Beruflich Dokumente
Kultur Dokumente
Course Synopsis: Intended for students already comfortable with working in the Unix
environment, this in-depth course helps students acquire the variety of
skills needed to set up and maintain Unix computers.
Goals: The class concentrates on the popular Red Hat distribution of the Linux operating
system, and covers subjects ranging from initial installation of Linux to day-to-day
administrative tasks such as management of user accounts and disk space, and even
imparting the trouble-shooting skills future system administrators will need to cope
with unexpected behavior.
Course Contents:
Unit 1. 8 Hrs.
Unit 2. 8 Hrs.
Creation, modification, and deletion of users and groups, Password aging under Linux,
The Linux login process and login authentication, Regulating access to the root account
via su and sudo, Creation, modification, and deletion of partitions and filesystems,
Management of RAID devices under Linux, Disk space regulation using quotas, Backing
up and restoring Linux filesystems,
Unit 3. 9 Hrs.
Scheduling jobs using cron, anacron, and at, Management of processes running on the
system, Usage of process accounting and implementation of process limits, Configuration
and analysis of system logs, System performance analysis, Configuring network
interfaces, Setup of DNS and DHCP clients, Diagnosing network setup issues,
Configuring NFS clients
Unit 4. 8 Hrs.
Homework
Assignment: Assignment should be given from the above units in throughout the
semester.
Prerequisite:
Knowledge about Linux system Individuals wishing to take this class should already have a
solid grounding in UNIX concepts. Fundamentals such as an understanding of the Linux file
system, process management, and the ability to manipulate and edit files is considered a must
and will not be covered in class. An understanding of network concepts and the TCP/IP
protocol suite is helpful.
Coal: This course covers the fundamentals of networks security and the important standards
and applications.
Course Contents:
Unit 2. Cryptography.
1.8 Intruders.
1.9 Malicious Software.
1.10 Firewalls.
Laboratory works: This is a group project. Each group should consist of 3 to 4 students.
Phase I
The first phase of the class project is to decide on a network security topic for literature
survey. Choose a topic that your are interested to pursue. Check the textbook for the topics
we are going to cover in detail in the course. In this phase your are required to submit the
names of project’s members and one to tow pages summary of the chosen topic. There will
be a power point presentation.
Phase II
The objective of this phase is to carry a through literature survey of the chosen topic. This
means that you are required to read recently published articles in highly reputable journals
publications. Your are expected to collect eight to ten papers. It is expected that each student
be reading 2 or 3 papers. Generally you are encouraged to choose one or tow papers of
literature nature and one or more paper(s) covering different techniques of the literature part.
The outcome of this phase is a professional report that covers the chosen topic. The format of
the report is as follows:
You are asked to submit a hardcopy and a soft copy of the report in the due date as well as
gibing a presentation (See presentation format and report preparation)
Phase III
In phase III your have chosen one of the presented method/ algorithms/ techniques/ protocols
/ architectures for implementation.
Presentations
• You will do a presentation for phases I, II and III of the project. Phase I and II
presentations are Power Point presentations and phase III is a power point
presentation and a demo.
• Phase II presentation is about 30 minutes. The presentation should over all aspects of
the chosen topic. Each student is required to participate in the presentation according
to the materials s/he has studied. Expert tough questions in this part!
• Phase III is about 15 minutes. It should start be presenting the algorithms/ technique
protocol / architecture under investigation. After this it should cover the
implementation details.
• Slides can include graphics or text. Text slides should have a few bulleted highlights,
and not have copies of paragraphs form your paper.
• Report preparation
• Although your report of phase II is a literature survey. It doesn’t mean that your copy
paragraphs form the papers your are readings. Copying paragraphs or sentences form
others work without appropriate referencing and quotation is an act of academic
dishonesty that qualifies you for F grade and to be reported for disciplinary action.
• Your are expected to read the papers and understand the content then express the
materials using your own worked. I am not interested I in a Shakespearean writing
style that you copy form references. I am interested in having your fully understand
the material and present your own understanding.
Finally
• All presentation materials need to be submitted in your presentation slot. You should
submit all source code, design work, and the written report.
• Absolutely no late submissions or demos
• All project membe5 shave to attend the presentation and should be prepared to
answer any questions
• The final grade of the project will depend on all aspects of the project such as:
literature survey, application programs
Text books: Network Security Essentials: Applications and Standards 2/#, William
Stallings, Pearson Education
References: Cryptography and Network Security, 3rd. Edition, William Stallings, Pearson
Education.
Homework assignments: home work assignments covering lecture materials will be given
throughout the semester.
Course Synopsis: This course offers an intensive covering on TCP/IP and the Linux
Networking Facilities. The course has a high practical content with an
emphasis on getting a basic, working system going at each stage.
Goal: To familiarize the students with the theory and practice of designing and developing a
secure and meaningful network of computers using Linux as the network operating
system.
Course Contents:
2.2 TCP/IP network configuration: Loading network drivers, using a DHCP client,
configuring a static IP address, Using a PPP Link.
2.4 Network Features: inetd server, tcpd access control, xinetd, services and protocols
files, Local startup scripts, GUI tools.
DHCP Principles, setting up a simple server, DHCP relaying, DHCP configuration files,
dynamic and fixed addresses, integrating with other protocols.
Introduction to DNS, DNS principles and operation, simple caching name server, primary
and slave name servers, core DNS configuration, starting and testing a name server.
File and Print Sharing via Samba, Running a Samba Server, General Samba
Configuration, Serving files with Samba, Serving printers with Samba, File sharing via
NFS, serving files with NFS, Printer Sharing via LPD, Configuring LPD server,
configuring and LPRng server, Configuring a CUPS server
Unit 6. File Transfer Protocol (FTP) 2 Hrs.
Laboratory works: Installing, configuring and testing the server systems covered in the
theory.
Linux Network Administrator's Guide, Tony Bautts, Terry Dawson, Gregor N. Purdy,
O'Reilly, Third Edition, 2005
Course Synopsis: It provides students with the knowledge and skills to manage accounts
and resources in a Microsoft Windows Server™ 2003 environment.
Goal: This course is to provide Information Technology (IT) professionals with the
knowledge and skills to deploy and managing Microsoft Server environment.
Course Contents:
Modifying Users and Computer Account Properties, Enabling and Unlocking User and
Computer Accounts, Creating a User Account Template, Locating User and Computer,
Accounts in Active Directory, Saving Queries, Resetting User and Computer Accounts,
Moving Domain Objects, Searching for and Moving User Accounts, Searching for and
Moving Computer Accounts Searching for and Enabling User Accounts
Creating Groups, Managing Group Membership, Strategies for Using Groups, Modifying
Groups, Using Default Groups Best Practices for Managing Groups
Managing Access to Shared Folders, Managing Access to Files and Folders Using NTFS
Permissions, Determining Effective Permissions, Managing Access to Shared Files Using
Offline Caching, Configuring Access for Manufacturing Personnel, Configuring Access
for Marketing Personnel Configuring Access for Purchasing Personnel
Multimedia: Introduction to Printing in the Windows Server 2003 Family, Installing and
Sharing Printers, Managing Access to Printers Using Shared Printer, Permissions,
Managing Printer Drivers Implementing Printer Locations, Install Printers Browse
Network Printers with Locations
Unit 6. Managing Printing 2 Hrs.
Changing the Location of the Print Spooler, Setting Printer Priorities, Scheduling Printer
Availability Configuring a Printing Pool, Creating Printing Pools Setting Printer
Priorities and Availability
Multimedia: The Role of the Organizational Unit, Modifying Permissions for Active
Directory Objects Delegating Control of Organizational Units, Delegating Administrative
Control, Documenting Security of an Object Created in an Organizational Unit
Configuring Group Policy Settings, Assigning Scripts with Group Policy, Configuring
Folder Redirection, Determining Applied GPOs, Creating a Group Policy, Generating a
Group Policy, Modeling Report, Generating a Group Policy Results Report
Homework
Assignment: Assignment should be given from the above units in throughout the
semester.
Course Synopsis: Students with the knowledge and skills to implement, manage, and
maintain a Microsoft Windows Server 2003 network infrastructure.
Course Contents:
Multimedia: The Role of DHCP in the Network Infrastructure, Adding and Authorizing a
DHCP Server Service, Configuring a DHCP Scope, Configuring a DHCP Reservation,
Configuring DHCP Options, Configuring a DHCP Relay Agent
Unit 5. Resolving Host Names by Using Domain Name System (DNS) 5 Hrs.
Multimedia: The Role of DNS in the Network Infrastructure, Installing the DNS Server
Service, Configuring the Properties for the DNS Server Service, Configuring the DNS
Zones, Configuring DNS Zone Transfers, Configuring DNS Dynamic Updates,
Configuring a DNS Client, Delegating Authority for Zones
Multimedia: The Role of WINS in the Network Infrastructure, Installing and Configuring
a WINS Server, Managing Records in WINS, Configuring WINS Replication, Managing
the WINS database
Reference: Do
Homework
Assignment: Assignment should be given from the above units in throughout the
semester.
Goals: To study advanced aspects of web database and data mining, encompassing the
principles, research results and commercial application of the current technologies.
Course Contents:
Unit 1. Overview of Database Systems 1 Hrs.
Text Books:
1. Database System Concepts (4th Edition), Silberschatz, Korth, and Sudarshan, 2002.
2. Oracle 9i Programming: A Primer, Rajshekhar Sunderraman, 2003
Homework
Assignment: Assignment should be given from the throughout the semester.
Computer Usage: No specific
Prerequisite: C, Database, Object Oriented Programming (C++ or Java)
Category Content: Science Aspect: 25%
Design Aspect: 75%
Course Title: Advanced Database and Information System
Course no: CSC-410 Full Marks: 70+10+20
Credit hours: 3 Pass Marks: 28+4+8
Goal: In-depth study of relational database management system and the issues involved in
designing efficient database systems, and the strategies, data-structures, and
algorithms used in the implementation of such systems. Introducing basic issues of
grid computing and peer-to-peer database.
Course Contents:
Rewrite optimization, semantic query optimization, magic sets, cost optimization, cost
model, selectivity estimation, new paradigms in query.
Peer-peer data sharing architectures, data grids, data mining, logic foundations, semantic
databases, spatial and temporal databases, and knowledge bases
Text Books: Database Management Systems, 3rd 2003: Raghu Ramakrishnan and Johannes
Gehrke
Databases and Transaction Processing, an Application-Oriented Approach:
Philip M. Lewis, Arthur Bernstein, and Micheal KiferGoals
Homework
Assignment: Assignment should be given throughout the semester.
Goal: This course introduces fundamental concept and implementation of object oriented
and distributed database systems with focus on data distribution, transaction
processing, concurrency control and recovery.
Course Contents:
Transparency, performance and reliability. The concept and role of the transaction in
distributed computing. Introduction to distributed architectures.
Two Phase Commit, Presumed abort, presumed commit. Three phase commit. Partitions.
Replication and voting. Shared-nothing DB. Scalability of replication.
Text Books: Database Systems Concepts; Silberschatz, Abraham, Henry F. Korth, and S.
Sudarshan.
Homework
Assignment: Assignment should be given throughout the semester.
Goals: To study about Oracle and XML encompassing the principles, research results and
commercial application of the current technologies.
Course Contents:
Laboratory works: Design and development of application using oracle and xml.
Homework
Assignment: Assignment should be given throughout the semester.
Prerequisite: Java
Goal: Study of application server and web administration using oracle 10g. Here is an
architectural and technical reference on how to use Oracle Application Server 10g to
Web-enable Oracle databases for application server systems. Focus on coverage of
installation, configuration, and tuning, using Java with Oracle Application Server
10g, and much more.
Course Contents:
Goals: To study advance aspects of information retrieval and search engine, encompassing
the principles, research results and commercial application of the current
technologies.
Course Detail:
Goals and history of IR. The impact of the web on IR. The role of artificial intelligence
(AI) in IR.
Boolean and vector-space retrieval models; ranked retrieval; text-similarity metrics; TF-
IDF (term frequency/inverse document frequency) weighting; cosine similarity.
Word statistics; Zipf's law; Porter stemmer; morphology; index term selection; using
thesauri. Metadata and markup languages (SGML, HTML, XML).
Search engines; spidering; metacrawlers; directed spidering; link analysis (e.g. hubs and
authorities, Google PageRank); shopping agents.
Unit 8. Text Categorization and Clustering: 7 Hrs.
Categorization algorithms: Rocchio; naive Bayes; decision trees; and nearest neighbor.
Clustering algorithms: agglomerative clustering; k-means; expectation maximization
(EM). Applications to information filtering; organization; and relevance feedback.
Extracting data from text; XML; semantic web; collecting and integrating specialized
information on the web.
Probabilistic models; Generalized Vector Space Model; Latent Semantic Indexing (LSI).
Text Books:
Homework
Assignment: Assignment should be given from the throughout the semester.
Course Contents:
Media Types, Text Document Information Retrieval, Need for MIRS, Indexing
Text, Vector Graphics and Animation, Audio, Digital Images, Digital Video, Major
Characteristics and Requirements of Multimedia Data and Applications
MIRS Architecture, Data Models, User Interface Design, Feature Extraction, Indexing
and Similarity Measure
Automatic Text Document Indexing and Boolean Retrieval Model, Vector Space
Retrieval Model, Probabilistic Retrieval Model, Cluster-Based Retrieval Model,
Nontraditional IR methods, Performance measurement, WWW search engines
Audio properties, classification, speech recognition and retrieval, music indexing and
retrieval
Color-Based Image Indexing and Retrieval Techniques, Image retrieval based on shape,
on texture, Compressed image data, Integrated image indexing
Video shot detection or segmentation, video indexing and retrieval, video representation
and abstraction
Unit 8. Integrated Multimedia Indexing and Retrieval: 2 Hrs.
Filter process, B+ and B Trees, Clustering, Multidimensional B+ Tree, k-d Trees, Grid
Files, Tree Family
QoS Management, Design Goals, Data Storage devices and management, data placement
on disks, disk scheduling and admission control, server configuration and network
connection
Humang Judgment Data, Recall and Precision Pari, Percentage of Weighted Hits,
Similarity Ranking, Factors Affecting Retrieval Effectiveness
Homework
Assignment: Assignment should be given throughout the semester.
Prerequisite: Non