Search here What you want.

RGPV B.E Computer Science 7th Sem (Grading System) Syllabus

Tuesday, July 9

                                                CS-701 – Compiler Design   


Unit-I 
Introduction to compiling & Lexical Analysis Introduction of Compiler, Major data Structure in compiler, BOOT Strapping & Porting, Compiler structure: analysis-synthesis model of compilation, various phases of a compiler, Lexical analysis: Input buffering , Specification & Recognition of Tokens, LEX.

Unit-II 
Syntax Analysis &Syntax Directed Translation Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent parsing, transformation on the grammars, predictive parsing, bottom up parsing, operator precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax directed definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed definition, L-attribute definition, Top down translation, Bottom Up evaluation of inherited attributes Recursive Evaluation, Analysis of Syntax directed definition.

Unit-III
Type Checking & Run Time Environment Type checking: type system, specification of simple type checker, equivalence of expression, types, type conversion, overloading of functions and operations, polymorphic functions. Run time Environment: storage organization, Storage allocation strategies, parameter passing, dynamic storage allocation , Symbol table

Unit –IV 
Code Generation  Intermediate code generation: Declarations, Assignment statements, Boolean expressions, Case statements, Back patching, Procedure calls Code Generation: Issues in the design of code generator, Basic block and flow graphs, Register allocation and assignment, DAG representation of basic blocks, peephole optimization, generating code from DAG.

Unit –V
Code Optimization Introduction to Code optimization: sources of optimization of basic blocks, loops in flow graphs, dead code elimination, loop optimization, Introduction to global data flow analysis, Code Improving transformations ,Data flow analysis of structure flow graph Symbolic debugging of optimized code.


List of Experiments:  
1.Develop a lexical analyzer to recognize a few patterns.
2.Write a programme to parse using Brute force technique of Topdown parsing.
3.Develop LL (1) parser (Construct parse table also).
4.Develop an operator precedence parser (Construct parse table also)
5.Develop a recursive descent parser  Write a program for generating for various intermediate code forms i) Three address code ii) Polish notation
6.Write a program to simulate Heap storage allocation strategy
7.Generate Lexical analyzer using LEX
8.Generate YACC specification for a few syntactic categories.
9.Given any intermediate code form implement code optimization techniques
10.Study of an Object Oriented Compiler.  




                                                   CS-702 – Distributed System  


Unit-I 
Introduction to distributed systems Architecture for Distributed System, Goals of Distributed system, Hardware and Software concepts, Distributed Computing Model, Advantages & Disadvantage distributed system, Issues in designing Distributed System,

Unit-II 
Distributed Share Memory And Distributed File System Basic Concept of Distributed Share Memory (DSM), DSM Architecture & its Types, Design & Implementations issues In DSM System, Structure of Share Memory Space, Consistency Model, and Thrashing. Desirable features of good Distributed File System, File Model, File Service Architecture, File Accessing Model, File Sharing Semantics, File Catching Scheme, File Application & Fault tolerance. Naming: - Features, System Oriented Names, Object Locating Mechanism, Human Oriented Name.

Unit-III 
Inter Process Communication And Synchronization API for Internet Protocol, Data Representation & Marshaling, Group Communication, Client Server Communication, RPC- Implementing RPC Mechanism, Stub Generation, RPC Messages. Synchronization: - Clock Synchronization, Mutual Exclusion, Election Algorithms:- Bully & Ring Algorithms.

Unit-IV 
Distributed Scheduling And Deadlock Distributed Scheduling-Issues in Load Distributing, Components for Load Distributing Algorithms, Different Types of Load Distributing Algorithms, Task Migration and its issues. Deadlock-Issues in deadlock detection & Resolutions, Deadlock Handling Strategy, Distributed Deadlock Algorithms,

Unit-V 
Distributed Multimedia & Database system Distributed Data Base Management System(DDBMS), Types of Distributed Database, Distributed Multimedia:- Characteristics of multimedia Data, Quality of Service Managements. Case Study of Distributed System:- Amoeba, Mach, Chorus




                                                CS-703 – Cloud Computing   



Unit-I 
Introduction: Historical development ,Vision of Cloud Computing, Characteristics of cloud computing as per NIST , Cloud computing reference model ,Cloud computing environments, Cloud services requirements, Cloud and dynamic infrastructure, Cloud Adoption and rudiments .Overview of cloud applications: ECG Analysis in the cloud, Protein structure prediction, Gene Expression Data Analysis ,Satellite Image Processing ,CRM and ERP ,Social networking .

Unit-II 
Cloud Computing Architecture: Cloud Reference Model, Types of Clouds, Cloud Interoperability & Standards, Scalability and Fault Tolerance, Cloud Solutions: Cloud Ecosystem, Cloud Business Process Management, Cloud Service Management. Cloud Offerings: Cloud Analytics, Testing Under Control, Virtual Desktop Infrastructure.

Unit –III 
Cloud Management & Virtualization Technology: Resiliency, Provisioning, Asset management,Conceps of Map reduce , Cloud Governance, High Availability and Disaster Recovery. Virtualization: Fundamental concepts of compute ,storage, networking, desktop and application virtualization .Virtualization benefits, server virtualization, Block and file level storage virtualization  Hypervisor management software, Infrastructure Requirements , Virtual LAN(VLAN) and Virtual SAN(VSAN) and their benefits .  

Unit-IV 
Cloud Security:   Cloud Information security fundamentals, Cloud security services, Design principles, Secure Cloud Software Requirements, Policy Implementation, Cloud Computing Security Challenges, Virtualization security Management, Cloud Computing Secutity Architecture .

Unit-V 
Market Based Management of Clouds , Federated Clouds/Inter Cloud: Characterization & Definition ,Cloud Federation Stack , Third Party Cloud Services . Case study : Google App Engine, Microsoft Azure , Hadoop , Amazon , Aneka  

List of Experiments: 
1. Installation and configuration of Hadoop/Euceliptus etc.
2. Service deployment & Usage over cloud.
3. Management of cloud resources.
4. Using existing cloud characteristics & Service models .
5. Cloud Security Management.
6. Performance evaluation of services over cloud .




                                    CS-704 – Information Storage & Management  

Unit-I 
Introduction to Storage Technology: Data proliferation, evolution of various storage technologies, Overview of storage infrastructure components, Information Lifecycle Management, Data categorization.

Unit-II 
Storage Systems Architecture: Intelligent disk subsystems overview, Contrast of integrated vs. modular arrays, Component architecture of intelligent disk subsystems, Disk physical structure components, properties, performance, and specifications, RAID levels & parity algorithms, hot sparing, Front end to host storage provisioning, mapping and operation.

Unit-III 
Introduction to Networked Storage: JBOD, DAS, NAS, SAN & CAS evolution and comparision. Applications, Elements, connectivity, standards, management, security and limitations of DAS, NAS, CAS & SAN.

Unit -IV 
Hybrid Storage solutions; Virtualization: Memory, network, server, storage & appliances. Data center concepts & requirements, Backup & Disaster Recovery: Principles Managing & Monitoring: Industry management standards (SNMP, SMI-S, CIM), standard framework applications, Key management metrics (Thresholds, availability, capacity, security, performance).

Unit-V 
Information storage on cloud :Concept of Cloud, Cloud Computing, storage on Cloud, Cloud Vocabulary, Architectural Framework, Cloud benefits, Cloud computing Evolution, Applications & services on cloud, Cloud service providers and Models, Essential characteristics of cloud computing, Cloud Security and integration.




                             Elective –I   (CS 7101 Network & Web Security)    


UNIT I 
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File System Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerability Assessment, Types of Penetration Testing. Risk Management.

UNIT II 
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, Diffie- Hellman key exchange, elliptic curve cryptography.

UNIT III 
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes ,Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK) Digital Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates.

UNIT IV 
Trojans and Backdoors: Overt and Covert Channels, Working, Types (Remote Access Trojans, Data-Sending Trojans, Destructive Trojans, Trojans, Proxy Trojans, FTP Trojans, Security Software Disablers). Viruses and Worms: Characteristics, Working, Infection Phase, Attack Phase. Sniffers: Definition, spoofing, Sniffing, Vulnerable Protocols, Types. Phishing: Methods, Process, Attacks Types (Man-in-the-Middle Attacks, URL Obfuscation Attacks, Hidden Attacks, Client-side Vulnerabilities, Deceptive Phishing, Malware-Based Phishing, DNSBased Phishing, Content-Injection Phishing, Search Engine Phishing). Web Application Security- Secured authentication mechanism, secured session management, Cross-site Scripting, SQL Injection and other vulnerabilities
Denial-of Service Attacks: Types of Attacks (Smurf Attack, Buffer Overflow Attack, Ping of Death Attack, Teardrop Attack, SYN Attack, SYN Flooding), DDoS Attack(Distributed DoS Attack.), Session Hijacking, Spoofing v Hijacking, TCP/IP hijacking, CAPTCHA Protection    


UNIT V
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.


List of Experiments: 

1. Footprinting using footprinting tools(Open Source & Free)(ex-nslookup, ARIN, Whois, Google Earth etc..)
2. Scanning for vulnerabilities using (Angry IP, HPing2, IPScanner, Global Network Inventory Scanner, Net Tools Suite Pack.)
3. NetBIOS Enumeration Using NetView Tool, Nbtstat Enumeration Tool (Open Source).
4. Steganography using tools: Tool: Merge Streams, Image Hide, Stealth Files, Blindside, STools, Steghide, Steganos, Pretty Good Envelop, Stegdetect,.
5. Steganalysis - Stego Watch- Stego Detection Tool, StegSpy.
6. How to Detect Trojans by using – Netstat, fPort, TCPView, CurrPorts Tool, Process Viewer.
7. Lan Scanner using look@LAN, wireshark.
8. Understanding DoS Attack Tools- Jolt2 , Bubonic.c, Land and LaTierra, Targa, Nemesy Blast, Panther2, Crazy Pinger, Some Trouble, UDP Flood, FSMax.





                                       Elective –I   (CS 7102 Simulation & Modelling)  


Unit-I 
Introduction to Modeling and Simulation Nature of Simulation. Systems , Models and Simulation, Continuous and Discrete Systems, system modeling, concept of simulation, Components of a simulation study, Principles used in modeling Static and Dynamic physical models, Static and Dynamic Mathematical models Introduction to Static and Dynamic System simulation , Advantages ,Disadvantages and pitfalls of Simulation.

Unit-II 
System Simulation and Continuous System Simulation Types of System Simulation, Monte Carlo Method, Comparision of analytical and Simulation methods, Numerical Computation techniques for Continuous and Discrete Models, Distributed Lag Models, Cobweb Model. Continuous System models, Analog and Hybrid computers, Digital- Analog Simulators, Continuous system simulation languages ,Hybrid simulation ,Real Time simulations.

Unit –III 
System Dynamics & Probability concepts in Simulation Exponential growth and decay models, logistic curves ,Generalization of growth models , System dynamics diagrams, Multi segment models , Representation of Time Delays. Discrete and Continuous probability functions, Continuous Uniformly Distributed Random Numbers, Generation of a Random numbers, Generating Discrete distributions, Non-Uniform Continuously Distributed Random Numbers, Rejection Method.

Unit-IV
Simulation of Queueing Systems and Discrete System Simulation Poisson arrival patterns, Exponential distribution, Service times, Normal Distribution Queuing Disciplines, Simulation of single and two server queue. Application of queuing theory in computer system. Discrete Events ,Generation of arrival patterns, Simulation programming tasks, Gathering statistics, Measuring occupancy and Utilization, Recording Distributions and Transit times .

Unit-V 
Introduction to Simulation languages and Analysis of Simulation output GPSS: Action times, Succession of events, Choice of paths, Conditional transfers, program control statements . SIMSCRIPT: Organization of SIMSCRIPT Program, Names & Labels, SIMSCRIPT statements . Estimation methods , Relication of Runs, Batch Means , Regenerative techniques , Time Series Analysis , Spectral Analysis and Autoregressive Processes.


List of Experiments:-
1. Simulate CPU scheduling algorithm using queueing system a) FCFS b) SJF c) Priority Algo
2. Simulate multiplexer/concentrator using queuing system
3. Simulate congestion control algorithms.
4. Simulate disk scheduling algorithms.
5. Simulate a Manufacturing shop and write a program in GPSS.
6. Simulate Telephone system model and write a program in SIMSCRIPT.




                             Elective –I   (CS 7103 Embedded Computer System)  



Unit – I 
Introduction to Embedded systems Embedded Systems Vs General Computing Systems, Classification of Embedded Systems, Major application areas of Embedded Systems, Purpose of Embedded systems ,Core of the Embedded system, Memory, Sensors and Actuators, Communication Interface, Embedded firmware, PCB and Passive Components, Characteristics and Quality attributes of a Embedded System .

Unit – II
Design of Embedded Systems with 8bit Microcontrollers-8051 Factors for considering in selecting a Controller ,Designing with 8051 microcontroller Different addressing modes supported by 8051 , Instruction set for 8051 microcontroller. Fundamental issues in Hardware Software Co-Design , Computational models in Embedded Design .

Unit – III 
Embedded Hardware & Firmware Design and Development Analog &Digital Electronic components, VLSI & Integrated circuit design, Electronic Design Automation tools , PCB layout Design and its fabrication .Embedded firmware design approaches , Embedded firmware Development Languages ,Programming in Embedded C . Integration and testing of Embedded Hardware and Firmware , Safe & robust Design, Reliability, Faults, errors & Failure, Functional Design, Architecture Design, Prototyping.

Unit -IV 
Embedded System Development Environment Integrated Development Environment (IDE) , Types of files Generated on Cross- Compilation , Disassembler / Decompiler, Simulators, Emulators and Debugging, Boundary Scan.

Unit – V 
Embedded Product Development Lifecycle(EDLC) and Trends in Embedded Industry What is EDLC ,Objectives of EDLC , Different phases of EDLC , EDLC Approaches-Linear or waterfall model , Iterative Model , Prototyping/Evolutionary Model, Spiral Model . Processor trends in Industry , Embedded OS Trends , Development Language trends Open Standards, Frameworks and Alliances , Bottlenecks.




                              Elective –I   (CS 7104 Real Time Fault Tolerant Systems)    


Unit-I 
Structure of Real Time System, Performance Measure for real time system, Task Assignments,Fault Tolerant Scheduling, Real Time Vs General purpose Data  Bases, Data Bases for Hard Real Time System, Real Time Communication

Unit-II 
Fault Tolerance, Fault-Error-Failure. Redundancy, Error Detection, Damage Confinement, Error Recovery, Fault Treatment, Fault Prevention, anticipated and unanticipated Faults. Error models: General coding scheme Error detection techniques: Watchdog processors, Heartbeats, consistency and capability checking, Data audits, Assertions, Control-flow checking, Error control coding. Application: DHCP

Unit-III 
Fault tolerance: Coding technique-fault tolerant self checking and fail safe circuits-fault tolerance in combinatorial and sequential circuits- synchronous and asynchronous fail safe circuits. Software fault tolerance: Process pairs, robust data structures, N version programming, Recovery blocks, Replica consistency & reintegration, multithreaded programs Application: VAX. Network fault tolerance: Reliable communication protocols, Agreement protocols, Database commit protocols -Application: Distributed SQL server Check pointing & Recovery - Application: Micro check pointing, IRIX Checkpoints

Unit-IV
Experimental Evaluation: Modelling and simulation based, Fault injection based - Application: NFTAPE fault injector . Modelling for performance, dependability and perform ability: dependability-specific methods (fault trees, reliability block diagrams), queues, stochastic Petri nets and stochastic activity networks - Application: Ultra SAN

Unit-V 
Practical Systems for Fault Tolerance: - Application: Ad-hoc wireless network - Application: NASA Remote Exploration & Experimentation System Architecture: Fault tolerant computers - general purpose commercial systems-fault tolerant multiprocessor and VLSI based communication architecture. Fault tolerant software: Design-N-version programming recovery block - acceptance tests-fault trees- validation of fault tolerant systems.

Share this article on :

2 comments:

Unknown said...

I would've taken these courses back in college because I find it more interesting than nursing patients in the hospital. Hope it's not yet too late to study Computer Science. :)
- RockyMountainLabs.com

Divit said...

Thanks for sharing up–to-date on this subject! I find it is very informative and very well written one! Keep up on this quality!

Amazon Cloud Service Consultant in Chennai

Post a Comment

 
© Copyright 2022Rajiv Gandhi Proudyogiki Vishwavidyalaya All Rights Reserved.