Sunday, November 29, 2020

Skill Enhancement Course: SEC-B: Information Security/ E-Commerce CMS-A-SEC-B-4-1-TH: Information Security

 Overview

Overview of Security Parameters: Confidentiality, Integrity and availability-security

violation, Assumptions and Trust- Security assurance, OSI security architecture.

05 hours

Cryptography

Mathematical Tools for Cryptography, Symmetric Encryption Algorithm, Theory of Block

cipher design, Symmetric cipher model, Risk assessment, quantitative and qualitative

approaches, Network security management, Firewalls, Web and wireless security

management, Computer security log management, IT security infrastructure, Operating

system security, user security, program security.

10 hours

Finite Field and Number Theory

Groups, Rings, Fields-Modular, Prime numbers, Fermat's and Euler's Theorem, Chinese

remainder Theorem, Discrete Logarithm.

03 hours

Hash Functions and Digital Signatures

Authentication requirement – Authentication function -MAC, Hash functions, Security of

hash function, Hashing Algorithms: MD5.

05 hours

Internet Firewalls for Trusted System

Roles of Firewalls, Firewall related terminology, Types of Firewalls, Firewall designs.

02 hours

E-Mail, IP & Web Security (Qualitative study)

E-mail Security: Security Services for E-mail-attacks possible through E-mail, Pretty

Good S/MIME.

IP Security: Overview of IPSec, IP Security Architecture, Authentication Header,

Encapsulation Security Payload.

Web Security: Secure Socket Layer/Transport Layer Security, Basic Protocol, SSL

05 hours

Attacks, Secure Electronic Transaction (SET).

Cyber

Cyber laws to be covered as per IT 2008

Definitions, Digital Signature And Electronic Signature.

1) [Section 43] Penalty and Compensation for damage to computer, computer system,

etc.

2) [Section 65] Tampering with Computer Source Documents.

3) [Section 66 A] Punishment for sending offensive messages through communication

service, etc.

4) [Section 66 B] Punishments for dishonestly receiving stolen computer resource or

communication device.

5) [Section 66C] Punishment for identity theft.

6) [Section 66D] Punishment for cheating by personation by using computer resource.

7) [Section 66E] Punishment for violation of privacy.

8) [Section 66F] Punishment for cyber terrorism.

9) [Section 67] Punishment for publishing or transmitting obscene material in

electronic form.

10) [Section 67A] Punishment for publishing or transmitting of material containing

sexually explicit act, etc. in electronic form.

11) [Section 67B] Punishment for publishing or transmitting of material depicting

children in sexually explicit act, etc. in electronic form.

12) [Section 72] Breach of confidentiality and privacy.

CMS-A-CC-4-10-P:Programming with Microprocessor 8085 Core Course- 10: Practical, Credits:02, Contact hours: 40.

 1. Assembly Language Programming for Arithmetic Operations like Addition, Subtraction,

Multiplication and Division on 8, 16 bit data.

2. Assembly Language Programming for different logical operations.

3. Assembly Language Programming for code conversions.

4. Assembly Language Programming for different sorting techniques.

5. Assembly Language Programming for memory block transfer.

6. Assembly Language Programming for AP series and Fibonacci series.

7. Assembly Language Programming for HCF, LCM etc.

8. Assembly Language Programming for Searching.

9. Assembly Language Programming for frequency distribution.

10. Block Replacement and transfer

Many more programs can be included related to the programming techniques of Microprocessor 8085

CMS-A-CC-4-10-TH: Microprocessor and its Applications Core Course- 7: Theory, Credits:04, Contact hours: 60.

 Introduction to Microcomputer based system:

Evolution of Microprocessor and Microcontrollers and their advantages and disadvantages.

03 hours

Microprocessor Architecture and Memory Interfacing

Basic Architecture of Microprocessor 8085 and explanation of each block, Microprocessor

8085 pin out and signals, Addressing modes, Instruction Formats, Instruction Cycle, Clock

Cycle, Multiplexed Address Data Bus, Control and Status signals, Microprocessor and Bus

Timing, De-multiplexing of Address Data Bus, Generation of Control Signals for I/O and

Memory, Basic concepts in Memory Interfacing, Address Decoding and memory

Addresses.

14 hours

Interfacing I/O Devices

Basic Interfacing concepts, Peripheral I/O instructions (I/O mapped I/O), Device Selection

and data Transfer, Absolute and Partial Decoding, Input Interfacing, Interfacing I/O using

decoders, Memory mapped I/O techniques, Data transfer schemes, Interfacing 8155

memory segment.

10 hours

Programming 8085

Instruction Set of 8085, Different Programming Techniques, Stack and Subroutines,

Counter and Time Delays, Code Conversion, BCD Arithmetic and 16 bit Data Operation.

10 hours

Interfacing Peripheral Devices and Applications

Interrupts: 8085 Interrupt, RST instructions, Software and Hardware interrupt, multiple

Interrupts and Priorities, 8085 Vectored Interrupts, Restart as Software Instructions.

Interfacing Digital to Analog Converters, Analog to Digital Interfacing, keyboard

interfacing, interfacing 8255 (Mode - 0, BSR), Support IC chips- 8237/8257,8259

13 hours

Microprocessor 8086

The 8086 microprocessor- Architecture, Instruction set, Addressing modes, Interrupts,

Memory interfacing with 8086.

CMS-A-CC-4-9-P: Algorithms Lab. Core Course- 9: Practical, Credit:02, Contact hour: 40.

 Lab. based on Graph Theory using C

Graph Algorithms:

Implementation of Graph algorithms: Single Spanning Tree Generation using - BFS, DFS, Minimal

Spanning Tree Generation using - Prim's Algorithm, Kruskal’s Algorithm, Shortest Path finding using -

Floyd's Algorithm, Floyd-Warshall Algorithm, Dijkstra's Algorithm, Graph Partitioning Algorithm.

CMS-A-CC-4-9-TH: Introduction to Algorithms & its Applications Core Course- 9: Theory, Credit: 04, Contact hours: 60.

 Introduction to Algorithms:

Definition, Characteristics, Recursive and Non-recursive algorithms.

05 hours

Asymptotic Complexity Analysis of Algorithms:

Space and Time Complexity, Efficiency of an algorithm, Growth of Functions, Polynomial

and Exponential Complexity, Asymptotic Notations: Big O Notation and Small o notation,

Big Ω and Small ω, Big Θ and Small ϕ Notations, Properties: Best case/worst case/average

case analysis of well-known algorithms.

10 hours

Algorithm Design Techniques:

Concepts and simple case studies of Greedy algorithms. Divide and conquer: Basic

concepts, Case study of selected searching and sorting problems using divide and

conquer techniques: Dynamic programming: General issues in Dynamic Programming.

15 hours

Graph Representation and Algorithm:

Graph traversal algorithms: BFS, DFS, Minimal spanning trees: Prim's Algorithm,

Kruskal's Algorithm, Shortest path algorithms: Floyd's Algorithm, Floyd-Warshall

Algorithm, Dijkstra's Algorithm, Graph Coloring Algorithms.

25 hours

Classification of Problems:

Concept of P, NP.

CMS-A-CC-4-8-P: Computer Networking and Web Design Lab Core Course- 8: Practical, Credit: 02, Contact hour: 40.

 Computer Networks: Practical

Familiarization with Networking cables (CAT5, CAT6, UTP), Connectors (RJ-45, Tconnector),

Hubs, Switches, LAN installation & configuration (peer-to-peer) process.

05 hours

Web Design: Practical

Web page design by HTML

Handling HTML form

HTML

Capturing Form Data, GET and POST form methods, Dealing with multi value fields

Redirecting a form after submission.

20 hours

Array

Anatomy of an Array ,Creating index based and Associative array, Accessing array

Looping with Index based array, with associative array using each() and for each()

Some useful Library function.

CMS-A-CC-4-8-TH: Data Communication, Networking and Internet Technology. Core Course- 8: Theory, Credit: 04, Contact hours: 60.

 Overview of Data Communication and Networking

Introduction:

Data communications Components, data representation, direction of data flow (simplex, half

duplex, full duplex).

Network Hardware: Physical structure (type of connection, topology), categories of

network (LAN, MAN, WAN).

Internet: Brief history, Protocols and standards, Reference models: OSI reference model,

properties of all the layers, TCP/IP reference model, their comparative study.

04hours

Physical Layer

Data & Signals: Analog & Digital Data and Signals, periodic and non-periodic signals,

composite signals, bandwidth, bit rate, transmission of digital signals.

Transmission Impairments: Attenuation, Distortion and Noise.

Data Rate Limits: Noiseless Channel: Nyquist Data rate, Noisy Channel: Shannon’s

Capacity, calculation of data rate using both limits.

Digital Transmission

Digital to Digital Conversion: Line coding, schemes (RZ, NRZ, Manchester, Differential

Manchester), block coding.

Analog to Digital Conversion: Sampling, Nyquist rate of sampling, Pulse code modulation

(PCM), Delta Modulation (DM), Adaptive Delta Modulation (ADM), parallel and serial

transmission.

Analog Transmission

Digital to Analog: Amplitude shift keying (ASK), Frequency Shift Keying (FSK), Phase

Shift Keying (PSK), Quadrature Amplitude Modulation (QAM).

Analog to Analog Conversion:

Amplitude Modulation (AM), Frequency Modulation (FM), Phase Modulation.

12hours

Bandwidth Utilization Techniques

Multiplexing: FDM, Synchronous & Statistical TDM, WDM.

04hours

Transmission Medium

Guided media: Twisted pair, Coaxial, Fiber optics.

Unguided: Radio waves, microwaves, Infrared, Antenna, Communication satellites

(qualitative study only).

06hours

Switching and Telephone network

Circuit switched networks, Packet Switched networks, Virtual Circuit switch.

Major components of telephone network, Dial up modem, DSL and ADSL modems, Cable

TV for data transfer (qualitative study only)

04hours

Data link Layer:

Types of errors, framing (character and bit stuffing), error detection & correction methods,

Linear and cyclic codes, checksum.

Protocols: Stop & wait ARQ, Go-Back- N ARQ, Selective repeat ARQ, HDLC (qualitative

study only).

Physical addressing: MAC address and its format.

04hours

Medium Access sub layer

Point to Point Protocol, Token Ring: Reservation, Polling. Multiple access protocols: Pure

& Slotted ALOHA, CSMA, CSMA/CD, CSMA/CA.

Channelization: FDMA, TDMA, CDMA (Qualitative study only).

Wired and Wireless LAN: Standards, fast Ethernet, Protocol 802.11, Bluetooth.

08hours

Network layer

Internetworking & devices: Repeaters, Hubs, Bridges, Switches, Router, Gateway,

Addressing: IP addressing, Subnetting, Routing techniques: static vs. dynamic routing ,

Protocols: RARP, ARP, IP, ICMP

11 hours

Transport layer

Process to Process delivery: UDP, TCP

03 hours

Application Layer

Introduction to DNS, Remote logging, FTP, Electronic mail, WWW & HTTP

CMS-A-SEC-A-3-2-TH: Internet of Things (IoT) Skill Enhancement Course: SEC-A: Choice -2, Theory, Credit:02, Contact hours: 40.

 Introduction to Internet of Things (IoT)

Defining IoT, Characteristics of IoT, Physical design of IoT, Functional blocks of IoT,

Communication models & APIs.

04 hours

IoT and M2M

Difference between IoT and M2M, Software defined Network, network function

virtualization (NFV), difference between SDN and NFV.

04 hours

Network & Communication aspects

Wireless medium access issues, MAC protocol survey, Survey routing protocols,

Sensor deployment & Node discovery, Edge connectivity and protocols, Fog/Gateway

Devices for Data aggregation and dissemination, Security challenges.

08 hours

IoT Physical Servers and Cloud Offerings

Introduction to Cloud Storage models and communication APIs Web Server – Web Server

for IoT, Cloud for IoT, Python web application framework.

05 hours

Developing IoTs

Introduction to Python, Introduction to different IoT tools, Developing applications

through IoT tools, Developing sensor based application through embedded system platform,

Implementing IoT concepts with python.

08 hours

IoT Physical Devices and Endpoints Introduction to Raspberry PI-Interfaces (serial, SPI,

I2C) Programming – Python program with Raspberry PI with focus of interfacing external

gadgets.

04 hours

IoT Analytics

Signal processing, real-time and local analytics, Databases, cloud analytics and applications.

04 hours

Domain specific applications of IoT

Home automation, Industry applications, Surveillance applications.

CMS-A-SEC-A-3-1-TH: Computer Graphics Skill Enhancement Course: SEC-A: Choice -1: Theory, Credit:02, Contact hours: 40.

 Introduction

Basic concepts of Graphics Devices– CRT monitor, Monochrome and Color Monitor

displaying technique only, Physical and logical units of graphics devices – Pixel and its

different properties, Basic idea for image or picture formation using pixels – Raster Scan and

Vector Scan.

05 hours

Basic geometrical shapes formation algorithms

Concepts Co-ordinate System, Line Segment, Digital Differential Analyzer, Circle and arc

segment, elliptic segment, Bresenham’s and Midpoint scan conversion algorithms.

05 hours

Two and Three Dimensional Transformations

Transformations operations - Translation, Rotation, Scaling. Reflection, Shearing and Inverse

of these operations, Homogeneous coordinate system representation, matrix representation.

Composite Transformations Operations – Basic ideas and matrix representations by matrix

concatenation for a particular operation.

14 hours

Two Dimensional Clipping

View port, window port, display device, Point Clipping, Line Clipping, Cohen-Sutherland

line clipping algorithm, Sutherland Hudgeman polygon clipping algorithm

08 hours

Projection

Basic Concept of Projection operation and its application, Classification – Perspective,

Parallel and its subclasses, Principles of these projections (Geometric representation only, no

Mathematical Foundation and algorithms)

06 hours

Applications

Basic Concepts Computer Art, Animation – Animating and modeling of real world,

Morphing – Classification of morphing and Application to the Advertisements and

publicities.

CMS-A-CC-3-7-P: Operating Systems Lab. Core Course- 7: Practical, Credit: 02, Contact hours: 40. Shell programming in LINUX

 1. Write a shell script to convert the content of a file from lower case to upper case.

2. Write a shell script to count the words, lines and characters of a given file. File name should be

provided at run time.

3. Write a shell script that take a word from user and find out the frequency of the word in a given

file.

4. Write a shell script that gets executed at the moment of user login and it displays Good Morning,

Good afternoon, Good Evening, Good Night, depending upon the time at which the user logs on.

5. Write a shell script to print Pascal diamond.

6. Write a shell script to find a number using sequential search method.

7. Write a shell script to find a number using binary search technique.

8. Write a shell script to sort a set of integer numbers using bubble sort.

9. Write a shell script to find out the factorial of a given number.

10. Write a shell script to reverse a string and check whether it is a palindrome.

11. Write a shell script to find the roots of a quadratic equation ax2 + bx +c = 0, considering all

possible cases.

12. Write a shell script for menu based system to insert records for employees with employee ID,

name, designation, salary in a data file, also display records when necessary. Display salary for

the employee asked.