M.
Tech                        Network Engineering                Regulations -2014
                        KALASALINGAM UNIVERSITY
                                  (Under Section 3 of UGC Act 1956)
                                 Anand Nagar, Krishnankoil - 626 190
                        Srivilliputtur (Via), Virudhunagar (Dt), Tamil Nadu
      CURRICULAM FOR THE M.TECH. DEGREE PROGRAMME IN
                  NETWORK ENGINEERING
Semester 1
                             Course Title
Code No.                                                    L       T      P     C
MAT5101      Applied Mathematics                             3      0      0     3
CSE5102      Web Service                                     3      0      0     3
CSE****      Elective  I                                    3      0      0     3
CSE5103      Adhoc Wireless Networks                         3      0      0     3
CSE5104      Secure Network System Design                    3      0      0     3
CSE5105      Network Routing Protocols                       3      0      0     3
CSE5181      Web Service Lab                                 0      0      3     1
CSE5182      Network Security Lab                            0      0      3     1
                          Total                             18      0      6    20
Semester 2
Code No.                     Course Title                   L       T      P     C
CSE5106      Wireless Sensor Networks                       3       0      0     3
CSE5107      Next Generation Networks                       3       0      0     3
             Simulation of Communicating systems and
CSE5108                                                     3       0      0     3
             Networks
CSE****      Elective  II                                  3       0      0     3
CSE****      Elective  III                                 3       0      0     3
CSE5109      Survivable Networks                            3       0      0     3
CSE5183      Network Simulation Lab                         0       0      3     1
             Network Forensics, Testing and Monitoring
CSE5184                                                     0       0      3     1
             Lab
                          Total                             18      0      6    20
                       KALASALINGAM UNIVERSITY
M.Tech                            Network Engineering            Regulations -2014
Semester 3
Code No.                         Course Title               L        T       P        C
 CSE****     Elective IV                                     3       0        0       3
 CSE****     Elective V                                      3       0        0       3
 CSE****     Elective VI                                     3       0        0       3
 CSE6198     Project Phase  I                               0       0       18       6
                           Total,                            9       0       18       15
Semester 4
Code No.                         Course Title               L        T       P        C
CSE6199      Project Phase  II                              0       0       30       10
                List of Electives for M.Tech (Network Engineering)
Code No.                         Course Title               L        T       P        C
CSE5110      Mobile and Pervasive Computing                  3       0       0        3
CSE5111      Optical Networks                                3       0       0        3
CSE5112      Multimedia Communication Networks               3       0       0        3
CSE5113      4G Technologies                                 3       0       0        3
CSE5114      Vehicular Ad Hoc Networks (VANETs)              3       0       0        3
CSE5115      High speed switching Architecture               3       0       0        3
CSE5116      Internet of Things                              3       0       0        3
CSE5117      Mobile Application Development                  3       0       0        3
CSE6101      Network Forensics                               3       0       0        3
CSE6102      Enterprise Network Design                       3       0       0        3
CSE6103      Convergent Networking                           3       0       0        3
CSE6104      Storage Area Networks                           3       0       0        3
CSE6105      Software Defined Networking                     3       0       0        3
CSE6106      Network System Design using Network             3       0       0        3
             Processors
CSE6107      Autonomic Networks                              3       0       0        3
CSE6108      Green Computing                                 3       0       0        3
CSE6109      Cloud computing                                 3       0       0        3
                                                                     L   T P          C
MAT5101                  APPLIED MATHEMATICS
                                                                     3   0        0   3
                        KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
CLASSICAL OPTIMIZATION TECHNIQUES
Statement of optimization problem  classification  optimization technique -
Unconstrained Optimization  Equality constraints  Inequality constraints 
Lagrange
Multiplier method  Kuhn-Tucker Condition - Indirect search methods  Gradient
of a
function  Steepest descent method  Conjugate gradient method  Newtons
method.
LINEAR PROGRAMMING
Standard form of Linear programming problem  definitions and theorems 
Solution of
linear simultaneous equations  Simplex algorithm  graphical method  Dual
simplex
method  Transportation problem - Applications.
MATRIX THEORY
Matrix Norms - Jordan Canonical form Generalized Eigen vectors - Singular
Value
Decomposition - Pseudo Inverse - Least square Approximations  QR Algorithm.
PROBABILITY AND RANDOM PROCESS
Probability - Random Process variables - Binomial, Poisson, Geometric, Uniform
Normal, Exponential Distributions - Moment generating functions and their
properties -
Functions of random variables.
QUEUING THEORY
Single and multiple server Markovian queuing models - Customer impatience-
Queuing
applications.
TEXT BOOK:
1. Singiresu S.Rao ,Engineering Optimization , New Age International (P) Ltd ,
2001
2. Gupta S.C. and Kapoor V.K. Fundamentals of Mathematical Statistics, sultan
   Chand and sons , Newdelhi,2001
3. Lewis.D.W. Matrix Thoery, Allied Publishers, Chennai 1995
REFERENCES :
1. S.D.Sharma, Operations Research, Kedar Nath Ram Nath & co 2008.
2. M.K. Ochi., Applied Probability and Stochastic processes, John Wiley & sons
  1992.
3. Bronson.R. Matrix operations , Schaums outline series , Tata Mcgraw Hill,
Newyork.
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering            Regulations -2014
                                                               L    T P C
CSE5102                     WEB SERVICES
                                                               3    0   0   3
UNIT I DISTRIBUTED INFORMATION SYSTEMS AND MIDDLEWARE
Design of an Information System  Architecture of an Information System 
Communication in an Information System Understanding Middleware  RPC
and Related Middleware  TP Monitors  Object Brokers  Message oriented
Middleware.
UNIT II     WEB TECHNOLOGIES
Exchanging information over the Internet  Web Technologies for supporting
remote clients  Application Servers  Web Technologies for Application
Integration
UNIT III    WEB SERVICES TECHNOLOGIES
Web Services Technologies  Web Services Architecture  SOAP : Simple Object
Access Protocol  WSDL : Web Services Description Language  UDDI:
Universal Description Discovery and Integration- Related Standards
UNIT IV     SERVICE CO-ORDINATION PROTOCOLS
An Introduction to co-ordination protocols  Infrastructure for co-ordination
Protocols  WS Co-ordination  WS  Transactions  RosettaNet  Standards
related to co-ordination protocols
UNIT V      SERVICE COMPOSITION
Basics of Service Composition  A new chance of success for composition 
Service Composition Models  Dependencies between co-ordination and
composition  BPEL : Business Process Execution language for web services 
State of the Art in Web Services
REFERENCES:
                     KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
   1. Gystavo Alonso, Fabio Casasi, Hareemi Kuno, Vijay Machiraju, Web
      Services  Concepts, Architecture and Applications, Springer, 2004.
   2. Ron Schmelzer et al, XML and Web Services, Pearson Education, 2002.
   3. Sandeep Chatterjee and James Webber, Developing Enterprise Web
      Services: An Architects Guide, Practice Hall, 2004.
   4. Jorge Cardoso, Semantic Web Services, 2006.
                                                                  L    T P C
CSE5103             ADHOC WIRELESS NETWORKS
                                                                  3    0   0   3
UNIT I INTRODUCTION & MAC PROTOCOLS
Ad Hoc Wireless Networks Issues. MAC protocols for ad hoc Wireless Networks:
Issues, Classification of MAC Protocols, Contention Based protocols, Contention-
Based Protocols with Reservation Mechanisms, Contention-Based MAC
Protocols with scheduling Mechanisms, MAC Protocols that use Directional
Antennas.
UNIT II      ROUTING PROTOCOLS
Classifications, Table Driven, On-Demand, Hybrid and Hierarchical Routing
Protocols, Routing Protocols with efficient Flooding mechanism, Power aware
Routing Protocols. Operation of Multicast Routing Protocols, Energy efficient
Multicasting and Multicasting with QoS guarantees.
UNIT III     TRANSPORT LAYER AND SECURITY PROTOCOLS
Introduction, Issues, Design Goals, Classification of Transport Layer Solutions,
TCP over Ad Hoc Wireless Networks, Other Transport Layer Protocols, Security
in Ad Hoc Wireless Networks, Secure Routing in Ad Hoc wireless Networks.
UNIT IV      QOS
Introduction, Issues and Chal lenges, Classifications of QoS Solutions, MAC
Layer Solutions, Network Layer Solutions, QoS Frameworks for Ad Hoc Wireless
Networks
UNIT V       ENERGY MANAGEMENT
Introduction, Need for Energy Management, Classification of Energy
Management Schemes, Battery Management Schemes, Transmission Power
Management Schemes, System Power Management Schemes
                      KALASALINGAM UNIVERSITY
M.Tech                         Network Engineering               Regulations -2014
TEXT BOOK
  1. Siva Ram Murthy C, Manoj B.S., Ad Hoc Wireless Networks: Architectures
     and Protocols, Prentice Hall, 2005.
REFERENCES
  1. Chai-Keong Toh, Ad Hoc Mobile Wireless Networks, PHI, 2002.
  2. Charles Perkins, Ad Hoc Networking, Addison Wesley, 2001.
  3. Mohammed Liyas, Handbook of Ad Hoc Wireless Networks, CRC Press,
     2003.
                                                                      L    T P C
CSE5104           SECURE NETWORK SYSTEM DESIGN
                                                                      3    0   0   3
UNIT I        NETWORK SECURITY FOUNDATIONS
Secure network design through modeling and simulation, A fundamental
framework for network security, need for user level security on demand, Network
Security Axioms, security policies and operations life cycle, security networking
threats, network security technologies, general and identity design
considerations, network security platform options and best deployment practices,
secure network management and network security management.
UNIT II       IDENTIFYING SYSTEM DESIGNERS NEEDS AND GOALS
Evolution of network security and lessons learned from history, Analyzing top-
down network design methodologies, technical goals and tradeoffs  scalability,
reliability, availability, Network performance, security, Characterizing the existing
internetwork, characterizing network traffic, developing network security
strategies.
UNIT III PHYSICAL SECURITY ISSUES AND LAYER-2 SECURITY
CONSIDERATIONS
Control physical access to facilities, Control physical access to data centers,
Separate identity mechanisms for insecure locations, Prevent password-recovery
mechanisms in insecure locations, awareness about cable plant issues,
electromagnetic radiation and physical PC security threats, L2 control protocols,
MAC flooding considerations, attack mitigations, VLAN hopping attacks, ARP,
DHCP, PVLAN security considerations, L2 best practice policies.
UNIT IV       IP ADDRESSING AND ROUTING DESIGN CONSIDERATIONS
                       KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
Route summarizations, ingress and egress filtering, Non routable networks,
ICMP traffic
management, Routing protocol security, Routing protocol authentication,
transport protocol management policies, Network DoS/flooding attacks.
UNIT V       TESTING AND OPTIMIZING SYSTEM DESIGN
Selecting technologies and devices for network design, testing network design 
using industry tests, building a prototype network system, writing and
implementing test plan, tools for testing, optimizing network design  network
performance to meet quality of service (QoS), Modeling, simulation and behavior
analysis of security attacks, future issues in information system security.
REFERENCES:
   1. Sumit Ghosh, Principles of Secure Network System Design, Springer-
      Verlag, NY,2002. (UNIT I)
   2. Sean Convery, Network Security Architecture, Cisco Press, 2004.(UNIT III
      & IV)
   3. Priscilla Oppenheimer, Top-Down Network Design, Third edition, Cisco
      Press, 2012. (UNIT II & V).
   4. Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems
      Approach, Fourth Edition, Morgan Kauffmann Publishers Inc., 2009,
      Elsevier.
   5. William Stallings, Cryptography and Network security Principles and
      Practices, Pearson / PHI, 4th edition, 2006.
   6. Wade Trappe, Lawrence C Washington, Introduction to Cryptography with
      Coding Theory, 2nd edition, Pearson, 2007.
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering             Regulations -2014
                                                                L    T P C
CSE5105           NETWORK ROUTING PROTOCOLS
                                                                3    0   0   3
UNIT I     ROUTER ARCHITECTURE
Functions of Router  Types  Elements  Packet Flow  Packet Processing
Router Architectures, IP Address Lookup Algorithms- Impact of Addressing on
Lookup- Longest Prefix Matching  Nave algorithms  Binary Tries  Multibit
Tries.
UNIT II    NETWORK ROUTING: BASICS AND FOUNDATIONS
Networking and Network Routing: An Introduction, Routing algorithms: Shortest
path and widest path  Bellman Ford algorithm and distance vector approach 
Dijikstras algorithm-comparison  widest path algorithm  shortest and widest
path computation  k-shortest path algorithms, Routing Protocols: Framework
and Principles.
UNIT III   ROUTING IN IP NETWORKS
IP Routing and Distance Vector Protocol Family  Routers, Networks, and
Routing information Basics  static Routes - RIP v1,v2 - IGRP  EIGRP  Route
Redistribution, OSPF and integrated IS-IS  Features  Packet Format 
examples  Integrated IS-IS, similarities and differences between OSPF and IS-
IS, IP Traffic Engineering, BGP, Internet Routing Architectures
                     KALASALINGAM UNIVERSITY
M.Tech                        Network Engineering             Regulations -2014
UNIT IV       MANET ROUTING
Internet based mobile ad-hoc networking, communication strategies,
classification of MANET routing algorithms Destination sequenced Distance
Vector (DSDV), Dynamic source Routing (DSR), Ad-hoc on demand Distance
Vector (AODV) & Temporarily Ordered Routing algorithm (TORA).
UNIT V       NEXT GENERATION ROUTING
Quality of Service Routing  Attributes  Adapting shortest path and widest path
routing  Update Frequency, Information Accuracy and impact on routing
Heterogeneous Service, Single-Link case  Source based QoS routing  Routing
protocols for QoS Routing , MPLS , Routing and Traffic Engineering with MPLS-
Advanced topics : Packet Queuing and Scheduling, Traffic Conditioning,
TEXT BOOK
1.         D.Medhi and K.Ramasamy, Network Routing : Algorithms, Protocols
and
         Architectures, Morgan Kaufmann Publishers, 2007.
REFERENCES
1.         Steen Strub M, Routing in Communication networks, Prentice Hall
International ,
        New York, 1995
2.         C.Siva Ram Murthy and B.S.Manoj, Adhoc Wireless Networks,
Pearson
        Education, 2007.
3.         Internetworking Technologies Handbook, Inc. Cisco Systems, ILSG
Cisco
        Systems, 4th Edition , 2003
                       KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering             Regulations -2014
                                                                L    T P C
CSE5181                  WEB SERVICE LAB
                                                                0    0   3   1
LIST OF EXPERIMENTS
  1. Write a program to implement WSDL Service (Hello Service . WSDL File)
  2. Write a program the service provider that can implement a single get
     price(), static bind() and get product ()operation.
  3. Write a program to implement the operation can receive request and will
     return a response in two ways.
                  i. One - Way operation
                 ii. Request - Response
  4. Write a program to implement to create a simple web service that converts
     the temperature from Fahrenheit to Celsius (using HTTP Post Protocol)
  5. Write a program to implement business UDDI Registry entry
  6. Write a program to implement
                  i. Web based service consumer
                 ii. Windows application based web service consumer
  7. Create a web service for temperature conversion with appropriate client
     program.
  8. Create a web service for currency conversion (at five currencies) with
     appropriate client program.
  9. Create a WinForms client application that communicates with Google's
     web service to perform searches and display the results
                    KALASALINGAM UNIVERSITY
M.Tech                           Network Engineering                  Regulations -2014
                                                                           L    T P C
CSE5182                   NETWORK SECURITY LAB
                                                                           0    0   3   1
List of Experiments
      1.   Implementation of Symmetric Encryption algorithms using c or c++.
      2.   Implement MD5/SHA algorithm.
      3.   Study of packet capturing and analyzer tools like ethereal, snort and etc.
      4.   Working with Sniffers for monitoring network communication (Ethereal)
      5.   Using IP TABLES on Linux and setting the filtering rules
      6.   Password guessing and Password Cracking.
      7.   Configure a firewall to block the following for 5 minutes and verify the
           correctness of this system using the configured parameters:
               (a) Two neighborhood IP addresses on your LAN
               (b) All ICMP requests
               (c) All TCP SYN Packets
      8. Configuration of Proxy Server
      9. Configuring Virtual Private Network Over WAN
      10. Implementation of email security using PGP
CSE5106               WIRELESS SENSOR NETWORKS                             L    T P C
                         KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
                                                                  3    0   0   3
UNIT I INTRODUCTION
Introduction  Sensor Mote Platforms  WSN Architecture and Protocol Stack 
WSN Applications  Military Applications  Environmental Applications  Health
Applications  Home Applications  Industrial Applications  Factors Influencing
WSN Design
UNIT II      PHYSICAL LAYER AND MEDIA ACCESS CONTROL
Physical Layer Technologies  Overview of RF Wireless Communication 
Channel Coding  Modulation  Wireless Channel Effects  Physical Layer
Standards  Media Access Control  Challenges for MAC  CSMA  Contention
based Media Access  Reservation Based Media Access  Hybrid Media Access.
UNIT III     NETWORK LAYER AND TRANSPORTATION LAYER
Challenges for routing  Data Centric and Flat Architecture Protocols 
Hierarchical Protocols  Geographical Routing Protocols  QoS Based Protocols
 Transport Layer  Challenges for Transport Layer  Pump Slowly, Fetch
Quickly Protocol  Congestion Detection and Avoidance (CODA) Protocol.
UNIT IV      TIME SYNCHRONISATION AND LOCALISATION
Challenges for Time Synchronisation - Network Time Protocol  Time Sync
Protocol for Sensor Networks (TPSN)  Reference  Broadcast Synchronisation
(RBS)  Localisation  Challenges in localization  Ranging Techniques  Range
based localization Protocol  Range Free Localisation Protocol.
UNIT V       RECENT TRENDS
Security Issues in WSN  Wireless Sensor and Actor Networks  Wireless
Multimedia Sensor Networks  Wireless Underwater Sensor Networks  Wireless
Underground Sensor Networks.
REFERENCES:
   1. Ian F. Akyildiz and Mehmet Can Vuran, Wireless Sensor Networks, Wiley
      2010.
   2. Jun Zheng and Abbas Jamalipour, Wireless Sensor Networks  A
      Networking Perspective, Wiley 2009.
   3. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless
      Sensor Networks, Wiley 2005.
   4. Ivon Stojmenovic, Hand Book of Sensor Networks  Algorithms and
      Architectures, Wiley ,2005.
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering            Regulations -2014
                                                               L    T P C
CSE5107            NEXT GENERATION NETWORKS
                                                               3    0   0   3
UNIT I INTRODUCTION
Next Generation Networks (NGN) Vision, Scenarios and Advances  NGN
Networks : Perspectives and Advances  Some Possible Scenarios  Virtual
International Congress  Virtual Class Rooms  e-Education and Experimental
Laboratory  Virtual Home  Home Networks  Automatic Traffic and Car Driving
 NGN Requirements on Technology and Management.
UNIT II     NGN FUNCTIONAL ARCHITECTURE
ITU NGN Functional Architecture  Proposed NGN Functional Architecture 
NGN Network Operator  NGN Network Service Provider  NGN Customer and
CTE  Network and Service Evaluation towards NGN- Fixed Network Evaluation
 Mobile Network Evaluation  Internet Evaluation
UNIT III    NGN KEY DEVELOPMENT AREAS
Terminal Area  Access Network Area  Backhaul Network Area  Core Transport
Network Area  Service Creation Area  Network Control and Managerial Area 
Service Control and Management  Advanced Technologies for Network and
Service Management.
UNIT IV     NGN STANDARDIZATION
ITU and GSI NGN  ETSI and TISPAN - NGN  ATIS and NGN  CJA and NGN -
TMF and NGOSS, NGMN Alliance and NGMN - 3GPP and LTE/SAE  NGMN
Alliance and NGMN, 3GPP and LTE/SAE
UNIT V      NEXT GENERATION WIRELESS LANS
An overview of IEEE 802.11  History of high throughput and 802.11 n-
Environments and applications of 802.11 n  Major features of 802.11 n 
Orthogonal Frequency Division Multiplexing  MIMO/SDM Basics  Physical
Interoperability with 11 a/g legacy OFDM device  High Throughput and Robust
Performance
REFERENCES:
  1. Jingming Li Salina and Pascal Salina, Next Generation Networks,
     Prospective and Potentials , John Wiley and Sons, 2007.
  2. Thomas Plavyk, Next generation Telecommunication Networks, Services
     and Management, Wiley & IEEE Press Publications, 2012.
  3. Eldad Perahia and Robert Stacey, Next Generation Wireless LANs,
     Cambridge University Press, 2008.
                     KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering           Regulations -2014
   4. Monique J. Morrow, Next Generation Networks, CISCO Press, 2007.
            SIMULATION OF COMMUNICATING SYSTEMS                L      T P C
CSE5108
                       AND NETWORKS                            3      0   0   3
UNIT I NTRODUCTION TO NETWORK SIMULATION
Simulation of Computer Networks - Introduction to Network Simulator   Linkage
between OTcl and C++ in NS2
UNIT II      SIMULATION CONCEPTS OF NS2
Implementation of Discrete-Event Simulation Network Objects: Creation,
Configuration, and Packet Forwarding
UNIT III      NS2 MODULES
Nodes as Routers or Computer Hosts - Link and Buffer Management - Packets,
Packet Headers, and Header Format - Transport Control Protocols, TCP, UDP -
Application: User Demand Indicator
UNIT IV      HELPER MODULES
Related Helper Classes, Timers, Random numbers, Built-in error models, Bit
operations of NS2 - Processing an NS2 Simulation: Debugging, Tracing, and
Result Compilation
UNIT V      MODULE DEVELOPMENT
Developing New Modules for NS2, ARQ, Packet Scheduling for Multi-Flow Data
Transmission - AWK Programming  Trace file analysis using awk scripts
TEXT BOOK
1. Teerawat Issariyakul,   Ekram Hossain, Introduction to Network Simulator
   NS2, Springer, 2009.
REFERENCES
   1. Jeruchim M.C,PhilipBalabanand Sam Shanmugam S,Simulation of
      communications systems ,PlenumPress, New York, 2004
   2 Law A.M and David Kelton W, Simulation Modelling and analysis, Mc
      GrawHill Inc., New York , 2003
   3. Hayes J.F, Modelling and Analysis of Computer Communication networks,
      Plenum Press, New York, 1984
                     KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
                                                                 L    T P C
CSE5109                SURVIVABLE NETWORKS
                                                                 3    0   0   3
UNIT I INTRODUCTION
Network Continuity  Define Survival  In defense of Paranoia  By the Numbers
 Plan to Survive  Choice Versus Chance - Tactics of Mistakes  TCP/IP 
Probes Viruses  Worms  Trojan Horses  Denial of Service /Distributed DoS 
Sample Attack
UNIT II      VULNERABILITIES
System Complexity  Top General Vulnerabilities  Top Windows Vulnerabilities 
Top Unix Vulnerabilities  Common Threads  Design your Way out of Trouble 
Defense in depth  Olive Drab Networks  Converged Networks  Operator
Error - Lessons from Failure  Lessons from Success
UNIT III     PLAN FOR SURVIVABLE NETWORKS AND DISASTERS
Three main points  Operational Continuity  Getting the People out  Data
Services Example  Topology  Facilities  Configuration Control  Unnatural
Disasters  Physical Attacks  Cyber Attacks  Combine Attacks  unnatural
disasters (Un-intentional)  Unfortunate Opportunities  Unfortunate Planning 
Unfortunate Implementation
UNIT IV      PREPARING FOR DISASTER
Survival requirements  Network Continuity Requirements  Threat Analysis 
Operational Analysis  Survival Planning  Fixes  Remedies  Procedures 
Survivability Today  Data Currency  Trade  Offs
UNIT V       RECOVERY AND BUSINESS CASE
Cyber Recovery  Operational Procedures  Forensic Procedures  Physical
Discovery  Restoration  Rehearsal Evolution      - Business Case 
Understanding the Cost  Understanding the Revenues  Expected values 
Presenting your case  CDG Example  Necessity  Catastrophes happen 
Your Recovery  Trade Offs
REFERENCES
   1. Annlee Hines, Planning for Survivable Networks: Ensuring Business
      Continuity, Wiley Publishing, 2002.
   2. Mechthild Stoer, Design of Survivable Networks, Springer Verlag 1992.
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering        Regulations -2014
   3. R. Bhandari, Survivable Networks  Algorithms for Diverse Routing,
      Springer, 1999.
   4. Ibrahima Diarrassouba, Survivable Network Design Problems with High
      Connectivity Requirement: Optimization Models and Exact Algorithms,
      Lambert Academic Publishing, 2012.
                                                            L   T P C
CSE5183              NETWORK SIMULATION LAB
                                                            0   0   3   1
LIST OF EXPERIMENTS:
I. STUDY OF GLOMOSIM AND NS  2 SIMULATORS
II. SIMULATION USING GLOMOSIM
     1. Simulate Ad hoc network using AODV protocol.
     2. Simulate Ad hoc network using DSDV protocol.
     3. Simulate Ad hoc network using DSR protocol.
III .SIMULATION USING NETWORK SIMULATOR -2
     1. Simulate Ad hoc network using AODV protocol.
     2. Simulate Ad hoc network using DSDV protocol.
     3. Simulate Ad hoc network using DSR protocol.
     4. Simulate a MPLS network using LDP protocol.
     5. Simulate a MPLS network for differentiated Services.
     6. Simulate a Random number Generators
     7. Simulate a MPLS network providing alternate LSPs under protection
        scheme.
IV. POST TRACE ANALYSIS USING PERL AND AWK SCRIPTS
V. PERFORMANCE ANALYSIS BY PLOTTING GRAPHS USING XGRAPH
AND GNUPLOT
                      KALASALINGAM UNIVERSITY
M.Tech                         Network Engineering              Regulations -2014
                NETWORK FORENSICS, TESTING AND                       L    T P C
CSE5184
                       MONITORING LAB                                0    0   3   3
LIST OF EXPERIMENTS
Network Forensics
      1. Intrusion detection
      2. Logging (the best way to track down a hacker is to keep vast records
          of activity on a network with the help of an intrusion detection system)
      3. Correlating intrusion detection and logging
Testing and Monitoring
      1. IP Monitoring
      2. Network management using Cisco Works
      3. Network protocol analysis
      4. Network Traffic Engineering
      5. Network Delay analysis
      6. Troubleshooting basic network problems (IP configuration, NIC)
      7. Bandwidth Measuring/Monitoring/Engineering
      8. Network Hacker Monitoring
      9. Enterprise Management using Tivoli - Net View
      10. Use of Network Monitoring/testing Tools
                         KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
                                                                 L    T P C
CSE5110         MOBILE AND PERVASIVE COMPUTING
                                                                 3    0   0   3
UNIT I INTRODUCTION
Differences between Mobile Communication and Mobile Computing  Contexts
and Names  Functions  Applications and Services  New Applications 
Making Legacy Applications Mobile Enabled  Design Considerations 
Integration of Wireless and Wired Networks  Standards Bodies  Pervasive
Computing  Basics and Vision  Principles of Pervasive Computing 
Categories of Pervasive Devices.
UNIT II      3G AND 4G CELLULAR NETWORKS
Migration to 3G Networks  IMT 2000 and UMTS  UMTS Architecture  User
Equipment  Radio Network Subsystem  UTRAN  Node B  RNC functions 
USIM  Protocol Stack  CS and PS Domains  IMS Architecture  Handover 
3.5G and 3.9G a brief discussion  4G LAN and Cellular Networks  LTE 
Control Plane  NAS and RRC  User Plane  PDCP, RLC and MAC  WiMax
IEEE 802.16d/e  WiMax Internetworking with 3GPP
UNIT III     SENSOR AND MESH NETWORKS
Sensor Networks  Role in Pervasive Computing  In Network Processing and
Data Dissemination  Sensor Databases  Data Management in Wireless
Mobile Environments  Wireless Mesh Networks  Architecture  Mesh Routers
 Mesh Clients  Routing  Cross Layer Approach  Security Aspects of Various
Layers in WMN  Applications of Sensor and Mesh networks
UNIT IV      CONTEXT AWARE COMPUTING & WEARABLE COMPUTING
Adaptability  Mechanisms for Adaptation - Functionality and Data  Transcoding
 Location Aware Computing  Location Representation  Localization
Techniques  Triangulation and Scene Analysis  Delaunay Triangulation and
Voronoi graphs  Types of Context  Role of Mobile Middleware  Adaptation
and Agents  Service Discovery Middleware Health BAN- Medical and
Technological Requirements-Wearable Sensors-Intra-BAN communications
UNIT V       APPLICATION DEVELOPMENT
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering             Regulations -2014
Three tier architecture - Model View Controller Architecture - Memory
Management  Information Access Devices  PDAs and Smart Phones  Smart
Cards and Embedded Controls  J2ME  Programming for CLDC  GUI in MIDP
 Application Development ON Android and iPhone
REFERENCES:
1. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, Mobile Computing:
Technology, Applications and Service Creation, 2 nd edition, Tata McGraw Hill,
2010.
2. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
3. Pei Zheng and Lionel M Li, Smart Phone & Next Generation Mobile
Computing, Morgan Kaufmann Publishers, 2006.
4. Frank Adelstein, Fundamentals of Mobile and Pervasive Computing, TMH,
2005
5. Jochen Burthardt et al, Pervasive Computing: Technology and Architecture of
Mobile Internet Applications, Pearson Education, 2003
6. Feng Zhao and Leonidas Guibas, Wireless Sensor Networks, Morgan
Kaufmann Publishers, 2004
7. Uwe Hansmaan et al, Principles of Mobile Computing, Springer, 2003
8. Reto Meier, Professional Android 2 Application Development, Wrox
Wiley,2010.
9. Mohammad s. Obaidat et al, Pervasive Computing and Networking, John wiley
10. Stefan Poslad, Ubiquitous Computing: Smart Devices, Environments and
Interactions, Wiley, 2009
11. Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert
Fundamentals of Mobile and Pervasive Computing, McGraw-Hill, 2005
                     KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering             Regulations -2014
                                                                L    T P C
CSE5111                  OPTICAL NETWORKS
                                                                3    0   0   3
UNIT I      OPTICAL NETWORK TECHNOLOGY AND COMPONENTS
Circuit Switching-Packet Switching-Optical Networks-Optical Layers-Optical
Packet Switching-Transmission Basis  Propagation of Signals in Optical Fiber-
Modulation and Demodulation formats. Couplers, Isolators & Circulators,
Multiplexers & Filters, Optical Amplifiers, Switches, Wavelength Converters.
UNIT II     OPTICAL NETWORKS ARCHITECTURES
SONET/SDH: Multiplexing- Layers-Frame Structure-Elements of SONET/SDH
Infrastructure- ATM: Functions-Adaptation Layer-QOS-Flow Control- Signaling
and Routing, IP: Routing and Forwarding- QOS- MPLS, SAN: ESCON- Fiber
Channel- HIPPI
UNIT III WDM NETWORK DESIGN
WDM Network Elements: Line Terminal- Line Amplifier- OXC and its
configuration, WDM Network Design: Cost Trade Offs  LTD and RWA Problem-
Dimensioning Wave Length Routing Network- Statistical and Maximum Load
Dimensioning Model.
UNIT IV ADVANCED OPTICAL NETWORKS
Access Network: Overview- HFC- FTTC, Photonic Packet Switching:
OTDMSynchronization- Buffering-Header processing- Burst Switching- NTTs
Optical ATM switches-AON-CORD, Long- Haul Networks- Long- Haul Network
Case Study- Long- Haul Undersea Networks- Metro Networks- Metro Ring Case
Study.
UNIT V     OPTICAL NETWORK DESIGN AND MANAGEMENT
                     KALASALINGAM UNIVERSITY
M.Tech                        Network Engineering             Regulations -2014
Transmission System Engineering: Power penalty- Gain Saturation and
Equalization in EDFA- Power Transient and Automatic Control-Cross Talk-
Dispersion- Wave Length Stabilization- Fiber Non linearities- Soliton system-
over all design Consideration. Control and Management  Network management
functions, Configuration management, Performance management, Fault management,
Optical safety, Service interface.
TEXT BOOK
1. Ramaswami .R and Sivarajan .K, Optical Networks: A Practical
Perspective, Morgan Kaufmann, 3rd Edition, 2009.
REFERENCES:
1. Stern T.E and Bala K, Multiwave length Optical Networks: A Layered
Approach, Addison-Wesley.
2. Agarwal G.P, Fiber-Optic Communication Systems, John Wiley and
Sons
                                                                   L   T P C
CSE5112       MULTIMEDIA COMMUNICATION NETWORKS
                                                                   3   0   0   3
UNIT I        MULTIMEDIA COMMUNICATION MODELS
Architecture of Internet Multimedia Communication- Protocol Stack-
Requirements and Design challenges of multimedia communications- Multimedia
distribution models Unicasting, Broadcasting and Multicasting.
UNIT II       GUARANTEED SERVICE MODEL
Multicast routing-PIM- Best effort service model and its limitations- QoS and its
metrics-Queuing techniques-WFQ and its variants-RED-QoS aware routing -Call
Admission Control-RSVP- Policing and Traffic Shaping algorithms- QoS
architectures.
UNIT III    MULTIMEDIA TRANSPORT
End to end solutions-Multimedia over TCP-Significance of UDP- Multimedia
Streaming- Audio and Video Streaming-Interactive and non Interactive
Multimedia- RTSP- RTP/RTCP  SIP-H.263.
UNIT IV     MULTIMEDIA OVER WIRELESS NETWORKS
End to end QoS Provisioning-QoS enhancements-Call Admission Control-QoS
Management-Multimedia support in 3G & 4G networks- Location Based
Multimedia Service System.
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering           Regulations -2014
UNIT V       MULTIMEDIA NETWORK SECURITY AND APPLICATIONS
Security threats in Multimedia Communication- Digital Rights Management
Architecture-DRM for Mobile Multimedia- Architectures, Requirements and
Design Challenges of real time Multimedia Network Applications- Case Study-
VoIP- Video Conferencing- Military Surveillance- Interactive TVVideo on
Demand- Smart Phone.
REFERENCES:
1. K. R. Rao, Zoran S. Bojkovic, Dragorad A. Milovanovic, Introduction to
Multimedia
Communications Applications, Middleware, Networking, John Wiley and Sons,
2006.
2. Jean Warland, Pravin Vareya, High Performance Networks, Morgan Kauffman
Publishers, 2002.
3. William Stallings, High Speed Networks and Internets Performance and
Quality of Service, 2nd Edition, Pearson Education, 2002.
4. Aura Ganz, Zvi Ganz, Kitti Wongthawaravat, Multimedia Wireless Networks
Technologies, Standards and QoS, Prentice Hall, 2003.
5. Mahbub Hassan and Raj Jain, High Performance TCP/IP Networking, Pearson
Education, 2004
6. Shiguo Lian, Multimedia Communication Security Recent Advances, Nova
Science Publishers, 2008.
                                                               L   T P C
CSE5113                  4G TECHNOLOGIES
                                                               3   0   0   3
UNIT I         INTRODUCTION
Introduction: History of mobile cellular systems, First Generation, Second
Generation, Generation 2.5, Overview of 3G & 4G, 3GPP and 3GPP2 standards
UNIT II       3G NETWORKS
3G Networks: Evolution from GSM, 3G Services & Applications, UMTS network
structure, Core network, UMTS Radio access, HSPA  HSUPA, HSDPA, CDMA
1X , EVDO Rev -0, Rev-A, Rev-B, Rev-C Architecture, protocol stack.
UNIT III      4G LTE NETWORKS
4G Vision, 4G features and challenges, Applications of 4G, 4G Technologies 
Multi carrier modulation, Smart Antenna Techniques, OFDM-MIMO Systems,
Adaptive Modulation and Coding with Time-Slot Scheduler, Bell Labs Layered
Space Time (BLAST) System, Software-Defined Radio,Cognitive Radio.
UNIT IV      WiMAX NETWORKS
WiMax: Introduction  IEEE 802.16, OFDM, MIMO, IEEE 802.20
                     KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
UNIT V       SPECTRUM & PERFORMANCE
Spectrum for LTE-Flexibility-Carrier Aggregation-Multi standard Radio base
stations-RF requirements for LTE-Power level requirements-Emission
requirements-Sensitivity  and     Dynamic     range-Receiver    susceptibility.
Performance Assessment-Performance Evaluation
REFERENCES:
1. Juha Korhonen, Artech House, Introduction to 3G Mobile Communication, Jan
2003, ISBN-10: 1580535070.
2. Erik Dahlman, Stefan Parkvall, Johan Skold, 4G LTE/LTE  Advanced for
Mobile Broadband, , Academic Press, 2011.
3. Erik Dahlman, Stefan Parkvall, Johan Skold and Per Beming, 3G Evolution
HSPA and LTE for Mobile Broadband, Academic Press, Oct 2008, ISBN-10:
0123745381.
4. Flavio Muratore, UMTS Mobile Communication for the Future, John Wiley &
Sons Ltd, Jan 2001, ISBN-10: 0471498297
5. Harri Holma and Antti Toskala, HSDPA/HSUPA for UMTS, Johan Wiley & Sons
Ltd, May 2006, ISBN-10: 0470018844
6. Savo G.Glisic, Advanced Wireless Networks- 4GTechnologies, Wiley, 2006
7. Magnus Olsson, Catherine Mulligan, EPC and 4G packet network, Elsevier
2012
8. Vijay Garg, Wireless Communications and Networking, Elsevier, Morgan
kufmann publisher 2007.
                                                                  L   T P C
CSE5114       VEHICULAR ADHOC NETWORKS (VANETS)
                                                                  3    0   0   3
UNIT I INTRODUCTION TO VANETS
Infrastructure in Vehicular Communications : Status, Challenges and
Perspectives  Architecture of Vehicular Ad Hoc Networks  Traffic Engineering 
Traffic Monitoring Models for Traffic Flow and Vehicle Motion  Co-operative
Vehicular Safety Applications  Enabling Technologies  Co-operative System
Architectures  Mapping for Safety Applications- VANET  enabled Active Safety
Applications
UNIT II      INFORMATION DISSEMINATION AND MOBILITY MODELING IN
VANETS
Introduction  Obtaining Local Measurements  Information Transport 
Protocols for Information Transport  Improving Network Connectivity  What to
Transport  Summarising Measurements  Geographical Data Aggregation 
                      KALASALINGAM UNIVERSITY
M.Tech                      Network Engineering             Regulations -2014
VANET Convenience and Efficiency Applications Vehicular Mobility Modeling for
VANET  Flow Models  Traffic Models  Behavioral Models  Trace or Survey
based Models  Integration with Network Simulators
UNIT III PHYSICAL LAYER AND               MAC     LAYER   FOR    VEHICULAR
COMMUNICATIONS
Wireless Propagation Theory  Channel Metrics  Measurement Theory 
Empirical Channel Characterisation at 5.9 GHz  MAC Layer and Scalability
Aspects of Vehicular Communication Networks  Communication based on IEEE
802.11 p  Performance Evaluation and Modeling  Aspects of Congestion
Control
UNIT IV   APPLICATION           LEVEL       MESSAGE        CODING        AND
COMPOSITIONS
Introduction to Application Environment  Safety Applications and data
requirements  Desirable Architectural features  Broadcast Characteristics 
Message Dispatcher  Data element dictionary  Message Construction 
Example Applications  Emergency brake warning  Intersection violation
warning - Data sets  Predictive coding  Architecture Analysis
UNIT V   DATA SECURITY             AND     STANDARDS        IN   VEHICULAR
COMMUNICATION NETWORKS
Challenges of Data Security in Vehicular Networks  Network, Applications, and
Adversarial Model  Network Model  Application Model  Attacker Model 
Security Infrastructure  Cryptographic Protocols  Privacy Protection
Mechanisms  Implementation Aspects  Standards and Regulations  Layered
architecture for VANETs  DSRC Regulstions  DSRC Physical Layer and Middle
Layers  DSRC Message Sub layer.
REFERENCES :
   1. Hannes Hartenstein and Kenneth P Laberteaux, VANET Vehicular
      Applications and Inter-Networking Technologies, Wiley 2010
   2. Mohamed Watfa, Advances in Vehicular Ad-Hoc Networks: Developments
      and Challenges, Information Science Reference , 2010
   3. Stephan Olariu, Michele C. Weigle Vehicular Networks: From Theory to
      Practice, Chapman and Hall/CRC , 2009
                     KALASALINGAM UNIVERSITY
M.Tech                         Network Engineering                Regulations -2014
                                                                       L    T P C
CSE5115         HIGH SPEED SWITCHING ARCHITECTURE
                                                                       3    0   0   3
UNIT I      HIGH SPEED NETWORK
LAN and WAN network evolution through ISDN to BISDN - Transfer mode and control
of BISDN - SDH multiplexing structure - ATM standard , ATM adaptation layers.
UNIT II     LAN SWITCHING TECHNOLOGY
Switching concepts; Switch forwarding techniques; switch path control - LAN switching;
cut through forwarding; store and forward - virtual LANs.
UNIT III    ATM SWITCHING ARCHITECTURE
                        KALASALINGAM UNIVERSITY
M.Tech                           Network Engineering                Regulations -2014
Switch models - Blocking networks  basic and enhanced banyan networks - sorting
networks  merge sorting - rearrange able networks - full and partial connection networks
- nonblocking networks  recursive network  construction and comparison of non-
blocking network - switches with deflection routing  shuffle switch - tandem banyan.
UNIT IV       QUEUES IN ATM SWITCHES
Internal queuing  Input, output and shared queuing - multiple queuing networks 
combined input, output and shared queuing  performance analysis of queued switches.
UNIT V       IP SWITCHING
Addressing mode - IP switching types-flow driven and topology driven solutions - IP
Over ATM address and next hop resolution  multicasting - IPv6 over ATM.
TEXT BOOK
   1. Ranier Handel, Manfred Huber N, Stefan Schrodder, ATM Networks-concepts,
      protocols, applications, Adisson Wesley, New York, 3rd Edition, 1999.
REFERENCES
   1. John Chiong A, Internetworking ATM for the internet and enterprise networks,
      McGraw Hill, New York, 1998.
   2. Achille Patavina, Switching Theory: Architectures and performance in Broadband
      ATM Networks, John Wiley and Sons Ltd., New York.1998.
                                                                         L    T P C
CSE5116                     INTERNET OF THINGS
                                                                         3    0   0   3
UNIT I INTRODUCTION
Definitions and Functional Requirements Motivation  Architecture - Web 3.0
View of IoTUbiquitous IoT Applications  Four Pillars of IoT  DNA of IoT - The
Toolkit Approach for End-userParticipation in the Internet of Things. Middleware
for IoT: Overview  Communication middleware for IoT IoT Information Security
UNIT II       IOT PROTOCOLS
Protocol Standardization for IoT  Efforts  M2M and WSN Protocols  SCADA
and RFID Protocols Issues with IoT Standardization  Unified Data Standards 
                        KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
Protocols  IEEE 802.15.4  BACNet Protocol  Modbus  KNX  Zigbee
Architecture  Network layer  APS layer  Security
UNIT III     WEB OF THINGS
Web of Things versus Internet of Things  Two Pillars of the Web  Architecture
Standardization for WoT Platform Middleware for WoT  Unified Multitier WoT
Architecture  WoT Portals and Business Intelligence. Cloud of Things: Grid/SOA
and Cloud Computing  Cloud Middleware  Cloud Standards  Cloud Providers
and Systems  Mobile Cloud Computing  The Cloud of Things Architecture
UNIT IV      INTEGRATED
Integrated Billing Solutions in the Internet of Things Business Models for the
Internet of Things - Network Dynamics: Population Models  Information
Cascades - Network Effects  Network Dynamics: Structural Models - Cascading
Behavior in Networks - The Small-World Phenomenon
UNIT V       APPLICATIONS
The Role of the Internet of Things for Increased Autonomy and Agility in
Collaborative Production Environments - Resource Management in the Internet
of Things: Clustering, Synchronisation and Software Agents. Applications - Smart
Grid  Electrical Vehicle Charging
REFERENCES:
   1. Honbo Zhou, The Internet of Things in the Cloud: A Middleware
      Perspective, CRC Press, 2012.
   2. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the
      Internet of Things, Springer, 2011.
   3. David Easley and Jon Kleinberg, Networks, Crowds, and Markets:
      Reasoning About a Highly Connected World, Cambridge University Press
      - 2010
   4. Olivier Hersent, Omar Elloumi and David Boswarthick, The Internet of
      Things: Applications to the Smart Grid and Building Automation, Wiley,
      2012
   5. Olivier Hersent, David Boswarthick, Omar Elloumi , The Internet of Things
       Key applications and Protocols, Wiley, 2012
                                                                  L   T P C
CSE5117         MOBILE APPLICATION DEVELOPMENT
                                                                  3   0   0   3
UNIT I INTRODUCTION
Preliminary Considerations  Cost of Development  Importnace of Mobile
Strategies in Business World  Mobile Web Presence  Mobile Applications 
Marketing  Web Services for Mobile Devices  Creating Example Web Service _
Debugging Web Sevice
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
UNIT II      MOBILE USER INTERFACE DESIGN
Effective Use of Screen Real Estate  Understanding Mobile Application Users 
Understanding Mobile Information Design  Understanding Mobile Platforms 
Using the Tools for Mobile Interface Design  Choosing a Mobile Web Option 
Adaptive Mobile Website  Mobile Web Applications with HTML 5
UNIT III     ANDROID APPLICATION DEVELOPMENT
Getting to know the Android User Interfaces  Designing Your User interface
using Views  Displaying Pictures and Menus with Views  Using Image views to
Display pictures  Using menus with views  Data Persistence  Saving and
loading user performances - Persisting data to files  Creating and using Data
bases                                    Content                    Providers.
UNIT IV  ANDROID MESSAGING, NETWORKING, LOCATION BASED
SERVICES
SMS Messaging, Sending E-mail  Networking  Downloading Binary Data, Text
Files- Accessing Web Services  Performing Asynchronous Calls  Location
Based Services  Displaying Maps  Getting Location Data  Creating your own
services  Communicating between a service and an activity  Binding activities
to Services
UNIT V       IOS AND WINDOWS PHONE
Getting started with iOS  iOS Project  Debugging iOS Apps  Objective C
Basics  Hello Word App  Building the derby app in iOS  Windows Phone 7
Project  Building Derby App in Windows Phone 7.
REFERENCES
   1. Jeff McWherter and Scott Gowell, Professional Mobile Application
      Development, Wrox 2012.
   2. Wei  Meng Lee, Beginning Android Application Development, Wiley 2011
   3. Charlie Collins, Michael Galpin and Matthias Kappler, Android in Practice,
      Dream Tech. 2012
   4. James Dovey and Ash Furrow, Beginning Objective C, Apress, 2012
   5. David Mark, Jack Nutting, Jeff LaMouche, and Fredric Olsson, Beginning
      iOS6 Development: Exploring the iOS SDK, Apress, 2013.
                                                                  L   T P C
CSE6101                 NETWORK FORENSICS
                                                                  3   0   0   3
UNIT I INTRODUCTION
                      KALASALINGAM UNIVERSITY
M.Tech                        Network Engineering             Regulations -2014
Practical Investigative Strategies  Real World Class  Footprints  Concepts in
Digital Evidence  Challenges relating to Network Evidence  Network Forensics
Investigative Methodology  Technical Fundamentals  Sources of Network
Based Evidences  Evidence Acquisition  Physical Interception  Traffic
Acquisition Software  Active Acquisition.
UNIT II      TRAFFIC ANALYSIS
Packet Analysis  Protocol Analysis - Flow Analysis  Higher  Layer Traffic
Analysis  Case Study  Statistical Flow Analysis  Sensors  Flow Record
Export Protocol  Collection and Aggregation  Analysis  Case Study
UNIT III     WIRELESS NETWORK FORENSICS AND IDS
Wireless Access Points  Wireless Traffic Capture and Analysis  Common
Attacks  Locating Wireless Devices  Case Study  Network Intrusion Detection
and Analysis  Types of NIDS/NIPS  NIDS/NIPS Evidence Acquisition 
Comprehensive Packet logging  Snort  Case Study
UNIT IV      NETWORK DEVICES AND SERVERS
Event Log Aggregation, Correlation and Analysis  Sources of Logs  Network
Log Architecture  Collecting and Analysing Evidences  Case Study 
Switches , Routers and Firewalls  Interfaces  Logging  Case Study - Web
Proxies  Web Proxy Functionality  Evidence- Squid  Web Proxy Analysis 
Encrypted Web Traffic - Case Study
UNIT V       ADVANCED TOPICS
Network Tunneling  Tunneling for Functionality - Tunneling for Confidentiality -
Covert Tunneling  Case Study  Malware Forensics  Trends in Malware
Evolution  Network Behavior of Malware  The future of Malware and Network
Forensics  Case Study
REFERENCES
   1. Sheri Davidoff and Jonathan Han, Network Forensics  Tracking Hackers
      through Cyberspace, Prentics Hall, 2012.
   2. William J Buchanan, Introduction to Security and Network Forensics, CRC
      Press, 2011.
   3. Kevin Mandia, Chris Prosise, Incident Response and computer forensics,
      Tata McGrawHill, 2006.
   4. Bill Nelson, Amelia Philips and Christopher Steuart, Guide to computer
      forensics and investigations, course technology, Cengage Learning;
      4thedition, ISBN: 1-435-49883-6, 2009.
                                                                   L   T P C
CSE6102             ENTERPRISE NETWORK DESIGN
                                                                   3   0   0   3
                      KALASALINGAM UNIVERSITY
M.Tech                        Network Engineering           Regulations -2014
UNIT I  INTRODUCTION TO NETWORK CONCEPTS, STANDARDS AND
PROTOCOLS
Introduction to Computer Networks - Networking Standards and Reference
Models - Transmission Basics and Networking Media  Introduction to TCP/IP
Protocols
UNIT II        LOCAL AND WIDE AREA NETWORK TOPOLOGIES AND
HARDWARE
LAN Topologies and Ethernet Standards - Networking Hardware - Wide Area
Networking Technologies -WAN Topologies - WAN Transmission Methods - WAN
Implementation and Remote Connectivity  Wireless Networking
UNIT III    ENTERPRISE NETWORKING WITH WINDOWS 2008 and UNIX
Characteristics of Network Operating Systems - Networking with Windows Server
2008 - Networking with UNIX
UNIT IV     INDEPTH TCP/IP NETWORKING
Designing TCP/IP based networks  TCP/IP mail Services  TCP/IP Utilities 
Voice and Video over IP  Signaling and Transport Protocols  QoS Assurance
UNIT V      ENTERPRISE NETWORK MANAGEMENT
Security Audits, Risks and Policies  Security in Network Design  Wireless
Network Security - Troubleshooting Network Problems - Ensuring Network
Integrity and Availability -Maintaining and Upgrading Computer Networks 
Network Management Fundamentals  Fault and Performance Management 
Change Management
TEXT BOOK
   1. Tamara Dean, Network+ Guide to Networks , Course Technology, USA,
      2010, 5th edition
   2. Glen E. Clarke, CompTIA Network+ Certification Study Guide, Tata
      McGraw Hill, 2009, 4th edition
                     KALASALINGAM UNIVERSITY
M.Tech                        Network Engineering              Regulations -2014
                                                                    L   T P C
CSE6103               CONVERGENT NETWORKING
                                                                    3   0    0   3
UNIT I      TRADITIONAL VOICE NETWORKS:
The state of voice communications  Enterprise telephony signaling  Signaling
system 7  Call routing and dial plans  defining and measuring voice quality 
voice digitization and coding.
UNIT II      PACKET VOICE AND DATA NETWORKS:
Quality of Service criteria for packet telephony  WAN protocols for integrated
voice and data services  Design considerations for WAN protocols  Review of
IP features for voice/Data integration.
UNIT III     VOICE OVER IP:
VOIP fundamental  VOIP gateways  VOIP design elements  Routing calls
over analog voice posts  Performing call signaling over digital voice parts.
UNIT IV       VOICE GATEWAYS AND GATE KEEPERS:
Gateways and gate keepers  Media gateway control protocol  H.323 Session
Initiation protocol  Connecting to PSTN - Connecting to PBX  Connecting to IP
WAN  Dial plans  Digit manipulation  Configuring class of restrictions.
UNIT V       GATE KEEPERS & UNIFIED COMMUNICATION MANAGER:
Deploying gate keepers  Gate keeper configuration  IP to IP gateways - Cisco
unified communication manager  Architecture  Deployment models  End
points  Media resources  User features  Voice mail integration.
REFERENCES:
   1. Scott Keagy, Integrating voice and data networks, Cisco press, 2000.
   2. Kevin Wallace, Cisco Voice Over IP (CVoice), 3 rd edition 2009.
   3. Denise Dano hue, David Mellory and Ken Salhoff, Cisco Voice Gateways
      and Gate Keepers, Pearson education 2008.
   4. Dennis Hartmann, Implementing Cisco Unified Communications Manager 
       Part I, Pearson Education, 2009.
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
                                                                 L    T P C
CSE6104              STORAGE AREA NETWORKS
                                                                 3    0   0   3
UNIT I     STORAGE SYSTEMS
Introduction to Information Storage and Management: Information Storage, Data
Center Infrastructure, Information Lifecycle. Storage System Environment:
Components of a Storage System, Disk Drive Architecture and Performance,
Logical Components of the Host. Data Protection: Concept of RAID and different
RAID levels. Intelligent Storage System (ISS) and its components,
Implementation of ISS as high-end and midrange storage arrays
UNIT II      STORAGE NETWORK TECHNOLOGIES
Direct Attached Storage and SCSI, Storage Area Networks: Fibre Channel.
Network Attached Storage, IPSAN: iSCSI, FCIP. Network Attached Storage,
Content Addressed Storage.
UNIT III     STORAGE VIRTUALIZATION
Forms of Virtualization, Storage Virtuaization Challenges, File and Block level
Virtualization, Concepts in Practice. Cloud Computing: Cloud Services (SaaS,
PaaS, and Iaas), Cloud concerns and implementations
UNIT IV      BUSINESS CONTINUITY
Business Continuity Life Cycle, Failure Analysis, Backup and Recovery:
Architecture and different Backup/Recovery topologies, Local Replication
technologies and their operation, Remote replication technologies and their
operation. Overview of emerging technologies like Duplication, Offsite Backup,
Continuous Data Protection (CDP) technology
UNIT V       STORAGE SECURITY AND MANAGEMENT
Storage    Security   framework,   Storage   Security   domains,    Security
implementations in Storage Networking, Monitoring the Storage Infrastructure,
Storage Management Activities, Storage Management Standards and Initiatives,
Concepts in Practice.
REFERENCES
   1. EMC Corporation, Information Storage and Management, 1 st edition, Wiley
      India, ISBN: 978-81-265-2147-0, 2009.
   2. Additional resource material on www.emc.com/resource-library/resource-
      library.esp
                      KALASALINGAM UNIVERSITY
M.Tech                         Network Engineering               Regulations -2014
   3. Marc Farley, Storage Networking Fundamentals: An Introduction to
      Storage Devices, Subsystems, Applications, Management, and Filing
      Systems, Cisco Press, 2004, ISBN: 1-58705-162-1
   4. Tom Clark, Designing Storage Area Networks, Tom Clark, 2 nd edition,
      ISBN: 0-321-13650-0, 2003
                                                                     L    T P C
CSE6105           SOFTWARE DEFINED NETWORKING
                                                                     3    0   0   3
UNIT I INTRODUCTION
Introduction  Centralised and Distributed Control and Data Planes  Evolution
versus Revolution  The Control Plane  Data Plane  Moving Information
between Planes  Distributed Control Planes  IP and MPLS  Creating IP
Underlay  Convergence Time  Load Balancing  High availability  creating the
MPLS overlay  Replication  Centralised Control Planes  ATM/LANE  Route
Servers
UNIT II       SDN CONTROLLERS
Introduction  General Concepts  Layer 3 Centric  Plexxi  Cisco OnePK 
Network Programmability  The Management Interface  The Application 
Network Divide  The Command line Interface  NETCONF and NETMOD-
SNMP- Modern Programmatic Interfaces- I2RS  Modern Orchestration 
OpenStack- CloudStack- Puppet.
UNIT III      NETWORK FUNCTION VIRTUALISATION
The Multitenant Data Centre  The virtualized Multitenant Data Centre  SDN
Solutions for the Data Centre Network  VLANs- EVPN  VxLAN  NVGRE 
Network Function Virtualisations  Virtualisation snd Data Plane I/O  Services
Engineered Path  Service Locations and Chaining  NFV at ETSI  Non- ETSI
NFV Work
UNIT IV       USE CASES
Use cases for Bandwidth Scheduling, Manipulation, and Calendaring 
Bandwidth Calendaring  Big Date and Application Hyper  Virtualisation for
Instant CSPF- Use cases for Data Centre Overlays, Big data, and Network
Function Virtualisation  Use case for Input Traffic Monitoring, Classification, and
Triggered Actions.
UNIT V        OPENFLOW
Introduction to OpenFlow  Building Blocks  OpenFlow Messages  Northbound
Interface- Implementing OpenFlow Switch  OpenFlow Reference Switch 
                       KALASALINGAM UNIVERSITY
M.Tech                     Network Engineering            Regulations -2014
Hardware Implementations  Software based Switches  Openflow in Cloud
Computing.
REFERENCES :
   1. Thomas D.Nadeau and Ken Gray, Software Defined Networks, Oreilly,
      2013
   2. Siamak Azodolmolky, Software Defined Networking with OpenFlow,
      PACKT Publishing, 2013
   3. Rajesh Kumar Sundarrajan, Software Defined Networking(SDN)- a
      definitive guide, e-book, March 2014.
           NETWORK SYSTEM DESIGN USING NETWORK                L   T P C
CSE6106
                       PROCESSORS                             3   0   0   3
UNIT I     INTRODUCTION
Introduction and overview-Basic Terminology and Example Systems -Review of
Protocols and Packet Formats.
UNIT II    TRADITIONAL PROTOCOL PROCESSING SYSTEMS
Conventional computer hardware and its use in low-end network systems-
Algorithms for protocol processing-packet processing functionality-Software
architectures for protocol processing on conventional hardware-advanced
hardware architectures
UNIT III   NETWORK PROCESSOR TECHNOLOGY
Motivation for network processors-Complexity of network processor design-
network processor architectures-Scaling a network processor-a review of
commercial network processor architectures-languages
UNIT IV    NETWORK PROCESSORS AND PROGRAMMING
Discussion of Intel IXP2XXX network processor-Intel: reference platform;
embedded
RISC processor-Intel: programmable packet processor hardware and
programming- Intel: more on programming the packet processors- a
programming example- Programming example; switching fabrics
UNIT V     ALTERNATIVE ARCHITECTURES
Network processor design tradeoffs-Active and programmable networks-Active
network
Applications - Commercial network processors-Benchmarks for Network
Processors
                     KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
TEXT BOOK
1. Comer D, Network Systems Design Using Network Processors, Intel
IXP1200
Version, Prentice Hall, 2003.
                                                                 L    T P C
CSE6107                AUTONOMIC NETWORKS
                                                                 3    0   0   3
UNIT I INTRODUCTION
Introduction to Autonomic Concepts Applied to Future Self-Managed Networks 
The need for Autonomic Systems  Application of Autonomics to Computers 
Autonomics Computing -        From Autonomics Computing to Autonomics
Networking  Autonomic Networking Design Principles  From Autonomic
Networking to Autonomic Network Management.
UNIT II      AUTONOMIC NETWORK ARCHITECTURE
Autonomic Overlay Network Architecture  Smart Media Routing and Transport 
An Autonomic Service Architecture - ANA : Autonomic Network Architecture 
Core Architectural Abstractions  The Compartment API  Implementation of a
Functional Block for Inter-Compartment Connectivity  A utility-Based Autonomic
Architecture to Support QoE Quantification in IP Networks
UNIT III AUTONOMIC NETWORK MANAGEMENT , SELF ORGANISING
ARCHITECTURE
Autonomic Network Management : Avoiding New Management Silos 
Federation of Networks  Federation of Management Systems  End to End
management of IPTV Services - Principles of Self- Organisation  Self
Organising Modules Inter-/Intra- Layer Interactions  Evaluation Methodologies
UNIT IV      AUTONOMICS IN RADIO ACCESS NETWORKS
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering             Regulations -2014
Radio Resource Management  Self-Organising Network  Self Optimization 
SON in Radio Access Networks  SON in GSM- SON in UMTS  SON in LTE 
SON in Heterogeneous Networks  SON in IEEE 1900 Standard  Control and
Learning Techniques in SON  SON Use Case in LTE Network: Intercell
Interference Co-ordination
UNIT V       AUTOMATED POLICY MANAGEMENT
Security Risk Evaluation Framework  Service Risk Analysis  Network Risk
Analysis - Quality of Protection Metric  ROCONA Tool Implementation 
Deployment and Case Study  Experimentation and Evaluation  Vulnerability
Database Used in the Experiments  Validation of HVM  Validation of Expected
Risk (ER)  Validation of QoPM- Running Time Evaluation of the Attack
Propagation Metric.
REFERENCES:
   1. Nazim Agoulmine, Autonomic Network Management Principles, Academic
      Press 2011
   2. Monique Calisti, John C. Strassner, Advanced Autonomic Networking and
      Communication, Springer 2008
   3. Mieso Denko, Laurence Tianruo Yang, Yan Zhang, Autonomic Computing
      and Networking, Springer 2009
                                                                 L    T P C
CSE6108                   GREEN COMPUTING
                                                                 3    0   0   3
UNIT I FUNDAMENTALS
Green IT Fundamentals: Business, IT, and the Environment  Green computing:
carbon foot print, scoop on power  Green IT Strategies: Drivers, Dimensions,
and Goals  Environmentally Responsible Business: Policies, Practices, and
Metrics.
UNIT II      GREEN ASSETS AND MODELING
Green Assets: Buildings, Data Centers, Networks, and Devices - Green Business
Process
Management: Modeling, Optimization, and Collaboration  Green Enterprise
Architecture  Environmental Intelligence Green Supply Chains  Green
Information Systems: Design and Development Models.
UNIT III     GRID FRAMEWORK
Virtualizing of IT systems  Role of electric utilities, Telecommuting,
teleconferencing and teleporting Materials recycling Best ways for Green PC 
Green Data center Green Grid framework.
UNIT IV      GREEN COMPLIANCE
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
Socio-cultural aspects of Green IT Green Enterprise Transformation Roadmap 
Green Compliance: Protocols, Standards, and Audits Emergent Carbon Issues:
Technologies and Future.
UNIT V       CASE STUDIES
The Environmentally Responsible Business Strategies (ERBS) Case Study
Scenarios for Trial Runs CASE STUDIES Applying Green IT Strategies and
Applications to a Home, Hospital, Packaging Industry and Telecom Sector.
TEXT BOOKS:
  1. Bhuvan Unhelkar, Green IT Strategies andApplications-Using
     Environmental Intelligence, CRC Press, June 2011
  2. Woody Leonhard, Katherrine Murray, Green Home computing for
     dummies, August 2009.
REFERENCES:
   1. Alin Gales, Michael Schaefer, Mike Ebbers, Green Data Center: steps for
      the Journey, Shoff/IBM rebook, 2011.
   2. John Lamb, The Greening of IT, Pearson Education,2009.
   3. Jason Harris, Green Computing and Green IT-Best Practices on
      regulations & industry, Lulu.com, 2008.
   4. Carl Speshocky, Empowering Green Initiatives with IT, John Wiley & Sons,
      2010.
   5. Wu Chun Feng (editor), Green computing: Large Scale energy efficiency,
      CRC Press, 2012
                                                                  L   T P C
CSE6109                   CLOUD COMPUTING
                                                                  3    0   0   3
UNIT  I      FOUNDATIONS
Introduction to Cloud Computing  Roots of Cloud Computing  Layers and
Types of Clouds  Desired features of a Cloud - Challenges and Risks 
Migration into a Cloud  Seven step Model of Migration in to a Cloud  Enriching
the Integrations as a Service Paradigm for the Cloud Era The Enterprise
Cloud Computing Paradigm.
UNIT  II    INFRASTRUCTURE AS A SERVICE
Virtual Machines Provisioning and Migration Services  Management of Virtual
Machines for Cloud Infrastructures  The anatomy of cloud infrastructures 
distributed Management of Virtual Infrastructures - Scheduling Techniques 
Capacity Management to meet SLA Commitments  Enhancing Cloud
Computing Environments Using Cluster as a Service  Cloud Storage
UNIT  III    PLATFORM AND SOFTWARE AS A SERVICE
Integration of Private and Public Clouds  Aneka Cloud Platform  Hybrid Cloud
Implementation  Workflow Engine for clouds  Architecture of workflow
management System  The MapReduce Programming Model and
                      KALASALINGAM UNIVERSITY
M.Tech                       Network Engineering              Regulations -2014
Implementations  MapReduce Programming Model  Major MapReduce
Implementations for the Cloud  MapReduce Impacts
UNIT  IV    MONITORING AND MANAGEMENT
An Architecture for Federated Cloud Computing  SLA Management in Cloud
Computing  Traditional Approaches to SLA Management  Types of SLA  Life
Cycle of SLA  Automated policy based management  Performance Prediction
for HPC on clouds  Grid and Cloud  HPC in the Cloud: Performance related
issues
UNIT  V     GOVERNANCE AND SECURITY
Organisational Readiness and Change Management in the cloud age  Basic
concept of Organisational Readiness  Common Change Management Models
 Data Security in the Cloud  Cloud Computing and Data Security Risk  Cloud
Computing and Identity  Content level Security  Technologies for Data Security
in Cloud Computing
REFERENCES :
   1. Rajkumar Buyya, James Broberg and Andrej Goscinski, Cloud Computing
       Principles and Paradigms, Wiley 2011
   2. Borko Furht, Armando Escalante, Handbook of Cloud Computing,
      Springer 2010
   3. Michael Miller, Cloud Computing: Web-Based Applications That Change
      the Way You Work and Collaborate Online, Que Publishing, August 2008.
   4. Kumar Saurabh, Cloud Computing  Insights into New Era Infrastructure,
      Wiley Indian Edition,2011.
                      KALASALINGAM UNIVERSITY