Mapping with COs to POs- for Network Security
PO PO PO PO                    PO PO               PO                             PO1 PO1
Knowle                           PO5                                   PO9         PO10
           1   2     3     4              6   7               8                              1   2
  dge
                                K3/K5/
 Level    K3 K4 K5 K5                    A3 A2               A3         A3          A3       A3      A2
                                  K6
 CO1
           L   M     -     -       -      -   -                -         -           -        -       -
 (K3)
 CO2
 (K3)      L   M     -     -       -      -   -                -         -           -        -       -
  CO3                                                                   S
  (K2)       M      S     -     -        -        -     -      -    (Assignm         -        -       -
                                                                      ent)
  CO4                                                                   S
  (K2)       M      S     -     -        -        -     -      -    (Assignm         -        -      S
                                                                      ent)
  CO5                                                                                S
  (K2)       M      S     -     -        -        -     -      -         -        (Semin      -       -
                                                                                    ar)
UIT11856 /                           NETWORK SECURITY                        LTPC              3 00 3
UIT12856
OBJECTIVES
   To become skilled at fundamentals of secret and public key cryptography
   To describe network security threats, network security tools and applications
   To be aware of the importance of information security.
Course Outcome:
   Apply symmetric ciphers to encrypt data (K3)
   Calculate the Public key encryption and Hash function (K3)
   Describe the purpose of Network security (K2)
   Discuss the system security details (K2)
   Review the wireless Communication & security (K2)
UNIT I           SYMMETRIC CIPHERS                                                                   9
Overview – Classical encryption techniques – Block ciphers and data encryption standard – Finite fields –
Advanced encryption standard – Contemporary symmetric ciphers – Confidentiality using symmetric
encryption.
UNIT II          PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS                                            9
Number theory – Public-key cryptography and RSA – Keym – Diffie-hellman key exchange – Elliptic
curve cryptography – Message authentication and hash functions – Hash algorithms – Digital signatures
and authentication protocols.
UNIT III         NETWORK SECURITY PRACTICE                                                           9
Authentication applications – Kerberos-X.509 authentication service – Electronic mail security – Pretty
good privacy – S/MIME – IP security – IP security architecture – Authentication header – Encapsulating
security payload – Key management.
UNIT IV         SYSTEM SECURITY                                                                   9
Intruders – Intrusion detection – Password management – Malicious software: Viruses and related threats-
Virus Countermeasures-Distributed denial of Service Attacks – Firewalls – Firewall design principles –
Trusted systems.
UNIT V          WIRELESS SECURITY                                                                 9
Introduction to Wireless Communication-Wireless Operating modes-Wireless LAN security standards-
Wireless LAN security factors and issues-IEEE 802.11 Security WEP and WPA-IEEE 802.11 Security
WPA2 and 802.11i-Network Planning and deployment performance tuning and trouble shooting.
                                                                                   TOTAL: 45 HOURS
TEXT BOOKS:
    1. William Stallings, “Cryptography and Network Security Principles and Practices”, Third Edition,
       Pearson Education, 2003.
REFERENCES:
    1. Mathew Gost ,“802.11 Wireless Networks: The Definitive guide”, Second Edition, Mathew Gost,
       O’Reilly Media Inc(April 25,2005)
    2. Jon Edney, William A.Arbaugh, “Real 802.11 Security: WI-FI Protected access and 802.11i”,
       Addison-Wesley Professional July 25, 2003.
    3. Atul Kahate, “Cryptography and Network Security”, Second Edition, TMH, 2007.
    4. Bruce Schneier, “Applied Cryptography”, Second Edition, John Wiley and Sons Inc, 2001.
    5. Stewart S. Miller, “Wi-Fi Security”, TMH, 2003.
    6. Charles B. P fleeger and Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
       Pearson Education, 2003.
Mapping with COs to POs- for Satellite Communication
          PO PO PO PO                     PO PO              PO                             PO1 PO1
Knowle                            PO5                                  PO9         PO10
           1   2     3     4               6    7             8                              1   2
  dge
                                 K3/K5/
 Level    K3 K4 K5 K5                     A3 A2              A3         A3          A3       A3       A2
                                   K6
 CO1
          M    S     -     -         -     -    -              -         -           -        -       -
 (K2)
 CO2
 (K2)     M    S     -     -         -     -    -              -         -           -        -       -
  CO3                                                                   S
  (K2)       M      S     -     -        -        -     -      -    (Assignm         -        -       -
                                                                      ent)
  CO4                                                                   S
  (K2)       M      S     -     -        -        -     -      -    (Assignm         -        -       S
                                                                      ent)
  CO5                                                                                S
  (K2)       M     L      -     -        -        -     -      -         -        (Semin      -       -
                                                                                    ar)
UEC11859 /                      SATELLITE COMMUNICATION                      LTPC            3 003
UEC12859
OBJECTIVES
   To determine look angle of earth station antenna
   To calculate sub satellite point
   To analyze subsystem configuration.
Course Outcome:
   Discuss the Laws & Satellite orbit (K2)
   Calculate link–budget for satellite communication (K2)
   Review the Satellite access and Spectrum(K2)
   Explain the antenna system(K2)
   Summarize the performance of satellite application(K2)
UNIT I           SATELLITE ORBITS                                                                 9
Kepler’s Laws, Newton’s law, orbital parameters, orbital perturbations - station keeping - geo stationary
and non Geo-stationary orbits - Look Angle Determination- Limits of visibility - eclipse-Sub satellite
point - Sun transit outage - Launching Procedures - launch vehicles and propulsion.
UNIT II          SPACE SEGMENT AND SATELLITE LINK DESIGN                                          9
Spacecraft Technology- Structure, Primary power, Attitude and Orbit control, Thermal control and
Propulsion, communication Payload and supporting subsystems, Telemetry-Tracking and command.
Satellite uplink and downlink Analysis and Design, link budget, E/N calculation-performance
impairments-system noise, inter modulation and interference, Propagation Characteristics and Frequency
considerations - System reliability and design lifetime.
UNIT III          SATELLITE ACCESS                                                        9
Modulation and Multiplexing: Voice, Data, Video, Analog - digital transmission system - Digital video
Broadcast - multiple access: FDMA – TDMA – CDMA - Assignment Methods - Spread Spectrum
communication - compression - encryption.
UNIT IV           EARTH SEGMENT                                                                   9
Earth Station Technology -Terrestrial Interface - Transmitter and Receiver - Antenna Systems TVRO -
MATV- CATV - Test Equipment Measurements on G/T, C/No – EIRP - Antenna Gain.
UNIT V            SATELLITE APPLICATIONS                                                   9
INTELSAT Series, INSAT- VSAT, Mobile satellite services: GSM - GPS-INMARSAT- LEO- MEO,
Satellite Navigational System. Direct Broadcast satellites (DBS)- Direct to home Broadcast (DTH),
Digital audio broadcast (DAB)- Worldspace services- Business TV(BTV), GRAMSAT- Specialized
services - E–mail- Video conferencing - Internet.
                                                                                .TOTAL: 45 HOURS
TEXT BOOKS:
    1. Dennis Roddy, “Satellite Communication”, McGraw Hill International, 4th Edition, 2006.
    2. Pritchard, Hendri G. Suyderhoud, Robert A. Nelson, “Satellite Communication Systems
       Engineering”, Prentice Hall/Pearson, 2007.
REFERENCES:
    1. Bruce R. Elbert, “The Satellite Communication Applications Hand Book”, Artech House Bostan
       London, 1997.
    2. Tri T. Ha, “Digital Satellite Communication”, II edition, 1990.
    3. Timothy Pratt – Charles Bostian & Jeremy Allmuti, “Satellite Communications”, John Willy &
       Sons (Asia) Pvt. Ltd, 2nd Edition 2004
    4. Brian Ackroyd, “World Satellite Communication and earth station Design”, BSP professional
       Books, 1990.
    5. M.Richharia, “Satellite Communication Systems-Design Principles”, Macmillan 2003.
Mapping with COs to POs- for CMC
             PO     PO    PO    PO                 PO      PO   PO                       PO1 PO1
Knowle                                   PO5                           PO9       PO10
              1      2     3     4                  6       7    8                        1   2
  dge
                                       K3/K5/
 Level       K3     K4    K5    K5                 A3      A2   A3     A3         A3      A3     A2
                                        K6
  CO1
             M      L      -      -        -        -      -    -       -         -        -      -
  (K2)
  CO2
  (K2)       M      L      -      -        -        -      -    -       -         -        -      -
  CO3                                                                    S
  (K2)       M      L      -      -        -        -      -    -    (Assignm     -        -      -
                                                                       ent)
  CO4         S     M      L     L         -        -      -    -        S      S (GD)     -      S
  (K3)                                                               (Assignm
                                                                       ent)
  CO5                                                                                S
  (K2)       M     L      -     -        -        -     -      -         -        (Semin      -           -
                                                                                    ar)
UEC11801/          CELLULAR AND MOBILE COMMUNICATION                          LTPC 3 00 3
UEC12801
OBJECTIVES
    To understand the Evolution of mobile communication and basic fundamentals of cellular
     concepts
    To understand the different types of propagation, modulation techniques and multiple access
     techniques
    To know the cellular systems for various applications
COURSE OUTCOME(s)
  1. Summarize the evolution of mobile communications & basic fundamentals of cellular concept.
     (K2)
  2. Classify the techniques of propagation mechanisms and their impacts on network channels.(K2)
  3. Describe the various modulation techniques, diversity and antennas for cellular communication.
     (K2)
  4. Illustrate the different types of Multiple access techniques for mobile communication.(K3)
  5. Review the various cellular systems and standards.(K2)
UNIT I           CELLULAR CONCEPT & SYSTEM DESIGN FUNDAMENTALS                                        9
Introduction to Wireless communication: Evolution of mobile communications - mobile radio systems -
Examples, trends in cellular radio and personal communications - Cellular Concept: Frequency reuse -
channel assignment hand off - Interference and system capacity - trunking and grade of service -
Improving Coverage and capacity in Cellular systems.
UNIT II          MOBILE RADIO PROPAGATION                                                         9
Free space propagation model- relating power to electric field –Propagation mechanisms- reflection
-Ground reflection model -diffraction- scattering- link budget design using path loss models -Small scale
Multipath propagation- Impulse response model of a multi-path channel- Small scale Multipath
measurements- parameters of Mobile multipath channels- types of small scale fading.
.
UNIT III        MODULATION TECHNIQUES- DIVERSITY AND ANTENNAS                                      9
Modulation Techniques: Minimum Shift Keying- Gaussian MSK- Orthogonal Frequency Division
Multiplexing, Performance of Digital Modulation in Slow-Flat Fading Channels and Frequency Selective
Mobile Channels. Diversity Techniques: Types of diversity- RAKE receiver -Basic combining methods-
Base station and mobile station antennas.
UNIT IV          MULTIPLE ACCESS TECHNIQUES AND SPEECH CODING                                     9
Multiple Access Techniques: FDMA- TDMA- spread spectrum multiple access- CDMA, SDMA- CSMA
protocols - Coding: Characteristics of speech signals - Quantization techniques - Adaptive Differential
pulse code modulation (ADPCM) - Frequency domain coding of speech, Vocoders- Linear Predictive
Coders- Selection of Speech Codec’s for Mobile Communication- GSM Codec- USDC Codec -
Performance evaluation.
UNIT V          CELLULAR SYSTEMS AND STANDARDS                                            9
WLL, Bluetooth, AMPS- GSM – Architecture - Channels and Frame structure - DECT- GPRS - EDGE-
IS-95 – Forward and Reverse CDMA Channel- WCDMA layer architecture - UMTS – PACS.
                                                                            TOTAL: 45 HOURS
TEXT BOOKS:
   1. Rappaport.T.S, “Wireless Communications: Principles and Practice”, Second Edition, Pearson
      Education / Prentice Hall of India ,Third Indian Reprint , 2003.
   2. Vijay K Garg, “Wireless Network Evolution 2G to 3G”, Pearson Education New Delhi, 2003.
REFERENCES:
   1. Dharma Prakash Agarwal and Qing An Zeng, “Introduction to Wireless and Mobile
      Systems”,Second Edition, Thomson Learning New Delhi, 2007.
   2. William C.Y.Lee,“Mobile and Cellular Telecommunications Analog and Digital Systems”,
      Second Edition,TMH.
   3. Tse & viswanath, “cellular communication”.
   4. Schiller,”mobile communications”, Pearson, 2005.
Mapping with COs to POs- for Ad hoc
         PO PO PO PO                        PO    PO   PO                           PO1 PO1
                                 PO5                            PO9        PO10
Knowled 1      2     3     4                 6     7    8                            1   2
ge Level                        K3/K5/
         K3 K4 K5 K5                        A3    A2    A3       A3         A3       A3       A2
                                  K6
  CO1
          M    L     -     -       -         -     -     -        -           -       -       -
  (K2)
  CO2                                                            S
  (K2)    M    L     -     -       -         -     -     -   (Assignme        -       -       -
                                                                nt)
  CO3
  (K2)      M     L    -     -       -       -     -     -                S (GD)      -       -
  CO4                                                            S
  (K2)      M     L    -     -       -       -     -     -   (Assignme        -       -       -
                                                                nt)
  CO5                                                                        S
  (K2)      M     L    -     -       -       -     -     -        -       (Semin      -       -
                                                                            ar)
UEC128514                  AD HOC AND SENSOR NETWORKS                       LTPC 3 00 3
OBJECTIVES
    To know the constraints of the wireless physical layer that affect the design and performance of
     ad hoc and sensor networks, protocols, and applications.
   To understand MAC and Routing protocols that have been proposed for ad hoc and sensor
     networks
   To understand the localization and energy issues in wireless sensor networks
COURSE OUTCOME(s)
  1. Review the distinctive issues in ad-hoc & sensor networks (K2)
  2. Describe MAC protocol and contention algorithms in wireless ad-hoc Networks (K2)
  3. Observe the challenges in designing routing and transport protocols for wireless ad-hoc networks.
     (K2)
  4. Discuss the challenges in designing MAC protocols for wireless sensor networks.(K2)
  5. Summarize the various design problems like localization & QoS in sensor network Platform.
     (K2)
UNIT I         INTRODUCTION                                                                 9
Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum – Radio
propagation Mechanisms – Characteristics of the Wireless Channel -mobile ad hoc networks
(MANETs) and wireless sensor networks (WSNs) :concepts and architectures. Applications of Ad Hoc
and Sensor networks. Design Challenges in Adhoc and Sensor networks.
UNIT II                 MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS
9
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols
Contention based protocols with Reservation Mechanisms- Contention based protocols with
Scheduling Mechanisms – Multi channel MAC-IEEE 802.11.
UNIT III       ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS
              NETWORKS                                               9
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing,
reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad
hoc wireless Networks.
UNIT IV        WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS
9
Single node architecture: hardware and software components of a sensor node - WSN Network
architecture: typical network architectures-data relaying and aggregation strategies -MAC layer
protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
UNIT V         WSN ROUTING, LOCALIZATION & QOS                                                     9
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-absolute and
relative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-Transport
Layer issues.
                                                                                  TOTAL: 45 HOURS
TEXT BOOKS:
  1. C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols
     ", Prentice Hall Professional Technical Reference, 2008.
  2. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:
     Theory and Applications”, World Scientific Publishing Company, 2006.
REFERENCES:
  1. Feng Zhao and Leonides Guibas, "Wireless Sensor Networks", Elsevier Publication , 2002.
  2. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor Networks”,
     Wiley, 2005.
  3. Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks-Technology,
     Protocols, and Applications”, John Wiley, 2007.
  4. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.