CS 8th SEM AICTE121220115902
CS 8th SEM AICTE121220115902
CS 8th SEM AICTE121220115902
う乙
5 PI 150 100 250 6
Implementation)
Total 280 80 40 210 140 750 12 16 20
NSSNCC/Swachhata Abhiyan,/Rural Outreach Qualifler
Note: Departmental BOS will decide list offour elective subjects for each PEC (Program Elective Course) / OEC (Open Elective Course).
t hour lecture (L) : I credit I hour Tutorial (T) = I credit 2 hour Practical (P): I credit
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
E S
d m
SubieCt Name
n e
Subject
Mid Quiz, End Lab Total
code &Title
Sem Assignment Sem Work RIarks
Exam
Network
CS801 Management 70 20 10 30 20 150 3 2 4
Module-Il:Management Information Base (MIB), Structure of Management Information, NMS Presentation of the
sMI, NMS Meter-ware Network view. Remote Monitoring (RMON), RMON Group.
Desktop Management: Desktop Management Interface (DMI), DMI Architecture, DMI Browser, DMVSNMp
Mapping, Desktop SNMP Extension Agents. Setting up LAN Access, SNMP Configuration.
Module-III: OSI Layering, TCP/IP Layering, Protocols & Standards, Internet standards, Internet administration,
Internet Addresses, Internet protocol: introduction, IP header, IP routing, Subnet addressing, subnet mask, special case
of IP addresses, Comparative Study of IPV4 & IPV6, port numbers Address Resolution Protocol, ARP packet format,
Proxy ARP, ARP command, ARP Example, Reverse Address Resolution Protocol (RARP): Introduction, RARp
Packet format, RARP Examples, RARP server design.
Module-IV: Delivery and Routing of IP Packets, Routing Methods, Static versus Dynamic Routing, Routing table. and
Routing Module, Classless Addressin*q: CIDR. Internet Protocol (lP), Datagram, Fragnrentation, Options, IP Package.
Interior and Exterior Routing, Routing infbnnation protocol (RIP), Open shortest path first protocol (OSPF). BGp,
GGP. Private Netrvorks. Virtual Private Network (VPN), Network Address Translation (NAT).
Module-V: Internet Control Message Protocols (ICMP):- Types of message, message fbnnat. emor reporting. query.
checksum" ICMP Package. IGMP, IGMP Message and its operation, IcMp package.
Transmission control protocol, Process-to-Prooess Communication. TCP Sen,ices Florv Control, TCP Timers. TCp
Operation, TCP Package. Application layers protocols Telnet Protocol. File Transfbr Protocol (FTP), Simple Mail
'I'ransfer Protocol (SMT'P). X-Window system protocol, Remote procedure
call, and Netrvork file system.
Suggested Books:
会で /(/ル メ
-
Course Outcomes:On successil completion ofthe course,the students will be able to:
C01: Explain and demonstrate Nctwork ⅣIanagelnents Architccttlre,Routing&Protocols used ftlr Net、 vork
Mttlagcmcnt.
C〕 02: Select Routing nlcthods and Protocols for Nct、 vork Bascd:Ⅳ fanagementsだ L Construct Computer
Ne"vork。
C03: Compare Routing Strategies,Networks Conflguration and various protocols
C04: Select nctwork rnanagement Protocols dtt IViaintain the ne● ″ork by perfolll.ing routine nlalntenance
tasks.
レ レ ツ
ノ
/
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
E S
d m
M S
i e
d m a
SubieCt Name &
n e
Subject
QuiZ, End Lab Total
code Title
Assignment Sem Work Rttarks
E
x
m
Data Warehousing
CS802 & Mining 70 20 10 30 20 150 3 2 4
Module-I:Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, Data Preprocessing: Data
cleaning, Data Integration and transformation, Data reduction. Data warehouse Design: Data warehouse schema,
Partitioning strategy Data warehouse Implementation, Data Marts, Meta Data, and Example of a Multidimensional
Data model. Introduction to Pattern Warehousing.
Module-Il: OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc. Data
Warehouse Hardware and Operational Design: Security, Backup and Recovery.
Module-III: Introduction to Data & Data Mining: Data Types, Quality of data, Data Preprocessing, Similarity
measures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/s knowledge discovery in
databases. lssues in Data mining. Introduction toFuzzy sets and fuzzy logic.
Module-V: Clustering & Association Rule mining: Hierarchical algorithms, Partitional algorithms, Clustering large
databases BIRCH, DBSCAN, CURE algorithms, Association rules: Parallel and distributed algorithms such as Apriori
and FP growth algorithms.
Suggested Books:
l. Pang-Ning Tan, Steinbach & Kumar, "Introduction to Data Mining", Pearson Education.
2. Data Mining Techniques; ArunK.Pujari; University Press.
3. Jaiwei Han, MichelineKamber,"Data Mining : Concepts and Techniques",Morgan Kaufmann
Publishers.
4. Anahory& Murray, "Dota Warehousing in the Real World", Pearson Education.
5. Margaret H. Dunham,"Dato Mining : Introductory ond Advanced topics", Pearson Education.
6. Data Mining; Adriaans&Zantinge; Pearson education.
7. Mastering Data Mining; Berr),Linoff; Wiley.
一レ
CS802 (Data Warehousing & Mining)
CO1: Understand the functionality of the various data mining and data warehousing component.
CO2: Analyze OLAP tools.
CO3: Apply Data Mining Techniques and methods on large data sets.
CO4: Compare and contrast classification and prediction techniques.
CO5: Explain data mining tools on various applications and understand the basics of big data analytics.
v
zNVv
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
E S
d m
SubieCt Name
n e
Subject
Mid Sem Quiz, End Lab Total
code &Title
Exam Assignment Sem Work Marks
Distributed
CS803A Systems & 70 20 10 100 3 3
Cloud
Comoutins
Module-I: Characterization of Distributed Systems: lntroduction, Examples of distributed Systems, Resource sharing
and the Web Challenges. Architectural models, Fundamental Models. Theoretical Foundation for Distributed System:
Limitation of Distributed system, absence of global clock, shared memory, Logical clocks; Lamport's & vectors logical
clocks. Concepts in Message Passing Systems: causal order, total order, total causal order, Techniques for Message
Ordering, Causal ordering of messages, global state, and termination detection.
Module-Il: Distributed Mutual Exclusion: Classification of distributed mutual exclusion, requirement of mutual
exclusion theorem, Token based and non-token based algorithms, performance metric for distributed mutual exclusion
algorithms. Dishibuted Deadlock Detection: system model, resource Vs communication deadlocks, deadlock
prevention, avoidance, detection & resolution, centralized dead lock detection, distributed dead lock detection, path
pushing algorithms, edge chasing algorithms.
Module-III: Agreement Protocols: lntroduction, System models, classification of Agreement Problem, Byzantine
agreement problem, Consensus problem, Interactive consistency Problem, Solution to Byzantine Agreement problem,
Application of Agreement problem, Atomic Commit in Distributed Database system. Distributed Resource
Management: Issues in distributed File Systems, Mechanism for building distributed file systems, Design issues in
Distributed Shared Memory, Algorithm for Implementation of Distributed Shared Memory.
ModuIe-IV: Failure Recovery in Distributed Systems: Concepts in Backward and Forward recovery, Recovery in
Concurrent systems, obtaining consistent Checkpoints, Recovery in Distributed Database Systems. Fault Tolerance:
Issues in Fault Tolerance, Commit Protocols, Voting protocols, Dynamic voting protocols
Module-V: Cloud Computing Definition: Cloud Types: private, public and hybrid cloud. Cloud computing Services:
IaaS, PaaS, SaaS. Introduction to cloud Virtualization concepts. Types of Virtualization & its benefits. Benefits and
challenges of cloud computing, Next generation Cloud Applications.
Suggested Books:
胎 レ
CS803A (Distributed System & Cloud Computing)
Upon completion ofthe course, the students will be able to
E S
d m
n e
Subject SubieCt
n e
code Name &
Mid QuiZ, Lab Total
Title
Sem Assignment Work RIarks
Exam
Ethical
CS803B Hacking 70 20 10 100 3 3
Module-l: Ethical Hacking: Types of Data Stolen From the Organizations, Elements of Intbrmation Security,
Authenticity and Non-Repudiation, Security Challenges, Effects of Hacking, Hacker Types of Hacker, Ethical
-
Hacker, Hacktivism - Role of Security and Penetration Tester, Penetration Testing Methodology, Networking &
Computer Attacks - Malicious Software (Malware), Protection Against Malware, Intruder Attacks on Networks and
computers, Addressing Physical Security - Key Loggers and Back Doors.
Module-Il: Foot Printing And Social Engineering: Web Tools for Foot Printing, Conducting Competitive Intelligence,
Google Hacking, Scanning, Enumeration, Trojans & Backdoors, Virus & Worms, Proxy & Packet Filtering, Denial of
Service, Sniffer, Social Engineering - shoulder surfing, Dumpster Diving, piggybacking.
Module-III: Data Security: Physical Security - Attacks and Protection, Steganography - Methods, Attacks and
Measures, Cryptography - Methods and Types of Attacks, Wireless Hacking, Windows Hacking, Linux Hacking.
Module-IV: Network Protection System & Hacking Web Servers: Routers, Firewall & Honeypots, IDS & IpS, Web
Filtering, Vulnerability, Penetration Testing, Session Hijacking, Web Server, SQL Injection, Cross Site Scripting,
Exploit Writing, Buffer Overflow, Reverse Engineering, Email Hacking, Incident Handling & Response, Bluetooth
Hacking, Mobiles Phone Hacking.
Module-V: Ethical Hacking Laws And Tests: An introduction to the particular legal, professional and ethical issues
likely to face the domain of ethical hacking, ethical responsibilities, professional integrity and making appropriate use
of the tools and techniques associated with ethical hacking - Social Engineering, Host Reconnaissance, Session
Hijacking, Hacking - Web Server, Database, Password Cracking, Network and Wireless, Trojan, Backdoor, LINIX,
LINUX, Microsoft, NOVEL Server, Buffer Overflow, Denial of Service Attack, Methodical Penetration Testing.
Suggested Books:
l. Michael T. Simpson, Kent Backman, James E. "Corley, Hands-On Ethical Hacking and Network Defense", Second
Edition, CENGAGE Learning.
2. Steven DeFino, Barry Kaufman, Nick Valenteen, "Official Certified Ethical Hacker Review Guide", CENGAGE
Learning.
3. Patrick Engebretson, "The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing
Made Easy", Syngress'Basics Series -Elsevier.
4. Whitaker & Newman, "Penetration Testing and Network Defense"
/声 レ
CS803B (Ethical Hacking)
' Upon completion of the course, the students will be able to.
+
CO3: Define overflows and different types of Auacks and their protection mechanism.
a'"/
&
-\ 6l'-
Y,#/ Lt-- A/
--
12 ' \l
(-,,'
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
Embedded
CS803C Systems 70 20 10 100 3 3
Module-I: lntroduction to Embedded Systems: Definition of embedded system, embedded systems vs. general
computing systems, history of embedded systems, classification, major application areas, purpose of embedded
systems, characteristics and quality attributes of embedded systems, common design metrics, and processor
technology: general purpose processor, application specific processor, single purpose processor.
Module-Il: Embedded System Architecture: Von Neumann v/s Harvard architecture, instruction set architecture, CISC
and RISC instructions set architecture, basic embedded processor, microcontroller architecture, CISC & RISC
examples: 8051, ARM, DSP processors.
Module-III: Input Output and Peripheral Devices Timers and counters, watchdog timers, intemrpt controllers, PWM,
keyboard controller, analog to digital converters, real time clock. Introduction to communication protocols: basic
terminologies, concepts, serial protocol: I2C, CAN, firewire, USB. Parallel protocols: PCI bus, IrDA, bluetooth, IEEE
802. I 1, wireless protocols.
Module-IV: Memory System Architecfure Caches, virtual memory, MMU, address translation, memory and
interfacing, memory write ability and storage performance. Memory types, composing memory - advance RAM
interfacing, microprocessor interfacing VO addressing, intemrpts, direct memory access, arbitration multilevel bus
architecture.
Module-V: Embedded System Supporting Technologies Difference between normal OS and RTOS, scheduling
algorithms. Case study: Tiny OS, VxWorks, QNX. Overview of VLSI technolory, introduction to device drivers. Case
studies: washing machine, air-conditioning, auto focus camera. References:
Suggested Books:
l. F Vahid, T Giogarvis, Embedded systems: A unified hardware/software approach, Wiley.
2. Raj Kamal, Embedded Systems Introduction,2ndEd., TMH publication.
3. David E Simons, An Embedded Software Primer, Pearson.
4. Introduction to Embedded Systems - Shibu K.V, Mc Graw Hill.
5. 8051 Microcontroller and Embedded Systems by Muhammad Ali Mazidi, Janice Mazidi and Janice
Gillispie Mazidi
ι tt c、
畔_
CS803C (Embedded Systems)
CO2: Describe the architecture of 8051 microcontroller and write embedded progftIm for 8051
microcontroller.
CO5: Design a system, component, or process to meet desired needs within realistic constraints such as
economic, environmental, social, political, ethical, health and safety, manufactumbility, and
sustainability.
(t'-''-''
*wN/v
.Iabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
E S
d m
n e
n e
Subject SubieCt
Mid QuiZ, Lab Total
code Name & Sem Assigmment Work Marks
Title
Exam
CS804A Data
Analytics 70 20 10 100 3 3
Module-I:Data Definitions and Analysis Techniques:Elements, Variables, and Data categoization, Levels of
Measurement, Data management and indexing Introduction to Statistical Concepts: Sampling Distributions,
Resampling, Statistical Inference, and R-Programming Descriptive Statistics Measures of central tendency Measures of
location of dispersions.
Module-Il:Basic Data analysis techniques:Statistical hypothesis generation and testing, Chi-Square test, t-Test
Analysis of variance Correlation analysis, Maximum likelihood test
Module-Ill:Advance Data analysis techniques: Regression Modelling, Multivariate Analysis, Bayesian Modeling,
Inference And Bayesian Network, Regression analysis, Classification techniques, Clustering Techniques Clustering
Association rules analysis
Module-fV:Frameworks and Visualization: MapReduce - Hadoop, Hive, MapR - Sharding - NoSQL Databases -
53 - Hadoop Distributed File Systems - Visualizations - Visual Data Analysis Techniques, Interaction Techniques;
Systems and Applications
Module-V:Case studies and projects: Understanding business scenarios, Feature engineering and visualization,
Scalable and parallel computing with Hadoop and Map-Reduce Sensitivity Analysis, Case Studies - Real Time
Sentiment Analysis, Stock Market Predictions.
Suggested Books:
1
AnandRajaraman And Jeffrey David Ullman, Mining Of Massive Datasets,Cambridge University Press.
3
Bill Franks, Taming The Big Data Tidal Wave: Finding Opportunities In Huge Data Streams With Advanced
4
Jiawei Han, MichelineKamber "Data Mining Concepts And Techniques", Second Edition, Elsevier, Reprinted.
″ レ
CS804A (Data Ana$tics)
COl: Understand the key issues in data management and its associated applications in intelligent business
and scientific computing.
CO2: Acquire fundamental enabling techniques and scalable algorithms like Hadoop, Map Reduce and NO
SQL in data analyics.
CO3: Interpret basic and advanced data analytics models and apply software tools for data analltics.
CO4: Achieve adequate perspectives of data analytics in various applications like recommender systems,
social media applications etc.
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
Module-I: Introduction and Concepts: Networks and commercial transactions - Internet and other novelties; networks
and electronic transactions today, Model for commercial transactions; lnternet environment - internet advantage,
worlds wide web and other internet sales venues; online commerce solutions.
Module-Il: Electronic Payment Methods: Updating traditional transactions; Secure online transaction models; Online
commercial environments; Digital currencies and Payment systems; Offline secure processing; private data
networks. Security protocols.
Electronic Commerce Providers:On-line Commerce options: Company profiles. Electronic Payment Systems: Digital
payment systems-First virtual internet payment system; cyber cash model. On-line Commerce Environments: Servers
and commercial environments; Ecommerce servers.
Module-III: Digital Currencies: Operational process of Digicash, Ecash Trail; Using Ecash-; Smart cards; Electronic
Data lnterchange: basics, EDI versus Internet and EDI over Internet. Strategies, Techniques and Tools-, shopping
techniques and online selling techniques.
Module-fV: ERP- An Enterprise Perspective Production Finance, Personnel disciplines and their relationship,
Transiting environment, MIS Integration for disciplines, Information/Workflow-, Network Structure, Client Server
Integrator System, Virhrl Enterprise-Kandarp . ERP - Resource Management Perspective: Functional and Process of
Resource. Management, Introduction to basic Modules of ERP System: HRD, Personnel Management, Training and
Development, Skill Inventory, Material Planning and Control, Inventory, Forecasting, Manufacturing, Production
Planning, Production Scheduling, Production Control, Sales and Distribution, Finance, Resource Management in
global scenario.
Module-V: ERP - Information System perspective: lntroduction to OLAP (Online Analysis and Processing), TP,
OAS, KBS, MRP, BPR" SCM, REP, CRM, Information Communication Technology-.ERP-Key Managerial issues :
Concept Selling, IT Infrastructure, Implication, of ERP Systems on Business Organization, Critical success factors in
ERP System, ERP Culture Implementation Issues, Resistance to change, ERP Selection issues, Return on Investment,
Pre and Post Implementation Issues.
Suggested Books:
l. Ravikalakota, Andrew Whinston, "Frontiers of electronic Commerce", Addision Wesley.
2. V.K. Garg and N.K. Venkita Krishna, "Enterprise Resource Planning-Concepts and Practice", PHI
Publications.
3. Hill, 3'd edition.
Greenstein and Feinman, "E Commerce", Tata McGraw
4. Greenstein, Feinman, "Electronic Commerce Security, Risk management and Control" , Tata
ヽ
McGraw Hill.
ケゝマ―■二
CS804B (E-commerce and ERP)
Course Outcomes: On successful completion of the course, the students will be able to:
Xvvv
Jabalpur Engineering College, Jabalpur
(AICTE Model Curriculum based scheme)
B. Tech. (AICTE) VIII Sem. (Computer Science & Engineering)
巾 d
u c
Simulation
CS804C & Modeling 70 20 10 100 3 3
Module-I: Modeling & Simulation Concepts Modeling & Simulation Concepts: System Concepts, What is a Model?
Type of Models, Modeling & Simulation, Continuous vs. Discrete System Simulation, Numerical Integration vs.
Continuous Simulation, Analog vs. Digital Simulation, Simulation vs. Monte- Carlo Simulation, Nature of Computer
Modeling and Simulation, when to Use Simulation? Limitations of Simulation
Module-Il: Probability Concepts in Simulation Stochastic variables, Random numbers: Pseudo-random generators,
Testing of Pseudo-random number generators, Generation of non-uniformly distributed random numbers, discrete and
continuous random variables, and density and distributive functions. Study of few distributions such as Poisson,
Normal, Uniform
Module-III: Simulation of Continuous Systems lntroduction, Differential equations, Pure Pursuit Problem, Simulation
of Chemical Reaction, Autopilot Simulation and Simulation of other Continuous systems
Module-fV: Simulation of Discrete Systems Arrival patterns and service times, Simulation of Queuing System -
Elementary idea about networks of Queuing with particular emphasis to computer system environment
Module-V: Verification & Validation Design of simulation experiments and validation of simulation experiments
comparing model data units and real system data Simulation Language A brief introduction to important discrete and
continuous languages such as GPSS (Study & use of the language). Use of data base & AI techniques in the area of
modeling and simulation
Suggested Books:
ク レ
CS804C (Simulation & Modeling)
Course Outcomes: After the completion of this course, the students will be able to:
COl: Define, describe and apply basic concepts related to modeling, identification and simulation.
CO2: Classifr various simulation models and give practical examples for each category.
CO3: Demonstrate the ability to apply knowledge of probability and statistics for simulation & modeling,
CO4: Generate and test random numbers and apply them to develop simulation models.
CO5: Construct a model for a given set of data and motivate its validity.
XYU