Monday, 10 March 2014

Introduction of Wireless Networks contd...

Signal

Definition: 1. Signals are nothing but they are the physical representation of data.
                   2.Mathematically, we can say that signals are functions of time and location. so the following is the right representation for signal:-   f(x,t)
Here f(x,t) represents the signal which is the function of location and time.
                      
                    Users of communication uses these signals for communication. Here,signal parameters represents the data values which are to be transmitted from sender to receiver.
                     
For radio transmission, the periodic signals (i.e. sine wave ) are used as carriers. The general form of a sine wave is :    g(t) = A sin (2 pi f t + phi t)
The signal parameters are the 
                     
 Amplitude --> A
Phase Shift --> phi
frequency   --> f
Here the amplitude as a factor of the function g may also change over time.
The frequency f expresses the periodicity of the signal over with the period (T = 1/f).
The  frequency f may change over time.
Now , the remaining signal parameter is phi which represents the phase shift of the signal. The phase shift determines the shift of the signal relative to the same signal without a shift .
NOTE: 
  • Shifting of phase is also used to represent data.                  
  • Sine wave has  special emphasis as it is possible to construct every periodic signal g by using only sine and cosine function according to a fundamental eqn of FOURIER.                              

Friday, 7 March 2014

SYLLABUS: CS 8303 Wireless Network { NON GRADING }

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA, BHOPAL
PROGRAMME: B.E. Computer Science & Engg., VIII Semester
Course : CS 8303 Wireless Network

 {L T P=3 1 0}            Duration-3hrs.                Max.Marks-100                                     Min.Marks-35

Unit 1
Introduction of Wireless Networks, Different Generations of Wireless Networks. Characteristics of the Wireless Medium: Radio Propagation Mechanisms, Path Loss Modelling and Signal Coverage, Effect of Multipath and Doppler, Channel Measurement and Modelling Techniques.
Unit 2
Network Planning: Introduction, Wireless Network Topologies, Cellular Topology, Cell Fundamentals, Signal to Interferences Radio Calculations, Network Planning for CDMA Systems. Wireless Network Operations: Mobility Management, Radio Resources and Power Management
Unit 3
Multiple Division Techniques: FDMA, TDMA, CDMA, OFDM, SDMA. 
Comparison of Multiple Division Techniques,
 Modulation Techniques – AM, FM, FSK, PSK, QPSK, QAM, 16QAM 
Mobile Data Networks: Introduction, Data Oriented CDPD Network, GPRS, EDGE and High Data Rates,
SMS in GSM, Mobile Application Protocols.
Unit 4
Introduction to Wireless LAN, Evolution of WLAN, Wireless Home Networking, Technologies for Home
Area Network (HAN), Overview of IEEE 802.11, Reference Architecture, PHY and MAC Layer, ireless
ATM, HIPERLAN.
UNIT 5
IEEE 802.15 WPAN, HomeRF, Bluetooth, Interference between Bluetooth and 802.11, Adhoc Networks,
Introduction to 2.5 G and 3 G Networks.

References

1. Kaveh Pahlavan, Prashant Krishnamurthy “principles of Wireless Networks”, PHI.
2. Qing- An Zeng, Dharma Prakash Agrawal “Introduction to Wireless and Mobile Systems” CENGAGE
Learning.
3. Sumit Kasera, Nishit Narang, A P Priyanka “2.5 G Mobile Networks: GPRS and EDGE”, TMTMH
4. Dr. KAMILO FEHER “Wireless Digital Communications” , PHI
5. Jochen Schiller “ Mobile Communications”, PEARSON

SYLLABUS: Information Security (IT 801) (NON GRADING)


Departmental Core DC-24(NON GRADING)

 Information Security IT 801

{L, T, P}= { 3, 1, 2}                       Max. Marks-100                                     Min. Marks-35

                                                                            
 Duration-3 Hrs.
Branch : Information Technology, VIII Semester
Course: Information Security
Unit I: 
Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers, Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption standard, round function,modes of operation, cryptanalysis, brute force attack, Security Goals (Confidentiality, Integrity, Availability).
Unit II:
 Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key exchange, Digital signature standard, elliptic curve cryptography.
Unit III:
 Authentication: One way Authentication, password based, certificate based, Mutual Authentication ,shared secret based, Asymmetric based, Authentication and key agreement, centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association & Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure Socket Layer(SSL),Transport Layer Security (TLS).
Unit IV: 
Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String attack,Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail ,Establishing keys,Privacy ,Authentication of the source, Message integrity ,Non-Repudiation, Viruses, Worms, Malware.
Unit V:
 Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP, Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture, Introduction to intrusion detection system.

References:-

Bernard Menezes,“ Network Security and Cryptography”, CENGAGE Learning.
Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.
Atual Kahate, “ Cryptography and Network Security”, TMH.
William Stalling, “ Cryptography and Network security”, Pearson.

SYLLABUS:CS-8303 – Wireless Network(Grading System 2013)

CS-8303 – Wireless Network(Grading System 2013)
Unit 1
Introduction of Wireless Networks, Different Generations of Wireless Networks.
Characteristics of the Wireless Medium: Radio Propagation Mechanisms, Path Loss Modelling
and Signal Coverage, Effect of Multipath and Doppler, Channel Measurement and Modelling
Techniques.
Unit 2
Network Planning: Introduction, Wireless Network Topologies, Cellular Topology, Cell
Fundamentals, Signal to Interferences Radio Calculations, Network Planning for CDMA
Systems.
Wireless Network Operations: Mobility Management, Radio Resources and Power Management
Unit 3
Multiple Division Techniques: FDMA, TDMA, CDMA, OFDM, SDMA. Comparison of Multiple
Division Techniques, Modulation Techniques – AM, FM, FSK, PSK, QPSK, QAM, 16QAM
Mobile Data Networks: Introduction, Data Oriented CDPD Network, GPRS, EDGE and High
Data Rates, SMS in GSM, Mobile Application Protocols.
Unit 4
Introduction to Wireless LAN, Evolution of WLAN, Wireless Home Networking, Technologies for
Home Area Network (HAN), Overview of IEEE 802.11, Reference Architecture, PHY and MAC
Layer, Wireless ATM, HIPERLAN.
UNIT 5
IEEE 802.15 WPAN, HomeRF, Bluetooth, Interference between Bluetooth and 802.11, Adhoc
Networks, Introduction to 2.5 G and 3 G Networks.

References

1. Kaveh Pahlavan, Prashant Krishnamurthy “principles of Wireless Networks”, PHI.
2. Qing- An Zeng, Dharma Prakash Agrawal “Introduction to Wireless and Mobile Systems”
CENGAGE Learning.
3. Sumit Kasera, Nishit Narang, A P Priyanka “2.5 G Mobile Networks: GPRS and EDGE”, TMH
4. Dr. KAMILO FEHER “Wireless Digital Communications” , PHI
5. Jochen Schiller “ Mobile Communications”, PEARSON

SYLLABUS:Grading System 2013-14 (IT- 801) – Information Security

Grading System 2013-14
IT- 801 – Information Security
Branch : Information Technology, VIII Semester
Course: Information Security
Unit I:
 Basic of Cryptography, secret key cryptography, Types of attack, Substitution ciphers,
Transposition ciphers, block ciphers and steam ciphers, Confusion and Diffusion, Data encryption
standard, round function, modes of operation, cryptanalysis, brute force attack, Security Goals
(Confidentiality, Integrity, Availability).
Unit II:
 Public key Cryptography, Modulo arithmetic, Greatest common divisor, Euclidean
algorithm, RSA algorithm, hash function, attack on collision resistance, Diffie hellman key
exchange, Digital signature standard, elliptic curve cryptography.
Unit III:
 Authentication: One way Authentication, password based, certificate based, Mutual
Authentication ,shared secret based, Asymmetric based, Authentication and key agreement,
centralized Authentication, eavesdropping, Kerberos, IP security overview:- security association &
Encapsulating security payload ,tunnel and transfer modes, internet key exchange protocol, Secure
Socket Layer(SSL), Transport Layer Security (TLS).
Unit IV: 
Software vulnerabilities: Phishing Attacks, buffer overflow vulnerability, Format String
attack, Cross Site Scripting, SQL injection Attacks, Email security:- Security services of E-mail
,Establishing keys, Privacy ,Authentication of the source, Message integrity ,Non-Repudiation,
Viruses, Worms, Malware.
Unit V:
 Web Issue: Introduction, Uniform Resource Locator/uniform resource identify, HTTP,
Cookies, Web security problem, Penetration Testing, Firewalls:- functionality, Polices and Access
Control, Packet filters, Application level gateway, Encrypted tunnel, Security architecture,
Introduction to intrusion detection system.

References:-

Bernard Menezes, “ Network Security and Cryptography”, CENGAGE Learning.
Charlie Kaufman, “ Network Security”, PHI.
Forouzan, “Cryptography & Network Security”, TMH
Randy Weaver, “ Network Infrastructure Security”, Cengage Learning.
Atual Kahate, “ Cryptography and Network Security”, TMH.
William Stalling, “ Cryptography and Network security”, Pearson.

List of Experiment:-


  1. Study of Network Security fundamentals - Ethical Hacking, Social Engineering practices.
  2.  System threat attacks - Denial of Services.
  3.  Sniffing and Spoofing.
  4.  Web Based Password Capturing.
  5.  Virus and Trojans.
  6.  Anti-Intrusion Technique – Honey pot.
  7.  Symmetric Encryption Scheme – RC4.
  8.  Block Cipher – S-DES, 3-DES.
  9.  Asymmetric Encryption Scheme – RSA.
  10.  IP based Authentication.

Scheme: BE (CS) 8TH SEM (NON GRADING)

SCHEME B.E. Information Technology(NON GRADING) SEMESTER – VIII Revised Syllabus and Scheme of Examination Effective from July 2010-11

Scheme B.E. VIII Semester ( Information Technology) (Grading System w.e.f-2013-14)

Scheme B.E. VIII Semester ( Computer Science and Engineering) (Grading System w.e.f-2013-14)


http://www.rgpv.ac.in/uploadContent/frm_ViewScheme.aspx
Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal 
B.E. VIII Semester ( Computer Science and Engineering)Subject wise distribution of marks and corresponding credit  
(Grading System w.e.f-2013-14)








S.No.








Subject Code







Subject Name & Title
Maximum Marks Allotted
Credits
Allotted Subject wise
Total
Credits
Remark
Theory Slot
Practical Slot
Total
Marks
End
Sem.
Mid Sem.
MST
(Two tests average)
Quiz,
Assig- nment
End
Sem
Term work

Period per
week


Lab
work & sessional
Assignm
ent/ quiz


L


T


P
1
CS-801
Soft Computing
70
20
10
30
10
10
150
3
1
2
06
2
CS-802
Web Engineering
70
20
10
30
10
10
150
3
1
2
06
3
CS-803
Elective -II
70
20
10
-
-
-
100
3
1
-
04
4
CS-804
Elective -III
70
20
10
-
-
-
100
3
1
-
04
5
CS-805
Major Project
-
-
-
120
40
40
200
-
-
08
08
6
CS-806
Self study
-
-
-
-
-
50
50
0
0
2
02
7
CS-807
Seminar /Group Discussion
-
-
-
-
-
50
50
0
0
2
02
Grand
Total


Total
280
80
40
180
60
160
800
12
4
16
32
800
MST: Mid Semester Tests Taken at Least twice Per Semester                                                                                             L: Lecture -                                                                                    T: Tutorial -                                                                                    P: Practical Elective –II                                                     Elective-III
CS 8201 - N/W Management                                                            CS 8301Bioinformatics
CS 8202 Cyber Security                                                                  CS8302 Digital imageprocessing
CS 8203 Data Mining and Knowledge Discovery                          CS8303wireless network
CS 8204 Semantic Web & Ontologies                                            CS8304Quantum computing



Note: 1. Minimum Strength of Ten Students is required to offer an Elective in the College in a Particular Academic Session.
2.  Choice of Elective Course ones made for an examination cannot be changed for future examinations
3. Elective Courses for B.E. programme in IT & CS are common, but certain elective courses, which have been given as core courses in any scheme cannot be offered by students of that branch as in elective.