Sie sind auf Seite 1von 39

Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

CS701 Compiler Design

Unit-I Introduction to compiling & Lexical Analysis


Introduction of Compiler, Major data Structure in compiler, BOOT Strapping &
Porting,
Compiler structure: analysis-synthesis model of compilation, various phases of a
compiler, Lexical analysis: Input buffering , Specification & Recognition of
Tokens,
LEX.
Unit-II Syntax Analysis &Syntax Directed Translation
Syntax analysis: CFGs, Top down parsing, Brute force approach, recursive descent
parsing, transformation on the grammars, predictive parsing, bottom up parsing,
operator
precedence parsing, LR parsers (SLR,LALR, LR),Parser generation.Syntax
directed
definitions: Construction of Syntax trees, Bottom up evaluation of S-attributed
definition,
L-attribute definition, Top down translation, Bottom Up evaluation of inherited
attributes
Recursive Evaluation, Analysis of Syntax directed definition.
Unit-III Type Checking & Run Time Environment
Type checking: type system, specification of simple type checker, equivalence of
expression, types, type conversion, overloading of functions and operations,
polymorphic
functions. Run time Environment: storage organization, Storage allocation
strategies,
parameter passing, dynamic storage allocation , Symbol table
Unit –IV Code Generation
Intermediate code generation: Declarations, Assignment statements, Boolean
expressions,
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Case statements, Back patching, Procedure calls Code Generation: Issues in the
design of
code generator, Basic block and flow graphs, Register allocation and assignment,
DAG
representation of basic blocks, peephole optimization, generating code from DAG.
Unit –V Code Optimization
Introduction to Code optimization: sources of optimization of basic blocks, loops
in flow
graphs, dead code elimination, loop optimization, Introduction to global data flow
analysis, Code Improving transformations ,Data flow analysis of structure flow
graph
Symbolic debugging of optimized code.
List of Experiments:
􀀀 Develop a lexical analyzer to recognize a few patterns.
􀀀 Write a programme to parse using Brute force technique of Topdown parsing.
􀀀 Develop LL (1) parser (Construct parse table also).
􀀀 Develop an operator precedence parser (Construct parse table also)
􀀀 Develop a recursive descent parser
􀀀 Write a program for generating for various intermediate code forms
i) Three address code ii) Polish notation
􀀀 Write a program to simulate Heap storage allocation strategy
􀀀 Generate Lexical analyzer using LEX
􀀀 Generate YACC specification for a few syntactic categories.
􀀀 Given any intermediate code form implement code optimization techniques
􀀀 Study of an Object Oriented Compiler.
References:
1. A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and
Tools , Pearson Education
2 Raghavan, Compiler Design, TMH Pub.
3. Louden. Compiler Construction: Principles and Practice, Cengage Learning
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course : CS-701 Compiler Design


Sr. No Unit/Topic No. of No. of
lectures lectures
anticipated actual
Unit- I
Introduction of Compiler, Major data Structure in compiler. BOOT
1 Strapping & Porting, Compiler structure: analysis-synthesis model of 3
compilation.
Various phases of a compiler. Lexical analysis: Inputbuffering.
2 Specification & Recognition of Tokens. 4

LEX. Error . Numericals.


3 3

Unit- II
Syntax analysis: CFGs. Top down parsing. Brute force approach.
4 Recursive descent parsing. Transformationon the grammars, predictive 6
parsing.
Bottom up parsing. Operator precedence parsing. LR parsers
5 (SLR,LALR, LR). 6

Parser generation.Syntax directed definitions: Construction of Syntax


6 trees, Bottom up evaluation of S- attributed definition,L-attribute 2
definition.
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Top down translation, Bottom Up evaluation of inherited attributes


7 ,Recursive Evaluation. Analysis of Syntax directed definition. 2

Unit- III
Type checking: type system, specification of simple type checker.
8 Equivalence of expression, types, type conversion, overloading of 3
functions and operations.

Polymorphic functions. Run time Environment: Storage organization,


9 Storage allocation strategies. 2

Parameter passing, dynamic storage allocation,Symbol table.


10 2

Unit- IV
Intermediate code generation: Declarations, Assignment statements.
11 Boolean expressions, Case statements, Back patching 5

Procedure calls Code Generation: Issues in the design of code


generator. Basic block and flow graphs.
12 2

Register allocation and assignment. DAG representation of basic


blocks. peephole optimization. generating code from DAG.
13 2

Unit- V
Introduction to Code optimization: sources of optimization of basic
14 blocks. loops in flow graphs, dead code elimination, loop optimization. 4
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Introduction to global data flow analysis. Code Improving


15 transformations. Data flow analysis of structure flow graph. Symbolic 3
debugging of optimized code.

TOTAL NO OF LECTURES 49

Reference Books:

 Aho-Ullman, Principles of compiler Design, Narosa Publishing House.


 Aho-Ullman, Compilers: Principles Techniques & Tools, Addison Wesley.
 Dhamdhere, Compiler Construction.
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course : CS-701 Compiler Design

Assignment Questions

UNIT-I

(1) Define the following terms:


Translator, Compiler, Interpreter, preprocessor, assembler.
(2) Explain the different phases of compiler with duties of each phase.
(3) Explains the method of converting the regular expression into finite
automata and perform these on following:
(A+B)*. (A+B)*
(4) Write short notes on the following terms:
Bootstrapping, Input Buffering, Single pass and Multipass compiler.
(5) Write a LEX program to recognize following strings:
We (white space), if, then, else, id
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

UNIT-II

(1) Explain CFG with the help of an example and also generate the LMD and
RMD for taking an example of grammar
(2) What is a parser? Give its classification and explain each in short.
(3) Create Recursive descent (LL (1)) parser for the following grammar:
E→ E+T/T
T→ T*F/T
F→ (E)/id
(4) Create LALR parser for the following grammar:
(5) What is an Operator precedence grammar, taking an example of such type of
grammar and doing parsing on that grammar?

UNIT-III
(1) Write various storage allocation strategies.
(2) Write difference between heap allocation and stack allocation of storage.
(3) What is symbol table organization
(4) Comparison between various symbol table management techniques.
(5) Write short note on parameter passing.

UNIT-IV

(1) Explain syntax directed translation with help of an example.


(2) Describe the different methods for creating intermediate code with the help
of example.
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

(3) Create the triple and quadruple for the given statement
(i)Z=a+b*c+d/e↑f+g-h
(ii)A [i:j]=B[x:y]+C[l:k]
(4) Create 3-address code for the following statement:
If (i<=10) then
{ x=x+1;
}
else
{ y=y+1;
}
(5) Construct a DAG for the following code:
T= (a+b)*(c+d-e)-(a+b)/ (f*g)

UNIT-V

(1) Explain the different code optimization technique with the help of suitable
example.
(2) What is Basic Block? Write methods for find out the Basic block from a
given code.
(3) Construct a DAG for the following code:
T= (a+b)*(c+d-e)-(a+b)/ (f*g)
(4) Explain in brief activation records, and storage allocation.
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

(5) Explain global data flow analysis.


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course : CS-701 Compiler Design

List of Experiments

1. Write macro defination with arguments for calculation area and


perimeter of a triangle, a squre and a circle. Store these macro defination in
a file called "areaperi.h".Include this file in your program,and call the
macro defination for calculating area and perimeter for different squres,
triangles and circles

2. Write a program to read a file and display its content along with line
numbers before each line.

3. Write a program to append the contents of one file at the end of another.

4. Lexical Analysis
Design the lexical analysis for read input from a file and produce a
formatted output.( scans the file, accepts the file stream and
creates the lexeme)
NO LINE TOKEN TIP
____________________________________________
0 0 uses identifier
1 0 crt identifier
2 0 ; end of series
3 1 var keyword

5. Write a program that generates the machine code.


6. Write a program to calculate the first and follow of the given grammar.

7. Write a program to remove left recursion from given grammar.


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

8. Write a program for generating quadruples form and triples form for various
intermediate code forms.

9. Write a Program for Syntax Analyzer.

10. Write a program for generating Polish notation.


11. Program to find leading symbol of any given operator precedence
grammar.
12. Program to find trailing symbol of a operator precedence grammar.
13. Generate Lexical analyzer using LEX
14. Generate YACC specification for a few syntactic categories.
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course: CS 7101 Network Management


FACULTY NAME: - Mr. JITENDRA KHAIRE

NO. OF NO. OF
LECTURES LECTURES
ANTICIPATED ACTUAL
S. NO TOPIC TO BE COVERED
1. Unit-I
Introduction to Network Managements Network 03
Management Framework, Network Based Managements
Evolution of Network Management: SGMP, CMIP

2. SNMP. Network Implementation and Management


Strategies Network Management Categories:
Performance Management, Fault Management, 03
Configuration Management
3. Security Managements, Accounting Managements. 04
Network Management Configuration: Centralized
Configuration, Distributed Configuration. Selected
Management Strategy
4. Unit-II
03
Management Information Base (MIB), Structure of
Management Information NMS Presentation of the SMI,
NMS Meter-ware Network View.
5. Remote Monitoring (RMON), RMON Group. Desktop 05
Management Desktop Management Interface(DMI),
DMI Architecture
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

DMI Browser, DMI/SNMP Mapping Desktop SNMP


04
Extension Agents. Setting up LAN Access, SNMP.
6. Unit-III
01
Introduction, layering, OSI Layering, TCP/IP Layering,
Protocols & Standards, Internet standards
Internet administration, Internet Addresses, Internet
protocol: introduction, IP header, IP routing subnet
8 addressing, subnet mask, special case of IP addresses, 03

Comparative Study of IPV4 & IPV6, 05


9 port numbers Address Resolution Protocol, ARP packet
format,
Proxy ARP, ARP command, ARP Example, Reverse 02
10 Address Resolution Protocol (RARP): Introduction,
RARP Packet format,
Unit-IV
11 03
Delivery and Routing of IP Packets, Routing Methods,
Static versus Dynamic Routing, Routing
table and Routing Module, Classless Addressing: CIDR
Internet Protocol (IP), Datagram, Fragmentation, 03
12 Options, IP Package. Interior and Exterior Routing,
Routing information protocol
(RIP), Open shortest path first protocol (OSPF), BGP, 04
13 GGP. Private Networks. Virtual Private Network (VPN),
Network Address Translation (NAT)
Unit-V

Internet Control Message Protocols (ICMP):- Types of


14 message, message format query, checksum, ICMP 04
Package. IGMP, IGMP Message and its Operation,
IGMP.
Package. Transmission control protocol, Process-to-
Process Communication, TCP Services Flow Control
15 TCP Timers. TCP Operation, TCP Package.. Application 06
layers protocol, Telnet Protocol, File Transfer Protocol
(FTP)
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

16 Simple Mail Transfer Protocol (SMTP), X-Window


02
system protocol, Remote procedure call, and Network
file
17 TOTAL NO. OF LECTURES 55

Reference Books:-

1. Forouzan, TCP/IP Protocol Suite 4th edition, TMH


2. J.Richard Burkey, Network Management Concept and Practice, PHI
3. Stevens, TCP/IP Illustrated Volume-I, Pearson
4. Tittel: TCP/IP, Cenage Learning
5. Uyless Black, TCP/IP and related protocols, McGraw Hill.
6. Doughals E. Comer, Internetworking with TCP/IP Vol. I, Principles, Protocols, and
7. Architecture, Prentice Hall, India.

Course: CS 7101 Network Management


Assignment Questions

Unit -1
1. Explain Fault Management?
2. Explain Security management
3. Explain Accounting management
4. Explain Report Management
5. Explain policy based management
6. short note
i. SGMP, ii. CMIP, iii SNMP
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Unit-2

1. Explain Management Information Base?


2. Describe Remote Monitoring (RMON)?
3. What is Desktop Management Interface (DMI)?
4. Describe Desktop SNMP Extension Agents?
5. Short note:-
a. SNMP configuration b. RMON Group

Unit 3
1. Explain OSI model and different layers?
2. What is the difference between OSI and TCP/IP?
3. Explain ARP and their header format?
4. Explain RARP and their header format?
5. Describe proxy ARP?

Unit 4
1. Explain Delivery and Routing of IP Packets?
2. What is the difference between static and dynamic routing?
3. What is the difference between intra and inter domain routing?
4. Explain OSPF and their types of links?
5. Short note:-
a. BGP b. RIP c. GGP d. VPN
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Unit 5

1. Explain ICMP and their query messages?


2. What is the difference between TCP and UDP?
3. Explain IGMP?
4. Short note:-
a. Flow control b. SMTP c. FTP d. NFS
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course: CS 702 Distributed System

ASSIGNMENTS FOR DISTRIBUTED OPERATING SYSTEM

UNIT –I

Q Explain the Architecture for Distributed System?

Q What are the Goals of Distributed system ?

Q Write down Hardware and Software concepts.

Q What is Distributed Computing Model and Advantages & Disadvantage distributed system.
Q What are the common issue in designing Distributed System?

UNIT-II

Explain the following

1 Basic Concept of Distributed Share Memory (DSM)


2 DSM Architecture & its Types, Design & Implementations issues In DSM System
3 Structure of Share Memory Space, Consistency Model, and Thrashing.

Q What are the Desirable features of good Distributed File System , File Model and File Service
Architecture ?
Q Explain the Following

1Accessing Model 2 File Sharing Semantics 3 File Catching Scheme 4 File Application & Fault
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

tolerance.

Q Write a Details note on Naming: - Features, System Oriented Names, Object Locating
Mechanism, Human Oriented Name.

UNIT-III
Q Explain the following
1 API for Internet Protocol Data Representation & Marshaling
2 Group Communication and Client Server Communication,

Q What is RPC Explain in detail RPC- Implementing RPC Mechanism, Stub Generation, RPC
Messages.
Q Explain Election Algorithms:- Bully & Ring Algorithms.

UNIT-IV

Q Write a Short note on Distributed Scheduling-Issues in Load Distributing?


Q What are the Components for Load Distributing Algorithms?
Q Explain Different Types of Load Distributing Algorithms?
Q Explain Task Migration and its issues?
Q Explain Deadlock-Issues in deadlock detection & Resolutions, Deadlock Handling Strategy ?
Q Explain Distributed Deadlock Algorithms ?

UNIT-V

Q Explain Distributed Data Base Management System(DDBMS)?


Q Explain Types of Distributed Database ?
Q Explain Distributed Multimedia:- Characteristics of multimedia Data, Quality of Service
Managements?
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course: CS 7201 Network & Web Security


Category of Course Title Course Code Credits-6C Theory Paper
Course (ES)
Departmental Network & L T P Max. Marks-70
Elective Web Security CS 7201 3 1 0 Min. Marks-28
DCO(E)-II Duration-3 Hrs.
Lecture Plan
Patel College of Science and Technology, Indore

Lecture Plan NO. OF NO. OF


LECTURES LECTURES
S. NO TOPIC TO BE COVERED
Subject: Subject Code:ANTICIPATED ACTUAL

1. Subject Teacher : Unit- I Department : CSE

Introduction to Network Security, Computer Security 02


and Cyber Security. Security Terminologies and
Principle Security Threats, Types of attacks (Operating
System, application level, Shrink Wrap code
Misconfiguration attacks etc.)

2. .Introduction to Intrusion, Terminologies, Intrusion


Detection System (IDS), Types of Intrusion. Detection
Systems, System Integrity Verifiers (SIVS).Indication 04
of Intrusion: System Indications,

3. File System Indications Network Indications. Intrusion 04


Detection Tools, Post attack IDS Measures Evading
IDS Systems. Penetration Testing, Categories of
security assessments, Vulnerability Assessment, Types
of Penetration Testing. Risk Management.
4. Unit-II
Cryptography, Classical Cryptographic Techniques, 05
Encryption, Decryption, Code Breaking Methodologies,
Cryptanalysis, Cryptography Attacks, Brute-Force
Attack, Use of Cryptography
5. Public key cryptography, Principles of Public key 04
Cryptosystems, Cryptographic Algorithms RSA. Data
Encryption Standard (DES), RC4, RC5, RC6, Blowfish,
Key Management,
6. 02
Diffie-Hellman key exchange, elliptic curve
cryptography.

7. Unit- III
Hash Functions, One-way Hash Functions, SHA 03
(Secure Hash Algorithm), Authentication
Requirements, Authentication Functions, Kerberos.
Message Authentication
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

codes ,Message Digest Functions, MD5, SSL (Secure 04


Sockets Layer) SSH (Secure Shell), Algorithms and
Security, Disk

8. Encryption, Government Access to Keys (GAK) Digital


Signature: Analysis, Components, Method,
Applications, Standard, And Algorithm: Signature. 04
Generation/Verification, ECDSA, EIgamal Signature
Scheme, Digital Certificates

9. Unit- IV

Trojans and Backdoors: Overt and Covert Channels,


Working, Types (Remote Access Trojans, Data-Sending 04
Trojans, Destructive Trojans, Trojans, Proxy Trojans,
FTP Trojans, Security Software Disablers.

10. Viruses and Worms: Characteristics, Working,


Infection Phase, Attack Phase. Sniffers: Definition
Spoofing, Sniffing, Vulnerable Protocols. Phishing: 04
Methods, Process, Attacks Types (Man-in-the-Middle
Attacks, URL Obfuscation Attacks,
11. Hidden Attacks, Client-side Vulnerabilities,
Deceptive Phishing, Malware-Based Phishing, DNS
Based Phishing, Content-Injection Phishing, Search 05
Engine Phishing

12. Web Application Security- Secured authentication 03


mechanism, secured session management, Cross-site
Scripting, SQL Injection and other vulnerabilities.

13. Denial-of Service Attacks: Types of Attacks (Smurf 04


Attack, Buffer Overflow Attack, Ping of Death Attack,
Teardrop Attack, SYN Attack, SYN Flooding), DDoS
Attack(Distributed DoS Attack.), Session Hijacking,
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Spoofing v Hijacking, TCP/IP hijacking, CAPTCHA


Patel College of Science and Technology, Indore
14. Unit 5 02

IP Security, Web Security, Firewalls: Types, Operation,


Design Principles, And Trusted Systems.

Computer Forensics, Need, Objectives,Stages & Steps 02


of Forensic Investigation in Tracking Cyber Criminals,
Incident Handling.

15. Hacking, Classes of Hacker (Black hats, grey hats, 02


white hats, suicide hackers), Footprinting,

16. Scanning (Types-Port, Network, Vulnerability), E-Mail 02


Spiders, Overview of System Hacking Cycle.

TOTAL NO. OF LECTURES 60

[A] Goal of Teaching the Subject: The purpose of this subject is


to cover the underlying concepts of Information Storage and Management. This
subject provides a comprehensive Knowledge of Information Storage Technology,
Key management metrics, cloud computing & security of storage system etc.
Patel College of Science and Technology, Indore

Lecture
LecturePlan
Plan
Subject:
Semester: - VII SubjectSubject
Subject Code: CS-703 Code: :-Information Storage & Management

Subject Teacher : Department : CSE


Subject Teacher: Pritesh Jain Department : CSE Session :- July 2012 To Dec 2013

[B] LECTURE PLAN:

Sr. Reference Hours


No. Unit
Date of
Contents Plan Completion
ned Execute

G.
1 1
Somasundaram
Introduction to Storage Technology
Data, information, Knowledge & Data G.
2 Somasundaram 1
categorization
Unit - I Data proliferation, evolution of various storage G.
3 1
technologies Somasundaram

G.
4 Overview of storage infrastructure components 1
Somasundaram

5 Managing Information, Information Lifecycle G. 1


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Management Somasundaram

Total 5

Storage System Architecture, Intelligent disk G.


6 subsystem overview Somasundaram 1

Contrast of integrated vs. modular arrays, G.


Component architecture of intelligent disk Somasundaram
7 subsystem 1

Component of storage system environment G.


8 ,Host, Connectivity, storage Somasundaram 1
Unit - II

Disk physical structure components, properties, G.


9 1
performance, and specifications Somasundaram

G.
10 RAID levels & parity algorithms. 1
Somasundaram

Hot sparing, Front end to host storage G.


11 1
provisioning Somasundaram

G.
12 Mapping and operation. 1
Somasundaram

Total 7

G.
13 Introduction to Networked Storage 1
Somasundaram
Unit – III
14 Just Bunch of Disks(JBOD), Direct Attached G. 1
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Storage(DAS) Somasundaram

Storage Area Network(SAN) G.


15 Somasundaram 2

Network Attached Storage(NAS) G.


16 Somasundaram 2

Unit - III G.
17 Content-Addressed Storage(CAS) 2
Somasundaram

evolution and comparison of Networked G.


18 1
Storage Somasundaram

Security and limitations of network storage G.


19 Somasundaram 1

Total 10

Introduction to Hybrid Storage Solution G.


20 Somasundaram 1

G.
21 Virtualization: Memory, network 1
Somasundaram

G.
22 Virtualization: server, storage & appliances 1
Unit - IV Somasundaram

G.
23 Data center concepts & requirements. 1
Somasundaram

G.
24 Backup & Disaster Recovery: Principles 1
Somasundaram

25 Industry management standards SNMP G. 2


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Somasundaram

G.
26 Industry management standards SMI-S, CIM 2
Somasundaram

G.
27 Standard framework applications 1
Somasundaram

Key management metrics Thresholds, G.


28 2
availability capacity, security, performance Somasundaram

Total 12

Cloud
29 Concept of Cloud, Cloud Computing 2
Computing Bible

Cloud
30 storage on Cloud, Cloud Vocabulary 1
Computing Bible

Cloud
31 Architectural Framework, Cloud benefits 1
Computing Bible

Cloud computing Evolution, Applications & Cloud


32 2
Unit - V services on cloud Computing Bible

Cloud
33 Cloud service providers and Models 2
Computing Bible

Cloud
34 Essential characteristics of cloud computing 1
Computing Bible

Cloud
35 Cloud Security and integration. 1
Computing Bible

Total 10
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

References:

1. G. Somasundaram & Alok Shrivastava (EMC Education Services) editors;


Information Storage and Management: Storing, Managing, and Protecting
Digital Information; Wiley India.

2. Ulf Troppens, Wolfgang Mueller-Friedt, Rainer Erkens, Rainer Wolafka, Nils


Haustein; Storage Network explained: Basic and application of fiber
channels, SAN, NAS, iSESI, INFINIBAND and FCOE, Wiley India.

3. John W. Rittinghouse and James F. Ransome; Cloud Computing:


Implementation, Management and Security, CRC Press, Taylor Frances Pub.

4. Nick Antonopoulos, Lee Gillam; Cloud Computing: Principles, System &


Application, and Springer.
Patel College of Science and Technology, Indore
5. Anthony T. Velete, Toby J.Velk, and Lecture
Robert Eltenpeter,
Plan Cloud Computing: A
practical Approach, TMH Pub.
Subject: Subject Code:

Subject
6. Saurabh, Teacher
Cloud :
Computing: Department
Insight into New Era : CSE
Infrastructure, Wiley India.

7. Sosinsky, Cloud Computing Bible, Wiley


Patel College of Science and Technology, Indore

Patel College of Science and Technology, Indore


Assignment

Semester: - SIGNATURE
VII LectureSubject:-
Subject Code: CS-703 Plan Information Storage BY
APPROVED & Management

Subject Teacher: Pritesh


Subject: Jain PREPARED: BY
Department CSE Date:-
Subject Code:

Subject Teacher : Department : CSE

Lecturer HOD
DESIGNATION

Assignment Unit –I

Q1. Define Data and Information. What is the difference between Data and Information? Give
Categorization of DATA.

Q2. Give the evolution of various Information Storage Technologies and their Architecture.

Q3. What are components of a storage infrastructure?

Q4. What are the key challenges in managing Information? Explain briefly.

Q5. What is information lifecycle management? Give its characteristics and benefits

Assignment Unit –II


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Q1. Give the overview of intelligent disk subsystem and their component architecture?

Q2. . Briefly explain the network attach storage.

Q3. Give the Hard disk physical structure, their component and properties.

Q4. Explain the Storage technology RAID and give their different levels and parity algorithms.

Q5. Consider a disk I/O system in which an I/O request arrives at the rate of 80 IOPS. The disk
service time

is 6 ms. Compute the following:

(a)Utilization of I/O controller (b) Total response time (c) Average queue size

(d) Total time spent by a request in a queue

Q.6 Short not on-

(i) Parity algorithms


(ii) Hot sparing,
(iii) Front end to host storage provisioning
(iv) Mapping and operation.
(v) Command queuing

Assignment Unit -III


Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Q1. Briefly explain the JBOD and DAS.

Q2. Briefly explain the network attach storage.

Q3. Briefly explain the SAN and CAS.

Q4. Explain integrated NAS connectivity & limitations.

Q5 Explain evolution and comparison between JBOD, DAS, NAS, SAN & CAS

Assignment Unit –IV

Q1. What is virtualization? Explain different types of virtualizations.

Q2. What is data centre? What are the core elements of the data center?

Q3. What is cloud computing? Also give its characteristics.

Q4. Explain various Industry standards for storage management like SMI-S, CIM
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Q5. Explain backup and restore operations with topologies.

Assignment Unit –V

Q1.What is cloud computing? Also give its characteristics.

Q2. Describe various services and applications on cloud..

Q3. Give Cloud computing Evolution and also explain its architectural framework.

Q4. Explain the different cloud type’s model & also describe security service boundary.

Q5. Describe Cloud Security, integration, Applications, services on cloud.

Prepared By: Pritesh Jain Approved By: HOD


Sign Sign
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE


Patel College of Science and Technology, Indore

Patel College of Science and Technology, Indore


Assignment

Semester: - VII LectureSubject:-


Subject Code: CS-703 Plan Information Storage & Management
Subject Teacher: Pritesh
Subject: Jain Department : CSE Date:-
Subject Code:

Subject Teacher : Department : CSE

Experiment

1. A brief study of various types of storage devices.


2. A brief study of Intelligent Storage System.
3. A brief study of Storage Networking Technologies i.e. SAN.
4. A brief study of Storage Networking Technologies i.e. NAS.
5. A brief study of storage technology i.e. RAID.
6. A brief study of storage technology i.e. CAS
7. A brief study of Industry standards for storage management i.e.
SMI-S, CMI.
8. A brief study of Datacenter
9. A brief study of cloud computing.
10.A brief study of cloud computing platform i.e. Amazon Elastic
Compute Cloud (EC2).
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Prepared By: Pritesh Jain Approved By: HOD


Sign Sign
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Course: CS 7201 Network & Web Security


Assignment Questions
Unit – I
1. Explain to following:-
a) Network Security b.) Computer Security c.) Cyber Security
2. Explain security threats?
3. Explain types of attacks?
4. Describe IDS?
5. Explain SIVS?
Unit – II
1. Describe to following?
a). Cryptography b). Encryption c). Code breaking technologies
2. What is RSA?
3. What is Blowfish? Explain with example?
4. Describe to Diffie-Hellman key exchange algo?
5. Explain to RS4,RS5 and RS6?

Unit – III

1. Explain to Hash function, SHA and authentication function?


2. What is Kerberos? Explain in detail?
3. Describe to digital signature?
4. Explain to Digital certificate?
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

5. Explain to Gak?

Unit – IV
1. Write difference between Trojans and Backdoors?
2. Write difference between Viruses and Worms?
3. Describe to CAPTCHA Protection?
4. .Explain to vulnerabilities with example?

Unit – V
1. Explain to IP Security, Web Security?
2. Write short note on Firewalls?
3. Write short note on Foot printing?
4. What is Hacking?
5. Give Overview of System Hacking?

Course: CS 7201 Network & Web Security


Reference Books:-

1. William Stallings, “Cryptography and Network Security: Principles and


Practice”
Pearson
2. Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “ Network
Security -
Patel College of Science and Technology, Indore

Lecture Plan
Subject: Subject Code:

Subject Teacher : Department : CSE

Private communication in a public world” TMH


3. Fourozon, “Cryptography & Network Security” TMH
4. Joseph Migga Kizza, Computer Network Security, , Springer International
Edition
5. Atul Kahate,”Cryptography and Network Security” Mc Graw Hill
6. Carl Endorf, Eugene Schultz, Jim Mellander “INTRUSION DETECTION &
PREVENSION” TMH
7. Neal, Krawetz, Introduction to Network Security,Cengage Learning

Das könnte Ihnen auch gefallen