IV Year Syllabus
IV Year Syllabus
IV Year Syllabus
2
Vision of the Institute
To evolve into an autonomous institution of international standing for imparting quality
technical education
Quality Policy
We at M. S. Ramaiah Institute of Technology strive to deliver comprehensive, continually
enhanced, global quality technical and management education through an established Quality
Management System complemented by the synergistic interaction of the stake holders concerned
To prepare graduates who excel in the engineering profession, qualified to pursue advanced
degrees, and possess the technical knowledge, critical thinking skills, creativity, and ethical
values.
To train the graduates for attaining leadership in developing and applying technology for the
betterment of society and sustaining the world environment
3
Program Educational Objectives (PEOs):
PEO1: To train to be employed as successful professionals in a core area of their choice
4
PO9: Individual and team work: Function effectively as an individual, and as a member or
leader in diverse teams, and in multidisciplinary settings.
PO10: Communication: Communicate effectively on complex engineering activities with the
engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
PO11: Project management and finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for, and have the preparation and ability to
engage in independent and life-long learning in the broadest context of technological change.
PSO2: VLSI and Embedded Domain: Demonstrate technical competency in the design and
analysis of components in VLSI and Embedded domains
5
CURRICULUM COURSE CREDITS DISTRIBUTION
Semester Humanities Basic Engineering Professional Profession Other Project Extra & Total
& Social Sciences Sciences/ Courses - al Courses Electives Work/Int Co- Credits
Sciences / Lab Lab Core (Hard - Electives (OE) ernship curricul in a
(HSS) (BS) (ES) core, soft (PC-E) (PW/IN) ar Semester
core, Lab) activities
(PC-C) (EAC)
First 2 9 14 25
Second 4 9 12 25
Third 8 07 10 25
Fourth 4 21 25
Fifth 2 19 04 25
Sixth 15 04 06 25
Seventh 14 12 26
Eighth 4 18 02 24
Total 08 30 33 79 20 04 24 02 200
6
SCHEME OF TEACHING
VII SEMESTER
VIII SEMESTER
7
WIRELESS AND DATA COMMUNICATION
UNIT – I
UNIT – II
Network Layer: Logical addressing IPv4 and IPv6 Addresses, IPv4 and IPv6 format, Unicast
Routing Protocols
UNIT – III
Cellular Concepts: Frequency reuse, channel assignment, hand off, interference and system
capacity, improving coverage and capacity in cellular systems – cell splitting, cell sectoring,
microcell zone concept.
Mobile Radio Propagation – Large Scale Path Loss: Free space propagation model, Relating
power to electric field – Reflection, Diffraction, Scattering, Link budget design, log-distance
path loss models, log normal shadowing.
UNIT – IV
Mobile Radio Propagation – Small Scale Fading and Multipath: Small scale multipath
propagation – Parameter of mobile multipath channels – Types of small scale fading.
Diversity techniques: Polarization diversity, frequency diversity, time diversity and RAKE
receiver, Space diversity – combining techniques and derivation of selection diversity
improvement.
8
UNIT – V
Self Study: HDLC protocol – HTTP & FTP protocols, Wireless LAN, Intersymbol interference,
Rayleigh and Rician fading, Spread spectrum techniques, Examples of 2G/3G wireless systems:
GSM, IS95, CDMA 2000, Introduction and features of LTE standards.
Textbooks:
References:
Course Outcomes:
1. Discriminate the functionality between the layers in OSI model and TCP/IP suite
(POs – 1, 2, 10, 12, PSO – 3)
2. Describe transport layer formats and the network layer routing algorithms in the internet
(POs – 1, 2, 10, 12, PSO – 3)
3. Employ cellular concept to improve capacity of cellular system with limited radio
spectrum (POs – 1, 2, 10, 12, PSO – 3)
4. Appreciate the importance of diversity technique in mobile fading channel. (POs – 1, 2,
10, 12, PSO – 3)
5. Employ the concept of multiple access techniques in 4G/5G mobile communication
standards. (POs – 1, 2, 10, 12, PSO – 3)
9
INFORMATION THEORY AND CODING
UNIT – I
Source Coding: Prefix Codes, Source coding theorem, Kraft McMillan Inequality property –
KMI. Encoding of the Source Output, Huffman codes, Arithmetic Coding, LZW Algorithm.
UNIT – II
UNIT – III
Linear Block Codes: Introduction, matrix description of linear block codes, Error detection and
error correction capabilities of linear block codes, Single error correcting Hamming codes, Table
lookup decoding using standard array.
UNIT – IV
Binary Cyclic Codes: Algebraic Structure of Cyclic Codes, Encoding using an (n-k) bit shift
register, Syndrome calculation, Error detection and correction
UNIT – V
Convolution Codes: Convolution Encoder, Time domain approach, Transform domain approach,
code tree, Trellis and State Diagram, Viterbi decoding algorithm for the convolution code.
Textbooks:
10
3. Shu Lin, Daniel J. Costello, “Error Control Coding”, Pearson/Prentice Hall, 2 nd Edition,
2004.
References:
Course Outcomes:
1. Apply basics of information theory to compute entropy, information rate and design
various coding techniques (POs – 1, 2, 3, 4, PSOs – 1, 2)
2. Categorize various channels for information transmission and interpret Shannon‟s
theorem in continuous channels (POs – 2, 3, 4, PSOs – 1, 2)
3. Design Linear Block Codes for error detection and error correction (POs – 2, 3, 4, PSOs
– 2, 3)
4. Model Cyclic Block Codes using shift register for error detection and correction
(POs – 2, 3, 4, PSOs – 2, 3)
5. Construct trellis diagrams for Convolution encoders and decode with Viterbi algorithm
(POs – 2, 3, 4, 5, PSOs – 2, 3)
11
EMBEDDED SYSTEM DESIGN
UNIT – I
UNIT – II
ARM7 Processor Fundamentals: ARM Architecture, Registers, current program status register,
pipeline, exceptions, interrupts and vector table, core extensions. Introduction to ARM
Instruction Set: Data Processing Instructions, Branch Instructions.
UNIT – III
Introduction to ARM7 Instruction Set: Load Store Instructions, Software Interrupt Instruction,
Program Status Register Instructions, Loading Constants, and Conditional Execution.
Introduction to the THUMB Instruction set: Thumb register usage, ARM7 – Thumb
Interworking, other branch instructions, Data Processing Instructions, Single register Load –
Store Instructions, Multiple register Load Store Instructions, Stack Instructions, and Software
Interrupt Instruction.
UNIT – IV
UNIT – V
Embedded/Real – Time Operating System Concepts: Architecture of the Kernel, Tasks &
Task Scheduler, and Interrupt service Routine.
12
Textbooks:
References:
Course Outcomes:
13
WIRELESS AND DATA COMMUNICATION LABORATORY
LIST OF EXPERIMENTS
Data Communication
1. Write a program for error detection using CRC-CCITT (16 bits) using C.
2. Write a program for a HLDC frame to perform bit stuffing and destuffing in a single
frame.
3. Write a program for a HLDC frame to perform character stuffing and destuffing in a
single frame.
4. Write a program for encryption and decryption of text.
5. Simulate a three node point-to-point network with duplex links between them. Set the
queue size, vary the bandwidth and find the number of packets dropped using NS2.
6. Simulate a four node point-to-point network, and connect the links as follows: n0-n2, n1-
n2 and n2-n3. Apply TCP agent between n0-n3 and UDP agent between n1-n3. Apply
relevant applications over TCP and UDP agents by changing the parameters and
determine the number of packets sent by TCP/UDP using NS2.
Wireless Communication
1. Analyze the performance of Quadrature Amplitude Modulation (QAM) and M-ary Phase
Shift Keying (PSK) scheme in AWGN channel, and compare the results with theoretical
results.
2. Compute Bit Error Rate (BER) for different digital modulation schemes in frequency-flat
and slowly varying fading channel.
3. Bit error rate analysis of digital communication receivers with Maximal Ratio Combining
(MRC) receive diversity in frequency-flat and slowly varying fading channel.
4. Bit error rate analysis of digital communication receivers with Equal Gain Combining
(EGC) receive diversity in frequency-flat and slowly varying fading channel.
5. Simulation of Direct Sequence Spread Spectrum (DSSS) techniques.
6. (a) Measurement of numerical aperture and attenuation loss in analog fiber optic link.
(b) Data multiplexing using fiber optic link
Textbooks:
1. James F. Kurose and Keith W. Ross, “Computer Networking: A Top Down Approach”,
5th Edition, Addison Wesley, 2009.
2. Larry L. Peterson and Bruce S Davie, “Computer Networks: A Systems Approach”, 5 th
Edition, Elsevier, 2011.
3. T. S. Rappaport, “Wireless Communications: Principles and Practice”, 2nd Edition,
Prentice Hall of India, Third Indian Reprint, 2010.
Course Outcomes:
1. Examine the performance of the algorithms of OSI model layers (POs – 1, 2, 3, 4, 5,
PSO – 3)
2. Use simulators to evaluate the network performance in different layers like NS2
(POs – 1, 2, 3, 4, 5, PSO – 3)
3. Analyze the performance of the digital modulation receivers in AWGN and fading
channel (POs – 1, 2, 3, 4, 5, PSO – 3)
4. Analyze the performance of diversity receiver in multipath fading channel (POs – 1, 2, 4,
5, PSO – 3)
5. Examine the characteristics of analog and digital optical link (POs – 1, 2, 4, 5, PSO – 3)
15
EMBEDDED SYSTEM DESIGN LABORATORY
LIST OF EXPERIMENTS
1. Search a key element “X” in a list of „n‟ 16-bit numbers using binary search algorithm.
2. Sort a given set of „n‟ 16-bit numbers in ascending order using bubble sort algorithm.
3. Reverse a given string and verify whether it is a palindrome or not. Display the
appropriate message.
4. Compute nCr using recursive procedure. Assume that „n‟ and „r‟ are non-negative
integers.
5. Read the current time and date from the system and display it in the standard format on
the screen.
6. ARM assembly language programs for data transfer, arithmetic, Thumb instructions and
logical operations.
7. C Programs for matrix multiplication, matrix addition and sparse matrix implementation.
1. Andrew N. Sloss, “ARM System Developers Guide”, Elsevier, 1st Edition, 2008.
2. LPC 2148 user manual.
Reference:
16
Course Outcomes:
17
INTERNSHIP
The evaluation of students will be based on an intermediate presentation, along with written
report containing a Certificate from the employer. The rubrics for evaluation of the presentation
and the questionnaire for the report will be distributed at the beginning of the internship.
Course Outcomes:
18
EVALUATION RUBRICS
Achievement Levels
Maximum
Criteria Inadequate Developing Proficient Marks CO
Marks
Awarded Mapping
(0% – 33 %) (34% – 66 %) (67% – 100 %)
Modern Software 10 Has not applied any Has applied tools, but Has applied tools CO 2
Tools modern tools for the without proper working effectively to design/
design/analysis of the knowledge, and has not analyze/debug/optimize
technical block diagrams. obtained satisfactory complex technical blocks.
results.
Lifelong Learning 10 No understanding of the Can present examples of Can present examples of CO 4
requirements for lifelong the impact of lifelong the impact of lifelong
learning in the learning in the engineering learning, along with the
engineering profession. industry. requirement of skills
updation in the modern
engineering profession.
19
Report Writing 10 Not professionally Professional report writing, Professionally prepared CO 5
written, content not with some of the course report, addressing to full
covering all items of outcomes addressed as part extant all the items listed
course outcome. of the report. as part of the required
outcomes of the
internship.
20
PROJECT
The evaluation of students will be based on an intermediate presentation, along with written
report containing a Certificate from the employer. The rubrics for evaluation of the presentation
and the questionnaire for the report will be distributed at the beginning of the internship.
Course Outcomes:
21
Rubrics for Evaluation (Maximum Marks = 50)
Marks
Two reviews will be conducted with the same rubrics, the marks will be averaged. Awarded
GROUP Poor Satisfactory Proficient
Modern Tool Usage Tools chosen are not Tools chosen are Tools chosen are appropriate,
appropriate for the required appropriate, along with the along with results that are
(10) analysis, or are obsolete. most modern version. matching theoretical
Results are incomplete. Results are arguments.
incomplete/incorrect.
(0 – 3) (8 – 10)
(4 – 7)
Project Management No goals and/or timelines set Goals and times set, but no Division into timelines and
for project. continuous evaluation of intermediate goals, along with
(5) progress. periodic reviews and
(0 – 1) observations.
(2 – 3)
(4 – 5)
Report Writing Non uniform/improper Clear formatting, but Clear formatting, with concise
formatting, details are lacking detail. Grammar and precise expression of
22
(10) missing, language and and writing are not ideas. Reference list is
grammar are poor. suitable. adequate with all details.
23
INDIVIDUAL
Effort & Contribution The individual did not The individual contributed The individual has contributed
contribute to the project and modestly to the project, significantly to the project, and
(5) failed to meet and is able to understand is informed about all the
responsibilities. The some of the design criteria design aspects that can impact
individual does not identify in the project. the performance.
key performance criteria of
the system. (4 – 7) (8 – 10)
(0 – 3)
Research/Experimentation Is not familiar with the tools Is familiar with the details Is completely familiar with all
(10) used or the technical block of the technical elements of the technical block
diagram, or the design of implementation. Has used diagram and their
experiments to test the tools, but not to their functionalities. Have run
hypothesis. full extant. Experiments experiments with an objective
are run, but with no to testing specific hypotheses.
(0 – 3) hypothesis testing.
(8 – 10)
(4 – 7)
Presentation No eye contact, voice is low Content is well prepared Connects with the audience
and content preparation and but delivery is poor, with a suitably designed
24
(5) delivery is dry. Poor language skills are content and professional
language skills. inadequate. delivery.
(0 – 3) (4 – 7) (8 – 10)
TOTAL (50)
25
EXTRA AND CO-CURRICULAR ACTIVITIES
Extra and
Co-
EAC - - - 100 - 50 2
Curricular
Activities
Course Outcomes:
1. Apply basic engineering knowledge in competitive situations such as quizzes and tech-
fests. (POs – 1, 2, 3, 4, 5)
2. Design and develop technical solutions that are beneficial to the society.
(POs – 3, 4, 5, 6, 7)
3. Communicate technical and non-technical ideas effectively to audiences at different
levels. (PO – 10)
4. Contribute productively to societal causes through their knowledge in technical domains.
(POs – 6, 7, 8)
5. Participate effectively as part of a team to perform technical and non-technical activities.
(PO – 9)
26
Evaluation Rubrics – Extra/Co-Curricular Activities
The concerned faculty will collect proof and provide marks for the activities, based on the rubrics. Marks may be added, for a total not exceeding
Fifty (50) marks for Extra-Curricular activities/semester and Fifty (50) marks for Co-Curricular activities/semester.
Organizing Department Level activities Organized activities at the Worked with professional National/International
such as orientation, farewell, college level such as robotics societies (IEEE, NSS) in Conferences, Meetings,
etc. competitions, hackathons etc. student/college chapter or Symposia, etc., participated
individually, for organizing as part of organizing
events inside/outside college. committee.
(including UDBHAV)
Participating Attending activities Participated in workshops in Volunteering work with National/International Level
organized by professional the domain or outside the NGOs, Social Organizations,
societies. domain, organized at a Hospitals, and similar events, such as national
prominent activities undertaken for a conclaves, NCC or other
location/organization outside period of time not lesser than camps, society meetings etc.
college. one week.
27
debates etc.
RIT Level Sports Day participation, Active members of societies Emerged victorious in events College Team members in
Udbhav participation, in college such as Debate such as sports day, sports such as cricket, tennis,
Technical competitions Society etc. quizzes/debates etc. in etc.
participation. college level events.
28
LIST OF ELECTIVES
29
INTERNET OF THINGS (IoT)
Introduction & concepts: Definition and Characteristics of IoT, Things in IoT, IoT Protocols,
IoT Functional Blocks, IoT Communication Models, IoT Communication APIs, IoT Enabling
Technologies, IoT Levels and Deployment Templates, IoT and M2M, SDN and NFV for IoT,
IoT System Management with NETCONFIG-YANG
UNIT – II
Python Language: Data Types & Data Structures, Control Flow, Functions, Modules, Packages,
File Handling, Date & Time Operations, Classes, Python Packages of Interest for IoT
UNIT – III
IoT Physical Devices and End Points: Basic Building Blocks of an IoT Device, Raspberry Pi,
Linux on Raspberry Pi, Raspberry Pi Interfaces: Serial, SPI, I2C
Cloud and Data Analytics: Introduction to cloud storage Models and Communication APIs,
Python
Web Application Framework: Django, Web Services for IoT, SkyNet Messaging Platform,
Data Analytics for IoT, Apache: Hadoop, Oozie, Storm, Real-Time Data Analysis, Tools for IoT
UNIT – V
IoT Case Studies: Home Automation: Smart Lighting, Home Intrusion Detection; Cities: Smart
Parking Environment: Weather Monitoring System, Weather Reporting Bot, Air Pollution
Monitoring, Forest Fire Detection; Agriculture – Smart Irrigation, IoT Printer
30
Textbook:
1. Arshdeep Bahga, Vijay Madisetti, “Internet of Things: A Hands-on Approach”,
Universities Press, 2015.
References:
1. Ovidiu Vermesan, Peter Friess, “Internet of Things – From Research and Innovation to
Market Deployment”, River Publishers Series in Communication, June 2014.
2. Adrian McEwen, Hakim Cassimally, “Designing the Internet of Things”, Wiley
Publications, 2013.
Course Outcomes:
1. Describe the OSI Model for the IoT/M2M Systems. (POs – 1, 2, 12, PSO – 3)
2. Learn basics of design, integration and applications of IoT models. (POs – 1, 2, 3, 12,
PSO – 3)
3. Acquire the knowledge of basic blocks of IOT devices using Raspberry Pi. (POs – 1, 2, 3, 5,
12, PSO – 3)
4. Understand cloud storage models and web services for IoT. (POs – 1, 2, 4, 12, PSO – 3)
5. Appraise with various case studies. (POs – 1, 2, 3, 4, 5, 12, PSO – 3)
31
MULTI-RESOLUTION SIGNAL PROCESSING
UNIT – I
Time Frequency Analysis of Signals: Introduction, Short Time Fourier Transform, Gabor
transform, Tiling in time frequency plane.
UNIT – II
Multi-resolution analysis: Scaling functions, Construction of wavelet basis MRA, Haar scaling
functions and function spaces, nested spaces, Haar wavelet function
UNIT – III
UNIT – V
Self Study: DFT, STFT and Gabor transform on 1D non-stationary signal, Illustration of scale,
frequency and translation on 1D non stationary signal, Application of multi-scale transforms on
2D signals, Implementation of sub-band adaptive filters, Image denoising using multi-scale
transforms.
Textbooks:
32
References:
Course Outcomes:
33
ERROR CONTROL CODING
UNIT – I
Introduction to algebra: Groups, Fields, binary field arithmetic, Construction of Galois Field
GF (2m) and its properties, Computation using Galois filed GF (2m) arithmetic, Vector spaces and
matrices on Galois field.
UNIT – II
Linear block codes: Generator and parity check matrices, Encoding circuits, Syndrome and
error detection and error correcting capabilities, Minimum distance considerations, decoding
circuits, Hamming codes, Reed-Muller codes.
UNIT – III
Cyclic codes: Introduction, Generator and parity check polynomials, Encoding using
multiplication circuits, Systematic cyclic codes – generator matrix for cyclic code, Encoding
using feedback shift register circuits, Meggitt decoder, Error trapping decoding, Cyclic hamming
codes, Golay code, Shortened cyclic codes.
UNIT – IV
BCH codes: Binary primitive BCH codes, Decoding procedures, Implementation of Galois field
arithmetic, Implementation of error correction.
UNIT – V
Self Study: Matrices on Galois field, Syndrome and error detection, Hamming codes, Generator
matrix for cyclic code, Encoding using shift register circuit, Encoding of convolutional codes,
Implementation of Hamming codes, cyclic codes, convolutional codes and Viterbi algorithm
34
Textbooks:
1. Shu Lin and Daniel J. Costello. Jr, “Error control coding”, 2nd Edition, Pearson, Prentice
Hall, 2010.
2. Blahut. R. E, “Theory and practice of Error control codes”, Addison Wesley, 1984.
References:
1. Patrick Guy Farrell, Jorge Castineira Moreira, “Essentials of Error Control Coding”, John
Wiley & Sons, 2010.
2. Todd K. Moon, “Error Correcting Codes”, John Wiley & Sons, 1st Edition, 2006.
Course Outcomes:
1. Apply properties of Galois Field to Groups, Fields, Vector Spaces, row space and sub-spaces.
(POs – 1, 2, 3, 4, PSO – 1)
2. Describe RM codes in error detection and error correction. (POs – 2, 3, 4, PSOs – 1, 3)
3. Demonstrate cyclic block codes in error detection and correction. (POs – 2, 3, 4, PSOs – 2, 3)
4. Illustrate various BCH Codes and apply them for error detection & correction. (POs – 2, 3, 4,
PSOs – 2, 3)
5. Construct higher-order error-control codes and use Viterbi & stack algorithms for decoding.
(POs – 2, 3, 4, PSOs – 2, 3)
35
CYBER SECURITY
UNIT – I
Transport Level Security: Web Security Considerations, Secure Sockets Layer, HTTPS,
Secure Shell (SSH)
UNIT – II
E-mail Security: Pretty Good Privacy, S/MIME, Domain keys identified mail
UNIT – III
UNIT – IV
Network Security: Security Architecture, anti pattern: signature based malware detection versus
polymorphic threads, document driven certification and accreditation, policy driven security
certifications. Refactored solution: reputational, Problems: cyber anti patterns concept, forces in
cyber anti patterns, cyber anti pattern templates, cyber security anti pattern catalog
UNIT – V
Cyber Network Security: Enterprise security using Zachman framework, Zachman framework
for enterprise architecture, primitive models versus composite models, architectural problem
solving patterns, enterprise workshop, matrix mining, mini patterns for problem solving
meetings. Case study: cyber security hands on – managing administrations and root accounts,
installing hardware, reimaging OS.
Self Study: Transport Layer Security, IP Security Policy, Cryptographic Suites, behavioral and
entropy based malware detection, Case study: installing system protection/ antimalware,
configuring firewalls.
Textbooks:
1. William Stallings, “Cryptography and Network Security Principles and Practice”, 6th
Edition, Pearson Education Inc., 2014.
2. Thomas J. Mowbray, “Cyber Security – Managing Systems, Conducting Testing, and
Investigating Intrusions”, Wiley, 2014.
36
References:
1. Behrouz A. Forouzan, “Cryptography and Network Security”, 2nd Edition, TMH 2010.
2. Atul Kahate, “Cryptography and Network Security”, 3rd Edition, TMH, 2017.
Course Outcomes:
37
OPTICAL COMMUNICATION NETWORKS
UNIT – I
Optical fiber waveguides: Historical development, general system, Advantages of optical fiber
communication, Optical fiber waveguides: Ray theory transmission, Modes in planar guide,
Phase and group velocity, Cylindrical fiber: Modes, Step index fibers, Graded index fibers,
Single mode fibers, Cut off wavelength.
UNIT – II
Digital Links: Point to point links, system considerations, link power budget, rise time budget
analysis.
UNIT – III
UNIT – IV
Client layers of the optical layer: SONET/SDH, Multiplexing SONET/SDH Layers, SONET
Frame Structure SONET/SDH Physical Layer, optical transports Network, Ethernet, IP,
Multiprotocol label switching.
UNIT –V
WDM System: Optical Line Terminals, Optical Line Amplifiers, Optical Add/Drop
Multiplexers, OADM Architectures, Reconfigurable OADMs, Optical Cross connects.
Self Study: Mode field diameter, effective refractive index, soliton propagation, LED structures
and characteristics, resilient packet ring, All optical OXC Configurations
38
Textbooks:
1. John M. Senior, “Optical Fiber Communication: Principles and Practice”, 3rd Edition,
PHI, 2010.
2. Rajiv Ramaswami, Kumar N. Sivarajan, Galen H. Sasaki, “Optical networks”, 3rd Edition
Morgan Kaufmann Publishers, 2010.
3. Gerd Keiser, “Optical Fiber Communications”, 5th Edition, McGraw Hill, 2015.
References:
1. Govind P. Agrawal, “Fiber Optic Communication System”, 3rd Edition, John Wiley and
Sons, 2010.
2. Djafark Mynbaev and Lowell L. Scheiner, “Fiber Optic Communication Technology”,
Pearson Education, 2006.
Course Outcomes:
39
MULTIMEDIA COMMUNICATION
UNIT – I
UNIT – II
UNIT – III
Text and Image Compression: Text and image representation, Compression Principles, Text
compression: Huffman coding, Arithmetic coding, Dictionary based (LZW) coding, Image
Compression: KL transform, DCT, Wavelet based compression (EZW), JPEG and JPEG 2000
UNIT – IV
UNIT – V
Self Study: Multimedia applications, Text and image representation, audio representation,
Psychoacoustics, H.263, MPEG – 7 standards
Textbooks:
40
References:
Course Outcomes:
41
REAL TIME OPERATING SYSTEMS (RTOS)
UNIT – I
Introduction to Real Time Embedded Systems: Brief history of Real Time Systems and
Embedded Systems.
System Resources: Resource Analysis, Real Time Service Utility, Scheduling Classes, The
Cyclic Executive, Scheduler Concepts, Preemptive Fixed Priority Scheduling Policies, Real-
Time OS, Thread Safe Reentrant Functions.
UNIT – II
Processing: Preemptive Fixed Priority Policy, Feasibility, Rate Monotonic least upper bound,
and Necessary and Sufficient feasibility, Deadline – Monotonic Policy, Dynamic priority
policies.
I/O Resources: Worst-case Execution time, Intermediate I/O, Execution efficiency, I/O
Architecture.
Memory: Physical hierarchy, Capacity and allocation, Shared Memory, ECC Memory, Flash file
systems.
UNIT – III
Multi-resource Services: Locking, Deadlock and livestock, Critical sections to protect shared
resources, priority inversion.
Soft Real-Time Services: Missed Deadlines, QoS, Alternatives to rate monotonic policy, mixed
hard and soft real-time services.
UNIT – IV
42
Performance Tuning: Basic concepts of drill-down tuning, hardware – supported profiling and
tracing, Building performance monitoring into software, Path length, Efficiency, and Call
frequency, Fundamental optimizations.
UNIT – V
High availability and Reliability Design: Reliability and Availability, Similarities and
differences, Reliability, Reliable software, Available software, Design tradeoffs, Hierarchical
applications for Fail-safe design.
Self Study: Programming in C on Linux platform, Implement Semaphore and pipes, realize IPC
using message queues, pipes, socket programming, creating threads and multithreads using fork()
function, setting up the different priority levels of threads, data transfer between parent and child
process.
Textbooks:
Reference:
Course Outcomes:
43
SATELLITE COMMUNICATION AND GPS
UNIT – I
UNIT – II
Space Segment: Power supply, Attitude and Control system, Spin stabilization, Momentum
control, Telemetry, Tracking and Command Subsystems, Transponders, Low noise amplifier &
Receivers, equipment reliability.
UNIT – III
Satellite Link Design: Basic transmission theory, System noise, Uplink, Concept of saturation
of TWTA, Downlink, Combined uplink and downlink C/N ratio & Intermodulation noise system
design example.
UNIT – IV
GPS System: Overview of the GPS System, Space Segment Description, Control Segment, User
Segment.
UNIT – V
GPS Signal Acquisition and Tracking: GPS Receiver Code and Carrier Tracking,
Measurement Errors and Tracking Thresholds, Signal Acquisition, Sequence of Initial Receiver
Operations.
Self Study: Direct launch, Antenna subsystem, Satellite mobile services, Radar sat, Indian space
program for civil aviation, working principle of GPS in mobile.
Textbooks:
References:
Course Outcomes:
1. Identify the significance of Kepler‟s laws of orbital mechanism and perturbations. (POs –1,
2, 6, PSO – 3)
2. Illustrate the subsystems of the satellite. (POs – 1, 2, 6, PSO – 3)
3. Design of satellite link budget and analyze the different satellite services for practical
applications. (POs – 1, 2, 6, PSO – 3)
4. Discuss the GPS system segments. (POs – 1, 2, 6, PSO – 3)
5. Describe the GPS signal acquisition and tracking. (POs – 1, 2, 6, PSO – 3)
45
WIRELESS NETWORKS
UNIT – I
Wireless Local Area Networks (WLANs): WLAN Standards – IEEE 802.11 and its variants,
WLAN Protocols – Physical Layer Protocols, MAC Layer Protocols and WLAN applications.
Wireless Body Area Networks (WBANs): Protocols – Physical Layer techniques, MAC Layer
Protocols, WBAN Technologies – Bluetooth, Zigbee, UWB and WBAN applications.
UNIT – II
Wireless Personal Area Networks (WPANs): Network Architecture- Piconet and Scatternet,
WPAN Technologies and Protocols -IEEE 802.15.5: Mesh WPAN and WPAN Applications.
Wireless Metropolitan Area Networks (WMANs): WiMAX, Broadband Wireless Networks –
WLL, LMDS, MMDS, WMAN Applications.
Wireless Wide Area Networks (WWANs): Interworking of WWAN and WWAN applications.
UNIT – III
MAC Protocols for Ad Hoc Wireless Networks: Introduction, Issues in designing a
MAC protocol for Ad hoc wireless Networks, Design goals of a MAC protocol for Ad
hoc wireless Networks, Classification of MAC protocols. Contention - based MAC protocols
with scheduling mechanism, MAC protocols that use directional antennas, Other MAC
protocols.
UNIT – IV
MAC Protocols for Wireless Sensor Networks: Introduction, Background, Fundamentals of
MAC Protocols, Performance Requirements, Common Protocols, MAC Protocols for WSNs,
Schedule-Based Protocols, Random Access-Based Protocols, Sensor-MAC, Case Study:
Protocol Overview, Periodic Listen and Sleep Operations.
UNIT – V
Routing Protocols for Ad Hoc Wireless Networks: Introduction, Issues in designing a
routing protocol for Ad hoc wireless Networks, Classification of routing protocols, table
drive routing protocol, On-demand routing protocol, Hybrid routing protocol, Routing protocols
with effective flooding mechanisms, Hierarchical routing protocols, Power aware routing
protocols.
46
Self Study: WLAN applications, WBAN applications, WPAN Applications, WMAN
Applications, WWAN applications, Classification of MAC protocols of Ad Hoc wireless
networks, Common WSN MAC Protocols, Classification of routing protocols of Ad Hoc
wireless networks.
Textbooks:
References:
Course Outcomes:
47
CRYPTOGRAPHY
UNIT – I
Basic Concepts of Number Theory and Finite Fields: Divisibility and the divisibility
algorithm, Euclidean algorithm, Modular arithmetic, Groups, Finite fields of the form GF(p),
Polynomial arithmetic, Finite fields of the form GF(2n), Prime Numbers, Fermat‟s and Euler‟s
theorem, Primality testing, Chinese Remainder theorem, Discrete logarithm.
UNIT – II
UNIT – III
UNIT – IV
Principles of Public-Key Cryptosystems: The RSA algorithm, Diffie - Hellman Key Exchange,
Elgamal Cryptosystem, Elliptic Curve Arithmetic, Elliptic Curve Cryptography
UNIT – V
Self Study: Rings and Fields, Transposition techniques, Traditional Block Cipher structure,
Classification in Digital Watermarking based on characteristics and applications, Types of
Steganography, Random Sequence Generation.
Textbooks:
1. William Stallings, “Cryptography and Network Security Principles and Practice”, 6th
Edition, Pearson Education Inc., 2014.
48
2. Frank Y. Shih, “Digital Watermarking and Steganography”, CRC Press, 2012.
References:
1. Behrouz A. Forouzan, “Cryptography and Network Security”, 2nd Edition, TMH, 2010.
2. Atul Kahate, “Cryptography and Network Security”, 3rd Edition, TMH, 2017.
Course Outcomes:
49
ADVANCED COMPUTER ARCHITECTURE
Subject Code: ECE28 Credits: 3:0:0:1
Prerequisites: Computer Organisation Contact Hours: 42
Course Coordinators: Maya V Karki, V. Anandi
UNIT – I
Parallel Computer Models: Multiprocessors and multicomputer, Multivectors and SIMD
computers.
UNIT – II
Program flow mechanisms: Data flow Architecture, Demand driven mechanisms.
UNIT – III
Speedup Performance Laws: Amdhal‟s law, Gustafson‟s law, Memory bounded speedup
model, Scalability Analysis and Approaches.
UNIT – IV
Pipelining: Linear pipeline processor, nonlinear pipeline processor, Instruction pipeline
Design, Mechanisms for instruction pipelining, Dynamic instruction scheduling, Branch
Handling techniques, branch prediction, Arithmetic Pipeline Design
UNIT – V
Multiprocessor Architectures: Symmetric shared memory architectures, distributed shared
memory architectures, models of memory consistency, scalable cache coherence, design
challenges of directory protocols, memory based directory protocols, cache based directory
protocols.
Self Study : The state of computing, Classification of parallel computers, Grain Size and
latency (U1), Control flow versus data flow, Comparisons of flow mechanisms, Performance
Metrics and Measures (U2), Advanced processor technology, Instruction-set Architectures
50
(U3), Cache basics & cache performance, reducing miss rate and miss penalty (U4), cache
coherence protocols (MSI, MESI, MOESI), overview of directory based approaches (U5)
Textbook:
1. Kai Hwang, “Advanced Computer Architecture: Parallelism, Scalability,
Programmability”, 1st Edition, Tata McGraw Hill, 2003.
References:
1. Kai Hwang and Zu, “Scalable Parallel Computers Architecture”, Tata McGraw Hill, 2003.
2. M. J. Flynn, “Computer Architecture, Pipelined and Parallel Processor Design”, Jones &
Bartlett Learning, 1995.
3. D. A. Patterson, J. L. Hennessy, “Computer Architecture: A quantitative approach”, 5th
Edition, Morgan Kaufmann, 2012.
Course Outcomes:
1. Illustrate understanding of contemporary computer architecture issues and techniques.
(POs – 1, 2, 6, PSO – 2)
2. Discuss the role of parallelism in current and future architectures. (POs – 2, 3, 6, PSO – 2)
3. Analyse the behavior of a pipeline as the processor executes various sequences of
instructions. (POs – 2, 3, 4, 12, PSO – 2)
4. Apply concept and principle of cache and virtual memory to high-performance computer
architecture. (POs – 1, 2, 3, 5, PSO – 2)
5. Compare different multiprocessor architectures and cache coherence protocols. (POs – 2, 3,
6, PSO – 2)
51