Govt. Polytechnic College, Jalore: Computer Engineering Department III Year Syllabus Faculty Name: Ankur Verma
Govt. Polytechnic College, Jalore: Computer Engineering Department III Year Syllabus Faculty Name: Ankur Verma
CONTETS
1
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
6.5 Throwing and catching mechanism
6.6 Rethrowing an exception
7. Managing Console I/O and File I/O :
7.1 C++ streams and stream classes
7.2 Unformatted I/O operations
7.3 Formatted console I/O operations
7.4 Managing output with manipulators
7.5 Classes for file stream operations
7.6 Opening and closing a file
7.7 File modes and file pointers
7.8 Put ( ), get ( ), read ( ), and write ( ) functions
Computer Science Engineering
4
PRACTICALS
1. Practice for Classes and Object Creation
2. Practice for constructors and deconstructors creation
3. Practice for static and friend functions for a class.
4. Practice for Function overloading
5. Practice for Operator overloading
6. Practice for Copy constructor
7. Practice for inheritance
8. Practice for virtual function
9. Practice for exception handling template
10. Practice for read( ) and write( )
REFERECE BOOKS :
1. Programming in C++ E. Balaguruswamy, TMH
2. Oriented Programming TURBO C++ Robert Lafore, Galgotia Pub.
3. The Complete Reference C++ Herbert Schildt, TMH
4. The C++ Programming Language B. Stroustrup, Addison wesley/Pearson
5. Let us C++ Y. Kanetkar, BPB
6. Object Oriented Programming and C++ R.Rajaram, New Age
COMPUTER NETWORK
CODE CS 306 L T P
IT 306 2 1 --
RATIOALE
Computer networks have global utilities in certain fields. It is used in inter linking libraries, Air
Lines, Railway
Station for reservations. The knowledge of subject and related software will enable the students to
work in organization
having such types of facilities. Today most uses of computer network in Internet for transferring
files, email, audio-video
conferencing movies, chatting at remote places.
COTETS
1. Data Link Layer and Local Area Networks :
1.1 Data Link Layer Design Issues
1.1.1 Framing,
1.1.2 Error Detection and Correcting Code
1.1.3 Error Control
1.2 LAN Protocols
2
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
1.2.1 Ethernet and IEEE 802.3 Standard CSMA/CD
1.2.2 IEEE 802.5 LAN Token Ring
1.3 PPP : Point to Point Protocol
1.4 FDDI : Fiber Distributed Data Interconnect
2 etwork Layer and Routing :
2.1 Network Layer Design Issues
2.2 Routing Algorithms
2.2.1 Shortest Path Routing
2.2.2 Flooding
2.2.3 Distance Vector Routing
2.2.4 Hierarchical Routing
2.2.5 Multicast Routing
2.3 Internet Protocol
2.3.1 IPv4 Header
2.3.2 IPv4 Address
2.3.3 Subnetting
2.3.4 Internet Control Protocols
Computer Science Engineering
11
2.4 IPv6
2.4.1 IPv6 Header
2.4.2 IPv6 Extension Headers
2.4.3 IPv6 Addresses
2.5 Routers
3. Transport Layer :
3.1 Transport Layer Services
3.2 Transport Protocol Mechanisms
3.2.1 Addressing
3.2.2 Multiplexing
3.2.3 Establishment a Connection
3.2.4 Releasing a Connection
3.2.5 Reliable Delivery
3.2.6 Flow Control and Buffering
3.3 Connectionless Transport Protocol : UDP
3.4 Connection - Oriented Transport Protocol : TCP
3.4.1 TCP Header format
3.4.2 TCP Connection Management
3.4.3 TCP Congestion Control
3.4.4 TCP Timer Management
4. Application Layer :
4.1 Principles of Application Layer Protocols
4.2 Domain Name System: DNS
4.3 The File transfer Protocol : FTP
4.4 Electronics Mail in the Internet : POP, HTTP, IMAP
4.5 WWW and HTTP
4.6 Network Management SNMP
5. Wireless etworking :
5.1 Wireless LANs
5.2 IEEE 802.11
5.3 BlueTooth
3
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
5.4 WiMAX IEEE 802.16
5.5 Building a Network
REFERECES BOOKS :
1. Data Communication and Computer Networks Sanjay Pahuja Standard Publishers
2. Data Communication and Computer Networks B. Froujan TMH
3. Computer Networks Andrew S. Tanenbaum, PHI
4. Computer Networks Peterson & Davie
5. Wireless Communications W. Stallings PHI
7. Computer Networks Black, PH
*****
INTRODUCTION TO NETWORK SECURITY AD CRYPTOGRAPHY
CODE CS 308 L T P
IT 308 2 1 --
RATIOALE
The aim of this course is to provide adequate knowledge about cryptography and network
security. In this course
student are taught about need and principle of security, different types of attacks, cryptographic
techniques, symmetric and
asymmetric key cryptography, Internet Security Protocols, E-mail Security, Firewall and VPN.
By acquiring adequate knowledge of this subject student may be able to understand the
importance of security in
today’s era when computer applications were developed to handle financial and personal data the
real need for security was
felt like never before now people realized data on computer are extremely important aspect of
modern life. After completing
this course, the student will be able to understand importance of security, cryptographic
techniques and various concepts of
security.
CONTETS
1. Computer Security :
1.1 Introduction
1.2 Need of Security
1.3 Security approaches
1.4 Principle of Security
Computer Science Engineering
14
2. Attacks on Computer :
2.1 Attacks: A general and technical view
2.2 Active and passive attacks
2.3 Program that attacks:
2.3.1 Virus
2.3.2 Worm, Trojan horse
2.3.3 Applets, ActiveX controls
2.3.4 Cookies, Scripts
2.4 Preventing Virus
2.5 Specific attacks
2.5.1 Sniffing and Spoofing
2.5.2 Phishing
2.5.3 Pharming or DNS spoofing
3. Cryptographic : Concepts and Techniques
4
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
3.1 Plain and Cipher Text
3.2 Substitution techniques
3.2.1 Caesar Cipher
3.2.2 Mono-alphabetic Cipher
3.2.3 Polyalphabetic substitution Cipher
3.2.4 Playfair Cipher
3.3 Transposition Techniques
3.3.1 Rail Fence Technique
3.3.2 Simple Columnar Transposition Technique
3.3.3 Vernam Cipher (One time pad)
3.4 Encryption and Decryption
4. Symmetric and Asymmetric Key Cryptography
4.1 Block and stream cipher
4.2 Overview of Symmetric Key Cryptography
4.3 Overview of Asymmetric Key Cryptography
4.4 Digital signature
4.5 Concept of message digests
5. Internet Security Protocols
5.1 Basic concept
5.2 Introduction of TCP/IP
5.3 Brief Overview of
5.3.1 Secure socket layer (SSL)
5.3.2 Secure Hyper Text Transfer Protocol (SHTTP)
5.3.3 Time stamping Protocol (TSP)
5.3.4Secure Electronic Transaction (SET)
6. E-mail Security:
6.1 Introduction
6.2 SMTP
Computer Science Engineering
15
6.3 Brief Overview of
6.3.1 Privacy Enhanced Mail (PEM)
6.3.2 Pretty good privacy (PGP)
6.3.3 Secure multipurpose secure Internet mail Extensions (SMIME)
7. Firewall
7.1 Introduction
7.2 Types of firewall
7.3 Packet filter
7.4 Application gateways
7.5 Concepts of DMZ
7.6 Limitation of firewall
7.7 Virtual Private Network (VPN)
7.8 Intrusion
REFERECE BOOKS :
1. Cryptography and Network Security Atul Kahate, TMH
2. Cryptography and Network Security Behrouz Forouzan, TMH / MH
3. Network Security Essentials Stallings W Pearson Education Asia
4. Cryptography and Network Security Stallings W Pearson Education Asia
5. Network Security Kaufmann Charlie et al. Pearson Education Asia
6. Network and Internet Security Vijay Ahuja A P Professional
5
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
*****
JAVA TOOLS
CODE CS 309 L T P
2 -- 2
RATIOALE
The aim of this course is to provide basic interface with internet through Java tools. This course
illustrate GUI
interface on web. The Java tools covered from basic applet, graphics, awt and event handling,
swing, servlets and JDBC
After completing this course student is able understand java tools and its application with web site
development.
COTETS
1. Java Fundamentals :
1.1 Introduction
1.2 Features of Java
1.3 Types of Java programs
1.4 Application programs
1.5 Applets
1.6 Sevlets
1.7 Java architecture
1.8 JDK tools
2. Applet :
2.1 Basics of applet
2.2 Applet life cycle
2.3 Applet tag
2.4 Paint( ), Update( ), Repaint( ), SetBackground( ), SetForeground( ), ShowStatus ( )
2.5 Different between applet and application programs
Computer Science Engineering
16
3. Graphics :
3.1 Drawing lines, Arc
3.2 Drawing rectangles, oval
3.3 Drawing ploggon, Polyline
3.4 Clipping
4. AWT and Event Handling:
4.1 Component
4.2 Frame
4.3 Button class
4.4 Layout managers
4.5 Label
4.6 Text field, text area
4.7 Check box, check box group
4.8 Choice, list, menu
4.9 Event handling
4.10 Adaptor class
5. Swing :
5.1 Introduction to JFC
5.2 JApplets, JToolTip class
5.3 JLabel, JButton
5.4 Text components
6
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
5.5 JList, JCombobox
5.6 JTable, JScrollPane
5.7 JCheck box, JTtext area
6. JDBC :
6.1 Database connectivity
6.2 JDBC application architecture
6.3 Obtaining connection
6.4 Statement Object
6.5 Working with Result Set
6.6 Prepared statements
6.7 Query Prepared Statement
7. Servlet :
7.1 Java servlet
7.2 Servlet container
7.3 Servlet life cycle
7.4 Servlet interface
7.5 Generic servlet, Http servlet class
7.6 HttpServletRequest, HttpServletResponse interface
7.7 getOutputStream, setHeader methods
7.8 Parameter passing to servlet
PRACTICALS
1. Practice programs on applets
2. Practice programs on graphics
3. Practice programs on awt and event handling
4. Practice programs on swing
5. Practice programs on servlets
Computer Science Engineering
17
6. Practice programs on JDBC
REFERECE BOOKS:
1. Internet and Java Programing R.Krishnamurthy,S. Prabhu New age
2. The Complete Reference Java 2 Herbert Schildt, (TMH)
3. Thinking in Java Bruce Eckel, President Mind View Inc
4. Java 2.0 Programming E.Balaguruswami, (TMH)
*****
PHP AD MYSQL
CODE CS 310 L T P
2 -- 2
RATIOALE
PHP (Personal Home Page) is a simple yet powerful open-source scripting language for creating
dynamic web
content. The millions of web sites powered by PHP are testament to its popularity and ease of use.
PHP is used by both
programmers, who appreciate its flexibility and speed, and web designers, who value its
accessibility and convenience.
Programming in PHP covers everything needed to know to create effective web applications.
MySQL is the World’s most
used RDBMS that runs as a server providing multi-user access to a number of database. It is the
most popular open-source
database system for the Web. It is fast, reliable and easy to use.
7
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
COTETS
1. Overview of PHP :
1.1 Static versus Dynamic Websites
1.2 Dynamic Contents from Databases
1.3 Developing Dynamic Internet Applications
1.4 Client-Side scripting versus Server-Side Scripting
1.5 Advantages and Capabilities of PHP
1.6 PHP versus ASP
2. Basic Scripting, Loop and Conditional Constructs
2.1 PHP Scripting Fundamentals
2.2 Primitive Data Types
2.3 Defining Constants and Variables
2.4 Loop Constructs: While, Do-While, For, Exit & Break
2.5 Conditional Constructs: If, Else and ElseIf, Switch/Case Statement
2.6 PHP Operators: Logical, Relational, Bitwise, Ternary Operator (?)
3. Arrays in PHP :
3.1 Usage of Arrays in PHP
3.2 Initializing Arrays
3.3 Adding and Removing Items from Arrays
3.4 One-dimensional and Multidimensional arrays
3.5 Array Functions
4. Working with Databases and Forms
4.1 Configuring PHP for Database Support
4.2 PHP’s Database API’s
4.3 PHP’s SQL API
4.4 MySQL vs. Acess
4.5 MySQL vs. SQL Server
4.6 Database Drivers
Computer Science Engineering
18
5. Using Cookies with PHP :
5.1 Purpose of Cookies
5.2 Cookies Myths
5.3 Setting Cookies
5.4 Retrieving, Expiring and Deleting Cookies
5.5 Storing Arrays in Cookie
6. MySQL :
6.1 Introduction to MySQL
6.2 Creating Databases and Tables
6.3 Working on Data and Tables
6.4 Retrieving and Modifying Data
6.5 SQL Functions
6.6 SQL Operators
6.7 Data Definition Statements
6.8 Data Manipulation Statements
6.9 Stored Procedures and Functions
6.10 Creating Triggers
6.11 Creating simple dynamic report using database
PRACTICALS
1. Practice programs for Basic Scripting, Loop and Conditional Constructs.
8
Govt. Polytechnic College, Jalore
Computer Engineering Department III year Syllabus
Faculty Name: Ankur Verma
2. Practice programs for Arrays in PHP.
3. Practice programs for Working with MS-Access Database and Forms.
4. Practice programs for Working with MySQL Database and Forms.
5. Practice programs for Working with Using Cookies with PHP.
6. Practice programs in MySQL for creating Databases and Tables
7. Practice programs in MySQL for Retrieving, Modifying, and Deleting Data
8. Practice programs in MySQL based on stored procedures and functions.
9. Practice programs in MySQL for creating triggers.
REFERECE BOOKS :
1. Straight To the Point: PHP, Dinesh Maidasani, Laxmi Publications (Firewall)
2. Straight To the Point: MySQL, Dinesh Maidasani, Laxmi Publications (Firewall)
3. How to Do Everything with PHP & MySQL, Vikram Vaswani, McGraw Hills
4. The Complete Reference MySQL, Vikram Vaswani, TMH
5. Web Database Application with PHP & MySQL, Beighley, SPD/O’ Reilly
*****