0% found this document useful (0 votes)
82 views9 pages

Knowle Dge Level

This document maps course outcomes (COs) to program outcomes (POs) for two courses: Network Security and Satellite Communication. For each course, it lists the COs and maps them to the appropriate POs based on the knowledge level (K2, K3, etc.) and skills (S, L, M). It then provides the course code, title, details like credit hours and objectives. Finally, it outlines the units/topics covered in each course along with references. The purpose is to demonstrate how the COs for each course align with the overall POs of the relevant program.

Uploaded by

dineshe.ece
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views9 pages

Knowle Dge Level

This document maps course outcomes (COs) to program outcomes (POs) for two courses: Network Security and Satellite Communication. For each course, it lists the COs and maps them to the appropriate POs based on the knowledge level (K2, K3, etc.) and skills (S, L, M). It then provides the course code, title, details like credit hours and objectives. Finally, it outlines the units/topics covered in each course along with references. The purpose is to demonstrate how the COs for each course align with the overall POs of the relevant program.

Uploaded by

dineshe.ece
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 9

Mapping with COs to POs- for Network Security

PO PO PO PO PO PO PO PO1 PO1
Knowle PO5 PO9 PO10
1 2 3 4 6 7 8 1 2
dge
K3/K5/
Level K3 K4 K5 K5 A3 A2 A3 A3 A3 A3 A2
K6
CO1
L M - - - - - - - - - -
(K3)
CO2
(K3) L M - - - - - - - - - -

CO3 S
(K2) M S - - - - - - (Assignm - - -
ent)
CO4 S
(K2) M S - - - - - - (Assignm - - S
ent)
CO5 S
(K2) M S - - - - - - - (Semin - -
ar)

UIT11856 / NETWORK SECURITY LTPC 3 00 3


UIT12856

OBJECTIVES
 To become skilled at fundamentals of secret and public key cryptography
 To describe network security threats, network security tools and applications
 To be aware of the importance of information security.
Course Outcome:
 Apply symmetric ciphers to encrypt data (K3)
 Calculate the Public key encryption and Hash function (K3)
 Describe the purpose of Network security (K2)
 Discuss the system security details (K2)
 Review the wireless Communication & security (K2)
UNIT I SYMMETRIC CIPHERS 9

Overview – Classical encryption techniques – Block ciphers and data encryption standard – Finite fields –
Advanced encryption standard – Contemporary symmetric ciphers – Confidentiality using symmetric
encryption.
UNIT II PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 9

Number theory – Public-key cryptography and RSA – Keym – Diffie-hellman key exchange – Elliptic
curve cryptography – Message authentication and hash functions – Hash algorithms – Digital signatures
and authentication protocols.
UNIT III NETWORK SECURITY PRACTICE 9
Authentication applications – Kerberos-X.509 authentication service – Electronic mail security – Pretty
good privacy – S/MIME – IP security – IP security architecture – Authentication header – Encapsulating
security payload – Key management.

UNIT IV SYSTEM SECURITY 9

Intruders – Intrusion detection – Password management – Malicious software: Viruses and related threats-
Virus Countermeasures-Distributed denial of Service Attacks – Firewalls – Firewall design principles –
Trusted systems.

UNIT V WIRELESS SECURITY 9

Introduction to Wireless Communication-Wireless Operating modes-Wireless LAN security standards-


Wireless LAN security factors and issues-IEEE 802.11 Security WEP and WPA-IEEE 802.11 Security
WPA2 and 802.11i-Network Planning and deployment performance tuning and trouble shooting.

TOTAL: 45 HOURS
TEXT BOOKS:

1. William Stallings, “Cryptography and Network Security Principles and Practices”, Third Edition,
Pearson Education, 2003.

REFERENCES:

1. Mathew Gost ,“802.11 Wireless Networks: The Definitive guide”, Second Edition, Mathew Gost,
O’Reilly Media Inc(April 25,2005)
2. Jon Edney, William A.Arbaugh, “Real 802.11 Security: WI-FI Protected access and 802.11i”,
Addison-Wesley Professional July 25, 2003.
3. Atul Kahate, “Cryptography and Network Security”, Second Edition, TMH, 2007.
4. Bruce Schneier, “Applied Cryptography”, Second Edition, John Wiley and Sons Inc, 2001.
5. Stewart S. Miller, “Wi-Fi Security”, TMH, 2003.
6. Charles B. P fleeger and Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003.
Mapping with COs to POs- for Satellite Communication
PO PO PO PO PO PO PO PO1 PO1
Knowle PO5 PO9 PO10
1 2 3 4 6 7 8 1 2
dge
K3/K5/
Level K3 K4 K5 K5 A3 A2 A3 A3 A3 A3 A2
K6
CO1
M S - - - - - - - - - -
(K2)
CO2
(K2) M S - - - - - - - - - -

CO3 S
(K2) M S - - - - - - (Assignm - - -
ent)
CO4 S
(K2) M S - - - - - - (Assignm - - S
ent)
CO5 S
(K2) M L - - - - - - - (Semin - -
ar)

UEC11859 / SATELLITE COMMUNICATION LTPC 3 003


UEC12859
OBJECTIVES
 To determine look angle of earth station antenna
 To calculate sub satellite point
 To analyze subsystem configuration.
Course Outcome:
 Discuss the Laws & Satellite orbit (K2)
 Calculate link–budget for satellite communication (K2)
 Review the Satellite access and Spectrum(K2)
 Explain the antenna system(K2)
 Summarize the performance of satellite application(K2)

UNIT I SATELLITE ORBITS 9

Kepler’s Laws, Newton’s law, orbital parameters, orbital perturbations - station keeping - geo stationary
and non Geo-stationary orbits - Look Angle Determination- Limits of visibility - eclipse-Sub satellite
point - Sun transit outage - Launching Procedures - launch vehicles and propulsion.
UNIT II SPACE SEGMENT AND SATELLITE LINK DESIGN 9
Spacecraft Technology- Structure, Primary power, Attitude and Orbit control, Thermal control and
Propulsion, communication Payload and supporting subsystems, Telemetry-Tracking and command.
Satellite uplink and downlink Analysis and Design, link budget, E/N calculation-performance
impairments-system noise, inter modulation and interference, Propagation Characteristics and Frequency
considerations - System reliability and design lifetime.
UNIT III SATELLITE ACCESS 9
Modulation and Multiplexing: Voice, Data, Video, Analog - digital transmission system - Digital video
Broadcast - multiple access: FDMA – TDMA – CDMA - Assignment Methods - Spread Spectrum
communication - compression - encryption.
UNIT IV EARTH SEGMENT 9
Earth Station Technology -Terrestrial Interface - Transmitter and Receiver - Antenna Systems TVRO -
MATV- CATV - Test Equipment Measurements on G/T, C/No – EIRP - Antenna Gain.
UNIT V SATELLITE APPLICATIONS 9
INTELSAT Series, INSAT- VSAT, Mobile satellite services: GSM - GPS-INMARSAT- LEO- MEO,
Satellite Navigational System. Direct Broadcast satellites (DBS)- Direct to home Broadcast (DTH),
Digital audio broadcast (DAB)- Worldspace services- Business TV(BTV), GRAMSAT- Specialized
services - E–mail- Video conferencing - Internet.
.TOTAL: 45 HOURS

TEXT BOOKS:

1. Dennis Roddy, “Satellite Communication”, McGraw Hill International, 4th Edition, 2006.
2. Pritchard, Hendri G. Suyderhoud, Robert A. Nelson, “Satellite Communication Systems
Engineering”, Prentice Hall/Pearson, 2007.

REFERENCES:

1. Bruce R. Elbert, “The Satellite Communication Applications Hand Book”, Artech House Bostan
London, 1997.
2. Tri T. Ha, “Digital Satellite Communication”, II edition, 1990.
3. Timothy Pratt – Charles Bostian & Jeremy Allmuti, “Satellite Communications”, John Willy &
Sons (Asia) Pvt. Ltd, 2nd Edition 2004
4. Brian Ackroyd, “World Satellite Communication and earth station Design”, BSP professional
Books, 1990.
5. M.Richharia, “Satellite Communication Systems-Design Principles”, Macmillan 2003.

Mapping with COs to POs- for CMC


PO PO PO PO PO PO PO PO1 PO1
Knowle PO5 PO9 PO10
1 2 3 4 6 7 8 1 2
dge
K3/K5/
Level K3 K4 K5 K5 A3 A2 A3 A3 A3 A3 A2
K6
CO1
M L - - - - - - - - - -
(K2)
CO2
(K2) M L - - - - - - - - - -

CO3 S
(K2) M L - - - - - - (Assignm - - -
ent)
CO4 S M L L - - - - S S (GD) - S
(K3) (Assignm
ent)
CO5 S
(K2) M L - - - - - - - (Semin - -
ar)

UEC11801/ CELLULAR AND MOBILE COMMUNICATION LTPC 3 00 3


UEC12801

OBJECTIVES
 To understand the Evolution of mobile communication and basic fundamentals of cellular
concepts
 To understand the different types of propagation, modulation techniques and multiple access
techniques
 To know the cellular systems for various applications

COURSE OUTCOME(s)
1. Summarize the evolution of mobile communications & basic fundamentals of cellular concept.
(K2)
2. Classify the techniques of propagation mechanisms and their impacts on network channels.(K2)
3. Describe the various modulation techniques, diversity and antennas for cellular communication.
(K2)
4. Illustrate the different types of Multiple access techniques for mobile communication.(K3)
5. Review the various cellular systems and standards.(K2)

UNIT I CELLULAR CONCEPT & SYSTEM DESIGN FUNDAMENTALS 9

Introduction to Wireless communication: Evolution of mobile communications - mobile radio systems -


Examples, trends in cellular radio and personal communications - Cellular Concept: Frequency reuse -
channel assignment hand off - Interference and system capacity - trunking and grade of service -
Improving Coverage and capacity in Cellular systems.

UNIT II MOBILE RADIO PROPAGATION 9


Free space propagation model- relating power to electric field –Propagation mechanisms- reflection
-Ground reflection model -diffraction- scattering- link budget design using path loss models -Small scale
Multipath propagation- Impulse response model of a multi-path channel- Small scale Multipath
measurements- parameters of Mobile multipath channels- types of small scale fading.
.
UNIT III MODULATION TECHNIQUES- DIVERSITY AND ANTENNAS 9
Modulation Techniques: Minimum Shift Keying- Gaussian MSK- Orthogonal Frequency Division
Multiplexing, Performance of Digital Modulation in Slow-Flat Fading Channels and Frequency Selective
Mobile Channels. Diversity Techniques: Types of diversity- RAKE receiver -Basic combining methods-
Base station and mobile station antennas.

UNIT IV MULTIPLE ACCESS TECHNIQUES AND SPEECH CODING 9


Multiple Access Techniques: FDMA- TDMA- spread spectrum multiple access- CDMA, SDMA- CSMA
protocols - Coding: Characteristics of speech signals - Quantization techniques - Adaptive Differential
pulse code modulation (ADPCM) - Frequency domain coding of speech, Vocoders- Linear Predictive
Coders- Selection of Speech Codec’s for Mobile Communication- GSM Codec- USDC Codec -
Performance evaluation.

UNIT V CELLULAR SYSTEMS AND STANDARDS 9


WLL, Bluetooth, AMPS- GSM – Architecture - Channels and Frame structure - DECT- GPRS - EDGE-
IS-95 – Forward and Reverse CDMA Channel- WCDMA layer architecture - UMTS – PACS.
TOTAL: 45 HOURS
TEXT BOOKS:

1. Rappaport.T.S, “Wireless Communications: Principles and Practice”, Second Edition, Pearson


Education / Prentice Hall of India ,Third Indian Reprint , 2003.
2. Vijay K Garg, “Wireless Network Evolution 2G to 3G”, Pearson Education New Delhi, 2003.

REFERENCES:

1. Dharma Prakash Agarwal and Qing An Zeng, “Introduction to Wireless and Mobile
Systems”,Second Edition, Thomson Learning New Delhi, 2007.
2. William C.Y.Lee,“Mobile and Cellular Telecommunications Analog and Digital Systems”,
Second Edition,TMH.
3. Tse & viswanath, “cellular communication”.
4. Schiller,”mobile communications”, Pearson, 2005.

Mapping with COs to POs- for Ad hoc


PO PO PO PO PO PO PO PO1 PO1
PO5 PO9 PO10
Knowled 1 2 3 4 6 7 8 1 2
ge Level K3/K5/
K3 K4 K5 K5 A3 A2 A3 A3 A3 A3 A2
K6
CO1
M L - - - - - - - - - -
(K2)
CO2 S
(K2) M L - - - - - - (Assignme - - -
nt)
CO3
(K2) M L - - - - - - S (GD) - -

CO4 S
(K2) M L - - - - - - (Assignme - - -
nt)
CO5 S
(K2) M L - - - - - - - (Semin - -
ar)

UEC128514 AD HOC AND SENSOR NETWORKS LTPC 3 00 3

OBJECTIVES
 To know the constraints of the wireless physical layer that affect the design and performance of
ad hoc and sensor networks, protocols, and applications.
 To understand MAC and Routing protocols that have been proposed for ad hoc and sensor
networks
 To understand the localization and energy issues in wireless sensor networks
COURSE OUTCOME(s)
1. Review the distinctive issues in ad-hoc & sensor networks (K2)
2. Describe MAC protocol and contention algorithms in wireless ad-hoc Networks (K2)
3. Observe the challenges in designing routing and transport protocols for wireless ad-hoc networks.
(K2)
4. Discuss the challenges in designing MAC protocols for wireless sensor networks.(K2)
5. Summarize the various design problems like localization & QoS in sensor network Platform.
(K2)

UNIT I INTRODUCTION 9

Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum – Radio


propagation Mechanisms – Characteristics of the Wireless Channel -mobile ad hoc networks
(MANETs) and wireless sensor networks (WSNs) :concepts and architectures. Applications of Ad Hoc
and Sensor networks. Design Challenges in Adhoc and Sensor networks.

UNIT II MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS


9

Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based protocols
Contention based protocols with Reservation Mechanisms- Contention based protocols with
Scheduling Mechanisms – Multi channel MAC-IEEE 802.11.

UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS


NETWORKS 9

Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing,
reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad
hoc wireless Networks.

UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS


9

Single node architecture: hardware and software components of a sensor node - WSN Network
architecture: typical network architectures-data relaying and aggregation strategies -MAC layer
protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.

UNIT V WSN ROUTING, LOCALIZATION & QOS 9

Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-absolute and
relative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-Transport
Layer issues.

TOTAL: 45 HOURS
TEXT BOOKS:
1. C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols
", Prentice Hall Professional Technical Reference, 2008.
2. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:
Theory and Applications”, World Scientific Publishing Company, 2006.

REFERENCES:

1. Feng Zhao and Leonides Guibas, "Wireless Sensor Networks", Elsevier Publication , 2002.
2. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor Networks”,
Wiley, 2005.
3. Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks-Technology,
Protocols, and Applications”, John Wiley, 2007.
4. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.

You might also like