M.tech Networking
M.tech Networking
M.tech Networking
KALASALINGAM UNIVERSITY
(Under Section 3 of UGC Act 1956)
Anand Nagar, Krishnankoil - 626 190
Srivilliputtur (Via), Virudhunagar (Dt), Tamil Nadu
Semester 2
Total 18 0 6 20
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
Semester 3
Semester 4
L T P C
MAT5101 APPLIED MATHEMATICS
3 0 0 3
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
LINEAR PROGRAMMING
Standard form of Linear programming problem definitions and theorems
Solution of
linear simultaneous equations Simplex algorithm graphical method Dual
simplex
method Transportation problem - Applications.
MATRIX THEORY
Matrix Norms - Jordan Canonical form Generalized Eigen vectors - Singular
Value
Decomposition - Pseudo Inverse - Least square Approximations QR Algorithm.
QUEUING THEORY
Single and multiple server Markovian queuing models - Customer impatience-
Queuing
applications.
TEXT BOOK:
1. Singiresu S.Rao ,Engineering Optimization , New Age International (P) Ltd ,
2001
2. Gupta S.C. and Kapoor V.K. Fundamentals of Mathematical Statistics, sultan
Chand and sons , Newdelhi,2001
3. Lewis.D.W. Matrix Thoery, Allied Publishers, Chennai 1995
REFERENCES :
1. S.D.Sharma, Operations Research, Kedar Nath Ram Nath & co 2008.
2. M.K. Ochi., Applied Probability and Stochastic processes, John Wiley & sons
1992.
3. Bronson.R. Matrix operations , Schaums outline series , Tata Mcgraw Hill,
Newyork.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5102 WEB SERVICES
3 0 0 3
REFERENCES:
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5103 ADHOC WIRELESS NETWORKS
3 0 0 3
UNIT IV QOS
Introduction, Issues and Chal lenges, Classifications of QoS Solutions, MAC
Layer Solutions, Network Layer Solutions, QoS Frameworks for Ad Hoc Wireless
Networks
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
TEXT BOOK
1. Siva Ram Murthy C, Manoj B.S., Ad Hoc Wireless Networks: Architectures
and Protocols, Prentice Hall, 2005.
REFERENCES
1. Chai-Keong Toh, Ad Hoc Mobile Wireless Networks, PHI, 2002.
2. Charles Perkins, Ad Hoc Networking, Addison Wesley, 2001.
3. Mohammed Liyas, Handbook of Ad Hoc Wireless Networks, CRC Press,
2003.
L T P C
CSE5104 SECURE NETWORK SYSTEM DESIGN
3 0 0 3
Evolution of network security and lessons learned from history, Analyzing top-
down network design methodologies, technical goals and tradeoffs scalability,
reliability, availability, Network performance, security, Characterizing the existing
internetwork, characterizing network traffic, developing network security
strategies.
Selecting technologies and devices for network design, testing network design
using industry tests, building a prototype network system, writing and
implementing test plan, tools for testing, optimizing network design network
performance to meet quality of service (QoS), Modeling, simulation and behavior
analysis of security attacks, future issues in information system security.
REFERENCES:
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5105 NETWORK ROUTING PROTOCOLS
3 0 0 3
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
TEXT BOOK
1. D.Medhi and K.Ramasamy, Network Routing : Algorithms, Protocols
and
Architectures, Morgan Kaufmann Publishers, 2007.
REFERENCES
1. Steen Strub M, Routing in Communication networks, Prentice Hall
International ,
New York, 1995
2. C.Siva Ram Murthy and B.S.Manoj, Adhoc Wireless Networks,
Pearson
Education, 2007.
3. Internetworking Technologies Handbook, Inc. Cisco Systems, ILSG
Cisco
Systems, 4th Edition , 2003
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5181 WEB SERVICE LAB
0 0 3 1
LIST OF EXPERIMENTS
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5182 NETWORK SECURITY LAB
0 0 3 1
List of Experiments
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
3 0 0 3
UNIT I INTRODUCTION
REFERENCES:
1. Ian F. Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks, Wiley
2010.
2. Jun Zheng and Abbas Jamalipour, Wireless Sensor Networks A
Networking Perspective, Wiley 2009.
3. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless
Sensor Networks, Wiley 2005.
4. Ivon Stojmenovic, Hand Book of Sensor Networks Algorithms and
Architectures, Wiley ,2005.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5107 NEXT GENERATION NETWORKS
3 0 0 3
UNIT I INTRODUCTION
Terminal Area Access Network Area Backhaul Network Area Core Transport
Network Area Service Creation Area Network Control and Managerial Area
Service Control and Management Advanced Technologies for Network and
Service Management.
ITU and GSI NGN ETSI and TISPAN - NGN ATIS and NGN CJA and NGN -
TMF and NGOSS, NGMN Alliance and NGMN - 3GPP and LTE/SAE NGMN
Alliance and NGMN, 3GPP and LTE/SAE
REFERENCES:
1. Jingming Li Salina and Pascal Salina, Next Generation Networks,
Prospective and Potentials , John Wiley and Sons, 2007.
2. Thomas Plavyk, Next generation Telecommunication Networks, Services
and Management, Wiley & IEEE Press Publications, 2012.
3. Eldad Perahia and Robert Stacey, Next Generation Wireless LANs,
Cambridge University Press, 2008.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
TEXT BOOK
1. Teerawat Issariyakul, Ekram Hossain, Introduction to Network Simulator
NS2, Springer, 2009.
REFERENCES
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5109 SURVIVABLE NETWORKS
3 0 0 3
UNIT I INTRODUCTION
Network Continuity Define Survival In defense of Paranoia By the Numbers
Plan to Survive Choice Versus Chance - Tactics of Mistakes TCP/IP
Probes Viruses Worms Trojan Horses Denial of Service /Distributed DoS
Sample Attack
UNIT II VULNERABILITIES
System Complexity Top General Vulnerabilities Top Windows Vulnerabilities
Top Unix Vulnerabilities Common Threads Design your Way out of Trouble
Defense in depth Olive Drab Networks Converged Networks Operator
Error - Lessons from Failure Lessons from Success
REFERENCES
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5183 NETWORK SIMULATION LAB
0 0 3 1
LIST OF EXPERIMENTS:
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
LIST OF EXPERIMENTS
Network Forensics
1. Intrusion detection
2. Logging (the best way to track down a hacker is to keep vast records
of activity on a network with the help of an intrusion detection system)
3. Correlating intrusion detection and logging
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5110 MOBILE AND PERVASIVE COMPUTING
3 0 0 3
UNIT I INTRODUCTION
Differences between Mobile Communication and Mobile Computing Contexts
and Names Functions Applications and Services New Applications
Making Legacy Applications Mobile Enabled Design Considerations
Integration of Wireless and Wired Networks Standards Bodies Pervasive
Computing Basics and Vision Principles of Pervasive Computing
Categories of Pervasive Devices.
REFERENCES:
1. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, Mobile Computing:
Technology, Applications and Service Creation, 2 nd edition, Tata McGraw Hill,
2010.
2. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
3. Pei Zheng and Lionel M Li, Smart Phone & Next Generation Mobile
Computing, Morgan Kaufmann Publishers, 2006.
4. Frank Adelstein, Fundamentals of Mobile and Pervasive Computing, TMH,
2005
5. Jochen Burthardt et al, Pervasive Computing: Technology and Architecture of
Mobile Internet Applications, Pearson Education, 2003
6. Feng Zhao and Leonidas Guibas, Wireless Sensor Networks, Morgan
Kaufmann Publishers, 2004
7. Uwe Hansmaan et al, Principles of Mobile Computing, Springer, 2003
8. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
9. Mohammad s. Obaidat et al, Pervasive Computing and Networking, John wiley
10. Stefan Poslad, Ubiquitous Computing: Smart Devices, Environments and
Interactions, Wiley, 2009
11. Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert
Fundamentals of Mobile and Pervasive Computing, McGraw-Hill, 2005
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5111 OPTICAL NETWORKS
3 0 0 3
TEXT BOOK
1. Ramaswami .R and Sivarajan .K, Optical Networks: A Practical
Perspective, Morgan Kaufmann, 3rd Edition, 2009.
REFERENCES:
1. Stern T.E and Bala K, Multiwave length Optical Networks: A Layered
Approach, Addison-Wesley.
2. Agarwal G.P, Fiber-Optic Communication Systems, John Wiley and
Sons
L T P C
CSE5112 MULTIMEDIA COMMUNICATION NETWORKS
3 0 0 3
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
REFERENCES:
L T P C
CSE5113 4G TECHNOLOGIES
3 0 0 3
UNIT I INTRODUCTION
Introduction: History of mobile cellular systems, First Generation, Second
Generation, Generation 2.5, Overview of 3G & 4G, 3GPP and 3GPP2 standards
UNIT II 3G NETWORKS
3G Networks: Evolution from GSM, 3G Services & Applications, UMTS network
structure, Core network, UMTS Radio access, HSPA HSUPA, HSDPA, CDMA
1X , EVDO Rev -0, Rev-A, Rev-B, Rev-C Architecture, protocol stack.
REFERENCES:
L T P C
CSE5114 VEHICULAR ADHOC NETWORKS (VANETS)
3 0 0 3
REFERENCES :
1. Hannes Hartenstein and Kenneth P Laberteaux, VANET Vehicular
Applications and Inter-Networking Technologies, Wiley 2010
2. Mohamed Watfa, Advances in Vehicular Ad-Hoc Networks: Developments
and Challenges, Information Science Reference , 2010
3. Stephan Olariu, Michele C. Weigle Vehicular Networks: From Theory to
Practice, Chapman and Hall/CRC , 2009
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE5115 HIGH SPEED SWITCHING ARCHITECTURE
3 0 0 3
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
Switch models - Blocking networks basic and enhanced banyan networks - sorting
networks merge sorting - rearrange able networks - full and partial connection networks
- nonblocking networks recursive network construction and comparison of non-
blocking network - switches with deflection routing shuffle switch - tandem banyan.
UNIT V IP SWITCHING
Addressing mode - IP switching types-flow driven and topology driven solutions - IP
Over ATM address and next hop resolution multicasting - IPv6 over ATM.
TEXT BOOK
1. Ranier Handel, Manfred Huber N, Stefan Schrodder, ATM Networks-concepts,
protocols, applications, Adisson Wesley, New York, 3rd Edition, 1999.
REFERENCES
1. John Chiong A, Internetworking ATM for the internet and enterprise networks,
McGraw Hill, New York, 1998.
2. Achille Patavina, Switching Theory: Architectures and performance in Broadband
ATM Networks, John Wiley and Sons Ltd., New York.1998.
L T P C
CSE5116 INTERNET OF THINGS
3 0 0 3
UNIT I INTRODUCTION
Definitions and Functional Requirements Motivation Architecture - Web 3.0
View of IoTUbiquitous IoT Applications Four Pillars of IoT DNA of IoT - The
Toolkit Approach for End-userParticipation in the Internet of Things. Middleware
for IoT: Overview Communication middleware for IoT IoT Information Security
UNIT IV INTEGRATED
Integrated Billing Solutions in the Internet of Things Business Models for the
Internet of Things - Network Dynamics: Population Models Information
Cascades - Network Effects Network Dynamics: Structural Models - Cascading
Behavior in Networks - The Small-World Phenomenon
UNIT V APPLICATIONS
The Role of the Internet of Things for Increased Autonomy and Agility in
Collaborative Production Environments - Resource Management in the Internet
of Things: Clustering, Synchronisation and Software Agents. Applications - Smart
Grid Electrical Vehicle Charging
REFERENCES:
1. Honbo Zhou, The Internet of Things in the Cloud: A Middleware
Perspective, CRC Press, 2012.
2. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the
Internet of Things, Springer, 2011.
3. David Easley and Jon Kleinberg, Networks, Crowds, and Markets:
Reasoning About a Highly Connected World, Cambridge University Press
- 2010
4. Olivier Hersent, Omar Elloumi and David Boswarthick, The Internet of
Things: Applications to the Smart Grid and Building Automation, Wiley,
2012
5. Olivier Hersent, David Boswarthick, Omar Elloumi , The Internet of Things
Key applications and Protocols, Wiley, 2012
L T P C
CSE5117 MOBILE APPLICATION DEVELOPMENT
3 0 0 3
UNIT I INTRODUCTION
Preliminary Considerations Cost of Development Importnace of Mobile
Strategies in Business World Mobile Web Presence Mobile Applications
Marketing Web Services for Mobile Devices Creating Example Web Service _
Debugging Web Sevice
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
REFERENCES
L T P C
CSE6101 NETWORK FORENSICS
3 0 0 3
UNIT I INTRODUCTION
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
REFERENCES
L T P C
CSE6102 ENTERPRISE NETWORK DESIGN
3 0 0 3
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
TEXT BOOK
1. Tamara Dean, Network+ Guide to Networks , Course Technology, USA,
2010, 5th edition
2. Glen E. Clarke, CompTIA Network+ Certification Study Guide, Tata
McGraw Hill, 2009, 4th edition
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE6103 CONVERGENT NETWORKING
3 0 0 3
REFERENCES:
1. Scott Keagy, Integrating voice and data networks, Cisco press, 2000.
2. Kevin Wallace, Cisco Voice Over IP (CVoice), 3 rd edition 2009.
3. Denise Dano hue, David Mellory and Ken Salhoff, Cisco Voice Gateways
and Gate Keepers, Pearson education 2008.
4. Dennis Hartmann, Implementing Cisco Unified Communications Manager
Part I, Pearson Education, 2009.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE6104 STORAGE AREA NETWORKS
3 0 0 3
REFERENCES
1. EMC Corporation, Information Storage and Management, 1 st edition, Wiley
India, ISBN: 978-81-265-2147-0, 2009.
2. Additional resource material on www.emc.com/resource-library/resource-
library.esp
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
L T P C
CSE6105 SOFTWARE DEFINED NETWORKING
3 0 0 3
UNIT I INTRODUCTION
Introduction Centralised and Distributed Control and Data Planes Evolution
versus Revolution The Control Plane Data Plane Moving Information
between Planes Distributed Control Planes IP and MPLS Creating IP
Underlay Convergence Time Load Balancing High availability creating the
MPLS overlay Replication Centralised Control Planes ATM/LANE Route
Servers
UNIT V OPENFLOW
Introduction to OpenFlow Building Blocks OpenFlow Messages Northbound
Interface- Implementing OpenFlow Switch OpenFlow Reference Switch
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
REFERENCES :
UNIT I INTRODUCTION
Introduction and overview-Basic Terminology and Example Systems -Review of
Protocols and Packet Formats.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
TEXT BOOK
1. Comer D, Network Systems Design Using Network Processors, Intel
IXP1200
Version, Prentice Hall, 2003.
L T P C
CSE6107 AUTONOMIC NETWORKS
3 0 0 3
UNIT I INTRODUCTION
Introduction to Autonomic Concepts Applied to Future Self-Managed Networks
The need for Autonomic Systems Application of Autonomics to Computers
Autonomics Computing - From Autonomics Computing to Autonomics
Networking Autonomic Networking Design Principles From Autonomic
Networking to Autonomic Network Management.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014
REFERENCES:
L T P C
CSE6108 GREEN COMPUTING
3 0 0 3
UNIT I FUNDAMENTALS
Green IT Fundamentals: Business, IT, and the Environment Green computing:
carbon foot print, scoop on power Green IT Strategies: Drivers, Dimensions,
and Goals Environmentally Responsible Business: Policies, Practices, and
Metrics.
TEXT BOOKS:
1. Bhuvan Unhelkar, Green IT Strategies andApplications-Using
Environmental Intelligence, CRC Press, June 2011
2. Woody Leonhard, Katherrine Murray, Green Home computing for
dummies, August 2009.
REFERENCES:
1. Alin Gales, Michael Schaefer, Mike Ebbers, Green Data Center: steps for
the Journey, Shoff/IBM rebook, 2011.
2. John Lamb, The Greening of IT, Pearson Education,2009.
3. Jason Harris, Green Computing and Green IT-Best Practices on
regulations & industry, Lulu.com, 2008.
4. Carl Speshocky, Empowering Green Initiatives with IT, John Wiley & Sons,
2010.
5. Wu Chun Feng (editor), Green computing: Large Scale energy efficiency,
CRC Press, 2012
L T P C
CSE6109 CLOUD COMPUTING
3 0 0 3
UNIT I FOUNDATIONS
Introduction to Cloud Computing Roots of Cloud Computing Layers and
Types of Clouds Desired features of a Cloud - Challenges and Risks
Migration into a Cloud Seven step Model of Migration in to a Cloud Enriching
the Integrations as a Service Paradigm for the Cloud Era The Enterprise
Cloud Computing Paradigm.
REFERENCES :
1. Rajkumar Buyya, James Broberg and Andrej Goscinski, Cloud Computing
Principles and Paradigms, Wiley 2011
2. Borko Furht, Armando Escalante, Handbook of Cloud Computing,
Springer 2010
3. Michael Miller, Cloud Computing: Web-Based Applications That Change
the Way You Work and Collaborate Online, Que Publishing, August 2008.
4. Kumar Saurabh, Cloud Computing Insights into New Era Infrastructure,
Wiley Indian Edition,2011.
KALASALINGAM UNIVERSITY