M.tech Networking

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 38

M.

Tech Network Engineering Regulations -2014

KALASALINGAM UNIVERSITY
(Under Section 3 of UGC Act 1956)
Anand Nagar, Krishnankoil - 626 190
Srivilliputtur (Via), Virudhunagar (Dt), Tamil Nadu

CURRICULAM FOR THE M.TECH. DEGREE PROGRAMME IN


NETWORK ENGINEERING
Semester 1
Course Title
Code No. L T P C
MAT5101 Applied Mathematics 3 0 0 3
CSE5102 Web Service 3 0 0 3
CSE**** Elective I 3 0 0 3
CSE5103 Adhoc Wireless Networks 3 0 0 3
CSE5104 Secure Network System Design 3 0 0 3
CSE5105 Network Routing Protocols 3 0 0 3
CSE5181 Web Service Lab 0 0 3 1
CSE5182 Network Security Lab 0 0 3 1
Total 18 0 6 20

Semester 2

Code No. Course Title L T P C


CSE5106 Wireless Sensor Networks 3 0 0 3
CSE5107 Next Generation Networks 3 0 0 3
Simulation of Communicating systems and
CSE5108 3 0 0 3
Networks
CSE**** Elective II 3 0 0 3
CSE**** Elective III 3 0 0 3
CSE5109 Survivable Networks 3 0 0 3
CSE5183 Network Simulation Lab 0 0 3 1
Network Forensics, Testing and Monitoring
CSE5184 0 0 3 1
Lab

Total 18 0 6 20

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Semester 3

Code No. Course Title L T P C


CSE**** Elective IV 3 0 0 3
CSE**** Elective V 3 0 0 3
CSE**** Elective VI 3 0 0 3
CSE6198 Project Phase I 0 0 18 6
Total, 9 0 18 15

Semester 4

Code No. Course Title L T P C


CSE6199 Project Phase II 0 0 30 10

List of Electives for M.Tech (Network Engineering)

Code No. Course Title L T P C


CSE5110 Mobile and Pervasive Computing 3 0 0 3
CSE5111 Optical Networks 3 0 0 3
CSE5112 Multimedia Communication Networks 3 0 0 3
CSE5113 4G Technologies 3 0 0 3
CSE5114 Vehicular Ad Hoc Networks (VANETs) 3 0 0 3
CSE5115 High speed switching Architecture 3 0 0 3
CSE5116 Internet of Things 3 0 0 3
CSE5117 Mobile Application Development 3 0 0 3
CSE6101 Network Forensics 3 0 0 3
CSE6102 Enterprise Network Design 3 0 0 3
CSE6103 Convergent Networking 3 0 0 3
CSE6104 Storage Area Networks 3 0 0 3
CSE6105 Software Defined Networking 3 0 0 3
CSE6106 Network System Design using Network 3 0 0 3
Processors
CSE6107 Autonomic Networks 3 0 0 3
CSE6108 Green Computing 3 0 0 3
CSE6109 Cloud computing 3 0 0 3

L T P C
MAT5101 APPLIED MATHEMATICS
3 0 0 3

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

CLASSICAL OPTIMIZATION TECHNIQUES


Statement of optimization problem classification optimization technique -
Unconstrained Optimization Equality constraints Inequality constraints
Lagrange
Multiplier method Kuhn-Tucker Condition - Indirect search methods Gradient
of a
function Steepest descent method Conjugate gradient method Newtons
method.

LINEAR PROGRAMMING
Standard form of Linear programming problem definitions and theorems
Solution of
linear simultaneous equations Simplex algorithm graphical method Dual
simplex
method Transportation problem - Applications.

MATRIX THEORY
Matrix Norms - Jordan Canonical form Generalized Eigen vectors - Singular
Value
Decomposition - Pseudo Inverse - Least square Approximations QR Algorithm.

PROBABILITY AND RANDOM PROCESS


Probability - Random Process variables - Binomial, Poisson, Geometric, Uniform
Normal, Exponential Distributions - Moment generating functions and their
properties -
Functions of random variables.

QUEUING THEORY
Single and multiple server Markovian queuing models - Customer impatience-
Queuing
applications.

TEXT BOOK:
1. Singiresu S.Rao ,Engineering Optimization , New Age International (P) Ltd ,
2001
2. Gupta S.C. and Kapoor V.K. Fundamentals of Mathematical Statistics, sultan
Chand and sons , Newdelhi,2001
3. Lewis.D.W. Matrix Thoery, Allied Publishers, Chennai 1995

REFERENCES :
1. S.D.Sharma, Operations Research, Kedar Nath Ram Nath & co 2008.
2. M.K. Ochi., Applied Probability and Stochastic processes, John Wiley & sons
1992.
3. Bronson.R. Matrix operations , Schaums outline series , Tata Mcgraw Hill,
Newyork.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5102 WEB SERVICES
3 0 0 3

UNIT I DISTRIBUTED INFORMATION SYSTEMS AND MIDDLEWARE

Design of an Information System Architecture of an Information System


Communication in an Information System Understanding Middleware RPC
and Related Middleware TP Monitors Object Brokers Message oriented
Middleware.

UNIT II WEB TECHNOLOGIES

Exchanging information over the Internet Web Technologies for supporting


remote clients Application Servers Web Technologies for Application
Integration

UNIT III WEB SERVICES TECHNOLOGIES

Web Services Technologies Web Services Architecture SOAP : Simple Object


Access Protocol WSDL : Web Services Description Language UDDI:
Universal Description Discovery and Integration- Related Standards

UNIT IV SERVICE CO-ORDINATION PROTOCOLS

An Introduction to co-ordination protocols Infrastructure for co-ordination


Protocols WS Co-ordination WS Transactions RosettaNet Standards
related to co-ordination protocols

UNIT V SERVICE COMPOSITION

Basics of Service Composition A new chance of success for composition


Service Composition Models Dependencies between co-ordination and
composition BPEL : Business Process Execution language for web services
State of the Art in Web Services

REFERENCES:

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

1. Gystavo Alonso, Fabio Casasi, Hareemi Kuno, Vijay Machiraju, Web


Services Concepts, Architecture and Applications, Springer, 2004.
2. Ron Schmelzer et al, XML and Web Services, Pearson Education, 2002.
3. Sandeep Chatterjee and James Webber, Developing Enterprise Web
Services: An Architects Guide, Practice Hall, 2004.
4. Jorge Cardoso, Semantic Web Services, 2006.

L T P C
CSE5103 ADHOC WIRELESS NETWORKS
3 0 0 3

UNIT I INTRODUCTION & MAC PROTOCOLS


Ad Hoc Wireless Networks Issues. MAC protocols for ad hoc Wireless Networks:
Issues, Classification of MAC Protocols, Contention Based protocols, Contention-
Based Protocols with Reservation Mechanisms, Contention-Based MAC
Protocols with scheduling Mechanisms, MAC Protocols that use Directional
Antennas.

UNIT II ROUTING PROTOCOLS


Classifications, Table Driven, On-Demand, Hybrid and Hierarchical Routing
Protocols, Routing Protocols with efficient Flooding mechanism, Power aware
Routing Protocols. Operation of Multicast Routing Protocols, Energy efficient
Multicasting and Multicasting with QoS guarantees.

UNIT III TRANSPORT LAYER AND SECURITY PROTOCOLS


Introduction, Issues, Design Goals, Classification of Transport Layer Solutions,
TCP over Ad Hoc Wireless Networks, Other Transport Layer Protocols, Security
in Ad Hoc Wireless Networks, Secure Routing in Ad Hoc wireless Networks.

UNIT IV QOS
Introduction, Issues and Chal lenges, Classifications of QoS Solutions, MAC
Layer Solutions, Network Layer Solutions, QoS Frameworks for Ad Hoc Wireless
Networks

UNIT V ENERGY MANAGEMENT


Introduction, Need for Energy Management, Classification of Energy
Management Schemes, Battery Management Schemes, Transmission Power
Management Schemes, System Power Management Schemes

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

TEXT BOOK
1. Siva Ram Murthy C, Manoj B.S., Ad Hoc Wireless Networks: Architectures
and Protocols, Prentice Hall, 2005.

REFERENCES
1. Chai-Keong Toh, Ad Hoc Mobile Wireless Networks, PHI, 2002.
2. Charles Perkins, Ad Hoc Networking, Addison Wesley, 2001.
3. Mohammed Liyas, Handbook of Ad Hoc Wireless Networks, CRC Press,
2003.

L T P C
CSE5104 SECURE NETWORK SYSTEM DESIGN
3 0 0 3

UNIT I NETWORK SECURITY FOUNDATIONS

Secure network design through modeling and simulation, A fundamental


framework for network security, need for user level security on demand, Network
Security Axioms, security policies and operations life cycle, security networking
threats, network security technologies, general and identity design
considerations, network security platform options and best deployment practices,
secure network management and network security management.

UNIT II IDENTIFYING SYSTEM DESIGNERS NEEDS AND GOALS

Evolution of network security and lessons learned from history, Analyzing top-
down network design methodologies, technical goals and tradeoffs scalability,
reliability, availability, Network performance, security, Characterizing the existing
internetwork, characterizing network traffic, developing network security
strategies.

UNIT III PHYSICAL SECURITY ISSUES AND LAYER-2 SECURITY


CONSIDERATIONS

Control physical access to facilities, Control physical access to data centers,


Separate identity mechanisms for insecure locations, Prevent password-recovery
mechanisms in insecure locations, awareness about cable plant issues,
electromagnetic radiation and physical PC security threats, L2 control protocols,
MAC flooding considerations, attack mitigations, VLAN hopping attacks, ARP,
DHCP, PVLAN security considerations, L2 best practice policies.

UNIT IV IP ADDRESSING AND ROUTING DESIGN CONSIDERATIONS


KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Route summarizations, ingress and egress filtering, Non routable networks,


ICMP traffic
management, Routing protocol security, Routing protocol authentication,
transport protocol management policies, Network DoS/flooding attacks.

UNIT V TESTING AND OPTIMIZING SYSTEM DESIGN

Selecting technologies and devices for network design, testing network design
using industry tests, building a prototype network system, writing and
implementing test plan, tools for testing, optimizing network design network
performance to meet quality of service (QoS), Modeling, simulation and behavior
analysis of security attacks, future issues in information system security.

REFERENCES:

1. Sumit Ghosh, Principles of Secure Network System Design, Springer-


Verlag, NY,2002. (UNIT I)
2. Sean Convery, Network Security Architecture, Cisco Press, 2004.(UNIT III
& IV)
3. Priscilla Oppenheimer, Top-Down Network Design, Third edition, Cisco
Press, 2012. (UNIT II & V).
4. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems
Approach, Fourth Edition, Morgan Kauffmann Publishers Inc., 2009,
Elsevier.
5. William Stallings, Cryptography and Network security Principles and
Practices, Pearson / PHI, 4th edition, 2006.
6. Wade Trappe, Lawrence C Washington, Introduction to Cryptography with
Coding Theory, 2nd edition, Pearson, 2007.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5105 NETWORK ROUTING PROTOCOLS
3 0 0 3

UNIT I ROUTER ARCHITECTURE


Functions of Router Types Elements Packet Flow Packet Processing
Router Architectures, IP Address Lookup Algorithms- Impact of Addressing on
Lookup- Longest Prefix Matching Nave algorithms Binary Tries Multibit
Tries.

UNIT II NETWORK ROUTING: BASICS AND FOUNDATIONS


Networking and Network Routing: An Introduction, Routing algorithms: Shortest
path and widest path Bellman Ford algorithm and distance vector approach
Dijikstras algorithm-comparison widest path algorithm shortest and widest
path computation k-shortest path algorithms, Routing Protocols: Framework
and Principles.

UNIT III ROUTING IN IP NETWORKS


IP Routing and Distance Vector Protocol Family Routers, Networks, and
Routing information Basics static Routes - RIP v1,v2 - IGRP EIGRP Route
Redistribution, OSPF and integrated IS-IS Features Packet Format
examples Integrated IS-IS, similarities and differences between OSPF and IS-
IS, IP Traffic Engineering, BGP, Internet Routing Architectures

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

UNIT IV MANET ROUTING


Internet based mobile ad-hoc networking, communication strategies,
classification of MANET routing algorithms Destination sequenced Distance
Vector (DSDV), Dynamic source Routing (DSR), Ad-hoc on demand Distance
Vector (AODV) & Temporarily Ordered Routing algorithm (TORA).

UNIT V NEXT GENERATION ROUTING


Quality of Service Routing Attributes Adapting shortest path and widest path
routing Update Frequency, Information Accuracy and impact on routing
Heterogeneous Service, Single-Link case Source based QoS routing Routing
protocols for QoS Routing , MPLS , Routing and Traffic Engineering with MPLS-
Advanced topics : Packet Queuing and Scheduling, Traffic Conditioning,

TEXT BOOK
1. D.Medhi and K.Ramasamy, Network Routing : Algorithms, Protocols
and
Architectures, Morgan Kaufmann Publishers, 2007.

REFERENCES
1. Steen Strub M, Routing in Communication networks, Prentice Hall
International ,
New York, 1995
2. C.Siva Ram Murthy and B.S.Manoj, Adhoc Wireless Networks,
Pearson
Education, 2007.
3. Internetworking Technologies Handbook, Inc. Cisco Systems, ILSG
Cisco
Systems, 4th Edition , 2003

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5181 WEB SERVICE LAB
0 0 3 1

LIST OF EXPERIMENTS

1. Write a program to implement WSDL Service (Hello Service . WSDL File)


2. Write a program the service provider that can implement a single get
price(), static bind() and get product ()operation.
3. Write a program to implement the operation can receive request and will
return a response in two ways.
i. One - Way operation
ii. Request - Response
4. Write a program to implement to create a simple web service that converts
the temperature from Fahrenheit to Celsius (using HTTP Post Protocol)
5. Write a program to implement business UDDI Registry entry
6. Write a program to implement
i. Web based service consumer
ii. Windows application based web service consumer
7. Create a web service for temperature conversion with appropriate client
program.
8. Create a web service for currency conversion (at five currencies) with
appropriate client program.
9. Create a WinForms client application that communicates with Google's
web service to perform searches and display the results

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5182 NETWORK SECURITY LAB
0 0 3 1

List of Experiments

1. Implementation of Symmetric Encryption algorithms using c or c++.


2. Implement MD5/SHA algorithm.
3. Study of packet capturing and analyzer tools like ethereal, snort and etc.
4. Working with Sniffers for monitoring network communication (Ethereal)
5. Using IP TABLES on Linux and setting the filtering rules
6. Password guessing and Password Cracking.
7. Configure a firewall to block the following for 5 minutes and verify the
correctness of this system using the configured parameters:
(a) Two neighborhood IP addresses on your LAN
(b) All ICMP requests
(c) All TCP SYN Packets

8. Configuration of Proxy Server


9. Configuring Virtual Private Network Over WAN
10. Implementation of email security using PGP

CSE5106 WIRELESS SENSOR NETWORKS L T P C

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

3 0 0 3

UNIT I INTRODUCTION

Introduction Sensor Mote Platforms WSN Architecture and Protocol Stack


WSN Applications Military Applications Environmental Applications Health
Applications Home Applications Industrial Applications Factors Influencing
WSN Design

UNIT II PHYSICAL LAYER AND MEDIA ACCESS CONTROL

Physical Layer Technologies Overview of RF Wireless Communication


Channel Coding Modulation Wireless Channel Effects Physical Layer
Standards Media Access Control Challenges for MAC CSMA Contention
based Media Access Reservation Based Media Access Hybrid Media Access.

UNIT III NETWORK LAYER AND TRANSPORTATION LAYER

Challenges for routing Data Centric and Flat Architecture Protocols


Hierarchical Protocols Geographical Routing Protocols QoS Based Protocols
Transport Layer Challenges for Transport Layer Pump Slowly, Fetch
Quickly Protocol Congestion Detection and Avoidance (CODA) Protocol.

UNIT IV TIME SYNCHRONISATION AND LOCALISATION

Challenges for Time Synchronisation - Network Time Protocol Time Sync


Protocol for Sensor Networks (TPSN) Reference Broadcast Synchronisation
(RBS) Localisation Challenges in localization Ranging Techniques Range
based localization Protocol Range Free Localisation Protocol.

UNIT V RECENT TRENDS

Security Issues in WSN Wireless Sensor and Actor Networks Wireless


Multimedia Sensor Networks Wireless Underwater Sensor Networks Wireless
Underground Sensor Networks.

REFERENCES:

1. Ian F. Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks, Wiley
2010.
2. Jun Zheng and Abbas Jamalipour, Wireless Sensor Networks A
Networking Perspective, Wiley 2009.
3. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless
Sensor Networks, Wiley 2005.
4. Ivon Stojmenovic, Hand Book of Sensor Networks Algorithms and
Architectures, Wiley ,2005.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5107 NEXT GENERATION NETWORKS
3 0 0 3

UNIT I INTRODUCTION

Next Generation Networks (NGN) Vision, Scenarios and Advances NGN


Networks : Perspectives and Advances Some Possible Scenarios Virtual
International Congress Virtual Class Rooms e-Education and Experimental
Laboratory Virtual Home Home Networks Automatic Traffic and Car Driving
NGN Requirements on Technology and Management.

UNIT II NGN FUNCTIONAL ARCHITECTURE

ITU NGN Functional Architecture Proposed NGN Functional Architecture


NGN Network Operator NGN Network Service Provider NGN Customer and
CTE Network and Service Evaluation towards NGN- Fixed Network Evaluation
Mobile Network Evaluation Internet Evaluation

UNIT III NGN KEY DEVELOPMENT AREAS

Terminal Area Access Network Area Backhaul Network Area Core Transport
Network Area Service Creation Area Network Control and Managerial Area
Service Control and Management Advanced Technologies for Network and
Service Management.

UNIT IV NGN STANDARDIZATION

ITU and GSI NGN ETSI and TISPAN - NGN ATIS and NGN CJA and NGN -
TMF and NGOSS, NGMN Alliance and NGMN - 3GPP and LTE/SAE NGMN
Alliance and NGMN, 3GPP and LTE/SAE

UNIT V NEXT GENERATION WIRELESS LANS

An overview of IEEE 802.11 History of high throughput and 802.11 n-


Environments and applications of 802.11 n Major features of 802.11 n
Orthogonal Frequency Division Multiplexing MIMO/SDM Basics Physical
Interoperability with 11 a/g legacy OFDM device High Throughput and Robust
Performance

REFERENCES:
1. Jingming Li Salina and Pascal Salina, Next Generation Networks,
Prospective and Potentials , John Wiley and Sons, 2007.
2. Thomas Plavyk, Next generation Telecommunication Networks, Services
and Management, Wiley & IEEE Press Publications, 2012.
3. Eldad Perahia and Robert Stacey, Next Generation Wireless LANs,
Cambridge University Press, 2008.
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

4. Monique J. Morrow, Next Generation Networks, CISCO Press, 2007.

SIMULATION OF COMMUNICATING SYSTEMS L T P C


CSE5108
AND NETWORKS 3 0 0 3

UNIT I NTRODUCTION TO NETWORK SIMULATION


Simulation of Computer Networks - Introduction to Network Simulator Linkage
between OTcl and C++ in NS2

UNIT II SIMULATION CONCEPTS OF NS2


Implementation of Discrete-Event Simulation Network Objects: Creation,
Configuration, and Packet Forwarding

UNIT III NS2 MODULES


Nodes as Routers or Computer Hosts - Link and Buffer Management - Packets,
Packet Headers, and Header Format - Transport Control Protocols, TCP, UDP -
Application: User Demand Indicator

UNIT IV HELPER MODULES


Related Helper Classes, Timers, Random numbers, Built-in error models, Bit
operations of NS2 - Processing an NS2 Simulation: Debugging, Tracing, and
Result Compilation

UNIT V MODULE DEVELOPMENT


Developing New Modules for NS2, ARQ, Packet Scheduling for Multi-Flow Data
Transmission - AWK Programming Trace file analysis using awk scripts

TEXT BOOK
1. Teerawat Issariyakul, Ekram Hossain, Introduction to Network Simulator
NS2, Springer, 2009.

REFERENCES

1. Jeruchim M.C,PhilipBalabanand Sam Shanmugam S,Simulation of


communications systems ,PlenumPress, New York, 2004
2 Law A.M and David Kelton W, Simulation Modelling and analysis, Mc
GrawHill Inc., New York , 2003
3. Hayes J.F, Modelling and Analysis of Computer Communication networks,
Plenum Press, New York, 1984

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5109 SURVIVABLE NETWORKS
3 0 0 3

UNIT I INTRODUCTION
Network Continuity Define Survival In defense of Paranoia By the Numbers
Plan to Survive Choice Versus Chance - Tactics of Mistakes TCP/IP
Probes Viruses Worms Trojan Horses Denial of Service /Distributed DoS
Sample Attack

UNIT II VULNERABILITIES
System Complexity Top General Vulnerabilities Top Windows Vulnerabilities
Top Unix Vulnerabilities Common Threads Design your Way out of Trouble
Defense in depth Olive Drab Networks Converged Networks Operator
Error - Lessons from Failure Lessons from Success

UNIT III PLAN FOR SURVIVABLE NETWORKS AND DISASTERS


Three main points Operational Continuity Getting the People out Data
Services Example Topology Facilities Configuration Control Unnatural
Disasters Physical Attacks Cyber Attacks Combine Attacks unnatural
disasters (Un-intentional) Unfortunate Opportunities Unfortunate Planning
Unfortunate Implementation

UNIT IV PREPARING FOR DISASTER


Survival requirements Network Continuity Requirements Threat Analysis
Operational Analysis Survival Planning Fixes Remedies Procedures
Survivability Today Data Currency Trade Offs

UNIT V RECOVERY AND BUSINESS CASE


Cyber Recovery Operational Procedures Forensic Procedures Physical
Discovery Restoration Rehearsal Evolution - Business Case
Understanding the Cost Understanding the Revenues Expected values
Presenting your case CDG Example Necessity Catastrophes happen
Your Recovery Trade Offs

REFERENCES

1. Annlee Hines, Planning for Survivable Networks: Ensuring Business


Continuity, Wiley Publishing, 2002.
2. Mechthild Stoer, Design of Survivable Networks, Springer Verlag 1992.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

3. R. Bhandari, Survivable Networks Algorithms for Diverse Routing,


Springer, 1999.
4. Ibrahima Diarrassouba, Survivable Network Design Problems with High
Connectivity Requirement: Optimization Models and Exact Algorithms,
Lambert Academic Publishing, 2012.

L T P C
CSE5183 NETWORK SIMULATION LAB
0 0 3 1

LIST OF EXPERIMENTS:

I. STUDY OF GLOMOSIM AND NS 2 SIMULATORS

II. SIMULATION USING GLOMOSIM


1. Simulate Ad hoc network using AODV protocol.
2. Simulate Ad hoc network using DSDV protocol.
3. Simulate Ad hoc network using DSR protocol.

III .SIMULATION USING NETWORK SIMULATOR -2


1. Simulate Ad hoc network using AODV protocol.
2. Simulate Ad hoc network using DSDV protocol.
3. Simulate Ad hoc network using DSR protocol.
4. Simulate a MPLS network using LDP protocol.
5. Simulate a MPLS network for differentiated Services.
6. Simulate a Random number Generators
7. Simulate a MPLS network providing alternate LSPs under protection
scheme.

IV. POST TRACE ANALYSIS USING PERL AND AWK SCRIPTS

V. PERFORMANCE ANALYSIS BY PLOTTING GRAPHS USING XGRAPH


AND GNUPLOT

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

NETWORK FORENSICS, TESTING AND L T P C


CSE5184
MONITORING LAB 0 0 3 3

LIST OF EXPERIMENTS
Network Forensics
1. Intrusion detection
2. Logging (the best way to track down a hacker is to keep vast records
of activity on a network with the help of an intrusion detection system)
3. Correlating intrusion detection and logging

Testing and Monitoring


1. IP Monitoring
2. Network management using Cisco Works
3. Network protocol analysis
4. Network Traffic Engineering
5. Network Delay analysis
6. Troubleshooting basic network problems (IP configuration, NIC)
7. Bandwidth Measuring/Monitoring/Engineering
8. Network Hacker Monitoring
9. Enterprise Management using Tivoli - Net View
10. Use of Network Monitoring/testing Tools

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5110 MOBILE AND PERVASIVE COMPUTING
3 0 0 3

UNIT I INTRODUCTION
Differences between Mobile Communication and Mobile Computing Contexts
and Names Functions Applications and Services New Applications
Making Legacy Applications Mobile Enabled Design Considerations
Integration of Wireless and Wired Networks Standards Bodies Pervasive
Computing Basics and Vision Principles of Pervasive Computing
Categories of Pervasive Devices.

UNIT II 3G AND 4G CELLULAR NETWORKS


Migration to 3G Networks IMT 2000 and UMTS UMTS Architecture User
Equipment Radio Network Subsystem UTRAN Node B RNC functions
USIM Protocol Stack CS and PS Domains IMS Architecture Handover
3.5G and 3.9G a brief discussion 4G LAN and Cellular Networks LTE
Control Plane NAS and RRC User Plane PDCP, RLC and MAC WiMax
IEEE 802.16d/e WiMax Internetworking with 3GPP

UNIT III SENSOR AND MESH NETWORKS


Sensor Networks Role in Pervasive Computing In Network Processing and
Data Dissemination Sensor Databases Data Management in Wireless
Mobile Environments Wireless Mesh Networks Architecture Mesh Routers
Mesh Clients Routing Cross Layer Approach Security Aspects of Various
Layers in WMN Applications of Sensor and Mesh networks

UNIT IV CONTEXT AWARE COMPUTING & WEARABLE COMPUTING


Adaptability Mechanisms for Adaptation - Functionality and Data Transcoding
Location Aware Computing Location Representation Localization
Techniques Triangulation and Scene Analysis Delaunay Triangulation and
Voronoi graphs Types of Context Role of Mobile Middleware Adaptation
and Agents Service Discovery Middleware Health BAN- Medical and
Technological Requirements-Wearable Sensors-Intra-BAN communications

UNIT V APPLICATION DEVELOPMENT


KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Three tier architecture - Model View Controller Architecture - Memory


Management Information Access Devices PDAs and Smart Phones Smart
Cards and Embedded Controls J2ME Programming for CLDC GUI in MIDP
Application Development ON Android and iPhone

REFERENCES:
1. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, Mobile Computing:
Technology, Applications and Service Creation, 2 nd edition, Tata McGraw Hill,
2010.
2. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
3. Pei Zheng and Lionel M Li, Smart Phone & Next Generation Mobile
Computing, Morgan Kaufmann Publishers, 2006.
4. Frank Adelstein, Fundamentals of Mobile and Pervasive Computing, TMH,
2005
5. Jochen Burthardt et al, Pervasive Computing: Technology and Architecture of
Mobile Internet Applications, Pearson Education, 2003
6. Feng Zhao and Leonidas Guibas, Wireless Sensor Networks, Morgan
Kaufmann Publishers, 2004
7. Uwe Hansmaan et al, Principles of Mobile Computing, Springer, 2003
8. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
9. Mohammad s. Obaidat et al, Pervasive Computing and Networking, John wiley
10. Stefan Poslad, Ubiquitous Computing: Smart Devices, Environments and
Interactions, Wiley, 2009
11. Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert
Fundamentals of Mobile and Pervasive Computing, McGraw-Hill, 2005

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5111 OPTICAL NETWORKS
3 0 0 3

UNIT I OPTICAL NETWORK TECHNOLOGY AND COMPONENTS


Circuit Switching-Packet Switching-Optical Networks-Optical Layers-Optical
Packet Switching-Transmission Basis Propagation of Signals in Optical Fiber-
Modulation and Demodulation formats. Couplers, Isolators & Circulators,
Multiplexers & Filters, Optical Amplifiers, Switches, Wavelength Converters.

UNIT II OPTICAL NETWORKS ARCHITECTURES


SONET/SDH: Multiplexing- Layers-Frame Structure-Elements of SONET/SDH
Infrastructure- ATM: Functions-Adaptation Layer-QOS-Flow Control- Signaling
and Routing, IP: Routing and Forwarding- QOS- MPLS, SAN: ESCON- Fiber
Channel- HIPPI

UNIT III WDM NETWORK DESIGN


WDM Network Elements: Line Terminal- Line Amplifier- OXC and its
configuration, WDM Network Design: Cost Trade Offs LTD and RWA Problem-
Dimensioning Wave Length Routing Network- Statistical and Maximum Load
Dimensioning Model.

UNIT IV ADVANCED OPTICAL NETWORKS


Access Network: Overview- HFC- FTTC, Photonic Packet Switching:
OTDMSynchronization- Buffering-Header processing- Burst Switching- NTTs
Optical ATM switches-AON-CORD, Long- Haul Networks- Long- Haul Network
Case Study- Long- Haul Undersea Networks- Metro Networks- Metro Ring Case
Study.

UNIT V OPTICAL NETWORK DESIGN AND MANAGEMENT


KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Transmission System Engineering: Power penalty- Gain Saturation and


Equalization in EDFA- Power Transient and Automatic Control-Cross Talk-
Dispersion- Wave Length Stabilization- Fiber Non linearities- Soliton system-
over all design Consideration. Control and Management Network management
functions, Configuration management, Performance management, Fault management,
Optical safety, Service interface.

TEXT BOOK
1. Ramaswami .R and Sivarajan .K, Optical Networks: A Practical
Perspective, Morgan Kaufmann, 3rd Edition, 2009.

REFERENCES:
1. Stern T.E and Bala K, Multiwave length Optical Networks: A Layered
Approach, Addison-Wesley.
2. Agarwal G.P, Fiber-Optic Communication Systems, John Wiley and
Sons

L T P C
CSE5112 MULTIMEDIA COMMUNICATION NETWORKS
3 0 0 3

UNIT I MULTIMEDIA COMMUNICATION MODELS


Architecture of Internet Multimedia Communication- Protocol Stack-
Requirements and Design challenges of multimedia communications- Multimedia
distribution models Unicasting, Broadcasting and Multicasting.

UNIT II GUARANTEED SERVICE MODEL


Multicast routing-PIM- Best effort service model and its limitations- QoS and its
metrics-Queuing techniques-WFQ and its variants-RED-QoS aware routing -Call
Admission Control-RSVP- Policing and Traffic Shaping algorithms- QoS
architectures.

UNIT III MULTIMEDIA TRANSPORT


End to end solutions-Multimedia over TCP-Significance of UDP- Multimedia
Streaming- Audio and Video Streaming-Interactive and non Interactive
Multimedia- RTSP- RTP/RTCP SIP-H.263.

UNIT IV MULTIMEDIA OVER WIRELESS NETWORKS


End to end QoS Provisioning-QoS enhancements-Call Admission Control-QoS
Management-Multimedia support in 3G & 4G networks- Location Based
Multimedia Service System.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

UNIT V MULTIMEDIA NETWORK SECURITY AND APPLICATIONS


Security threats in Multimedia Communication- Digital Rights Management
Architecture-DRM for Mobile Multimedia- Architectures, Requirements and
Design Challenges of real time Multimedia Network Applications- Case Study-
VoIP- Video Conferencing- Military Surveillance- Interactive TVVideo on
Demand- Smart Phone.

REFERENCES:

1. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, Introduction to


Multimedia
Communications Applications, Middleware, Networking, John Wiley and Sons,
2006.
2. Jean Warland, Pravin Vareya, High Performance Networks, Morgan Kauffman
Publishers, 2002.
3. William Stallings, High Speed Networks and Internets Performance and
Quality of Service, 2nd Edition, Pearson Education, 2002.
4. Aura Ganz, Zvi Ganz, Kitti Wongthawaravat, Multimedia Wireless Networks
Technologies, Standards and QoS, Prentice Hall, 2003.
5. Mahbub Hassan and Raj Jain, High Performance TCP/IP Networking, Pearson
Education, 2004
6. Shiguo Lian, Multimedia Communication Security Recent Advances, Nova
Science Publishers, 2008.

L T P C
CSE5113 4G TECHNOLOGIES
3 0 0 3

UNIT I INTRODUCTION
Introduction: History of mobile cellular systems, First Generation, Second
Generation, Generation 2.5, Overview of 3G & 4G, 3GPP and 3GPP2 standards

UNIT II 3G NETWORKS
3G Networks: Evolution from GSM, 3G Services & Applications, UMTS network
structure, Core network, UMTS Radio access, HSPA HSUPA, HSDPA, CDMA
1X , EVDO Rev -0, Rev-A, Rev-B, Rev-C Architecture, protocol stack.

UNIT III 4G LTE NETWORKS


4G Vision, 4G features and challenges, Applications of 4G, 4G Technologies
Multi carrier modulation, Smart Antenna Techniques, OFDM-MIMO Systems,
Adaptive Modulation and Coding with Time-Slot Scheduler, Bell Labs Layered
Space Time (BLAST) System, Software-Defined Radio,Cognitive Radio.

UNIT IV WiMAX NETWORKS


WiMax: Introduction IEEE 802.16, OFDM, MIMO, IEEE 802.20
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

UNIT V SPECTRUM & PERFORMANCE


Spectrum for LTE-Flexibility-Carrier Aggregation-Multi standard Radio base
stations-RF requirements for LTE-Power level requirements-Emission
requirements-Sensitivity and Dynamic range-Receiver susceptibility.
Performance Assessment-Performance Evaluation

REFERENCES:

1. Juha Korhonen, Artech House, Introduction to 3G Mobile Communication, Jan


2003, ISBN-10: 1580535070.
2. Erik Dahlman, Stefan Parkvall, Johan Skold, 4G LTE/LTE Advanced for
Mobile Broadband, , Academic Press, 2011.
3. Erik Dahlman, Stefan Parkvall, Johan Skold and Per Beming, 3G Evolution
HSPA and LTE for Mobile Broadband, Academic Press, Oct 2008, ISBN-10:
0123745381.
4. Flavio Muratore, UMTS Mobile Communication for the Future, John Wiley &
Sons Ltd, Jan 2001, ISBN-10: 0471498297
5. Harri Holma and Antti Toskala, HSDPA/HSUPA for UMTS, Johan Wiley & Sons
Ltd, May 2006, ISBN-10: 0470018844
6. Savo G.Glisic, Advanced Wireless Networks- 4GTechnologies, Wiley, 2006
7. Magnus Olsson, Catherine Mulligan, EPC and 4G packet network, Elsevier
2012
8. Vijay Garg, Wireless Communications and Networking, Elsevier, Morgan
kufmann publisher 2007.

L T P C
CSE5114 VEHICULAR ADHOC NETWORKS (VANETS)
3 0 0 3

UNIT I INTRODUCTION TO VANETS


Infrastructure in Vehicular Communications : Status, Challenges and
Perspectives Architecture of Vehicular Ad Hoc Networks Traffic Engineering
Traffic Monitoring Models for Traffic Flow and Vehicle Motion Co-operative
Vehicular Safety Applications Enabling Technologies Co-operative System
Architectures Mapping for Safety Applications- VANET enabled Active Safety
Applications

UNIT II INFORMATION DISSEMINATION AND MOBILITY MODELING IN


VANETS
Introduction Obtaining Local Measurements Information Transport
Protocols for Information Transport Improving Network Connectivity What to
Transport Summarising Measurements Geographical Data Aggregation
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

VANET Convenience and Efficiency Applications Vehicular Mobility Modeling for


VANET Flow Models Traffic Models Behavioral Models Trace or Survey
based Models Integration with Network Simulators

UNIT III PHYSICAL LAYER AND MAC LAYER FOR VEHICULAR


COMMUNICATIONS
Wireless Propagation Theory Channel Metrics Measurement Theory
Empirical Channel Characterisation at 5.9 GHz MAC Layer and Scalability
Aspects of Vehicular Communication Networks Communication based on IEEE
802.11 p Performance Evaluation and Modeling Aspects of Congestion
Control

UNIT IV APPLICATION LEVEL MESSAGE CODING AND


COMPOSITIONS
Introduction to Application Environment Safety Applications and data
requirements Desirable Architectural features Broadcast Characteristics
Message Dispatcher Data element dictionary Message Construction
Example Applications Emergency brake warning Intersection violation
warning - Data sets Predictive coding Architecture Analysis

UNIT V DATA SECURITY AND STANDARDS IN VEHICULAR


COMMUNICATION NETWORKS
Challenges of Data Security in Vehicular Networks Network, Applications, and
Adversarial Model Network Model Application Model Attacker Model
Security Infrastructure Cryptographic Protocols Privacy Protection
Mechanisms Implementation Aspects Standards and Regulations Layered
architecture for VANETs DSRC Regulstions DSRC Physical Layer and Middle
Layers DSRC Message Sub layer.

REFERENCES :
1. Hannes Hartenstein and Kenneth P Laberteaux, VANET Vehicular
Applications and Inter-Networking Technologies, Wiley 2010
2. Mohamed Watfa, Advances in Vehicular Ad-Hoc Networks: Developments
and Challenges, Information Science Reference , 2010
3. Stephan Olariu, Michele C. Weigle Vehicular Networks: From Theory to
Practice, Chapman and Hall/CRC , 2009

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE5115 HIGH SPEED SWITCHING ARCHITECTURE
3 0 0 3

UNIT I HIGH SPEED NETWORK


LAN and WAN network evolution through ISDN to BISDN - Transfer mode and control
of BISDN - SDH multiplexing structure - ATM standard , ATM adaptation layers.

UNIT II LAN SWITCHING TECHNOLOGY


Switching concepts; Switch forwarding techniques; switch path control - LAN switching;
cut through forwarding; store and forward - virtual LANs.

UNIT III ATM SWITCHING ARCHITECTURE

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Switch models - Blocking networks basic and enhanced banyan networks - sorting
networks merge sorting - rearrange able networks - full and partial connection networks
- nonblocking networks recursive network construction and comparison of non-
blocking network - switches with deflection routing shuffle switch - tandem banyan.

UNIT IV QUEUES IN ATM SWITCHES


Internal queuing Input, output and shared queuing - multiple queuing networks
combined input, output and shared queuing performance analysis of queued switches.

UNIT V IP SWITCHING
Addressing mode - IP switching types-flow driven and topology driven solutions - IP
Over ATM address and next hop resolution multicasting - IPv6 over ATM.

TEXT BOOK
1. Ranier Handel, Manfred Huber N, Stefan Schrodder, ATM Networks-concepts,
protocols, applications, Adisson Wesley, New York, 3rd Edition, 1999.

REFERENCES
1. John Chiong A, Internetworking ATM for the internet and enterprise networks,
McGraw Hill, New York, 1998.
2. Achille Patavina, Switching Theory: Architectures and performance in Broadband
ATM Networks, John Wiley and Sons Ltd., New York.1998.

L T P C
CSE5116 INTERNET OF THINGS
3 0 0 3

UNIT I INTRODUCTION
Definitions and Functional Requirements Motivation Architecture - Web 3.0
View of IoTUbiquitous IoT Applications Four Pillars of IoT DNA of IoT - The
Toolkit Approach for End-userParticipation in the Internet of Things. Middleware
for IoT: Overview Communication middleware for IoT IoT Information Security

UNIT II IOT PROTOCOLS


Protocol Standardization for IoT Efforts M2M and WSN Protocols SCADA
and RFID Protocols Issues with IoT Standardization Unified Data Standards
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Protocols IEEE 802.15.4 BACNet Protocol Modbus KNX Zigbee


Architecture Network layer APS layer Security

UNIT III WEB OF THINGS


Web of Things versus Internet of Things Two Pillars of the Web Architecture
Standardization for WoT Platform Middleware for WoT Unified Multitier WoT
Architecture WoT Portals and Business Intelligence. Cloud of Things: Grid/SOA
and Cloud Computing Cloud Middleware Cloud Standards Cloud Providers
and Systems Mobile Cloud Computing The Cloud of Things Architecture

UNIT IV INTEGRATED
Integrated Billing Solutions in the Internet of Things Business Models for the
Internet of Things - Network Dynamics: Population Models Information
Cascades - Network Effects Network Dynamics: Structural Models - Cascading
Behavior in Networks - The Small-World Phenomenon

UNIT V APPLICATIONS
The Role of the Internet of Things for Increased Autonomy and Agility in
Collaborative Production Environments - Resource Management in the Internet
of Things: Clustering, Synchronisation and Software Agents. Applications - Smart
Grid Electrical Vehicle Charging

REFERENCES:
1. Honbo Zhou, The Internet of Things in the Cloud: A Middleware
Perspective, CRC Press, 2012.
2. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the
Internet of Things, Springer, 2011.
3. David Easley and Jon Kleinberg, Networks, Crowds, and Markets:
Reasoning About a Highly Connected World, Cambridge University Press
- 2010
4. Olivier Hersent, Omar Elloumi and David Boswarthick, The Internet of
Things: Applications to the Smart Grid and Building Automation, Wiley,
2012
5. Olivier Hersent, David Boswarthick, Omar Elloumi , The Internet of Things
Key applications and Protocols, Wiley, 2012

L T P C
CSE5117 MOBILE APPLICATION DEVELOPMENT
3 0 0 3

UNIT I INTRODUCTION
Preliminary Considerations Cost of Development Importnace of Mobile
Strategies in Business World Mobile Web Presence Mobile Applications
Marketing Web Services for Mobile Devices Creating Example Web Service _
Debugging Web Sevice

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

UNIT II MOBILE USER INTERFACE DESIGN


Effective Use of Screen Real Estate Understanding Mobile Application Users
Understanding Mobile Information Design Understanding Mobile Platforms
Using the Tools for Mobile Interface Design Choosing a Mobile Web Option
Adaptive Mobile Website Mobile Web Applications with HTML 5

UNIT III ANDROID APPLICATION DEVELOPMENT


Getting to know the Android User Interfaces Designing Your User interface
using Views Displaying Pictures and Menus with Views Using Image views to
Display pictures Using menus with views Data Persistence Saving and
loading user performances - Persisting data to files Creating and using Data
bases Content Providers.

UNIT IV ANDROID MESSAGING, NETWORKING, LOCATION BASED


SERVICES
SMS Messaging, Sending E-mail Networking Downloading Binary Data, Text
Files- Accessing Web Services Performing Asynchronous Calls Location
Based Services Displaying Maps Getting Location Data Creating your own
services Communicating between a service and an activity Binding activities
to Services

UNIT V IOS AND WINDOWS PHONE


Getting started with iOS iOS Project Debugging iOS Apps Objective C
Basics Hello Word App Building the derby app in iOS Windows Phone 7
Project Building Derby App in Windows Phone 7.

REFERENCES

1. Jeff McWherter and Scott Gowell, Professional Mobile Application


Development, Wrox 2012.
2. Wei Meng Lee, Beginning Android Application Development, Wiley 2011
3. Charlie Collins, Michael Galpin and Matthias Kappler, Android in Practice,
Dream Tech. 2012
4. James Dovey and Ash Furrow, Beginning Objective C, Apress, 2012
5. David Mark, Jack Nutting, Jeff LaMouche, and Fredric Olsson, Beginning
iOS6 Development: Exploring the iOS SDK, Apress, 2013.

L T P C
CSE6101 NETWORK FORENSICS
3 0 0 3

UNIT I INTRODUCTION

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Practical Investigative Strategies Real World Class Footprints Concepts in


Digital Evidence Challenges relating to Network Evidence Network Forensics
Investigative Methodology Technical Fundamentals Sources of Network
Based Evidences Evidence Acquisition Physical Interception Traffic
Acquisition Software Active Acquisition.

UNIT II TRAFFIC ANALYSIS


Packet Analysis Protocol Analysis - Flow Analysis Higher Layer Traffic
Analysis Case Study Statistical Flow Analysis Sensors Flow Record
Export Protocol Collection and Aggregation Analysis Case Study

UNIT III WIRELESS NETWORK FORENSICS AND IDS


Wireless Access Points Wireless Traffic Capture and Analysis Common
Attacks Locating Wireless Devices Case Study Network Intrusion Detection
and Analysis Types of NIDS/NIPS NIDS/NIPS Evidence Acquisition
Comprehensive Packet logging Snort Case Study

UNIT IV NETWORK DEVICES AND SERVERS


Event Log Aggregation, Correlation and Analysis Sources of Logs Network
Log Architecture Collecting and Analysing Evidences Case Study
Switches , Routers and Firewalls Interfaces Logging Case Study - Web
Proxies Web Proxy Functionality Evidence- Squid Web Proxy Analysis
Encrypted Web Traffic - Case Study

UNIT V ADVANCED TOPICS


Network Tunneling Tunneling for Functionality - Tunneling for Confidentiality -
Covert Tunneling Case Study Malware Forensics Trends in Malware
Evolution Network Behavior of Malware The future of Malware and Network
Forensics Case Study

REFERENCES

1. Sheri Davidoff and Jonathan Han, Network Forensics Tracking Hackers


through Cyberspace, Prentics Hall, 2012.
2. William J Buchanan, Introduction to Security and Network Forensics, CRC
Press, 2011.
3. Kevin Mandia, Chris Prosise, Incident Response and computer forensics,
Tata McGrawHill, 2006.
4. Bill Nelson, Amelia Philips and Christopher Steuart, Guide to computer
forensics and investigations, course technology, Cengage Learning;
4thedition, ISBN: 1-435-49883-6, 2009.

L T P C
CSE6102 ENTERPRISE NETWORK DESIGN
3 0 0 3

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

UNIT I INTRODUCTION TO NETWORK CONCEPTS, STANDARDS AND


PROTOCOLS
Introduction to Computer Networks - Networking Standards and Reference
Models - Transmission Basics and Networking Media Introduction to TCP/IP
Protocols

UNIT II LOCAL AND WIDE AREA NETWORK TOPOLOGIES AND


HARDWARE
LAN Topologies and Ethernet Standards - Networking Hardware - Wide Area
Networking Technologies -WAN Topologies - WAN Transmission Methods - WAN
Implementation and Remote Connectivity Wireless Networking

UNIT III ENTERPRISE NETWORKING WITH WINDOWS 2008 and UNIX


Characteristics of Network Operating Systems - Networking with Windows Server
2008 - Networking with UNIX

UNIT IV INDEPTH TCP/IP NETWORKING


Designing TCP/IP based networks TCP/IP mail Services TCP/IP Utilities
Voice and Video over IP Signaling and Transport Protocols QoS Assurance

UNIT V ENTERPRISE NETWORK MANAGEMENT


Security Audits, Risks and Policies Security in Network Design Wireless
Network Security - Troubleshooting Network Problems - Ensuring Network
Integrity and Availability -Maintaining and Upgrading Computer Networks
Network Management Fundamentals Fault and Performance Management
Change Management

TEXT BOOK
1. Tamara Dean, Network+ Guide to Networks , Course Technology, USA,
2010, 5th edition
2. Glen E. Clarke, CompTIA Network+ Certification Study Guide, Tata
McGraw Hill, 2009, 4th edition

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE6103 CONVERGENT NETWORKING
3 0 0 3

UNIT I TRADITIONAL VOICE NETWORKS:


The state of voice communications Enterprise telephony signaling Signaling
system 7 Call routing and dial plans defining and measuring voice quality
voice digitization and coding.

UNIT II PACKET VOICE AND DATA NETWORKS:


Quality of Service criteria for packet telephony WAN protocols for integrated
voice and data services Design considerations for WAN protocols Review of
IP features for voice/Data integration.

UNIT III VOICE OVER IP:


VOIP fundamental VOIP gateways VOIP design elements Routing calls
over analog voice posts Performing call signaling over digital voice parts.

UNIT IV VOICE GATEWAYS AND GATE KEEPERS:


Gateways and gate keepers Media gateway control protocol H.323 Session
Initiation protocol Connecting to PSTN - Connecting to PBX Connecting to IP
WAN Dial plans Digit manipulation Configuring class of restrictions.

UNIT V GATE KEEPERS & UNIFIED COMMUNICATION MANAGER:


Deploying gate keepers Gate keeper configuration IP to IP gateways - Cisco
unified communication manager Architecture Deployment models End
points Media resources User features Voice mail integration.

REFERENCES:
1. Scott Keagy, Integrating voice and data networks, Cisco press, 2000.
2. Kevin Wallace, Cisco Voice Over IP (CVoice), 3 rd edition 2009.
3. Denise Dano hue, David Mellory and Ken Salhoff, Cisco Voice Gateways
and Gate Keepers, Pearson education 2008.
4. Dennis Hartmann, Implementing Cisco Unified Communications Manager
Part I, Pearson Education, 2009.

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

L T P C
CSE6104 STORAGE AREA NETWORKS
3 0 0 3

UNIT I STORAGE SYSTEMS


Introduction to Information Storage and Management: Information Storage, Data
Center Infrastructure, Information Lifecycle. Storage System Environment:
Components of a Storage System, Disk Drive Architecture and Performance,
Logical Components of the Host. Data Protection: Concept of RAID and different
RAID levels. Intelligent Storage System (ISS) and its components,
Implementation of ISS as high-end and midrange storage arrays

UNIT II STORAGE NETWORK TECHNOLOGIES


Direct Attached Storage and SCSI, Storage Area Networks: Fibre Channel.
Network Attached Storage, IPSAN: iSCSI, FCIP. Network Attached Storage,
Content Addressed Storage.

UNIT III STORAGE VIRTUALIZATION


Forms of Virtualization, Storage Virtuaization Challenges, File and Block level
Virtualization, Concepts in Practice. Cloud Computing: Cloud Services (SaaS,
PaaS, and Iaas), Cloud concerns and implementations

UNIT IV BUSINESS CONTINUITY


Business Continuity Life Cycle, Failure Analysis, Backup and Recovery:
Architecture and different Backup/Recovery topologies, Local Replication
technologies and their operation, Remote replication technologies and their
operation. Overview of emerging technologies like Duplication, Offsite Backup,
Continuous Data Protection (CDP) technology

UNIT V STORAGE SECURITY AND MANAGEMENT


Storage Security framework, Storage Security domains, Security
implementations in Storage Networking, Monitoring the Storage Infrastructure,
Storage Management Activities, Storage Management Standards and Initiatives,
Concepts in Practice.

REFERENCES
1. EMC Corporation, Information Storage and Management, 1 st edition, Wiley
India, ISBN: 978-81-265-2147-0, 2009.
2. Additional resource material on www.emc.com/resource-library/resource-
library.esp

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

3. Marc Farley, Storage Networking Fundamentals: An Introduction to


Storage Devices, Subsystems, Applications, Management, and Filing
Systems, Cisco Press, 2004, ISBN: 1-58705-162-1
4. Tom Clark, Designing Storage Area Networks, Tom Clark, 2 nd edition,
ISBN: 0-321-13650-0, 2003

L T P C
CSE6105 SOFTWARE DEFINED NETWORKING
3 0 0 3

UNIT I INTRODUCTION
Introduction Centralised and Distributed Control and Data Planes Evolution
versus Revolution The Control Plane Data Plane Moving Information
between Planes Distributed Control Planes IP and MPLS Creating IP
Underlay Convergence Time Load Balancing High availability creating the
MPLS overlay Replication Centralised Control Planes ATM/LANE Route
Servers

UNIT II SDN CONTROLLERS


Introduction General Concepts Layer 3 Centric Plexxi Cisco OnePK
Network Programmability The Management Interface The Application
Network Divide The Command line Interface NETCONF and NETMOD-
SNMP- Modern Programmatic Interfaces- I2RS Modern Orchestration
OpenStack- CloudStack- Puppet.

UNIT III NETWORK FUNCTION VIRTUALISATION


The Multitenant Data Centre The virtualized Multitenant Data Centre SDN
Solutions for the Data Centre Network VLANs- EVPN VxLAN NVGRE
Network Function Virtualisations Virtualisation snd Data Plane I/O Services
Engineered Path Service Locations and Chaining NFV at ETSI Non- ETSI
NFV Work

UNIT IV USE CASES


Use cases for Bandwidth Scheduling, Manipulation, and Calendaring
Bandwidth Calendaring Big Date and Application Hyper Virtualisation for
Instant CSPF- Use cases for Data Centre Overlays, Big data, and Network
Function Virtualisation Use case for Input Traffic Monitoring, Classification, and
Triggered Actions.

UNIT V OPENFLOW
Introduction to OpenFlow Building Blocks OpenFlow Messages Northbound
Interface- Implementing OpenFlow Switch OpenFlow Reference Switch

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Hardware Implementations Software based Switches Openflow in Cloud


Computing.

REFERENCES :

1. Thomas D.Nadeau and Ken Gray, Software Defined Networks, Oreilly,


2013
2. Siamak Azodolmolky, Software Defined Networking with OpenFlow,
PACKT Publishing, 2013
3. Rajesh Kumar Sundarrajan, Software Defined Networking(SDN)- a
definitive guide, e-book, March 2014.

NETWORK SYSTEM DESIGN USING NETWORK L T P C


CSE6106
PROCESSORS 3 0 0 3

UNIT I INTRODUCTION
Introduction and overview-Basic Terminology and Example Systems -Review of
Protocols and Packet Formats.

UNIT II TRADITIONAL PROTOCOL PROCESSING SYSTEMS


Conventional computer hardware and its use in low-end network systems-
Algorithms for protocol processing-packet processing functionality-Software
architectures for protocol processing on conventional hardware-advanced
hardware architectures

UNIT III NETWORK PROCESSOR TECHNOLOGY


Motivation for network processors-Complexity of network processor design-
network processor architectures-Scaling a network processor-a review of
commercial network processor architectures-languages

UNIT IV NETWORK PROCESSORS AND PROGRAMMING


Discussion of Intel IXP2XXX network processor-Intel: reference platform;
embedded
RISC processor-Intel: programmable packet processor hardware and
programming- Intel: more on programming the packet processors- a
programming example- Programming example; switching fabrics

UNIT V ALTERNATIVE ARCHITECTURES


Network processor design tradeoffs-Active and programmable networks-Active
network
Applications - Commercial network processors-Benchmarks for Network
Processors

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

TEXT BOOK
1. Comer D, Network Systems Design Using Network Processors, Intel
IXP1200
Version, Prentice Hall, 2003.

L T P C
CSE6107 AUTONOMIC NETWORKS
3 0 0 3

UNIT I INTRODUCTION
Introduction to Autonomic Concepts Applied to Future Self-Managed Networks
The need for Autonomic Systems Application of Autonomics to Computers
Autonomics Computing - From Autonomics Computing to Autonomics
Networking Autonomic Networking Design Principles From Autonomic
Networking to Autonomic Network Management.

UNIT II AUTONOMIC NETWORK ARCHITECTURE


Autonomic Overlay Network Architecture Smart Media Routing and Transport
An Autonomic Service Architecture - ANA : Autonomic Network Architecture
Core Architectural Abstractions The Compartment API Implementation of a
Functional Block for Inter-Compartment Connectivity A utility-Based Autonomic
Architecture to Support QoE Quantification in IP Networks

UNIT III AUTONOMIC NETWORK MANAGEMENT , SELF ORGANISING


ARCHITECTURE
Autonomic Network Management : Avoiding New Management Silos
Federation of Networks Federation of Management Systems End to End
management of IPTV Services - Principles of Self- Organisation Self
Organising Modules Inter-/Intra- Layer Interactions Evaluation Methodologies

UNIT IV AUTONOMICS IN RADIO ACCESS NETWORKS

KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Radio Resource Management Self-Organising Network Self Optimization


SON in Radio Access Networks SON in GSM- SON in UMTS SON in LTE
SON in Heterogeneous Networks SON in IEEE 1900 Standard Control and
Learning Techniques in SON SON Use Case in LTE Network: Intercell
Interference Co-ordination

UNIT V AUTOMATED POLICY MANAGEMENT


Security Risk Evaluation Framework Service Risk Analysis Network Risk
Analysis - Quality of Protection Metric ROCONA Tool Implementation
Deployment and Case Study Experimentation and Evaluation Vulnerability
Database Used in the Experiments Validation of HVM Validation of Expected
Risk (ER) Validation of QoPM- Running Time Evaluation of the Attack
Propagation Metric.

REFERENCES:

1. Nazim Agoulmine, Autonomic Network Management Principles, Academic


Press 2011
2. Monique Calisti, John C. Strassner, Advanced Autonomic Networking and
Communication, Springer 2008
3. Mieso Denko, Laurence Tianruo Yang, Yan Zhang, Autonomic Computing
and Networking, Springer 2009

L T P C
CSE6108 GREEN COMPUTING
3 0 0 3

UNIT I FUNDAMENTALS
Green IT Fundamentals: Business, IT, and the Environment Green computing:
carbon foot print, scoop on power Green IT Strategies: Drivers, Dimensions,
and Goals Environmentally Responsible Business: Policies, Practices, and
Metrics.

UNIT II GREEN ASSETS AND MODELING


Green Assets: Buildings, Data Centers, Networks, and Devices - Green Business
Process
Management: Modeling, Optimization, and Collaboration Green Enterprise
Architecture Environmental Intelligence Green Supply Chains Green
Information Systems: Design and Development Models.

UNIT III GRID FRAMEWORK


Virtualizing of IT systems Role of electric utilities, Telecommuting,
teleconferencing and teleporting Materials recycling Best ways for Green PC
Green Data center Green Grid framework.

UNIT IV GREEN COMPLIANCE


KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Socio-cultural aspects of Green IT Green Enterprise Transformation Roadmap


Green Compliance: Protocols, Standards, and Audits Emergent Carbon Issues:
Technologies and Future.

UNIT V CASE STUDIES


The Environmentally Responsible Business Strategies (ERBS) Case Study
Scenarios for Trial Runs CASE STUDIES Applying Green IT Strategies and
Applications to a Home, Hospital, Packaging Industry and Telecom Sector.

TEXT BOOKS:
1. Bhuvan Unhelkar, Green IT Strategies andApplications-Using
Environmental Intelligence, CRC Press, June 2011
2. Woody Leonhard, Katherrine Murray, Green Home computing for
dummies, August 2009.
REFERENCES:
1. Alin Gales, Michael Schaefer, Mike Ebbers, Green Data Center: steps for
the Journey, Shoff/IBM rebook, 2011.
2. John Lamb, The Greening of IT, Pearson Education,2009.
3. Jason Harris, Green Computing and Green IT-Best Practices on
regulations & industry, Lulu.com, 2008.
4. Carl Speshocky, Empowering Green Initiatives with IT, John Wiley & Sons,
2010.
5. Wu Chun Feng (editor), Green computing: Large Scale energy efficiency,
CRC Press, 2012
L T P C
CSE6109 CLOUD COMPUTING
3 0 0 3

UNIT I FOUNDATIONS
Introduction to Cloud Computing Roots of Cloud Computing Layers and
Types of Clouds Desired features of a Cloud - Challenges and Risks
Migration into a Cloud Seven step Model of Migration in to a Cloud Enriching
the Integrations as a Service Paradigm for the Cloud Era The Enterprise
Cloud Computing Paradigm.

UNIT II INFRASTRUCTURE AS A SERVICE


Virtual Machines Provisioning and Migration Services Management of Virtual
Machines for Cloud Infrastructures The anatomy of cloud infrastructures
distributed Management of Virtual Infrastructures - Scheduling Techniques
Capacity Management to meet SLA Commitments Enhancing Cloud
Computing Environments Using Cluster as a Service Cloud Storage

UNIT III PLATFORM AND SOFTWARE AS A SERVICE


Integration of Private and Public Clouds Aneka Cloud Platform Hybrid Cloud
Implementation Workflow Engine for clouds Architecture of workflow
management System The MapReduce Programming Model and
KALASALINGAM UNIVERSITY
M.Tech Network Engineering Regulations -2014

Implementations MapReduce Programming Model Major MapReduce


Implementations for the Cloud MapReduce Impacts

UNIT IV MONITORING AND MANAGEMENT


An Architecture for Federated Cloud Computing SLA Management in Cloud
Computing Traditional Approaches to SLA Management Types of SLA Life
Cycle of SLA Automated policy based management Performance Prediction
for HPC on clouds Grid and Cloud HPC in the Cloud: Performance related
issues

UNIT V GOVERNANCE AND SECURITY


Organisational Readiness and Change Management in the cloud age Basic
concept of Organisational Readiness Common Change Management Models
Data Security in the Cloud Cloud Computing and Data Security Risk Cloud
Computing and Identity Content level Security Technologies for Data Security
in Cloud Computing

REFERENCES :
1. Rajkumar Buyya, James Broberg and Andrej Goscinski, Cloud Computing
Principles and Paradigms, Wiley 2011
2. Borko Furht, Armando Escalante, Handbook of Cloud Computing,
Springer 2010
3. Michael Miller, Cloud Computing: Web-Based Applications That Change
the Way You Work and Collaborate Online, Que Publishing, August 2008.
4. Kumar Saurabh, Cloud Computing Insights into New Era Infrastructure,
Wiley Indian Edition,2011.

KALASALINGAM UNIVERSITY

You might also like