round button
Drop Your Query/Message
Back to Top

Information Technology Syllabus Polytechnic MSBTE Sixth Semester I Scheme

MSBTE Syllabus 6th Semester Information Technology IT Course and Classes in Nagpur for Polytechnic Diploma

Atlanta Computer Institute Nagpur conducts Tuition Classes for IT Information Technology sixth semester for all polytechnic institutes in India . The Following syllabus is of MSBTE Maharashtra State Board of Technical Education. Final Year Projects Training is also given to IT Information Technology Students of poly diploma students

Syllabus for Sixth Semester Information Technology Syllabus of Polytechnic MSBTE 

COURSE NAME : DIPLOMA IN INFORMATION  TECHNOLOGY 

COURSE CODE : IF DURATION OF COURSE : 6 SEMESTERS        YEAR / SEMESTER : SIXTH        DURATION : 16 WEEKS   PATTERN : FULL TIME - SEMESTER       SCHEME : I 

1 Computer & Network Security (IF, CO)
2 Web based Application development with PERL (IF, CO)
3 Server Side Scripting Using JSP (CO,IF)
4 Cloud Computing (CO,IF)
5 Wireless and Mobile Network(IF)
6. Web Based Application development with PHP (IF, CO)

 
 
 

 

Maharashtra State Board of Technical Education (MSBTE)


 
'I' Scheme
VI – Semester Course Curriculum
 
Course Title: Computer & Network Security (IF, CO)


(Course Code: ...................)


Diploma programme in which this course is offered

Semester in which offered 

Information Technology, Computer Engineering

Sixth

  1. 1. RATIONALE 

 Computer security is an important aspect in today’s world. Now a days due to various threats designing security in organization is an important consideration. It is essential to understand basic security principles, various threats to security and techniques to address these threats. The student will be able to recognize potential threats to confidentiality, integrity and availability and also able to implement various computer security policies.
This course will introduce basic cryptographic techniques, fundamentals of computer/network security, Risks faced by computers and networks, security mechanisms, operating system security, secure System design principles, and network security principles. It will develop knowledge for security of information within organizations. 

  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:
Maintain computer and network security of organization.

  1. 3. COURSE OUTCOMES (COs)

The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:

    1. a. Identify risks faced by Computer Systems and Information hazard in various situations.
    2. b. Identify role of people in computer security.
    3. c. Apply cryptographic algorithms and protocols to maintain Computer Security.
    4. d. Detect threats to provide security of network.
    5. e. Prevent attacks on network using firewall.
    6. f. Authenticate users using security protocols.
       
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. 
 

S. No.

Practical Outcomes (PrOs)

Unit No.

Approx. Hrs.
Required

 

Install and configure Antivirus software on system (any).

I

2

 

Set up operating system Updates.

I

2

 

Set up Backup and Recovery for the system.

I

2

 

Set up passwords to operating system and applications.

II

2

 

Apply security to file, folder or application using access permissions.

II

2

 

Write a program to implement Caesar Cipher

III

2

 

Write a program to implement poly-alphabetic Cipher

III

2

 

Write a program to implement Rail fence technique

III

2

 

Write a program to implement Simple Columner Transposition technique

III

2

 

  1. 10 

Create and verify digital signature using tool (e.g. Cryptool)

III

2

 

  1. 11 

Use Steganography to encode and decode the message using any tool.

III

2

 

  1. 12 

Install firewall on any operating system.

IV

2

 

  1. 13 

Configure firewall settings on any operating system.

IV

2

 

  1. 14 

Create and verify Digital Certificate using tool (e.g. Cryptool)

V

2

 

  1. 15 

Trace the origin of Email using any tool(e.g. emailTrackerPro)

V

2

 

  1. 16 

Trace the path of web site using Tracert Utility

V

2

 

Total

 

32

8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopics is to be taught and assessed in order to develop UOs for achieving the COs to attain the identified competency:
 


Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit – I
Introduction to computer security

 

  1. 1a. Explain the importance of given pillars of computer security.
  2. 1b. Explain the characteristics of given type of threat.
  3. 1c. Explain types of attacks related with security.
  4. 1d. Describe the features of given type of updates of operating system.

 

1.1 Foundations of Computer Security –Definition and Need of computer security, Security basics: Confidentiality, Integrity, Availability, Accountability,
Non-repudiation, Reliability.  
1.2 Risk and Threat Analysis: Assets, Vulnerability, Threats, Risks, Counter measures.  
1.3 Threat to Security: Viruses, Phases of Viruses, Types of Virus, Dealing with Viruses, Worms, Trojan Horse, Intruders, Insiders.
1.4 Type of attacks: Active and Passive attacks, Denial of service, DDOS, backdoors and trapdoors, sniffing, spoofing, man in the middle, replay, TCP/IP Hacking, encryption attacks.
1.5 Operating system security: Operating system updates : hot fix, patch, service pack

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit– II 
User Authentication & Access Control

 

  1. 2a. Explain given method to guess the passwords.
  2. 2b. Explain the given method of Biometric.
  3. 2c. Explain Authentication and Authorization with example.
  4. 2d. Describe the features of given access control policy.

 

2.1 Identification and Authentication: User name & Password, Guessing password, Password attacks-Piggybacking, Shoulder surfing, Dumpster diving.
2.2 Biometrics: finger prints, hand prints, Retina, patterns, voice patterns, signature and writing patterns, keystrokes.
2.3 Access controls: Definition, Authentication Mechanism, principle-Authentication, Authorization, Audit, Policies: DAC, MAC, RBAC.

Unit– III
Cryptography

 

  1. 3a. Define terms related to cryptography.
  2. 3b. Encrypt/Decrypt the given text using different substitution techniques.
  3. 3c. Convert plain text to cipher text and Vice versa using various transposition techniques.
  4. 3d. Explain Hashing with properties.
  5. 3e. Convert message using steganography.
  6. 3f. Explain different techniques of cryptography.

 

3.1 Introduction: Plain Text and Cipher Text, Cryptography, Cryptanalysis, Cryptology, Encryption, Decryption.
3.2 Substitution techniques: Caesar’s cipher, monoalphabetic, Homophonic, Polygram and polyalphabetic.
3.3 Transposition techniques: Rail fence technique, simple columnar, Vernam Cipher (One-Time Pad) , Book Cipher (Running Key Cipher),
3.4 Steganography-procedure, Hashing-definition, properties 
3.5 Symmetric and Asymmetric cryptography: Introduction to Symmetric encryption, DES (Data encryption Standard) algorithm, Asymmetric key cryptography: Digital Signature.

Unit-IV 
Firewall and Intrusion Detection System

 

  1. 4a. Explain need of firewalls.
  2. 4b. Compare types of firewall.
  3. 4c. Enlist configuration steps of firewalls.
  4. 4d. Describe VPN architecture.
  5. 4e. Explain Intrusion Detection system.
  6. 4f. Classify IDS techniques.
  7. 4g. Describe the given IDS technique.

 

 

  1. 4.1 Firewall – Need of firewall, types of firewall- packet filters, application gateways, circuit gateways.
  2. 4.2 Firewall Policies, configuration, limitations, DMZ.
  3. 4.3 Virtual Private Network- Introduction, architecture.
  4. 4.4 Intrusion Detection System- Vulnerability Assessment, Misuse detection, Anomaly Detection, Network-Based IDS, Host-Based IDS, Honeypots .   

Unit –V
 
Network Security

 

  1. 5a. Explain the given authentication protocols.
  2. 5b. Explain different ways to implement IP Security
  3. 5c. Explain protocols related to Email security.
  4. 5d. Describe Public Key Infrastructure.

 

  1. 5.1 Kerberos.
  2. 5.2 IP Security- overview, Protocols- AH, ESP, Modes- transport & Tunnel.
  3. 5.3 Email security- SMTP, PEM, PGP.
  4. 5.4 PKI – Introduction, Certificates, Certificate authority, X.509/PKIX certificate.

 

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

 

 

 

 


Course Title: Web based Application development with PERL (IF, CO)
(Course Code: ...................)


Diploma programme in which this course is offered

Semester in which offered 

Information Technology, Computer Engineering

Sixth

  1. 1. RATIONALE 

Perl is especially popular with system programmers and web developers. It is originally designed for text processing and automation.    

  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:
Develop simple web based application using Perl.

  1. 3. COURSE OUTCOMES (COs)

The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:

  1. a. Perform basic operations on Perl data types (scalars, arrays, and hashes) 
  2. b. Implement program using loops & decisions.
  3. c. Implement subroutines, modules, regular expressions and special variables in Perl program.
  4. d. Develop web based application in Perl with CGI.
  5. e. Develop web based application with use of different CGI modules and system interaction.
  6. f. Develop web based applications with database interaction.
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals/exercises in this section are practical based LOs (i.e. sub- components of the COs) to be developed and assessed in the student to lead to the attainment of the competency
 


Sr. No.

Practical Exercises
(Learning Outcomes  to be achieved through practicals)

Unit No.

Approx. Hrs.
Required

 

Write ‘Perl’ programs perform different operations on scalars (take input from user) given below.

    1. a. Perform arithmetic operations on scalars.
    2. b. Perform string Concatenate.

I

02*

 

Write ‘Perl’ programs to create list (take input from command line) and perform add and remove operation on it.

I

02*

 

Write a ‘Perl’ program to create hashes of subject and its marks and perform insert, delete and change operation. 

I

02*

 

Implement simple guessing game in ‘Perl’ by using decision in ‘Perl’.

II

02*

 

Implement a ‘Perl’ program to print prime numbers from 1 to N using while as well as for loop.

II

02*

 

Implement a ‘Perl’ program given below

  1. a) Take input pattern (string) and then test to see if it matches our string.
  2. b) Write simple programs to demonstrate use of Special Variable.

III

02*

 

Write a subroutine to check whether two arrays have the same contents and call it by passing array.

III

02*

 

Write a ‘Perl’ program which use module created and use it in another program.

III

02*

 

Create simple webpage to display your information by writing perl script.

IV

02*

 

  1. 10 

Write a Perl Script to read an HTML form data using the GET or POST method. (Use Developer Tools in Web Browser to check header and data of GET or POST method)

IV

02*

 

  1. 11 

Create simple webpage for addition of two numbers store total in cookie and reuse it as first number in html form for further requests.

IV

02*

 

  1. 12 

Create simple webpage for to display page views for that website using session. (try with closing tab with page view and closing browser completely)

IV

02*

 

  1. 13 

Perform Following
I) Install mod_perl with apache web server.
II) Create simple webpage to display your information using mod_perl.

V

02*

 

  1. 14 

Create simple web page which upload file to server and display its content.

V

02*

 

  1. 15 

Write a Perl Script to display requested data from Mysql table. (May use “PhpMyAdmin” which is front end for Mysql)

VI

02*

 

  1. 16 

Write a Perl Script to update and delete requested data from Mysql table. (May use “PhpMyAdmin” which is front end for Mysql)

VI

02*

 

  1. 17 

Mini Project 

 

 

 

Total

 

32

  1. 8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopics should be taught and assessed in order to develop LOs in cognitive domain for achieving the COs to attain the identified competency.
 


Unit

Major Learning Outcomes
(in cognitive domain) 

Topics and Sub-topics

Unit – I
Introduction to Perl

 

  1. 1a. Explain need and features of Perl.
  2. 1b. Explain different arithmetic operations on scalars. 
  3. 1c. Explain different operations

 

  1. 1.1 Introduction: Perl features, need of Perl and Program Structure.
  2. 1.2 Types of Data and input methods: Numbers, String in perl and different input methods.

 

Unit

Major Learning Outcomes
(in cognitive domain) 

Topics and Sub-topics

 

 

  1. on string.
  2. 1d. Explain arrays and operations performed on it.
  3. 1e. Explain hashes and different operations performed on it. 

 

 

  1. 1.3 Operators & Variables: different types of  operators and variables.
  2. 1.4 Lists and Hashes: different operations on List and Hashes
  3. 1.5 Different operations on Array

Unit– II 
loops & decisions

 

  1. 2a. Explain working of decisions in Perl.
  2. 2b. Explain working of loops in Perl.

 

    1. 2.1 Decision: Logical Operators for string and numerical data, 
    2. 2.2  Loops: for, while, until

Unit– III
subroutines, modules and regular expressions

 

  1. 3a. Explain subroutines 
  2. 3b. Explain Module and its use and types of modules.
  3. 3c. Design different regular expression.
  4. 3d. Explain special variables in Perl.

 

    1. 3.1 Subroutines: Subroutine basics, parameter passing, scope of variables.
    2. 3.2 Module: need, Package Hierarchies, Perl Standard Modules, CPAN
    3. 3.3 Regular expression: Literals, Regex Combinations, Quantifiers, Regex Anchors, Metacharacters, Grouping and Alternation, Assertions, Regex Modifiers.
    4. 3.4 Special Variable: Regular Expression Variables, Default Variables and Parameters, Input/Output Variables, Filehandle/format Variables, Error Variables, System Variables.

 

Unit-IV 
Introduction to web based application in Perl

 

  1. 4a. Explain CGI Function-Oriented Style and Object Oriented Style.
  2. 4b. Explain working of Cookies.
  3. 4c. Explain HTTP get and post method implementation in Perl.
  4. 4d. Explain CGI.pm Functions and Environment Variables in CGI.
  5. 4e. Explain debugging and troubleshooting in Perl web development.

 

    1. 4.1 function oriented and object oriented website creating with CGI.
    2. 4.2 Cookie Parameters, Cookie Limitations, inserting and retrieving cookies, Cookie Expiration, Multiple Cookies, Secure Flag. 
    3. 4.3 Get and Post method in HTTP, start_form in Perl.
    4. 4.4 CGI.pm Method Groupings, environment variables set by web server, form variables.
    5. 4.5 Debugging and Troubleshooting: Carp Module, with CGI Programs, Security Considerations: Untrusted Data from Forms, Strictness, Taint Mode and File Permissions.

Unit-V
CGI modules and system interaction.

5a. Explain CGI Modules.
5b. Security Considerations.
5c. Explain File Handling in Perl.
5d. Explain Uploading files on web server.

 

    1. 5.1 CGI modules: CGI::Carp, URI::Escape, Net::SMTP, mod_perl and HTML::Mason. 
    2. 5.2 mod_cgi vs. mod_perl, mod_perl Installation, Apache::Registry vs. Apache::PerlRun, run CGI programs with

 

Unit

Major Learning Outcomes
(in cognitive domain) 

Topics and Sub-topics

 

 

 

    1. mod_perl.
    2. 5.3 Security Considerations with mod_perl.
    3. 5.4 Interaction Based on Environment Variables, Security Considerations with CGI Modules.
    4. 5.5 Open, close, read, write file in Perl.
    5. 5.6 Upload File on web server and display its content.

Unit –VI
database interaction

6a. Explain DBI Module and      database drivers.
6b. Explain interaction with SQL Databases with the DBI
6c. Explain Security Considerations with Data Access

6.1 Interacting with a Database: DBI, Database Drivers, Data Source Names, Credentials, and Attributes, Database Handles, Statement Handles, Error Handling
6.2 Connecting to the Database, Executing a Query (Perform CRUD operations), Retrieving the Results, Quote Method for Dynamic Statements, Binding Parameters, Interacting with the Web, Building HTML Tables.
6.3 Security Considerations: Stored Credentials, Unnecessary Privileges, Unsanitized Statements and Input.

 


Course Title: Server Side Scripting Using JSP (CO,IF)
(Course Code: ...................)


Diploma programme in which this course is offered

Semester in which offered 

Computer Engineering, Information Technology

Sixth

  1. 1. RATIONALE 
    In current trends of web world, dynamic and platform independent web applications are required. Java Server Page is an important scripting technology for computer engineering and Information Technology diploma graduates to develop dynamic and platform independent web-based applications. JSP is widely used server side scripting technology as it allows designing web – based applications using java APIs, JDBC APIs.
  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:
 

    1. Develop simple web-based applications using server – side scripting through JSP 
  1. 3. COURSE OUTCOMES (COs)
  2. 4. The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:
  1. a. Handle HTTP request- response using Servlet.
  2. b. Design simple JSP page using JSP elements.
  3. c. Manage sessions.
  4. d. Perform database operations using JDBC.
  5. e. Deploy web applications.
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency.


Sr. No.

Practical Outcomes (PrOs)

Unit No.

Approx. Hrs.
Required

 

Install Web Server and database tool

I

2*

 

Write a program for demonstration of HTTP request and response using Servlet

I

2*

 

Develop a program to demonstrate use of all basic elements of JSP (Any 4  programs)

II

2*

 

Write a simple JSP program for Demonstrating use of expressions, declarations (Any 2 programs)

II

2*

 

Write a JSP program for Demonstrating use of request dispatching

III

2*

 

Write programs to demonstrate attributes of Page Directives

III

2*

 

Write a JSP programs for session management using Session tracking 

III

2*

 

Write a JSP programs for session management using:

  1. i. URL re-writing 
  2. ii. Hidden Form Field

III

2*

 

Write program to insert records using JDBC

IV

2*

 

  1. 10 

Write program to display specific records using JDBC

IV

2*

 

  1. 11 

Write program to search and update records using JDBC

IV

2*

 

  1. 12 

Write program to remove specific records using JDBC

IV

2*

 

  1. 13 

Write a program to demonstrate use of JSP Filters

IV

2*

 

  1. 14 

Write a JSP program for Demonstration of Event Listeners

IV

2*

 

  1. 15 

Write program to demonstrate use of JSP Standard Tag Library (JSTL)

V

2*

 

  1. 16 

Deploy a sample JSP

V

2*

 

Total

 

32

  1. 8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopics should be taught and assessed in order to develop UOs in cognitive domain for achieving the COs to attain the identified competency.


Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit – I
Web programming Environment – Introduction

 

  1. 1a. Select use of Servlet or JSP for the given problem
  2. 1b. Maintain HTTP sessions
  3. 1c. Use Servlet for request and response 

 

  1. 1.1 Servlet and JSP overview: Servlet Life cycle, Servlet Classes,Threading Models, JSP life-cycle
  2. 1.2 Overview of the Hypertext Transfer Protocol(HTTP): The HTTP Specification, HTTP Request-Response Model, HTTP sessions 
  3. 1.3 The Servlet API, The Javax.Servlet Package, Reading Servlet Parameters, Reading Initialization Parameter

Unit– II 
Introduction to JSP

 

  1. 2a. Design page using JSP elements and declarations for the given problem
  2. 2b. Develop web logic using JSP expressions  and Scriplets and

 

    1. 2.1  Overview of JSP
    2. 2.2 JSP Syntax and semantics: Components of JSP page, JSP Development Model, and complete example.

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

 

 

  1. declarations for the given problem

 

    1. 2.3 Expressions
    2. 2.4 Scriplets
    3. 2.5 Declarations

Unit– III
Request Dispatching, Page directives, and Session Management

 

  1. 3a. Apply the given validation rule
  2. 3b. Use relevant page directive(s) to create page instructions for the given problem
  3. 3c. Use relevant session API to manage the  session

 

    1. 3.1 Request dispatching and Form validation
    2. 3.2 Page directives
    3. 3.3 Session Management : Session tracking, Session API

Unit-IV 
JDBC, Application Event Listeners and Filters

 

  1. 4a. Use relevant JDBC driver for connecting the given database
  2. 4b. Write statements to perform primitive database operations using JDBC
  3. 4c. Write function to handle given event using event listener
  4. 4d. Use the relevant JSP Filter to solve the given problem

 

  1. 4.1  JDBC: Overview of JDBC,JDBC Drivers, ResultSet, Statement, Prepared Statement, Connecting to a Database With DriverManager
  2. 4.2 Application Event Listeners
  3. 4.3 Filters: Filter overview, Developing and deploying a Filter

Unit –V
JSP Tag Extensions and Deploying Web Application

 

  1. 5a. Select relevant custom tags to design web page for the given problem
  2. 5b. Develop business logic using expression language for the given situation
  3. 5c. Deploy sample web applications using web server

 

  1. 5.1 Custom Tags: Introduction and how it works
  2. 5.2 Tag Handlers and Tag Libraries
  3. 5.3 Expression Language
  4. 5.4 The JSP Standard Tag Library(JSTL)
  5. 5.5 Tag Extensions, Tag Files, and JSP Fragments
  6. 5.6 Deploying Web application


Course Title: Cloud Computing (CO,IF)
(Course Code: ...................)


Diploma programme in which this course is offered

Semester in which offered 

Information Technology

Sixth

  1. 1. RATIONALE 
    Cloud computing has evolved as a very important computing model, which enables information, software, and other shared resources to be provisioned over the network as services in an on-demand manner.
    After learning this subject student will be able to learn cloud types, security in cloud, and storage in cloud, cloud monitoring and management.
  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:

  1. Use large scale distributed system in Cloud applications.
  1. 3. COURSE OUTCOMES (COs)

The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:

  1. a. Describe the  basic concepts of cloud 
  2. b. Use the concept of virtualization in cloud computing
  3. c. Select Cloud Storage System
  4. d. Describe the cloud service provider and user
  5. e. Use the concept of cloud security
  6. f. Describe current trends and future scope of cloud
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency.


Sr. No.

Practical Outcomes (PrOs)

Unit No.

Approx. Hrs.
Required

 

Study of cloud computing and architecture

I

04*

 

Creating virtual machines with open source OS.

II 

04*

 

Deleting Virtual Machine and recreating it.

II

04*

 

Create a VM image and create VM from with captured image.

II

04*

 

Create and document the process of creating a Microsoft Azure Account(or any other free)

VI

04*

 

Create a free Microsoft Azure(or any other free) account and explore its management console

IV

04*

 

Installing web server (Apache Tomcat) on VM, hosting simple web application on it.

IV

04*

 

Study of Security as a Service

V

04*

 

Total

 

32

 

  1. 8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopics should be taught and assessed in order to develop UOs in cognitive domain for achieving the COs to attain the identified competency.
 


Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit – I
Introduction to Cloud Computing

 

  1. 1a. Explain Cloud Computing with its characteristics
  2. 1b. Explain cloud Deployment and Services model
  3. 1c. Explain architecture of cloud computing

 

  1. 1.1 Defining cloud Computing, Essential characteristics of cloud computing
  2. 1.2  Cloud Deployment Model: Public cloud, Private cloud, Community cloud, Hybrid cloud
  3. 1.3 Cloud Service Models: Iaas, Paas, Saas
  4. 1.4 Cloud Economics and Benefits
  5. 1.5 Architecture of Cloud computing
  6. 1.6 Cloud Computing Infrastructure

Unit– II 
Virtualization

 

  1. 2a. Explain Virtualization.
  2. 2b. Explain Virtualization types  
  3. 2c. Explain Virtualization Technology examples. 

 

    1. 2.1  Introduction, Characteristics of virtualized environment
    2. 2.2 Virtualization Types
    3. 2.3 Technology Example: 

Vmware, Microsoft Hyper-V, KVM , Xen
2.4 Advantages 
VM Migration
VM consolidation
VM Management
2.5 disadvantages of virtualization

Unit– III
Storage in Clouds 

 

  1. 3a. Explain storage system architecture.
  2. 3b. Understand cloud file systems.
  3. 3c. Compare GFS and HDFS

3.1 Storage system architecture, 
3.2 Virtualize Data Centre(VDC) architecture, VDC Environment, server, storage, networking
3.3 Block and file level storage

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

 

 

virtualization, Virtual Provisioning, and automated storage tiering, VSAN and benefits, 
3.5 Cloud file systems: GFS and HDFS, 
Comparisons among GFS,HDFS.

Unit-IV Cloud monitoring and management

 

  1. 4a. Describe federated cloud computing
  2. 4b. Explain SLA management
  3. 4c. Understand the cloud interface standards.
  4. 4d. Describe the cloud life cycle. 

 

  1. 4.1  Service Provider and users
  2. 4.2 An architecture of federated cloud computing
  3. 4.3 SLA management: Types of SLA, Life cycle of SLA.
  4. 4.4 Service catalog, management and functional interfaces of services ,
  5. 4.5 Cloud portal and its functions
  6. 4.6 Cloud Service life cycle phases:

Service planning, service creation, service operation and service termination

  1. 4.7 Software defined approach and techniques for managing IT resources

 

Unit –V
Security in Cloud Computing

 

  1. 5a. Explain Key security terminologies in cloud computing
  2. 5b. Understand the technologies for Data Security
  3. 5c. Understand cloud Computing identity and digital identity
  4. 5d. Describe Security-As-A-Cloud Service

 

  1. 5.1 Cloud Security Fundamentals
  2. 5.2 Cloud Risk
  3. 5.3 Cloud Risk division
  4.  Polity and Organizational Risks
  5.  Technical Risks
  6.  Legal risks
  7. 5.4 Technologies for Data security, Data security risk,
  8. 5.5 Digital identity and access management,
  9. 5.6 Content level security
  10. 5.7 Security-As-A-Cloud Service

 

Unit –VI
Trends and future in cloud computing

6a Understand the current trends in cloud computing
6b Understand different Cloud platforms 

 
6.1 Cloud trends in supporting Ubiquitous  Computing
6.2   Enabling Technologies with the Internet of   Things(RFID, Sensor Networks and ZigBee Technologies, GPS)
6.3   Innovatove Applications with the Internet of Things(Ex: Smart Buildings and SmartPower Grid)
6.4 Future of Cloud-Based smart Devices, Faster time to Market for Software Applications, Home Based Cloud Computing, Energy Aware Cloud

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

 

 

Computing
6.5 Cloud Platforms: Amazon EC2 and S3,Microdsoft Azure , Cloudstack, Intercloud, Google App Engine, Open Source cloud Eucalyptus, Open stack, Open Nebulla, etc., 


Course Title:Wireless and Mobile Network(IF)
(Course Code:...................)


Diploma programme in which this course is offered

Semester in which offered 

Information Technology

Sixth

  1. 1. RATIONALE

In this world of connectivity and collaborative work environment, it is necessary to connect to the network from anywhere, withanybody, atany time. Wireless communication provides connectivity with mobility, flexibility and convenience. Wireless devices are used across the various industries like Healthcare, Education, Automation. Renewable energy sector, Automobileetc. Effective use of social networkinghas become possible due to high end wireless devices. This course will help the students to develop skills to handle wireless and mobile communication systems

  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:
Maintain wireless and Mobile Networks.

  1. 3. COURSE OUTCOMES (COs)

The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:

  1. a. Troubleshoot mobile handsets.
  2. b. Choose relevant method to improve Cellular System capacity.
  3. c. Select cellular Mobile system standard.
  4. d. Select wireless technology for various applications.
  5. e. Select wireless network Technologies.
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals/exercisesin this section are practical basedLOs (i.e.sub- components of the COs) to be developed andassessed in the student to lead to the attainment of the competency
 


Sr. No.

Practical Exercises
(Learning Outcomes  to be achieved through practicals)

Unit No.

Approx. Hrs.
Required

 

Identify different sections and components of mobile phone such as ringer sections, dialer sections, receiver section and transmitter section.

I

02*

 

Observe & analyze input/output signals of different sections of mobile phone unit and Understand and Perform Handset charging Functionality.

I

02*

 

Perform Mobile Handset Testing.

I

02*

 

Read contents of Subscriber Identity Module (SIM) card.

III

02*

 

Understand Handoff,Frequency Reuse and cell splitting in Mobile computing.

II

02*

 

Perform Installation of mobile phone,registration,activation and authentication of mobile handset.

III

02*

 

Find out different add on accessories for mobile phone unit and their interfacing with handset.

I

02*

 

Troubleshooting and testing of mobile handset such as speaker problem,ringer problem,mike problem,vibrator problem,SIM card problem,charging problem,display problem,dialing/keypad problem.

I

02*

 

Check network availability manual and auto selection of network using AT Commands in mobile.

III

02*

 

  1. 10 

Observe the process of call connection and call release of mobile system.

III

     02

 

  1. 11 

Understand 3G Communication architecture and 3G network by connecting to mobile network using AT Commands.

III,IV

     02*

 

  1. 12 

Prepare a report on features and services provided by different mobile service providers like Idea,Airtel etc. and also specifications of different handsets provided by different companies.

IV

     02*

 

  1. 13 

To establish WLAN Network using Dlink access point and using Wi-Fi hotspot.

V

     02*

 

  1. 14 

To study RFID Technology.

V

     02

 

  1. 15 

To study different software simulation used in wireless sensor Network.

V

     02*

 

  1. 16 

To study about various Hardware sensor boards.

V

     02*

 

Total

 

32

  1. 8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopicsshouldbetaught and assessed in order to develop LOs in cognitive domain for achieving the COs to attain the identified competency.


Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

Unit – I
Introduction to wireless communication system

 

  1. 1a. Describe the features of the given mobile radio standards.
  2. 1b. Explain the working of the specified application of the mobile/fixed wireless communication system.
  3. 1c. Describe the working of the

 

  1. 1.1 History of mobile radio communication and evolution of mobile radio communication
  2. 1.2 Mobile Radio systems around the world: AMPS, N-AMPS, IS-95, GSM, UMTS, CDMA 2000 and examples of wireless communication systems
  3. 1.3 Important Definitions: Base station,

Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

 

 

  1. given block of mobile hand set.
  2. 1d. Explain the working principle of the given section of mobile handset unit.
  3. 1e. Describe step by step trouble shooting procedure for the given section of mobile phone.

 

  1. control channel, Forward channel, Reverse channel, Mobile station, Hand off, Mobile switching center (MSC or MTSO), Transreceiver, Half duplex system, Full duplex system and types of mobile wireless systems: Paging system, cordless telephone system and cellular telephone system
  2. 1.4 Concept of LEC networks and Wireless Local Loop (WLL) and its types FWT (Fixed wireless Telephone), WT with mobility, Radio parameters of CT-2, DECT, PHS, Mobile Os types, Features
  3. 1.5 Local Multipoint Distribution system (LMDS): Introduction, Benefits, Network architecture, LMDS specifications, system capacity, Microwave Propagation Issues, Network planning, Network node Equipment, Radio frequency equipment, Network Interface Equipment (customer Premises), Network Management
  4. 1.6 Mobile phone unit: Block diagram,working,Features,Block diagram and working of transmitter,receiver,frequency synthesizer, control unit and logic unit of mobile phone and test and troubleshoot various sections of mobile handset:ringer,dialer,battery,SIM,display sections

Unit– II 
Fundamentals of cellular system

 

  1. 2a. Explain the given terms, with respect to Cellular systems.
  2. 2b. Apply the principle of frequency reuse for the given coverage area.
  3. 2c. Choose the handoff mechanism for the given situation with justification.
  4. 2d. Explain the effect of the given interference on cellular system performance.
  5. 2e. Select the relevant method to improve coverage and system capacity.
  6. 2f. Calculate number of traffic

 

    1. 2.1 Cellular concept fundamentals: cell, cluster, reusefactor, minimum reuse distance, Frequencyreuse, channel assignment strategies
    2. 2.2 Handoff strategies: concept of handoff, Types of Handoffs: Hard, soft, Queued, delayed, MAHO (Mobile Assisted Handoff), Proper and improper Handoff, umbrella cell approach
    3. 2.3 Interference and system capacity: Co-channelinterference, Adjacent channel Interference, channel planning for wireless systems
    4. 2.4 Improving coverage and capacity in cellular systems: Cellsplitting, sectoring, Microcell zone concept, Repeaters for range extension

Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

 

 

  1. channels & control channels for the given frequency spectrum & the given frequency reuse ratio

 

    1. 2.5 Types of Multiple Access Techniques:SDMA,FDMA,TDMA,CDMA and comparison of multiple access strategies

Unit– III
Digital Cellular Mobile standards

 

  1. 3a. Describe the architecture of the given 2G/3G Cellular standard.
  2. 3b. Explain features of given mobile communication standard.
  3. 3c. Compare 2G/3G Standard with CDMA Standard on basis of given parameters.
  4. 3d. Describe call processing stages in given cellular standard.
  5. 3e. Describe the layered architecture of the given SS7 protocol.

 

 

    1. 3.1 Global system for Mobile communication (GSM): Introduction, Advantages of cellular systems, GSM frequency spectrum, Features, Propagation effects on GSM frequency, GSM Network Components: Public land mobile network(PLMN),GSM architecture, GSM radio aspects, GSMservices, supplementaryservices, security aspects, GSM protocol model, GSM channel types, Frame structure of GSM system, signal processing in GSM: Block diagram and functions of various blocks, Authentication in GSM, Call processing and Roaming in GSM: Mobile originated call, Mobile terminated call, Handover management, types of Handovers, Roaming in GSM, Roaming agreements, Roaming procedure, Block diagram of Location update while roaming,LU Procedure, Roaming Examples
    2. 3.2 Mobile Handset Identities: Functions of MS, Power levels, SIM card architecture, Mobile Identities, Other Identities like TMSI, MSRN
    3. 3.3 General Packet Radio Service (GPRS): Introduction to GPRS, GPRS system architecture, Interfaces in GPRS network, GPRSservices, Quality of service, Packet switched and circuit switched services, GPRSspeeds and profiles, Mobility Management and Routing in GPRS, Logical channels in GPRS, Protocol architecture
    4. 3.4 Enhanced Data rate for Global Evolution(EDGE):Introduction of EDGE, Technical difference between GPRS and EDGE,EDGE Technology: modulationtechniques, codingschemes, packethandling, Addressingwindow, measurementaccuracy,Interleaving,EDGE link controlling function, Linkadaptation, Incrementalredundancy,

Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

 

 

 

    1. Impact of EDGE on existing GSM/GPRS network, Requirements on EDGE, User plane protocols, Future evolution of GSM/EDGE towards WCDMA alignment, Benefits of EDGE Technology, EDGE data applications
    2. 3.5 CDMA Evolution:IS-95 standards Evolution, spreadspectrum, features, privacy, key attributes of CDMA, Forward (Downlink) and Reverse(uplink) signal, softhandover, CDMA2000, CDMA 2000 1XRTT, CDMA 2000 3X, CDMA 2000 EVDO, CDMA 2000 EVDV,CDMA wireless Evolution, GSM v/s CDMA,service aspects, Architecture, network reference model, Radioaspects, securityaspects, stages of call processing in IS-95,IS-95 channel structure, Authentication in IS-95 CDMA,output power control in CDMA,Handoffs in IS-95
    3. 3.6 Signaling system No 7(SS7):Primary characteristics of SS7,Protocol architecture of SS7,Performance of SS7,congestion control in SS7 Networks, various types of SS7 Services, signaling traffic in SS7

Unit-IV
Advance wireless standards

 

  1. 4a. Explain compatibility requirements of IMT-2000 global standards.
  2. 4b. Explain features of the given next generation standard.
  3. 4c. Describe the functions of the given section of UMTS network architecture.
  4. 4d. Compare features of two given next generation mobile communication standards.

 

 

  1. 4.1 Need for 3G and 4G technology,4G wireless networks, comparison of 3G and 4G
  2. 4.2 IMT-2000 Evolution and Migration: IMT-2000 vision, Radio spectrum for IMT-2000, Radio Transmission Technologies for IMT-2000, Existing mobile networks to IMT-2000, Driving forces for IMT-2000, IMT 2000 family, IMT-2000 Radio access networks and standards, spectrum requirements, Transition from GSM systems, satellite component,3G mobile technology,3G standards,2G to 3G Network standardization,2G to 3G Network Transition, compatibility and service
  3. 4.3 UMTS Technology: Features, UMTS data rates, UMTSpurpose, UMTSspectrum, UMTS Network architecture, Applications/Advantages of UMTS, UMTS Air interface

Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

 

 

 

  1. specifications, security procedure
  2. 4.4 TD-SCDMA Technology
  3. 4.5 Next generation wireless systems:Features of 4G and 4G LTE,VoLTE,4.5G,5G,4G Architecture,advantages,disadvantages and applications of 4G

Unit –V
Emerging wireless Network Technologies

 

  1. 5a. Develop personal area network(PAN)
  2. 5b. Describe given IEEE protocol standard for wireless communication networks.
  3. 5c. Explain the given IEEE 802.11 protocol and architecture.
  4. 5d. Compare the performance of given wireless network technologies based on given parameters.

 

 

  1. 5.1 IEEE 802.11 WLAN Technology: Adavtages, disadvantages, IEEE 802.11 system architecture, IEEE 802.11 Protocol architecture, IEEE 802.11 Physical layer specifications, IEEE 802.11 family of WLAN standards, WLAN applications, radio spectrum
  2. 5.2 IEEE 802.15 WPAN Technology:Features, IEEE 802.15.1 system architecture, IEEE 802.15.1 Protocol architecture, IEEE 802.15.3 High rate WPAN, IEEE 802.15.4 Low rate WPAN, Comparison of IEEE 802.15 WPAN standards, WPAN applications
  3. 5.3 WMAN/Wi-max/IEEE 802.16 Technology: Wi-maxstandards, Advantages of Wi-max over Wi-Fi, data rates in Wi-max, Technical features of Wi-max, frequencies used for Wi-max, IEEE 802.16 Standards for Wi-max, Wi-max network architecture, Relationship between IEEE 802.16 and IEEE 802.11, Comparison of Wi-max with Wi-Fi and CDMA 2000 technologies, security in WLAN, WPAN and WMAN
  4. 5.4 Mobile Ad-hoc Networks and Wireless Sensor Networks: Definition of MANET,MANET topologies, Features of MANET,Applications,Different types of MANET Architecture, Design challenges in MANET,Definition of Wireless Sensor network, Mesh Networking, Applications of wireless sensor network, clustering of WSN,Characteristics of WSN,Block diagram of sensor node, Different types of WSN Architecture, Energy efficiency in WSN,Design challenges in WSN,Comparison between WSN,MANET and IOT,ISO equivalent protocol layer architecture for WSN,Classification of clustering

Unit

Major Unit Outcomes (Uos)
(in cognitive domain) 

Topics and Sub-topics

 

 

 

  1. algorithms, Components of WSN Architecture
  2. 5.5 Concept of set up channel Blockage, voice channel blockage, call Drops, voice Quality


Course Title: Web Based Application development with PHP (IF, CO)
(Course Code: ...................)


Diploma programme in which this course is offered

Semester in which offered 

Information Technology, Computer Engineering

Sixth

  1. 1. RATIONALE 

In the growing field of Web technology it is essential for every Diploma Engineers to learn PHP Language to help them build interactive web applications. PHP is a general purpose, server-side scripting language run a web server that's designed to make dynamic pages and applications. PHP as a web development option is secure, fast and a reliable.

  1. 2. COMPETENCY 

The aim of this course is to help the student to attain the following industry identified competency through various teaching learning experiences:
Develop simple web based application using PHP language.

  1. 3. COURSE OUTCOMES (COs)

The theory, practical experiences and relevant soft skills associated with this course are to be taught and implemented, so that the student demonstrates the following industry oriented COs associated with the above mentioned competency:

  1. a. Develop simple program using control statement.
  2. b. Perform operations based on arrays and strings.
  3. c. Develop programs by applying object oriented concepts.
  4. d. Design simple Web pages  using form controls.
  5. e. Perform database operations using MYSQL and PHP.
  1. 6. SUGGESTED PRACTICALS/ EXERCISES

The practicals in this section are PrOs (i.e. sub-components of the COs) to be developed and assessed in the student for the attainment of the competency. 
 


S. No.

Practical Outcomes (PrOs)

Unit No.

Approx. Hrs.
Required

 

 

    1. a. Install and configure web server , PHP , MYSQL on operating system.
    2. b. Write a program to print “Welcome to PHP”.

 

I

02

 

Write a simple PHP program using expressions and operators.( Minimum Two programs)

I

02

 

Write a simple PHP program to demonstrate use of Decision making Control structures. (Minimum Three programs)

I

02

 

Write a simple PHP program  to demonstrate use of Loops. (Minimum Two  programs)

I

02

 

 
Write a simple PHP program for creating & manipulating Indexed array, Associative and Multidimensional array.(Any Three program)

II

02

 

Write a simple PHP program –

  1. a. Calculate length of string.
  2. b. Count the number of words in string.
  3. c. Reverse the string.

Without using string functions.

II

02

 

Write a simple PHP program to demonstrate use of Simple function and parameterized Functions.

III

02

 

Write a simple PHP program using object and classes . (Minimum Two  programs)

III

02

 

Write a simple PHP program 
a.  to inherit members of super class in subclass.
b.  to create constructor to initialize object of class.

III

02

 

  1. 10 

Design a simple web page using following form controls
a. text box
b. radio button
c. check box
d. button

IV

02

 

  1. 11 

Design a simple web page using following form controls
a. List box
b. Combo box
c. Hidden field box

 

 

 

  1. 12 

Develop web page in PHP using data validation rules.

IV

02

 

  1. 13 

Write a simple PHP program to demonstrate use of cookies and sessions.  

IV

02

S. No.

Practical Outcomes (PrOs)

Unit No.

Approx. Hrs.
Required

 

  1. 14 

Write a simple PHP program for sending and receiving plain text message.

IV

02

 

  1. 15 

Write a PHP program to insert and display specific record using PHP

V

02

 

  1. 16 

Write program to search and update records using PHP.

 

 

 

  1. 17 

a) Write a PHP program to Create , Retrieve , Update , Delete  table from  MYSQL server

V

02

 

Total

 

32

  1. 8. UNDERPINNING THEORY COMPONENTS

The following topics/subtopics is to be taught and assessed in order to develop UOs for achieving the COs to attain the identified competency:
 


Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit – I
 
Introduction to PHP

 

  1. 1a Write syntax used in PHP     programming.
  2. 1b Use various variables, data types needed for PHP.
  3. 1c Use control statements and loops.

 

 

  1. 1.1 History of PHP, Use of PHP,  Characteristics of PHP, Syntax of PHP
  2. 1.2 Variables, Data types, Expressions and operators, constants, strings.
  3. 1.3 Decision making Control Statements -if , if-else , case , break statement.  
  4. 1.4 Loop control structure - while , do-while , for , for-each , continue statement.

 

Unit– II
 
String and Arrays 

 

  1. 2a Implement various types of array.
  2. 2b Extract data from array.
  3. 2c Compare and  traverse  array elements.
  4. 2d Apply string functions on character array.

 

 

  1. 2.1 Creating & Manipulating Array, Types of Arrays
  2. 2.2 Extracting data from arrays, implode, explode , array flip.
  3. 2.3 Storing data & comparing arrays.
  4. 2.4 Traversing Arrays, array functions. 
  5. 2.5 Operation on string and String functions 

Unit-III 
 
Object Oriented Concepts

 

  1. 3a Implement various types of function.
  2. 3b Use Properties and methods of classes.
  3. 3c Apply object oriented concepts in programming.

 

  1. 3.1 Function and its types
  2. 3.2 Declaring a class & object, Accessing  Properties and Methods, Static Class, 

      Abstract Class.

  1. 3.3 Constructor and Destructor 
  2. 3.4 Inheritance, Overloading and Overriding, Cloning Object.

 

Unit

Unit Outcomes (UOs)
(in cognitive domain)

Topics and Sub-topics

Unit –IV
 
Browser Handling 

 

  1. 4a  Design web pages using Form controls.
  2. 4b Apply  validation rule on web page.
  3. 4c Use of cookies and operations on cookies values.
  4. 4d Use of session and operation on PHP session variable. 

 

4.1 Creating a webpage using Form controls, Accessing  data from web page.
4.2 Browser Role-GET and POST       methods. 
4.3 Server Role
4.4 Web page validation.
4.5 Working with multiple forms : 
- A web page having many forms
-A form having multiple submit   buttons.
4.6 Cookies - Use of cookies , Attributes of cookies , create cookies, retrieve cookies, modify cookies value , delete cookies.
4.7 Session - Use of session, Start session, get session variable value , modify a PHP session variable , destroy session
4.8 Sending E-mail.

Unit-VI
 
Databases and
Web Hosting

 

  1. 5a  Connectivity between MySQL data base and Webpage. 
  2. 5b Create table and perform operation on  table from PHP application
  3. 5c Deploy web application

 

 
5.1 Introduction to MySQL – Creation  of database, Creation of table , MySQL connect , MySQL , MySQL insert , MySQL update , MySQL select , MySQL delete.
5.2 Connecting to a MYSQL database  :        MYSQL database server from  PHP 
-Connecting to the database server
-Selecting database in MYSQL server
-Executing SQL statements
5.3 Retrieving the Query result
5.4 Closing database connection
5.5 Create table and Insert data to the table from PHP application.
5.6 Retrieve , Update and delete table data from MYSQL server and display it in PHP page
5.7 Steps of Host and deploy PHP Application.

 

 

 First Semester Information Technology Syllabus MSBTE

Second Semester Information Technology Syllabus MSBTE

Third Semester Information Technology Syllabus MSBTE

  Fourth Semester Information Technology Syllabus MSBTE

Fifth Semester Syllabus Information Technology MSBTE

Sixth Semester Syllabus Information Technology MSBTE 

 

BCA Bachelor Of Computer Application, BCCA, Bachelor of Commerce & Computer Application BE IT/CS, Information technology/Computer Science MCA, Master of Computer Application MCM, Master of Computer Management Diploma , Polytechnic Others,

Basic Programming

C / C++ ,

Testing

Software Testing,

Hardware & Networking

CCNA, MCSE, Hardware, Networking

Courses at Atlanta

New Batches start Every week On Mondays and Wednesdays.

New Batch Starting Date & Timing

Copyright © 2010-2023 All Right Reserved - Atlanta Computer Institute, Nagpur.
a