
floating point; ALU design, data path concepts, Basic idea of floating point arithmetic. Control
Unit: Basic concept, Hardwire control and micro programmed control - Block diagram and
operation.
Module 3 [9L]: Pipeline: Basic concepts, instruction pipelines – pipeline structure, multistage
pipeline, pipeline performance parameters, pipeline hazards.
Module 4 [9L]: Memory: Computer memory system overview, memory hierarchy; cache
memory - types and operations. Concept of L1 and L2 cache in computer systems.
Books:
1. Advanced Microprocessors and Peripherals by Ray, Ajoy Kumar, and Kishor M. Bhurchandi,
McGraw-Hill,
2. Computer organization & Architecture – Designing for Performance by William Stallings,
Pearson Education.
3. Computer Architecture and Organization by J. P. Hayes, McGraw Hill.
4. Computer System Architecture by Morris Mano, Pearson.
5. Computer Organization and Design – The Hardware/Software Interface by D. A. Patterson
and J. L. Hennessy, 4th Ed., Morgan Kaufmann.
18 | P a g e
CS14105 Software Engineering 3-0-0 3
Module 1[9L]: Introduction: The software engineering discipline-evaluation and impact,
Programs vs. software products, Why study of software engineering, Emergence of software
engineering, Notable changes in software development practice, Computer system engineering.
Software life cycle: Life Cycle Models: Classical waterfall model, Iterative waterfall model,
Prototype model, Evolutionary model, Spiral model, RAD model, comparison of different life
cycle models.
Agile: Concept and design.
Module 4[9L]: Software reliability and quality management: Software reliability, Statistical
testing, Software quality, Software quality management system, ISO 9000, SEI capability maturity
model, Personal software process (PSP), Six sigma, Software quality & Metrics. Computer aided
software engineering: Case and its scope, Case environment, Case support in software life cycle,
Other characteristics of case tools, Towards second generation case tool, Architecture of a case
environment. Software maintenance: Characteristics of software maintenance, Software reverse
engineering, Software maintenance processes model, Estimation maintenance cost. Software
reuse: Basics issues in any reuse program, Reuse approach, Reuse at organization level.
Books:
1. Fundamentals of Software Engineering by Rajib Mall, PHI.
2. Software Engineering- Practioner Approach by Pressman R, McGraw Hill.
3. Software Engineering Concepts by Richard Fairley, Tata McGraw Hill.
Reference:
4. An integrated approach to Software Engineering by Jalote Pankaj, Narosa
5. Software Engineering by Somerville, Pearson
6. Software Design by Budgen, Pearson
19 | P a g e
CS14106 Microprocessor and Microcontroller 3-0-0 3
Module 1 [9L]: Introduction to Microprocessor, Microcontroller, Microcomputer; 8085
Microprocessor Architecture, Pin Description, Bus concept and organization, Multiplexing and
Demultiplexing of Buses; Static and Dynamic RAM, ROM, Memory map; Signals and Timings,
Classification of Instructions, Instruction Format, Instruction Set, Addressing Modes.
Module 4[9L]: 8051 Microcontroller – Introduction of 8051 family; Block diagram description
of AT89C51; Internal Architecture - System Clock and Oscillator Circuits, CPU Registers,
SFRs, Memory Map, I/O Ports. Simple program and application development.
Books:
1. Microprocessor Architecture, Programming and Applications with the 8085 by Ramesh S.
Gaonkar, Penram Publishers
2. The 8051 Microcontroller & Embedded Systems using Assembly and C by Muhammad Ali
Mazidi, D. MacKinlay, Pearson Education.
3. Introduction to Microprocessors by Aditya P. Mathur, Tata McGraw Hill
Reference:
4. Microprocessors and Interfacing by Douglas V. Hall, Tata McGraw Hill.
5. The 8051 Microcontroller – Architecture, Programming and Applications by Kenneth J.
Ayala, Penram Publishers.
6. Microcomputers and Microprocessors – The 8080, 8085 and Z80 Programming by John
Uffenbeck.
20 | P a g e
CS14204 Computer System Design Laboratory 0-0-2 1
Example List of Experiments:
1. Assembly language programming of 8051
2. Timer programming of 8051 using status check
3. Timer programming of 8051 using interrupts
4. External interrupts programming of 8051
5. LCD interfacing to 8051 – project
6. Study of current microcontrollers e.g. PIC, ATmega, AVR, Arduino, ARM, Raspberry Pi
7. Motor speed control using microprocessor/microcontroller
8. Project: Real-time system design using existing microcontrollers (e.g. PIC, ATmega, AVR,
Arduino, ARM, Raspberry Pi)
References:
1. The x86 Microprocessors by Lyla B. Das, Pearson Education.
2. The 8051 Microcontroller and Embedded Systems Using Assembly and C by Muhammed
Ali Mazidi, Janice Gillispie Mazidi, Rolin D. Mc Kinlay, Pearson Education.
3. Data Sheets of Respective Microcontrollers as updated.
4. Microprocessor Architecture, Programming and Applications with the 8085 by Gaonkar,
Penram International.
21 | P a g e
Fifth Semester
CS15101 Artificial Intelligence 3-0-0 3
Module 1 [10L]: Basic Concepts: Foundations of Artificial Intelligence – the four approaches
to AI. Intelligent Agents – Agents and Environments, Rationality, Nature of Environments,
Structure of Agents. Solving Problems by Searching: Problem-Solving Agents, Searching for
Solutions, Uninformed Search Strategies, Heuristic Search Strategies, Heuristic Functions.
Beyond Classical Search: Local Search Algorithms and Optimization Problems, Local Search
in Continuous Spaces, Searching with Nondeterministic Actions. Introduction to Adversarial
Search.
Module 3 [7L]: Classical Planning: Definitions of Classical Planning. Algorithms for Planning
as State-Space Search. Planning Graphs. Other Classical Planning Approaches. Analysis of
Planning Approaches. Planning and Acting in the Real World: Time, Schedule and Resources,
Hierarchical Planning, Planning and Acting in Nondeterministic Domains, Multi-agent Planning.
Knowledge Representation: Ontological Engineering, Categories and Objects, Events, Mental
Events and Mental Objects, Reasoning Systems for Categories, Reasoning with Default
Information.
Module 5[6L]: Fuzzy Logic: Crisp Sets V/s Fuzzy Sets, Fuzzy Functions, Fuzzy Logic and
Fuzzy Inference Systems, Type-2 Fuzzy Sets, Intuitionistic Fuzzy Sets based sentiment
Analysis.
APPLICATIONS /CASE STUDY– Match Making for Indian Matrimony, Fuzzy Expert
System for Sleep Disturbance, Fuzzy Logic based Air Conditioner, Solving Reviewer Assignment
Problem using Fuzzy Functions, Time-Series Forecasting
Rough Sets: Introduction, Indiscernibility, Set Approximations, properties of Rough Sets,
Rough Membership, Reducts.
APPLICATIONS / CASE STUDY- Development of Part of Speech Tagger for Hindi
Language using Rough Sets.
Books:
1. Artificial Intelligence by E. Rich and K. Knight, TMH, 2nd Ed., 1992.
2. Principles of AI by N. J. Nilsson, Narosa Publ. House, 1990.
Reference:
3. Artificial Intelligence by P. H. Winston, Pearson Education, 3rd Edition, 2000
4. Fuzzy Logic with Engineering Applications by T. J.Ross, Third Edition, John Wiley.
22 | P a g e
5. Rule Based Expert Systems by M. Sasikumar, S. Ramani, Narosa Publishing House, 1994.
6. Principles of Soft Computing by Sivandandam, Deepa, Wiley Publications. 2nd Edition.
Books:
1. Introduction to Algorithms by T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, MIT
Press.
2. Fundamentals of Computer Algorithms by Ellis Horowitz, Sartaj Sahni
3. Algorithm Design - John Kleinberg.
23 | P a g e
CS15103 Database Management System 3-0-0 3
Module 1[8L]: Introduction and ER Model
Overview of a DBMS - Purpose of Database Systems; View of Data; Data Models; DDL; DML;
File Systems V/s DBMS, advantages and disadvantages of DBMS, Database Administrator;
Database Users; Overall System Structure; Entity-Relationship Model: Basic Concepts, Design
Issues, Mapping Constraints, Keys, ER-Diagram, Weak Entity Sets, Extended ER-Diagram,
Mapping of ER-Schema to Tables.
Module 5[4L]: Introduction to Recent Database Models: Object Oriented Database, Mobile
Databases, Distributed Databases, spatial Databases.
Books:
1. Database System Concepts by Abraham Silberschatz, Henry F. Korth and S. Sudarshan,
6th Ed, McGraw Hill.
2. Fundamentals of Database Systems by Ramez Elmasri, Shamkant B. Navathe, Elmasri,
PEARSON
3. Database Management Systems by R. Ramakrishnan, J. Gehrke, McGraw Hill, 2004
4. Transaction Processing, Concepts and Techniques by J. Gray and A. Reuter, Morgan
Kauffman, 1994.
5. Principles of Database Systems by J. D. Ullman, Galgotia
6. Han, J. and Kamber, M., “Data Mining: Concepts and Techniques”, 2nd Ed., Morgan
Kaufmann.
7. Ray Chhanda, “Distributed Database Systems”, Pearson.
8. Date, C. J, “An Introduction to Database Systems”, 8th Ed., Pearson.
24 | P a g e
CS15104 Parallel and Distributed Systems 3-0-0 3
Module 1[8L]: Introduction; Need; Parallelism in uniprocessors systems; Pipeline-
MIMD/SIMD, Distributed systems Versus Parallel systems, Models of distributed Systems-
Happened Before and Potential Causality Model, Models based on States.
Module 3[10L]: Parallel algorithms: prefix sum computation, matrix multiplication; Ranking,
Searching, Traversal and Sorting; multi-threaded programming, p-Threads. Programming
models-I (data parallel, task parallel, shared memory, distributed memory- Message Passing):
Message passing interface (MPI), Communication Types- Block and Non-blocking, Buffered
and Non-buffered; OpenMP programming.
Module 4[8L]: Co-processors parallel systems, GPGPU, CUDA Kernels and Threads, CUDA
devices memories, Blocks, Threads and indexes. OpenCL programming, CUDA vs OpenCL.
Books:
1. Introduction to Parallel Computing, by Kumar, Grama, Gupta and Karypis, Benjamin
Cummings Publishing Co., 2nd Ed., 2003.
2. Parallel Programming in C with MPI and OpenMP by M. J. Quinn.
3. Program Massively Parallel Processors: A Hands on Approach by David Kirk.
4. Heterogeneous computing with OpenCL by Benedict Gaster and Lee Howes
References:
1. H. Attiya and J. Welch, Distributed Computing: Fundamentals, Simulation and Advanced
Topics, McGraw Hill
2. Parallel Programming in OpenMP by Dror Mayden at all.
3. Parallel Programming with MPI by Petter S. Pacheco.
4. Using MPI: Portable Parallel Programming with the Message-Passing Interface, by William
Gropp, Ewing Lusk, and Anthony Skjellum, 2nd Ed., 1999.
5. CUDA GPU Gems 3 by Hubert Nguyen.
Module 2[12L] Context Free Grammar (CFG) and Context Free Language (CFL):
Language, Context free grammar, Simplification of CFG, Normal Form of CFG, left recursion,
left factoring, Basic Push down automata (PDA), DPDA, NDPDA, Construct of PDA from
CFG, Construction of CFG Equivalent to PDA, Two stack PDA. Removing null productions,
unit productions and λ-productions, Pumping lemma for CFLs.
25 | P a g e
Module 3[10L] Turing Machine: Ambiguity in Languages, inherently ambiguous language,
Chomsky Hierarchy of Languages, Basic Turing machine, DTM, NDTM, Variation of TM,
Multidimensional Turing Machine, Programmable Turing Machine, Linear Bounded Automata.
Module 4[6L] Compiler: Compilation process and phases of compiler, Lexical Analysis and
Syntax Analysis.
Books:
1. Introduction to Automata Theory, Languages and Computation by J. E. Hopcroft, R.
Motwani and J. D. Ullman, Pearson, 2001.
2. Elements of the Theory of Computation by H. R. Lewis and C. H. Papadimitriou, Prentice
Hall, 1997/Pearson 1998.
3. Introduction to the Theory of Computation by M. Sipser, Thomson Asia, 1997.
4. Automata and Computability by D. C. Kozen, Springer-Verlag, 1997.
5. Compilers : Principles, Techniques, & Tools by Alfred V. Aho, Ravi Sethi, D. Jeffrey
Ulman, Monica S. Lam, 2nd Edition
6. Introduction to Languages And The Theory of Computation by John Martin
26 | P a g e
Sixth Semester
Books:
1. Cloud Computing Bible by B. Sosinsky, Wiley India
2. Mastering Cloud Computing by R. Buyya, C. Vecchiola and S. T. Selvi, McGraw Hill
3. Cloud computing: A practical approach by A. T. Velte, TMH
4. Cloud Computing by Miller, Pearson
5. Building applications in cloud: Concept, Patterns and Projects by Moyer, Pearson
27 | P a g e
6. How to create scalable simulations.
7. How to pause and resume the simulation, and create simulation entities (a Datacenter
Broker in this example) dynamically.
8. How to create simulation entities (a Datacenter Broker in this example) in run-time using a
global manager entity (Global Broker).
9. How to create a datacenter with one host and a network topology and run one cloudlet on it.
Books:
1. Digital Image Processing by Gonzalves, Pearson.
2. Digital Image Processing by Jahne, Springer.
3. Digital Image Processing & Analysis by Chanda & Majumder, PHI.
4. Fundamentals of Digital Image Processing by Jain, PHI.
28 | P a g e
different type of attack: CMA, CPA, CCA etc. Shannon perfect secrecy, OTP, Pseudo random
bit generators, stream ciphers andRC4.
Module 3 [9L]: Block ciphers: Modes of operation, DES and its variants, AES, linear and
differential cryptanalysis; One-way function, Trapdoor one-way function, Public key
cryptography, RSA cryptosystem, Diffie-Hellman key exchange algorithm, Elgamal
Cryptosystem; Cryptographic hash functions, Secure hash algorithm, Message authentication,
digital signature, RSA digital signature, Elgamal digital signature.
Module 4 [9L]: IKE and IPSec; SSL/TLS; E-mail Security and PGP.
Books:
1 Cryptography and Network Security by Behrouz A. Forouzan and Debdeep
Mukhopadhyay, Second edition, Tata McGraw Hill, 2011.
2 Cryptography and Network Security Principles and practice by W. Stallings, 5/e, Pearson
EducationAsia, 2012.
3 Cryptography: Theory and Practice by Stinson. D., third edition, Chapman & Hall/CRC,
2010.
4 Elementary Number Theory with applications by Thomas Koshy, Elsevier India, 2005.
Module 2 [9L]: Supervised Learning: Decision Trees: ID3, Classification and Regression
Trees, Regression: Linear Regression, Multiple Linear Regression, Logistic Regression, Support
vector machines: Linear and Non-Linear, Kernel Functions, K-Nearest Neighbors
Module 4 [9L]: Neural Networks and Deep Learning: Perceptron, Multilayer Perceptron,
Representational limitation and gradient descent training. Multilayer networks and back
propagation. Hidden layers and constructing intermediate, distributed representations. Over
fitting, learning network structure, recurrent networks.
Re-inforcement Learning: Q-Learning.
Books:
1 Introduction to Machine Learning by Ethem Alpaydin, MIT Press, PHI, 3rd Edition 2014.
2 Applied Machine Learning by M. Gopal, TMH.
3 Machine Learning by Tom Mitchell, McGraw Hill, 3rd Edition,1997.
4 Foundations of Machine Learning by Mehryar Mohri, Afshin Rostamizadeh, Ameet
Talwalkar, MIT Press, 2012.
5 Artificial Intelligence and Machine Learning by Vinod Chandra and Anand Harindra, PHI.
29 | P a g e
6 Machine Learning: A Probabilistic Perspective by Kevin P. Murphy, The MIT Press,
2012.
7 Data Mining –Concepts and Techniques by Jiawei Han and Micheline Kambers and Jian
Pei, 3rd edition, Morgan Kaufman Publications, 2012.
Module 2 [9L]: Introduction to Hadoop Distributed File System, The Design of HDFS, HDFS
Concepts, Command Line Interface, Hadoop file system interfaces, Data flow, Data Ingest with
Flume and Scoop and Hadoop archives, Hadoop I/O: Compression, Serialization.
Module 3 [9L]: Map Reduce Anatomy of a Map Reduce Job Run, Failures, Job Scheduling,
Shuffle and Sort, Task Execution, Map Reduce Types and Formats, Map Reduce Features.
Books:
1. Hadoop: The Definitive Guide by Tom White, Third Edit on, O’reily Media, 2012.
2. Big Data Analytics by Seema Acharya, Subhasini Chellappan, Wiley 2015.
3. Intelligent Data Analysis by Michael Berthold, David J. Hand, Springer, 2007.
4. Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's
Businesses by Michael Mineli, Michele Chambers, Ambiga Dhiraj, Wiley Publications,
2013.
30 | P a g e
List of Elective Subjects
CS1*111 Software Project Management 3-0-0 3
Module 1[9L]: Definition – components of SPM – challenges and opportunities – tools and
techniques – managing human resource and technical resource – costing and pricing of projects
– training and development – project management techniques
Module 2[9L]: Monitoring & measurement of SW development – cost, size and time metrics –
methods and tools for metrics , Classifying software measures, determining what to measure,
applying the framework, Software measurement validation .
Module 4[9L]: The risk issues in SW development and implementation – identification of risks
– resolving and avoiding risks – tools and methods for identifying risk management, SPM Tools
& case study on SPM.
Books:
1. Software Engineering: A Practitioner’s Approach by Pressman, MGH, 8th Ed.
2. Software Engineering Project Management by Richard H. Thayer, John Wiley & Sons, 2nd
edition.
3. Software Project Management by Royce, Walker, Pearson Education.
4. Software Project Management in Practice by Pankaj Jalote, Pearson Education Inc.
5. Software Project Management by Kelker, S. A., Prentice Hall.
Module 2[9L]: Integration Testing- Scenario Testing, Defect bash, System and acceptance
testing- functional, non-functional testing, Performance testing- methodology, tools & Process.
Other Important type of testing’s used in IT Industry: Regression Testing, Internationalization
Testing, Enabling testing, Locale Testing, Language testing, Localization testing, Ad-hoc
testing- Overview, Buddy testing, Pair Testing, Exploratory Testing, Iterative testing Agile
and Extreme Testing.
Module 4[9L]: Software Test Automation- Scope of Automation, Design and Architecture of
automation, Process Model for Automation, Test metrics and measurement- Type of
Metrics, Project Metrics, Productivity Metrics, Progress Metrics, Release Metrics.
Books:
31 | P a g e
1. Software testing: Principles and Practice by Srinivasan D., Gopalswami R.
Pearson Education.
2. Software Testing: Principles by M G Limaye Tata McGraw Hill.
3. Software Engineering by Sommerville Pearson Education.
4. Software Engineering – a practitioner approach by Roger Pressman, 7e, Tata McGraw Hill.
5. Software Testing by Yogesh Singh, TMH
Module 3[6L]: Components, Frameworks and Tools: Client Programming and User
Experience (UX), Selection of Infrastructure Components, Client, Server and Storage
Technologies, Modeling, Workflow, Creation of a Generic Architecture, Database
Programming, Database Design and Considerations
Module 5[6L]: Architectural Process, Methods and Artifacts: Modeling, Applying Design
Patterns, Capture and Trace of Software Architecture, Code Quality Analysis, Design Patterns
Selection and Application.
Books:
1. Software Architecture in Practice, Len Bass, Paul Clements, Rick Kazman.
2. Documenting Software Architectures: Views and Beyond Paul Clements, Felix Bachmann,
Len Bass, David Garlen, James Ivers, Reed Little, Robert Nord, Judith Stafford.
Module 2[8]: Agile Software Process: Agile Manifesto, Plan Driven Approach vs Agile
Development Process; Agile Methods: Extreme Programming (XP), Adaptive Software
Development, Scrum, Crystal, FDD, Lean and DSDM, Agile Practices: Extreme Programming,
Continuous Delivery, Refactoring, Working with Legacy Code, Test-Driven Development.
32 | P a g e
Module 3[8]: Software Configuration Management (SCM): The SCM process, Software Risk
Management: Software risks; Software Risk: Risk identification, assessing risk impact, Risk
mitigation, monitoring and refinement.
Module 4[8]: Software Quality: Attributes; Specifications; Standards; Assurance and Reliability;
Quality through the Lifecycle; ISO/IEC 12207; Quality Management Systems, ISO 9000; Quality
Achievement; Quality Control; Quality Preservation; Process Improvement, ISO/IEC 15504 and
CMMI.
Module 5[8]: Software Metrics, Process, Product and Project Metrics; Software Measurement;
Metrics for Software Quality; Software Project Estimation; Empirical Estimation Model.
Books:
1. R.S. Pressman, Software Engineering - A Practitioner’s Approach, McGraw Hill, 7th
Edition.
2. Ian Sommerville, “Software Engineering”, 9th Edition, Pearson Education, Inc., publishing
as Addison-Wesley, 2011
Module 3[9L]: Projections - orthographic and perspective projection. Lighting and Shading -
light sources, normal computation, reflection models, flat and smooth shading, Introduction to
Textures and Mapping - Rendering Techniques - slicing, volume rendering, iso-surface
extraction, ray casting, multi resolution representations for large data rendering.
Module 4[9L]: Introduction to Curves Surfaces (Bezier, splines) and Meshes - structured and
unstructured, video games and computer animation, GUI: concepts of window programming,
open GL programming in Windows / Linux environments.
Books:
1. D. Hearn and M. P. Baker, Computer Graphics, McGraw Hill
2. Z. Xiang and R. A. Plastock, Shaum’s Outline of Computer Graphics, McGraw Hill
33 | P a g e
Module 2 [9L]: Linear filters: Linear filters and convolution; shift invariant linear systems-
discrete convolution, continuous convolution, edge effects in discrete convolution; Spatial
frequency and fourier transforms; Sampling and aliasing; filters as templates; Normalized
correlations and finding patterns. Edge detection: Noise; estimating derivatives; detecting edges.
Texture: Representing texture; Analysis using oriented pyramid; Applications; Shape from
texture. The geometry and views: Two views.
Module 3 [9L]: Stereopsis: Reconstruction; human stereo; Binocular fusion; using color
camera.
Books:
1. David A Forsynth and Jean Ponce, Computer Vision- A modern approach, Pearson
education series, 2003.
2. Milan Sonka, Vaclav Hlavac and Roger Boyle, Digital image processing and computer
vision, Cengage learning, 2008.
3. Schalkoff R. J., Digital Image Processing and Computer Vision, John Wiley, 2004.
Module 3[9L]: Linear Discriminant Functions: Linear Discriminant Functions and Decision
Surfaces, Generalized Discriminant Functions, The two-category linearly separable case,
Minimizing the perceptron criterion function, relaxation procedures, non- separable behaviour,
Minimum Squared- Error procedures. Support vector machines, Algorithm-independent machine
learning-Bias and Variance, Bootstrapping-Adaboost Algorithm, Boosting, Bagging
Books:
1 R. O. Duda, P. E. Hart and D. G. Stork, Pattern classification, John Wiley & Sons, 2002.
2 C. M. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 1995.
3 V. N. Vapnik, The Nature of Statistical Learning Theory, Springer, 2000.
34 | P a g e
4 N. Cristianini and J. Shawe-Taylor, An Introduction to Support Vector Machines,
Cambridge University Press, 2000.
Module 2 [9L]: Syntax Analysis: Role of the parser –Writing Grammars –Context-Free
Grammars – Top Down parsing – Recursive Descent Parsing – Predictive Parsing – Bottom-up
parsing – Shift Reduce Parsing – Operator Precedent Parsing – LR Parsers – SLR Parser –
Canonical LR Parser – LALR Parser.
Books:
1. Aho, Sethi and Ullman, Compiler Principles, Techniques and Tools, Pearson Education.
2. Holub, Compiler Design in C, PHI.
Module 3[9L]: Web development frameworks – Detailed study of one open source web
framework - Ruby Scripting, Ruby on rails – Design, Implementation and Maintenance aspects.
Module 4[9L]: Service Oriented Architecture – SOAP. Web 2.0 technologies. – AJAX.
Development using Web2.0 technologies. Introduction to semantic web.
Books:
1. Dave Thomas, with Chad Fowler and Andy Hunt. Programming Ruby: The Pragmatic
Programmer's Guide (3/e), Pragmatic Programmers, May 2008.
2. Balachander Krishnamurthy and Jennifer Rexford. Web Protocols and Practice: HTTP/1.1,
35 | P a g e
Networking Protocols, Caching, and Traffic Measurement (1/e), Addison Wesley
Professional, 2001
Module 2 [9L]: VLSI Circuit Design Processes: VLSI Design Flow, MOS Layers, Stick
Diagrams, Design. Rules and Layout, 2 µm CMOS Design rules for wires, Contacts and
Transistors Layout Diagrams for NMOS and CMOS Inverters and Gates, Scaling of MOS
circuits.
Module 3[9L]: Gate Level Design: Logic Gates and Other complex gates, Switch logic,
Alternate gate circuits, Time delays, Driving large capacitive loads, Wiring capacitance, Fan –
in, Fan – out, Choice of layers.
Module 4 [9L]: Data Path Subsystems: Subsystem Design, Shifters, Adders, ALUs,
Multipliers, Parity generators, Comparators, Zero/One Detectors, Counters. Array Subsystems:
SRAM, DRAM, ROM, Serial Access Memories. Programmable Logic Devices: PLAs,
FPGAs, CPLDs, Standard Cells, Programmable Array Logic, Design Approach, Parameters
influencing low power design. CMOS Testing: CMOS Testing, Need for testing, Test Principles,
Design Strategies for test, Chip level Test Techniques.
Books:
1. Essentials of VLSI circuits and systems – Kamran Eshraghian, Eshraghian Dougles and A.
Pucknell, PHI, 2005 Edition
2. CMOS VLSI Design – A Circuits and Systems Perspective, Neil H. E Weste, David Harris,
Ayan Banerjee, 3rd Ed, Pearson, 2009.
3. CMOS logic circuit Design – John .P. Uyemura, Springer, 2007.
4. Modern VLSI Design – Wayne Wolf, Pearson Education, 3rd Edition, 1997.
36 | P a g e
component communication – task management – dual role of time – inter task interactions –
process input/output – agreement protocols – error detection.
Books:
3. Embedded system architecture by Tammy Noergaard, 2nd Edition , Elsevier, 2012
4. Real–Time systems – Design Principles for distributed Embedded Applications by Hermann
Kopetz, 2nd Edition, Springer 2011
5. Programming Embedded Systems-With C and GNU Development Tools by Michael Barr,
Anthony Massa, 2nd Edition, O'Reilly Media, 2009.
6. Embedded Systems – Architecture Programming and Design by Raj Kamal, Tata McGraw
Hill, 2nd Edition, 2011.
Module 3[10L]: Aperiodic task scheduling: fixed priority server/non-server based scheduling
algorithms. Practical factors/overheads.
Module 4[10L]: Task Synchronization: Need and priority inversion problem, Priority
Inheritance protocol, priority ceiling protocol and stack-based priority ceiling protocol for fixed
priority preemptive system. Introduction to multiprocessor real-time systems, problems and
issues. An overview of a real-time operating system.
Books
2. J.W.S.Liu: Real-Time Systems, Pearson Education Asia.
3. Rajib Mall, "Real-Time Systems: Theory and Practice," Pearson, 2008.
4. S.T.Lavi, A.K.Agrawala: Real-time system Design, McGraw Hill.
5. P.A.Laplante: Real-time Systems Design and Analysis, An Engineer’s Handbook, IEEE
Press.
6. P.D.Laurence, K.Mauch: Real-time Microcomputer System Design, An Introduction,
McGraw Hill.
7. Krishna and Shin, "Real-Time Systems," Tata McGraw Hill. 1999.
37 | P a g e
CS1*123 Deep Learning 3-0-0 3
Module 1[9L] Introduction to Deep Learning: Why Deep Learning? What is a neural
network? Three reasons to go Deep, Your choice of Deep Net, An old problem: The Vanishing
Gradient.
Module 2[9L] Deep Learning Models: Restricted Boltzmann Machines, Deep Belief Nets,
Convolutional Networks, Recurrent Nets. Additional Deep Learning Models: Autoencoders,
Recursive Neural Tensor Nets, Deep Learning Use Cases.
Module 3[9L] Introduction to various CNN Architectures: VGG16, VGG19, Alex Net,
Google Net, ResNet, etc. Sequence Models: RNN, LSTM, BURT, Image captioning, visual
question answering, Generative Adversarial Networks (GAN) models, Deep Reinforcement
Learning and Network Visualization.
Module 4[9L] Deep Learning Platforms and Software Libraries: What is a Deep Learning
Platform? H2O.ai, Dato GraphLab, What is a Deep Learning Library? CPUs, GPUs, TPUs,
PyTorch, Theano, Caffe, TensorFlow, Dynamic vs Static computation graphs
Books:
1. Neural Networks and Deep Learning: A Textbook Book by Charu C. Aggarwal
2. Deep Learning: A Practitioner's Approach Book by Adam Gibson and Josh Patterson
3. Deep Learning by Aaron C. Courville, Ian Goodfellow, and Yoshua Bengio
Module 2[9L]: Collocations: Frequency, Mean and Variance, Hypothesis testing: t test,
Hypothesis testing of differences, Pearson’s chi-square test, Likelihood ratios, Mutual
Information, The notion of collocation.
n-gram Models over Sparse Data: Bins - Forming Equivalence Classes, n-gram models,
Buildin n-gram models, Statistical Estimators – MLE, Laplace Law, Lidstone Law, Jeffreys-
Perks Law, Held-out estimation, Cross-validation, Good-Turing estimation. Combining
Estimators - Simple linear interpolation, Katz’s backing-off, General linear interpolation.
Word Sense Disambiguation: Overview of Supervised and Unsupervised Learning,
Pseudowords, Supervised Disambiguation, Dictionary-based Disambiguation, Unsupervised
Disambiguation, Word Sense.
Lexical Acquisitions: Evaluation Measures, Verb Subcategorization, Attachment Ambiguity,
Selection Preferences, Semantic Similarity.
38 | P a g e
Module 3[9L]: Part-of-Speech Tagging: Concept of Markov Models and Hidden Markov
Models, Information source of Tagging, Markov Model Taggers – probabilistic model, Viterbi
Algorithm, variations, Hidden Markov Model Taggers, Transformation-based Learning of tags –
Transformations, The Learning Algorithm, Tagging Accuracy and uses of Taggers.
Probabilistic Parsing: Probabilistic Context Free Grammars. The probability of a string.
Parsing for Disambiguation, Treebanks, Tree probabilities and Derivational probabilities, Phrase
structure grammars and Dependency grammars, Evaluation, Building Parsers – Search methods,
use of the Geometric Mean.
Module 4[9L]: Statistical Alignment: Text alignment, Word alignment, Statistical Machine
Translation. Clustering: Hierarchical Clustering – Single-link and Complete-link, Group-
average agglomerative, Non-hierarchical Clustering – K-means, EM Algorithm.
An overview of Information Retrieval: Common design features, Evaluation measures,
Probability Ranking Principle, Vector Space Model, Term Distribution Models, Latent Semantic
Indexing, Discourse segmentation.
Text Categorization: Decision Trees, Maximum Entropy Modelling, Perceptrons, k Nearest
Neighbor Classification.
Books:
1. Foundation of Statistical Natural Language Processing by Christopher D. Manning
Module 3[10L]:
Distributed Databases [5L]
Homogeneous and heterogeneous databases, Distributed transactions, Commit protocols,
Concurrency control in distributed databases.
Hashing and Indexing, Inverted Index, Query Optimization [5L].
Books:
1. Database System Concepts by Abraham Silberschatz, Henry F. Korth and S. Sudarshan,
39 | P a g e
6th Ed, McGraw Hill.
2. Fundamentals of Database Systems by Ramez Elmasri, Shamkant B. Navathe, Elmasri,
PEARSON
3. Database Management Systems by R. Ramakrishnan, J. Gehrke, McGraw Hill, 2004
4. Transaction Processing, Concepts and Techniques by J. Gray and A. Reuter, Morgan
Kauffman, 1994.
5. Principles of Database Systems by J. D. Ullman, Galgotia
6. Han, J. and Kamber, M., “Data Mining: Concepts and Techniques”, 2nd Ed., Morgan
Kaufmann.
7. Ray Chhanda, “Distributed Database Systems”, Pearson.
8. Date, C. J, “An Introduction to Database Systems”, 8th Ed., Pearson.
Module 2 [9L]: Red-Black Trees: Insertion and all Rotations, deletion and all Rotations,
Complexity Analysis of all operations, Comparison between AVL tree and RB tree, When to use
what?
Binary heap, Binomial Heaps: insertion and deletion of elements, finding maximum and
minimum element.
Fibonacci Heaps: insertion and deletion of elements, finding maximum and minimum element.
KdTree: Construction of KdTree, Searching the tree.
Module 3 [9L]: Computational Geometry: Line segments and determine whether any pair of
segments intersects. Plane Sweep Techniques with its applications, Convex Hull problem
(Extreme point algorithm, incremental algorithm, divide & conquer approach).
Randomized algorithms: Use of probabilistic inequalities in analysis, applications using
examples. Randomized approximation algorithms for MAX 3-SAT, Randomized Divide-
Conquer, Quick sort. Randomized Hashing.
Books:
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, Introduction to Algorithms, Prentice hall.
2. Jon Kelinberg and Eva Tardos, Algorithm Design, Pearson
3. Data Structures Using C Second Edition Reema Thareja
4. Franco P. Preparata and Michael Ian Shamos, Computational Geometry An Introduction,
Springer- Verlag
40 | P a g e
Module 2[10L]: Wireless LANs and mobile network, Wireless 802.16 (WI-MAX), Bluetooth
(802.15.1), Medium Access CSMA/CA, Hidden Terminal and exposed Terminal Problems, Ad-
hoc Network and routing protocols.
Router User Interface, Connecting to a Router, Setup Model, Command Line Interface, CLI
Prompts, Layer 2 Switching: Meaning, Devices, STP, LAN Types and working on switches and
Basic commands, VLANs: VLAN Basics, Membership, Frame Tagging, VLAN Trunking
Protocol, Access List: Intro to Access List, Standard Access List, Telnet Access, Extended Access
List.
Module 3[10L]: Queuing Theory, TCP flavors: Tahoe, Reno, New-Reno, TCP-SACK, TCP-
RED, and TCP-Vegas. Transport protocol for real time (RTP), Quality of Services: Integral
Services, Resource reservation Protocol (RSVP), Differentiated Services. Routing and Multicast,
Structure of internet: Autonomous System, Inter-domain routing: OSPF and RIP, Inter domain
Routing: BGP, Multicasting: Group Management (IGMP).
Module 4[8L]: Peer-to-Peer and Overlay Network. Concept of overlays, Unstructured Overlays:
Overlay Network, Internet Traffic Modeling, P2P Network, Gnutella, Concepts of Distributed
Hast Table, Structured Overlays: Chord, CAN, Pastry.
Books:
1. Computer Networks: A System Approach, by Peterson and Davie, 5th Edition Morgan
Kauffman, 2011.
2. Computer Networking: Top Down Approach, by kurose and Ross, 6th Ed. Pearson, 2011.
3. Cisco Certified Networking Associate Study Guide, By Todd Lammle, Sixth Edition,
Wiley Publications.
Module 2[8L]: Reference Architecture- IoT Architecture-State of the Art – Introduction, State
of the art, Reference Model and architecture, IoT reference Model - IoT Reference Architecture
Introduction, Functional View, Information View, Deployment and Operational View, Other
Relevant architectural views. Real-World Design Constraints- Introduction, Technical Design
constraints-hardware is popular again, Data representation and visualization, Interaction and
remote control.
Module 3[8L]: IoT Data Link Layer & Network Layer Protocols- PHY/MAC Layer(3GPP
MTC, IEEE 802.11, IEEE 802.15), Wireless HART,Z-Wave, Bluetooth Low Energy, Zigbee
Smart Energy, DASH7 - Network Layer-IPv4, IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP,
RPL, CORPL, CARP.
Module 4[8L]: Transport & Session Layer Protocols - Transport Layer (TCP, MPTCP, UDP,
DCCP, SCTP)-(TLS, DTLS) – Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT.
41 | P a g e
Module 5[8L]: Service Layer Protocols & Security: Service Layer -oneM2M, ETSI M2M,
OMA, BBF – Security in IoT Protocols – MAC 802.15.4, 6LoWPAN, RPL, Application Layer
Books:
1. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos,
David Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a
New Age of Intelligence”, 1 st Edition, Academic Press, 2014.
2. Peter Waher, “Learning Internet of Things”, PACKT publishing, BIRMINGHAM –
MUMBAI
3. Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”, ISBN
978-3-642-19156-5 e-ISBN 978-3-642-19157-2, Springer
4. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving
World of M2M Communications”, ISBN: 978-1-118- 47347-4, Willy Publications
5. Vijay Madisetti and ArshdeepBahga, “Internet of Things (A Hands-onApproach)”, 1 st
Edition, VPT, 2014.
Books:
1. Mobile Communications by Jochen H. Schller, Second Edition, Pearson Education, New
Delhi, 2007.
2. Introduction to Wireless and Mobile systems by Dharma Prakash Agarval, Qing and An
Zeng, Thomson Asia Pvt Ltd, 2005.
42 | P a g e
CS1*130 Mainframe Technology 3-0-0 3
Module 1[10L]: Mainframe Applications: Characteristics of Mainframe Applications, Classes of
Mainframe applications, Batch, On-line, Interactive, Inter/Intra/Extranet, Network Capabilities,
Application Development, High Level Languages, Standard Utilities, Other Utilities.
Module 2[10L]: Mainframe Components: CPUs, Main Storage, Channels, Control Units, Direct
Access Storage Device (DASD), Tape Devices, Printers & Card Readers, Terminals, Operating System,
System Operation, Maintenance.
OS Components: Features, Virtual Storage, Swapping, Paging, Multiprogramming, Spooling, Sub-
Systems, Usage Modes, Batch Processing, Time Sharing Data Sets.
Module 3[10L]: Catalogs, VTOC and DASD labels, Tape Labels, Naming Convention, Generation
Data Groups, Data Security, Archiving, Backup.
OS Processing:
Data Set Access, File Organization, Record Organization, Access Strategies, Databases: Concepts,
Hierarchical Databases, Network Databases, Relational Databases.
Batch Processing: Jobs, JCL, Job Entry Subsystem (JES), Job Submission, Job Scheduling, Initiators,
Job Execution, Output Processing, Scheduling Extensions, Audit Extensions, Output Extensions.
Books:
1. Fog and Edge Computing: Principles and Paradigms by Rajkumar Buyya, Satish Narayana
Srirama.
Module 2[5L]: SEO Research & Analysis, Market Research, Keyword Research and Analysis,
Keyword opportunity, Competitors Website Analysis, SWOT Analysis of Website, How to
Choose Best Keywords, Tools available for Keyword Research.
Module 3[5L]: Website Design SEO Guidelines: Content Research, Content Guidelines,
Content Optimization, Design & Layout, XML Sitemap / URL List Sitemap.
Module 4[5L]: On-page Optimization: The Page Title, Meta Descriptions & Meta Keywords,
43 | P a g e
Headings, Bold Text, Domain Names & Suggestions, Canonical Tag, Meta Tags, Images and Alt
Text, Internal Link Building, The Sitemap, Invisible Text, Server and Hosting Check, Robots
Meta Tag, Doorway Pages, 301 Redirects, 404 Error, Duplicate content.
Module 5[5L]: Off-page Optimization: Page Rank, Link Popularity, Link Building in Detail,
Directory Submission, Social Bookmark Submission, Blog Submission, Articles, Links
Exchange, Reciprocal Linking, Posting to Forums, Submission to Search Engine, RSS Feeds
Submissions, Press Release Submissions, Forum Link Building, Competitor Link Analysis.
Module 6[5L]: Analytics: Google Analytics, Installing Google Analytics, How to Study Google
Analytics, Interpreting Bars & Figures, How Google Analytics can Help SEO, Advanced
Reporting, Webmaster Central & Bing/Yahoo, Open Site Explorer, Website Analysis using
various SEO Tools available.
Module 7[5L]: SEO Tools and Reporting: Keyword Density Analyzer Tools, Google Tools,
Yahoo / Bing Tools, Rich Snippet Text Tools, Comparison Tools, Link Popularity Tools, Search
Engines Tools, Site Tools, Miscellaneous Tools, Google analysis, Tracking and Reporting,
Reports Submission, Securing Ranks.
Books:
1. Search Engine Optimization For Flash by Perkins
2. Website Optimization by King
Module 2[9L]: Inverted indices: Preprocessing steps, tokenization, stemming, stop word
removal, term weighting; Index Compression: Data Compression Techniques, Huffman
Coding, Arithmetic Coding, compressing posting lists.
Module 3[9L]: Models: vector space model, probabilistic model, language models;
Evaluation: standard test collection, concept of relevance, precision-recall based metrics,
reciprocal rank, DCG; Relevance feedback and query expansion: Rocchio algorithm;Text
classification : Naïve Bayes; Text clustering: Flat Clustering, Hierarchical Clustering; XML
Retrieval: Basic concepts, Challenges, Evaluation.
Module 4[9L]: Web search: Structure of Web, web graph, Hidden Web, User intent, Web
crawl. Link Analysis: Web as a graph, Page Rank, Hubs and Authorities; Sentiment analysis of
social networking, Question Answering, Collaborative Searching.
Books:
1. Introduction to Information Retrieval by Christopher D. Manning, Prabhakar Raghavan
and Hinrich Schütze, Cambridge University Press. 2008.
44 | P a g e
CS1*134 Virtual Reality 3-0-0 3
Module 1[8L]: Virtual Reality and Virtual Environment: Introduction, Computer graphics, Real
time computer graphics, Flight Simulation, Virtual environments requirement, benefits of virtual
reality, Historical development of VR, Scientific Landmark, 3D Computer Graphics:
Introduction, The Virtual world space, positioning the virtual observer, the perspective
projection, human vision, stereo perspective projection, 3D clipping, Colour theory, Simple 3D
modelling, Illumination models, Reflection models, Shading algorithms, Radiosity, Hidden
Surface Removal, Realism-Stereographic image.
Module 3[8L]: Virtual Environment: Animating the Virtual Environment: Introduction, The
dynamics of numbers, Linear and Non-linear interpolation, the animation of objects, linear and
non-linear translation, shape & object inbetweening, free from deformation, particle system,
Physical Simulation: Introduction, Objects falling in a gravitational field, Rotating wheels,
Elastic collisions, projectiles, simple pendulum, springs, Flight dynamics of an aircraft.
Module 4[8L]: VR Hardware and Software: Human factors: Introduction, the eye, the ear, the
somatic senses, VR Hardware: Introduction, sensor hardware, Head-coupled displays, Acoustic
hardware, Integrated VR systems, VR Software: Introduction, Modeling virtual world, Physical
simulation, VR toolkits, Introduction to VRML
Books:
1. Virtual Reality Systems by John Vince, Pearson Education Asia, 2007.
References:
1. Visualizations of Virtual Reality by Adams, Tata McGraw Hill, 2000.
2. Virtual Reality Technology by Grigore C. Burdea, Philippe Coiffet, Wiley Inter Science,
2nd Edition, 2006.
3. Understanding Virtual Reality: Interface, Application and Design by William R. Sherman,
Alan B. Craig, Morgan Kaufmann, 2008.
45 | P a g e
Module 2[9L]: Substitution Patterns: Patterns of Substitutions within Genes, Estimating
Substitution Numbers, Variations in Evolutionary Rates between Genes. Molecular Clocks.
Distance-based Methods of Phylogenetics: Molecular Phylogenetics, Phylogenetic Trees – tree
reconstruction, rooted and unrooted trees, gene vs species trees, character and distance data.
Distance Matrix Methods – UPGMA, Estimation of branch lengths, Transformed distance
method, Neighbor’s relation method, Neighbor-joining methods. Maximum Likelihood
Approaches. Multiple Sequence Alignments.
Module 4[9L]: Protein and RNA Structure Prediction: Amino Acids, Polypeptide
Composition, Secondary Structure – Backbone flexibility, Accuracy of predictions, Chou-
Fasman and GOR methods. Tertiary and Quaternary Structure – Hydrophobicity, Desulfide
bonds, Active structures. Algorithms for Modeling Protein Folding – Lattice models, Off-lattice
models, Energy fuctions and optimizations. Structure Prediction – Comparative modeling,
Reverse protein folding.
Proteomics: From Genomes to Proteomes. Protein Classification – Enzyme nomenclature,
Families and superfamilies, Folds. Experimental Techniques – 2D electrophoresis, Mass
spectrometry, Protein microarrays. Inhibitors and Drug Design. Ligand Screening. X-Ray
Crystal Structures. NMR Structures. Empirical Methods and Prediction Techniques. Post-
translational Modification Prediction.
Books:
Fundamental Concepts of Bioinformatics, Krane, Raymer.
Module 2[8L]: Overview of Linear Algebra and Quantum Mechanics: Bases, Linear
Operators, Pauli Matrices, Inner products, Adjoints and Hermitian Operators, Tensor Products.
Operator functions. The commutator and anti-commutator, Polar and singular value
decomposition.
Postulates of Quantum Mechanics: State Space, Evolution, Quantum Measurement,
Distinguishing Quantum States, Projective and POVM Measurements, Phase, Composite
Systems. Superdense coding. Density Operator – Ensembles of quantum states, General
properties, Reduced Density operators. Schmidt Decomposition and Purifications. EPR and Bell
46 | P a g e
inequality.
Books:
1. Quantum Computation and Quantum Information, Nielsen, Chuang
Module 2 [9L]: Computations in Nature: Social Insects, Immune System, Evolving Population,
Brain etc.
Books:
1. Nature Inspired Algorithm for Optimization by Raymond Chiong, Springer.
2. Nature Inspired Optimization Algorithms by Xin-She yang, Elsevier.
3. Nature Inspired Metaheuristics Algorithms by Xin-She yang, Luniver Press
Module 2 [9L]: Noise less coding, Shannon’s first fundamental theorem, Discrete memory less
channel, Mutual information, Sources with finite memory, Markov sources, Shannon’s second
47 | P a g e
fundamental theorem on coding, Huffman coding, Lempel – Ziv algorithm, Shannon-Fano
algorithm.
Module 3 [9L]: Error detecting codes, Hamming distance, Error correcting codes, Repitition
codes, Linear block codes, binary cyclic codes, BCH codes, Reed-Soleman codes, Golay codes.
Convolution Coding: Code tree, state diagram, Trellis diagram, Maximum-Likelihood decoding
,Viterbi’s algorithm, Sequential decoding.
Module 4 [9L]: Network Information theory, Information Theoretic Security, Perfect Secrecy,
Shannon's Theorem, Perfectly Secret Codes, Introduction to Computational Security and
Pseudo Random Sources
Books:
1. T.M Gover, J.M Thomos,“Elements of Information Theory”, Wiley , Edition 2nd
2. Haykins S, “Digital Communications”, Wiley
3. D. J. Mackay , “Information Theory, Inference and Learning Algorithms ” Cambridge
University Press ,Edition 2002
4. J G Proakis, “ Digital Communications”, Mc Graw Hill.
5. Ballard and C.M.Brown, Computer Vision , Prentice Hall, Englewood Cliffs
6. Roman, S. Coding and Information Theory. New York: Springer-Verlag, 1992
Module 2 [10L]: The wireless Local Area Network (WLAN): Wireless Transmission Media,
WLAN Products and Standards, 802.11 security, IEEE 802.11b/n/g.., Securing WLANs,
Countermeasures;
Wireless Application Protocol (WAP): Comparison of the TCP/IP with mobile TCP/IP, OSI and
WAP Models, WAP Security Architecture, Marginal Security;
Secure Wireless and Mobile Communications: Security aspects of mobile communications:
Security in WLANs, Mobile WANs, Mobile Internet Communications, Wireless Transport
Layer Security.
48 | P a g e
Books:
1. S.K. Makki, P. Reiher, K. Makki, N. Pissinou and S. Makki, Mobile and wireless network
security and privacy, Springer.
2. R. Nichols and P. Lekkas, Wireless Security: Models, Threats and Solutions, McGrawhill,
2010
Module 2[9L]: Digital Signature; Process and services, attacks on digital signatures, Digital
Signature Schemes; Digital certificates and PKIs; Different PKIs: PGP (Pretty Good Privacy):
Web of trust, applications; X.509: X.500, Certification Authority (CA), Registration Authority
(RA), Root-CA, X.509 Protocols, Simple PKI (SPKI)
Module 3[9L]: Entity Authentication; Passwords and Challenge Response, zero-knowledge and
bio-metrics, Key management; security key distribution, Kerberos, Symmetric Key agreement,
Public Key Distribution and Hi-jacking, Issues of revocation, Anonymity and Privacy Smartcard
integration with PKIs, Trust management systems,
Module 4[9L]: Email Security, PGP and S-MIME, Cloud security through PKI, Application in
e-commerce, e-business, e-payment, e-health and mobile applications.
Books:
1. Cryptography and Network Security by Behrouz Forouzan and D. Mukhopadhyay
2. Public Key Infrastructure Overview by Joel Weise, Sun Blue Prints
49 | P a g e
computation, their relationships to each other, and to physical systems; Quantum error correcting
codes; Quantum cryptography, Quantum fault tolerance.
Books:
1. Cryptography: Theory and Practice by Douglas Stinson
2. Foundation of Cryptography by Oded Goldreich
3. Physical-Layer Security by Matthieu Bloch and Joao Barros
4. Quantum Computation and Quantum Information by Michael Nielsen and Isaac Chuang
Module 3 [9L]: Data acquisition- understanding storage formats and digital evidence,
determining the best acquisition method, acquisition tools, validating data acquisitions, remote
network acquisition tools, other forensics acquisitions tools.
Module 4 [9L]: Processing crimes and incident scenes, securing a computer incident or crime,
seizing digital evidence at scene, storing digital evidence, obtaining digital hash, reviewing case.
Books:
1. Warren G. Kruse IIandJay G. Heiser, “Computer Forensics: Incident Response
Essentials”, Addison Wesley, 2002.
2. Nelson, B, Phillips, A, Enfinger, F, Stuart, C., “Guide to Computer Forensics and
Investigations, 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
3. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles
River Media
50 | P a g e
CS1*143 Blockchain Technology 3-0-0 3
Module 1 [9L]: Introduction: Overview of Blockchain, Public Ledgers, Bitcoin, Smart
Contracts, Block in a Blockchain, Transactions, Distributed Consensus, Public vs Private
Blockchain, Understanding Cryptocurrency to Blockchain, Permissioned Model of Blockchain,
Overview of Security aspects of Blockchain, Basic Crypto Primitives: Cryptographic Hash
Function, Properties of a hash function, Hash pointer and Merkle tree, Digital Signature, Public
Key Cryptography, A basic cryptocurrency.
Books:
1. Blockchain: Blueprint for a New Economy by Melanie Swan, O’Reilly, 2015
2. Blockchain: The Blockchain for Beginners-Guide to Blockchain Technology and Leveraging
Blockchain Programming by Josh Thompsons
3. Blockchain Basics by Daniel Drescher, Apress; 1stedition, 2017
51 | P a g e
CS1*144 Software Defined Networking 3-0-0 3
Module 1[8L]: INTRODUCING SDN: SDN Origins and Evolution – Introduction – Why
SDN? - Centralized and Distributed Control and Data Planes - The Genesis of SDN.
Module 4 [7L]: SDN APPLICATIONS AND USE CASES: SDN in the Data Center - SDN in
Other Environments - SDN Applications - SDN Use Cases - The Open Network Operating
System 3
Module 5 [7L]: SDN'S FUTURE AND PERSPECTIVES: SDN Open Source - SDN Futures -
Final Thoughts and Conclusions
Books:
1. Software Defined Networks: A Comprehensive Approach by Paul Goransson and
Chuck Black, Morgan Kaufmann Publications, 2014
2. SDN - Software Defined Networks by Thomas D. Nadeau & Ken Gray, O'Reilly, 2013
3. Software Defined Networking with OpenFlow By SiamakAzodolmolky, Packt Publishing,
2013
================END===============
52 | P a g e