ICE Program 2015
ICE Program 2015
ICE Program 2015
2015
Study Plan
%Hrs %Units
Elective Subjects
1- Information Security
2- Artificial Intelligence
3- Advanced Operating Systems
4- Network Management & Security
5- Network and Communication Protocols
6- Control Engineering
Course Description
First Year
Course Description
Course Description
References Lesley Anne Robertson, Computing concepts with C++ essen als, 5th Ed. 2007.
Text books:
1. Cay S. Horstmann, Computing Concepts with C++ Essentials,
Lecturer Name:
3rd edition, John Wiley, 2003.
Signature:
2. Lesley Anne Robertson, Computing concepts with C++
essentials, 5th Ed. 2007.
Course Description
References
Course Description
Course Description
References
References
Second Year
Course Description
Topics Week No.
اﻟﺠﻤﻠﺔ اﻻﺳﻤﯿﺔ
1
اﻟﻤﺒﺘﺪأ واﻧﻮاﻋﮫ ،اﻟﺨﺒﺮ واﻧﻮاﻋﮫ ،ﻧﻮاﺳﺦ اﻻﺑﺘﺪاء ،ﻛﺎن واﺧﻮاﺗﮭﺎ ،ان واﺧﻮاﺗﮭﺎ
اﻟﻤﺜﻨﻰ واﻟﻤﻠﺤﻖ ﺑﮫ ،ﺟﻤﻊ اﻟﻤﺬﻛﺮ اﻟﺴﺎﻟﻢ واﻟﻤﻠﺤﻖ ﺑﮫ 2
ﺟﻤﻊ اﻟﻤﺆﻧﺚ اﻟﺴﺎﻟﻢ ،اﻻﺳﻤﺎء اﻟﺨﻤﺴﺔ 3
اﻟﺠﻤﻠﺔ اﻟﻔﻌﻠﯿﺔ
4
ﺑﻨﺎء اﻟﻔﻌﻞ اﻟﻤﺎﺿﻲ ،ﺑﻨﺎء ﻓﻌﻞ اﻻﻣﺮ
اﻟﻔﻌﻞ اﻟﻤﻀﺎرع ،ﺑﻨﺎؤه واﻋﺮاﺑﮫ، 5
اﻻﺳﻤﺎء اﻟﻤﻨﺼﻮﺑﮫ ،اﻟﻤﻔﻌﻮل ﺑﮫ ،اﻟﻤﻔﻌﻮل اﻟﻤﻄﻠﻖ ،اﻟﻤﻐﻌﻮل ﻓﯿﮫ ،اﻟﻤﻔﻌﻮل ﻣﻌﮫ 6
ﻣﻌﺎﻧﻲ ﺣﺮوف اﻟﺠﺮ 7
اﻟﺸﻌﺮ
8
ﻗﺼﯿﺪة ﻗﺪﯾﻤﺔ :اﻟﻤﺘﻨﺒﻲ ،اﺑﻦ زﯾﺪون
ﻗﺼﯿﺪة ﺣﺪﯾﺜﺔ :ﺳﺎﻣﻲ ﻣﮭﺪي 9
اﻟﻘﺮآن اﻟﻜﺮﯾﻢ
10
ﺳﻮرة ﻣﺮﯾﻢ
اﻻﻣﻼء
11
ﻛﺘﺎﺑﺔ اﻟﮭﻤﺰة اﻟﻤﺘﻮﺳﻄﺔ واﻟﻤﺘﻄﺮﻓﺔ
ﻛﺘﺎﺑﺔ اﻟﻀﺎد واﻟﻈﺎء ،ﻛﺘﺎﺑﺔ اﻟﺘﺎء اﻟﻘﺼﯿﺮة واﻟﻄﻮﯾﻠﺔ 12
ﻋﻼﻣﺎت اﻟﺘﺮﻗﯿﻢ
13
اﻻﻏﻼط اﻟﺸﺎﺋﻌﺔ ﻓﻲ اﻟﻤﻜﺎﺗﺒﺎت اﻟﺮﺳﻤﯿﺔ ،ﻛﺘﺎﺑﺔ اﻟﻌﺪد 14
اﻟﺸﻌﺮ :ﻗﺼﯿﺪة ﺟﺎھﻠﯿﺔ :ﻣﻌﻠﻘﺔ ﻋﻤﺮو ﺑﻦ ﻛﻠﺜﻮم اﻟﺘﻐﻠﺒﻲ
ﻗﺼﯿﺪة ﻋﺒﺎﺳﯿﺔ :ﻋﻠﻲ ﺑﻦ اﻟﺠﮭﻢ 15
ﻗﺼﯿﺪة ﺣﺪﯾﺜﺔ :ﻧﺰار ﻗﺒﺎﻧﻲ
ﻣﺤﺎﺿﺮات ﻓﻲ اﻟﻠﻐﺔ اﻟﻌﺮﺑﯿﺔ اﻟﻤﺼﺪر
اﻟﻣؤﻟف:
اﻟﻨﺎﺷﺮ وﺳﻨﺔ اﻟﻄﺒﻊ:
اﻟﻤﺮاﺟﻊ
Course Description
6 Manipulation string
10 Exception Handling
11 Thread &Multithread
13 Networking(Manipulating URLs)
Course Description
Course Description
Lab Description
Drop and Alter Table Constructs, Aggregate Functions: avg, min, max, sum,
7,8,9 count, Null Values: Null Values and Aggregates
Nested Subqueries
10 Nested Subqueries
Modification of the Database
Course Description
Lab Description
Course Description
Channel Coding and Error Control techniques; The channel coding, Main idea of error correction &
8
detection codes, code rate (efficiency), advantages and disadvantages.
9
Parity check codes, ARQ Techniques
10 Linear block codes, Binary repetition codes, Matrix representation of linear block codes Generator
and Parity Matrices, Hamming codes, syndrome decoding.
Code distance and error correction capability of linear block codes
11
Multiple error correction and Hamming bound.
12 Cyclic Redundancy Check (CRC) codes and Polynomial representation of block codes.
Use of shift registers in CRC implementations. Some examples of practical implementations of CRC.
13
GF (2m) field definition, Construction of finite field elements, mathematical operations in GF field.
14 Generation of BCH codes using GF field (single and multi-error corrections)
BCH encoder/decoder circuit
15
Convolutional Codes, generation, decoding algorithm.
Text Book-1: Essentials of Information Theory
Text Book Author : P.G. Farrell
Edition/Year/ Publisher : 1st, 2006 , Prentice Hall
Text Book-2: Data Compression; The Complete Reference Guide
Reference Author : David Salomon
Edition/Year/ Publisher : 3rd Edition, 2006, Springer.
Course Description
Microprocessors Architecture 3
Course Title Theoretical hours/w
And Interfacing Lab
ICE222 3
Course Code Practical hours/w
Second 0
Year Tutorial hours/w
Second 4
Semester Units
Lab Description
2 Binary Arithmetic
4 Bit Manipulation
6 BCD Arithmetic
12 IC tester
2
Course Title Internet Programming II Theoretical hours/w
Course 2
ICE223 Practical hours/w
Code
0
Year Second Tutorial hours/w
3
Semester Second Units
Course Description
7 Loops
8 Functions (function Define, function argument)
9 Function (class and objects)
10 Cookies, error handling
11 Function Reference: mathematical function
12 Function Reference: Array functions
13 Function Reference : Calendar Function
14 Function Reference: Comparison Functions and directory
Text book Text book: PHP5 & MySQL5 from novice to professional
Author : W. Jason Gilmore
Edition & Year public : 2nd Edi on, 2006
Reference
Lab Description
Text book
Reference
9 Wave equation for the case of lossless TL and the distortionless case.
Evaluation of the propagation constants and the effects of changing the operating
10
frequency.
11 Study the effects of reflections in different line and load conditions
Lab Description
Text book
Third Year
Lab Description
5 Diode as AM detector
6 Frequency Modulation
9 Fiber Optics
12
13
14
15
Text book: B.P. Lathi, Modern digital and analog communication systems, 4nd Edition,
Textbook
2009.
References
Course Description
Course Description
Reference
Text book:
Text book 1. Author : Kenneth H. Rosen, "Discrete Mathematics and its
Applications",6 th Edition, 2006
Course Description
Course Description
Reference
Lab Description
Text book
Reference
Course Description
Week
Topics
No.
ﺣﻘﻮق اﻻﻧﺴﺎن ﻓﻲ اﻟﺤﻀﺎرات اﻟﻘﺪﯾﻤﺔ: 1
ﺣﻘﻮق اﻻﻧﺴﺎن ﻓﻲ اﻟﺤﻀﺎرات اﻟﯿﻮﻧﺎﻧﯿﺔ واﻟﻤﺼﺮﯾﺔ
ﺣﻘﻮق اﻻﻧﺴﺎن ﻓﻲ ﺣﻀﺎرات اﻟﻌﺮاق اﻟﻘﺪﯾﻤﺔ 2
ﺣﻘﻮق اﻻﻧﺴﺎن ﻓﻲ اﻟﺸﺮاﺋﻊ واﻻدﯾﺎن اﻟﺴﻤﺎوﯾﺔ:
3
ﻓﻲ اﻟﺪﯾﺎﻧﺔ اﻟﯿﮭﻮدﯾﺔ واﻟﻤﺴﯿﺤﯿﺔ،
ﻓﻲ اﻻﺳﻼم 4
ﻣﺼﺎدر ﺣﻘﻮق اﻻﻧﺴﺎن: 5
اﻟﻤﺼﺎدر اﻟﺪوﻟﯿﺔ ،اﻟﻤﺼﺎدر اﻟﻮطﻨﯿﺔ ،
دﺳﺘﻮر ﺟﻤﮭﻮرﯾﺔ اﻟﻌﺮاق 6
ﺿﻤﺎﻧﺎت ﺣﻘﻮق اﻻﻧﺴﺎن: 7
ﻋﻠﻰ اﻟﺼﻌﯿﺪ اﻟﺪاﺧﻠﻲ ،ﻋﻠﻰ اﻟﺼﻌﯿﺪ اﻟﺪوﻟﻲ،
ﺣﻘﻮق اﻻﻧﺴﺎن ﻓﻲ اﻻﺳﻼم 8
دور اﻟﻤﻨﻈﻤﺎت اﻻﻗﻠﯿﻤﯿﺔ ﻓﻲ ﺣﻤﺎﯾﺔ ﺣﻘﻮق اﻻﻧﺴﺎن:
9
اﺗﻔﺎﻗﯿﺔ اﻻورﺑﯿﺔ ،اﻻﺗﻔﺎﻗﯿﺔ اﻻﻣﺮﯾﻜﯿﺔ،
اﻟﻤﯿﺜﺎق اﻻﻓﺮﯾﻘﻲ ،اﻟﻤﯿﺜﺎق اﻟﻌﺮﺑﻲ 10
ﻣﺴﺘﻘﺒﻞ ﺣﻘﻮق اﻻﻧﺴﺎن:
11
اﻟﺘﻘﺪم اﻟﺘﻜﻨﻮﻟﻮﺟﻲ واﺛﺮه ﻋﻠﻰ اﻟﺤﻘﻮق واﻟﺤﺮﯾﺎت،
اﻟﻌﻮﻟﻤﺔ وﺣﻘﻮق اﻻﻧﺴﺎن 12
ﻧﺸﺎة وﺗﻄﻮر ﺣﻘﻮق اﻟﻄﻔﻞ: 13
ﻣﺪﻟﻮل اﻟﻄﻔﻞ ،اﻟﺘﻄﻮر اﻟﺘﺎرﯾﺨﻲ ﻟﺤﻘﻮق اﻟﻄﻔﻞ ،ﻟﺪى اﻻﻣﻢ واﻟﺤﻀﺎرات ،ﻟﺪى اﻟﺪﯾﺎﻧﺔ اﻟﻤﺴﯿﺤﯿﺔ
ﺣﻘﻮق اﻟﻄﻔﻞ ﻓﻲ اﻻﺳﻼم 14
ﺣﻘﻮق اﻟﻄﻔﻞ ﻓﻲ اﻻﺗﻔﺎﻗﯿﺔ اﻟﺪوﻟﯿﺔ ﻟﻌﺎم ١٩٨٩ 15
Reference
Course Description
References
10 White noise: the matched filter, probability of error of the matched filter.
11 Coherent reception: correlation, phase-shift keying, frequency shift keying, non-coherent
detection of FSK, differential PSK, four phase PSK (QPSK).
12 Error probability for QPSK, probability of error of minimum shift keying MSK, comparison of
modulation systems.
13 Spread Spectrum Modulation: direct sequence (DS) spread spectrum, use of spread spectrum
with code division.
14 Multiple access CDMA, ranging using DS spread spectrum, frequency hopping (FH) spread
spectrum.
15 Generation & ch/s of PN sequences, acquisition (coarse synchronization) of a FH signal,
tracking (fine synchronization) of a FH signal, acquisition of a DS signal, tracking of a DS
signal.
Text book Text book(1):Analog&digital communication systems
Author : Martin S. Roden
Reference Text book(2) : Principles of Communications
Author : Taub & Schilling
Lab Description
Week
Topics
No.
1 Sample the given input signal for different sampling rates and recover the
signal by means of appropriate low – pass filter..
2 Study the Pulse – Width Modulation for both AC and DC Modulating Signals and
obtain the corresponding waveforms
3 Study the Pulse – Position Modulation for both AC and DC Modulating Signals and
obtain the corresponding waveforms
4 Study the functioning of a given Analog to Digital Converter
5 Study the functioning of a given Digital to Analog Converter
6 Encode the given 4-Bit Data Word into 16-Bit Orthogonal Encoded Word
using Hadamard Code.
7 Decode the 16-Bit Orthogonal Encoded Word to 4-Bit Data Word.
8 Study the performance of the given Continuously Variable Slope Delta
Modulation (CVSD).
9 Obtain the characteristics of the Phase Shift Keying (PSK) Modulator.
10 Obtain the characteristics of the Frequency Shift Keying (FSK) Modulator
Text book Text book :
Author :
Edition & Year public :
Reference
No. Topics
1 Introduction: Digital Image Processing and application- Image representation
and modeling- Image Enhancement- Image Restoration- Image Analysis- Image
Data Compression.
2 Digital Image Fundamentals: A simple Image Model- Some Basic Relationship
Between Pixels
3 Image Transforms: Two-Dimensional Fourier series representation
4 Image Transforms: Two-Dimensional Filter design
5 Image histogram, histogram modification
6 Image noise, noise cleaning
7 Image enhancement by pixel point operation
Lab Description
2 Image Formats
6 Image Histogram
10 Image Segmentation
11 Image Compression
13 Pattern Recognition
14 Final Exam
Text book Text book :
Author :
Edition & Year public :
Reference
Week Topics
No.
1 Information Systems in Global Business Today: the role of information systems in business today,
how information systems are transforming business
2 Globalization Challenges and Opportunities: the emerging digital firm
3 Globalization Challenges and Opportunities: Strategic Business Objectives of Information Systems
4 Perspectives on information systems: what is an information system?, dimensions of information
systems
5 Global E-Business and Collaboration: Business Processes, How Information Technology Improves
Business Processes
6 Global E-Business and Collaboration: Types of Information Systems (TPS, MIS, DSS, and Business
Intelligence)
7 Foundations of Business Intelligence: Databases and Information Management: Organizing Data in
A traditional File Environment, The Database Approach to Data Management
8 IT Infrastructure and Emerging Technologies: IT Infrastructure, Infrastructure Components
9 System analysis and design: need for system analysis, system analysis of existing, new
requirement
10 System analysis and design: system development model, structured systems analysis and design
11 E-commerce: Digital Markets, Digital Goods: E-commerce and the Internet, E-commerce : Business
and Technology
12 Securing Information Systems
13 Telecommunications, the Internet, and Wireless Technology
14 Enhancing Decision Making: Decision Making and Information Systems, Business Intelligence in
the Enterprise
15 Building Information Systems: systems development and organizational change
Text book title: Management Information Systems
Author: K. C. Laudon & J.P.Laudon
Edi on & Year public: Pren ce Hall, 12th Ed, 2012.
References title: Information Systems: A manager’s guide to technology
Author: Gallaugher, J
Edition & Year public: 1.4 Ed, 2012
title: Information Systems
Author: Ralph Stair, George Reynolds
Edi on & Year public: 9 Ed, 2010
title: Information Systems Essentials
Author: Ralph Stair, George Reynolds
Edi on & Year public: 6 Ed, 2012
Fourth Year
Week
Topics
No.
ﻣﻔﮭﻮم اﻟﺪﯾﻤﻘﺮاطﯿﺔ:
1
ﺟﺬور ﻣﻔﮭﻮم اﻟﺪﯾﻤﻘﺮاطﯿﺔ وﺗﻄﻮره
ﺗﻌﺮﯾﻒ اﻟﺪﯾﻤﻘﺮاطﯿﺔ 2
اﻟﺪﯾﻤﻘﺮاطﯿﺔ اﻟﻌﺎﻟﻤﯿﺔ واﻟﺨﺼﻮﺻﯿﺔ 3
اﺷﻜﺎل اﻟﺪﯾﻤﻘﺮاطﯿﺔ
4
اﻟﺪﯾﻤﻘﺮاطﯿﺔ اﻟﻤﺒﺎﺷﺮة
اﻟﺪﯾﻤﻘﺮاطﯿﺔ ﺷﺒﮫ اﻟﻤﺒﺎﺷﺮة 5
اﻟﺪﯾﻤﻘﺮاطﯿﺔ اﻟﺘﻤﺜﯿﻠﯿﺔ )اﻟﻨﯿﺎﺑﯿﺔ( 6
اﻟﻤﺠﻠﺲ اﻟﻨﯿﺎﺑﻲ 7
اﻟﯿﺔ اﻟﻨﻈﺎم اﻟﺘﻤﺜﯿﻠﻲ )اﻟﻨﯿﺎﺑﻲ( :اﻻﻧﺘﺨﺎب
8
ﻣﻔﮭﻮم اﻻﻧﺘﺨﺎب وﺗﻜﯿﯿﻔﮫ اﻟﻘﺎﻧﻮﻧﻲ
ھﯿﺌﺔ اﻟﻨﺎﺧﺒﯿﻦ 9
ﺗﻨﻈﯿﻢ ﻋﻤﻠﯿﺔ اﻻﻧﺘﺨﺎب ،اﻟﺪواﺋﺮ اﻻﻧﺘﺨﺎﺑﯿﺔ ،اﻟﻘﻮاﺋﻢ اﻻﻧﺘﺨﺎﺑﯿﺔ 10
اﻟﻤﺮﺷﺤﻮن ،اﻟﺤﻤﻠﺔ اﻻﻧﺘﺨﺎﺑﯿﺔ ،اﻟﺘﺼﻮﯾﺖ 11
ﻧﻈﻢ اﻻﻧﺘﺨﺎﺑﺎت
12
اﻻﻧﺘﺨﺎب اﻟﻤﺒﺎﺷﺮ وﻏﯿﺮ اﻟﻤﺒﺎﺷﺮ ،اﻻﻧﺘﺨﺎب اﻟﻔﺮدي واﻻﻧﺘﺨﺎب ﺑﺎﻟﻘﺎﺋﻤﺔ
ﻧﻈﺎم اﻻﻏﻠﺒﯿﺔ ،ﻧﻈﺎم ﺗﻤﺜﯿﻞ اﻟﻤﺼﺎﻟﺢ، 13
ﻧﻈﺎم اﻟﺘﺼﻮﯾﺖ اﻻﺧﺘﯿﺎري واﻟﺘﺼﻮﯾﺖ اﻻﺟﺒﺎري، 14
ﻧﻈﺎم اﻟﺘﺼﻮﯾﺖ اﻟﺴﺮي واﻟﺘﺼﻮﯾﺖ اﻟﻌﻠﻨﻲ 15
Lecturer Name: اﻟﻤﺼﺪر :ﺣﻘﻮق اﻻﻧﺴﺎن واﻟﻄﻔﻞ واﻟﺪﯾﻤﻘﺮاطﯿﺔ
Signature: اﻟﻤﺆﻟﻒ :أ .د .ﻣﺎھﺮ ﺻﺎﻟﺢ ﻋﻼوي اﻟﺠﺒﻮري واﺧﺮون
اﻟﻨﺎﺷﺮ وﺳﻨﺔ اﻟﻄﺒﻊ :وزارة اﻟﺘﻌﻠﯿﻢ اﻟﻌﺎﻟﻲ واﻟﺒﺤﺚ اﻟﻌﻠﻤﻲ– ﺟﺎﻣﻌﺔ ﺗﻜﺮﯾﺖ٢٠٠٩ ،
Course Theoretical
Digital Signal Processing Lab 3
Title Hrs/w
Course
CR411 Applied Hrs/w 3
Code
Year Fourth Tutorial Hrs/w 1
Semester First Units 4
Lab Description
7
Z-Transform - I
8 Z-Transform - II
9 Digital filter - I
10 Digital filter - II
11
12
13
14
15
Title : Digital Signal Processing , A practical approach
Text book Author : John G.Proakis
Edition/Publisher: Macmillan Publishing Company , 4th 2006
Title : Digital Signal Processing fundamentals ;
Reference Author: Vigay K. Madisetti
Edition & Year public : 2nd Ed., CRC press, 2010
Course Description
Reference
Lab Description
1 Wireless Systems
2 Cellular Systems
3 Mobile communications
5 Radio communications
6 Wireless networks
7 Antennas in cellular networks
8
9
10
11
12
13
14
15
Reference
Course Description
Week
Topics
No.
Course
Multimedia Computing Lab Theoretical Hrs/w 2
Title
Course
ICE421 Applied Hrs/w 3
Code
Year Fourth Tutorial Hrs/w 0
Lab Description
11, 12 Video Manipulation and Creating Visual Effects (using Adobe & CS5)
Course Description
Title : IP routing
Text book Author : Ravi Malhotra
Edition & Year public : 2002
Title : Advanced wireless networks
Reference Author : Savo G. Glistic
Edition & Year public : 2006
Title : IP routing
Text book Author : Ravi Malhotra
Edition & Year public : 2002
Reference
Elective Courses
4 Heuristic search
5 Control and implementation of state space search
6 Knowledge Intensive Problem solving
7 Reasoning with uncertain or incomplete information
8 Knowledge representation
9 Languages and programming Techniques for AI
10 Prolog
11 Understanding Natural Language
12 Automated Reasoning
13 Machine Learning : symbol-based
14 Genetic Algorithms
15 Neural Network
16 Final Exam
Reference
10 Data structures
11 Operators
12 Assignment B
13 Assignment B
14 Control structure
15 Revision
16
Text book: Amzi! Eclips Interactive Development Environment
Text book
(IDE) For prolog
Edition & Year published : 2007
Reference
Semester Units 4
Course Description
Reference
Semester Units 4
Lab Description
3 Block ciphers
5 Symmetric ciphers
9 Authentication
11 Digital signatures
12 Intruders
13 Malicious software
14 Firewalls
15 Final Examination
Course Description
Week
Topics
No.
1 Threads, SMP&Microkernels:Processes&Threads(Multithreading,thread Functionality, User-
Level&Kernel-Level Threads), Symmetric Multiprocessing(SMP Architecture, SMP
Organization,Multiprocessor Operating System DesignConsiderations), Micro-kernels(Microkernel
Architecture, Benefits of a Microkernel Organization, Microkernel Performance, Microkernel
Design), Solaries Thread &SMP Management (Multithreaded Architecture, Motivation, Process
Structure, Thread Execution, Interrupts as Threads ), Linux Process and Thread Management
(Linux Tasks, Linux Threads).
2 Process Synchronization: The Critical-Section Problem, Synchronization Hardware, Semaphores,
Deadlocks and Starvation, Classical Synchronization Problems, Monitors, Atomic Transactions
3 DEADLOCKS: Deadlock Characterization (Necessary Conditions, Resource-Allocation Graph),
Methods for Handling Deadlocks, Deadlock Prevention (Mutual Exclusion, Hold&Wait, No
Preemption,Circular Wait),Deadlock Avoidance (Safe State, Resource-Allocation-Graph
Algorithm),Deadlock Detection (Single Instance of Resource, Several Instances of a Resource
Type), Recovery from Deadlock (Process Termination, Resource Preemption)
4 EMBEDDED OPERATING SYSTEMS: Embedded Systems, Characteristics of Embedded Operating
Systems (Adapting an Existing Commercial Operating System, Purpose-Built Embedded Operating
System, eCos (Configurability, eCos Components, eCos Scheduler, eCos Thread Synchronization),
TinyOS (Wireless Sensor Networks, TinyOS Goals, TinyOS Components, TinyOS Scheduler, Example
Configuration, TinyOS Resource Interface)
5 Real time operating system, Network operating system, Mobile operating system
6 Multimedia operating systems: Introduction to multimedia files(Audio Encoding, Video Encoding),
Video compression (JPEG , The MPEG), Multimedia process scheduling (Scheduling Homogeneous
Processes , General Real-Time Scheduling, Rate Monotonic Scheduling, Earliest Deadline First
Scheduling)
7 Multimedia operating systems : multimedia files system paradiagms (VCR Control Functions, Near
Video on Demand, Near Video on Demand with VCR Functions), File placement (Placing a File on a
Single Disk, Two Alternative File Organization Strategies, Placing Files for Near Video on Demand,
Placing Multiple Files on a Single Disk, Placing Files on Multiple Disks), Caching(Block Caching, File
Caching), Disk scheduling for multimedia (Static Disk Scheduling, Dynamic Disk Scheduling)
8 Multimedia processor systems: Multiprocessors, Multiprocessor Hardware (UMA Bus-Based SMP
Architectures, UMA Multiprocessors Using Crossbar Switches, UMA Multiprocessors Using
Multistage Switching Networks, NUMA Multiprocessors), Multiprocessor Operating System Types,
Master-Slave Multiprocessors, Symmetric Multiprocessors, Multiprocessor Synchronization
(Spinning versus Switching), Multiprocessor Scheduling (Timesharing , Space Sharing, Gang
Scheduling)
9 Multiple processor systems: Multicomputers, Multicomputer Hardware (Interconnection
Technology, Network Interfaces), Low-Level Communication Software (Node to Network Interface
Communication) , User-Level Communication Software (Send and Receive, Blocking versus Non-
blocking Calls), Remote Procedure Call (Implementation Issues), Distributed Shared Memory
(Replication, False Sharing, Achieving Sequential Consistency), Multicomputer Scheduling, Load
Balancing (A Graph-Theoretic Deterministic Algorithm, A Sender-Initiated Distributed Heuristic
Algorithm)
10 Distributed systems: Network Hardware(Ethernet, The Internet), Network Services and Protocols
(Network Services, Network Protocols), Document-Based Middleware, File System-Based
Middleware (Transfer Model, Directory Hierarchy,Naming transparency, Semantics of File
Sharing,AFS),Shared Object-Based Middleware, Coordination-Based Middleware
11 Security: Security environment(Threats, Intruders, Accidental Data Loss), Basics of
Cryptography(Secret-Key & Public-Key Cryptography, One-Way Functions, Digital Signatures),
User authentication(Authentication Using Passwords, How Crackers Break In, UNIX ,Password
Security, Improving Password Security, One-Time Passwords, Challenge-Response Authentication),
Authentication Using a Physical Object, Authentication Using Biometrics, Countermeasures
12 Attacks from inside the system: Trojan Horses, Login Spoofing, Logic Bombs, Trap Doors, Buffer
Overflow, Generic Security Attacks, Famous Security Flaws, Famous Security Flaws in UNIX, Design
Principles for Security. Attacks from outside the system: Virus Damage Scenarios, How Viruses
Work (Companion Viruses, Executable Program Viruses,Memory Resident Viruses,Boot Sector
Viruses, Device Driver Viruses, Macro Viruses, Source Code Viruses), How Viruses Spread,
Antivirus and Anti-Antivirus Techniques (Virus Scanners, Integrity Checkers, Behavioral Checkers,
Virus Avoidance, Recovery from a Virus Attack), The Internet Worm, Mobile Code (Sandboxing,
Interpretation, Code signing), Java Security; Protection mechanisms: Protection Domains, Access
Control Lists, Capabilities; Trusted systems: Trusted Computing Base, Formal Models of Secure
Systems, Multilevel Security (The Bell-La Padula Model, The Biba Model)
13 Distributed processing, client/server & Clusters: Client/Server Computing (What Is Client/Server
Computing? Client/ Server Applications, Middleware, Distributed Message Passing (Reliability
versus Unreliability, Blocking versus Non-blocking), Remote Procedure Calls (Parameter Passing,
Parameter Representation, Client/Server Binding, Synchronous versus Asynchronous, Object-
Oriented Mechanisms), Clusters (Cluster Configurations, Operating System Design Issues, Cluster
Computer Architecture, Clusters Compared to SMP), Windows Cluster Server, Sun Cluster (Object
and Communication Support, Process Management, Networking, Global File System)
14 DISTRIBUTED PROCESS MANAGEMENT: Process Migration (Motivation, Process Migration
Mechanisms, Negotiation of Migration, Eviction, Preemptive versus Nonpreemptive Transfers),
Distributed Global States (Global States and Distributed Snapshots, The Distributed Snapshot
Algorithm), Distributed Mutual Exclusion (Distributed Mutual Exclusion Concepts, Ordering of
Events in a Distributed System, Distributed Queue, A Token-Passing Approach ), Distributed
Deadlock (Deadlock in Resource Allocation,Deadlock in Message Communication)
15 Case study: Unix & Linux: History of Unix(UNICS,MINIX, Linux),Unix Goals, Interfaces to Unix, Unix
Shell, Unix Utility Programs, Kernel Structure, Processes in Unix, Process Management System
Calls in UNIX, Thread Management System Calls, Threads in Unix, Threads in Linux, Scheduling in
Unix, Scheduling in Linux, Booting Unix; Memory management in Unix: Memory Management
System Calls in UNIX , Implementation of Memory Management in UNIX, Paging in UNIX, Page
Replacement Algorithm, Memory Management in Linux, Input/Output System Calls in Unix,
Implementation of Input/output in Unix, Streams, Unix File System, Linux File System, NFS:
Network File System, NFS Architecture , NFS Protocols , SECURITY IN UNIX
Text book Title: Modern Operating System, Andrew S. Tanenbaum, 2nd Ed.,
Title : Operating Systems: Internals and Design Principles, William Stallings, 6th Ed., 2009
Reference
Semester Units 4
Course Description
Semester Units 4
Lab Description
Week
Topics
No.
1,2 Network Installation
a) install the provided network adapter cards in the Insight and the Infomatics PCS
b) connect the three computers using the cables, terminators and Ts provided.
c) install the correct drivers for the two network adapter cards from the disk(s)
provided
d) ensure that the Windows for Workgroups network is setup for the three
computers
e) move the file NET-MAN.FIL from the 486 tower computer to the two PCS that
you have connected to it using the installed network.
3,4 Designing a Computer Lab
type of software needed
operating system / network operating system
type of computers (processor, RAM, hardisk size, monitor & video card,
additional internal hardware)
type of network (topology & protocol)
other hardware / software needed for the lab
approximate costs for above
5 1) Develop a computer network plan for Luna. (2-3 people)
2) Assign Legion Park Elementary School in writing an educational grant for
network equipment that will provide Internet connectivity. I have grant proposal
documents from CISCO and ASSANTE' that can be used. (1 person)
3) Same as #2 for another elementary school of your choice (1 person)
4) Same as #2 but for all elementary schools in one of the two districts (2-3
persons)
6 Introduction to Windows NT
title: Network Security Bible
Text book
Author : Cole
Edition & Year public : 2005
Reference
Semester Units 4
Course Description
Reference
Semester Units 4
Lab Description
2 Network architectures
3 802.XX protocols
4 Internet protocol IP
5 TCP/IP protocol
7 Application protocols
8 Network security
Title :
Text book Author :
Edition & Year public :
Reference