Create different Wired-cum-Wireless networks and MobileIP Simulations using NS2.
MITNE208 SEMINAR
Each student shall present a seminar on any topic of interest related to the core / elective courses offered in the first semester of the M. Tech. Programme. He / she shall select the topic based on the References: from reputed International Journals, preferably IEEE journals. They should get the paper approved by the Programme Co-ordinator / Faculty member in charge of the seminar and shall present it in the class. Every student shall participate in the seminar. The students should undertake a detailed study on the topic and submit a report at the end of the semester. Marks will be awarded based on the topic, presentation, participation in the seminar and the report submitted.
MITNE301 RESEARCH METHODOLOGY
Module I
Introduction to research methodology — Motivation for research — Types of research - Research approaches — Scientific method —Research process — Problems in research — Selecting the problem — Techniques — Research design - Features of good design Important concepts - Different research designs - Basic principles of experimental design -- Sampling design — Sample survey — Sampling design — Implications and steps — Characteristics and criteria for sampling design — Types of sampling designs — Random sampling - Complex random sampling designs
Module II
Measurement and scaling techniques — Sources of error in measurements -- Tests of good measurement — Scaling — Scaling techniques - Measurement uncertainty – uncertainty estimation — Methods of data collection — Observation — Interview — Questionnaire — Differences between questionnaires and schedules - Other methods of data collection - Selection of appropriate methods — Processing and analysis of data - Types of analysis Statistics in research — Measures of central tendency, dispersion, asymmetry — Regression analysis
Module III
Sampling fundamentals — Definitions - Sampling distributions — Central limit theorem -- Sampling theory - Sandler‘s A-test Standard error Estimation — Estimating population mean, proportion — Sample size and determination -- Determination of sample size - Testing hypotheses - Basic concepts Procedure and flow diagram — Measuring the power of a hypothesis test — Tests of hypotheses Important parametric tests - Hypothesis testing of means - difference between means.
Chi-square test — Chi-square as a test for comparing Variance, as a nonparametric test -Conditions for applications — Steps involved — ANOVA — Principle of ANOVA — Setting up ANOVA table — Short-cut method — Coding method — Two-way ANOVA
Module IV
Ethics of research — Ethical standards — Authorship of paper — Scientific misconduct — Fabrication — Obfuscation — Plagiarism - Misappropriation of data — Responsibilities of authors and institutions — Data interpretation and Report writing - Techniques of interpretation — Precautions — Significance of report writing — Guidelines for writing research papers and reports — Writing different sections of a research paper — Introduction, Methodology, Results, Discussion, Conclusion, Abstract — Writing the title — Guidelines for writing doctoral thesis — Role of computers in research- Evaluation of scientific journals and scientists-Impact factor-h-index
References:
1. C. R. Kothari, Research Methodology, Methods and techniques (New Age International Publishers, New Delhi, 2004)
2. R. Panneerselvam, Research Methodology (Prentice Hall of India, New Delhi, 2011)
3. Ranj it Kumar, Research Methodology. A step by step approach (Pearson Publishers, NewDelhi, 2005
MITNE302 - 1 NETWORK FORENSICS
Module I
Introduction to Network Forensics : Concepts in Digital Evidence, Challenges relating to Network Evidence, Network Forensics Investigative Methodology, Technical Fundamentals, Sources of Network-Based Evidence, On the Wire, In the Air, Switches , Routers, DHCP Servers, Name Servers, Authentication Servers, Network Intrusion Detection /Prevention Systems, Firewalls, Web Proxies, Application Servers, Central Log Servers. Evidence Acquisition: Physical Interception-Cables, Radio Frequency, Hubs, Switches, Traffic Acquisition Software, libpcap and WinPcap The Berkeley Packet Filter (BPF) Language, tcpdump , Wireshark, tshark, dumpcap, Active Acquisition- Common Interfaces, Inspection Without Access, Strategy.
Module II
Traffic Analysis : Protocol Analysis, Protocol Analysis Tools, Protocol Analysis Techniques, Packet Analysis, Packet Analysis Tools, Packet Analysis Techniques, Flow Analysis, Flow Analysis Tools, Flow Analysis Techniques, Higher-Layer Traffic Analysis, Common Higher-Layer Protocols, Higher-Layer Analysis Tools, Higher-Layer Analysis Techniques Statistical Flow Analysis, Process Overview, Sensors, Sensor Types, Sensor Software, Sensor Placement, Flow Record Export Protocols, NetFlow, IPFIX, sFlow, Collection and Aggregation, Wireless Traffic Capture and Analysis, Spectrum Analysis, Wireless Passive Evidence Acquisition, Common Attacks – Sniffing, Rogue Wireless Access Points, Evil Twin, WEP Cracking, Locating Wireless Devices.
Module III
Network Devices, Intrusion Detection and Analysis : Typical NIDS/NIPS Functionality, Sniffing , Higher-Layer Protocol Awareness, Alerting on Suspicious Bits Modes of Detection, Signature-Based Analysis, Protocol Awareness, Behavioral Analysis, Types of NIDS/NIPSs , NIDS/NIPS Evidence Acquisition , Comprehensive Packet Logging , Event Log Aggregation, Correlation, and Analysis, Sources of Logs - Operating System Logs , Application Logs Physical Device Logs, Network Equipment Logs, Network Log Architecture, Three Types of Logging Architectures, Remote Logging: Common Pitfalls and Strategies. Switches - Content-Addressable Memory Table, ARP, Switch Evidence, Routers-Types of Routers, Router Evidence, Firewalls -Types of Firewalls , Firewall Evidence.
Module IV
Advanced Topics : Network Tunneling, Tunneling for Functionality, Inter-Switch Link (ISL), Generic Routing Encapsulation (GRE), Tunneling for Confidentiality, Internet Protocol Security (IPsec), Transport Layer Security (TLS) and Secure Socket Layer (SSL), Covert Tunneling, Covert Tunneling Strategies , TCP Sequence Numbers , DNS Tunnels , ICMP Tunnels. Malware Forensics, Trends in Malware Evolution, Network Behavior of Malware, Propagation, Command-and-Control Communications, Payload Behavior.
Text Book
1. Sherri Davidoff, Jonathan Ham, “Network Forensics: Tracking Hackers through Cyberspace”, Pearson Education, 2012.
References
1. Katzendbisser, Petitcolas, " Information Hiding Techniques for Steganography and Digital Watermarking", Artech House. 42
2. Peter Wayner, "Disappearing Cryptography: Information Hiding, Steganography and Watermarking 2/e", Elsevier
3. Bolle, Connell et. al., "Guide to Biometrics", Springer
4. John Vecca, “Computer Forensics: Crime scene Investigation”, Firewall Media
5. Christopher L.T. Brown, “Computer Evidence: Collection and Preservation”, Firewall Media
MITNE303-1 ENGINEERING MOBILE APPLICATIONS
Module I
Mobile Processor Architecture : ARM Processor – Design Philosophy – System Hardware – System Software - Registers – Program Status Register – Pipe Line – Exceptions, Interrupts, Vector Table – Core Extensions. Firmware and boot loader – Case Study : Sand Stone – Embedded Operating System – Case Study : Simple Little Operating System.
Module II
Android Operating System : Features and Characteristics – Android Concepts – Framework - Architecture – Linux Kernel – Wakelocks - Low-Memory Killer – Binder – ashmem – Alarm – Logger - Hardware Abstraction Layer - Loading and Interfacing Methods - Init - Dalvik and Android’s Java - Java Native Interface - System Services - Service Manager and Binder Interaction. Hardware - Typical System Architecture - System-on-Chip - Memory Layout and Mapping – Filesystem.
Module III
Basic Android Development : Android Application Architecture – Manifest - Application Lifecycle – Activities – Activity Lifecycle – User Interface Fundamentals – Layouts – Menus - Views - Intents – Linkify – Intents to Broadcast Events.
Module IV
Advanced Android Development : Connecting to an Internet Resource - SQLite Databases – Content values and cursors – Text-to-Speech and speech recognition - Sensors - Location based services – Bluetooth – Wifi - Cloud to Device Messaging. Overview of Android Native Development.
References:
1. Karim Yaghmour, “Embedded Android Porting, Extending, and Customizing” , O'Reilly Media.
2. Andrew Sloss, Dominic Symes , Chris Wright, “ARM System Developer's Guide: Designing and Optimizing System Software”, Elsevier.
3. Reto Meier , “Professional Android 4 Application Development”, Wiley
MITNE303-2 ENTREPRENEURSHIP DEVELOPMENT
Module I
Entrepreneurship- definition. growth of small scale industries in developing countries and their positions vis-a-vis large industries; role of small scale industries in the national economy; characteristics and types of small scale industries; demand based and resources based ancillaries and sub-control types. Government policy for small scale industry; stages in starting a small scale industry.
Module II
Project identification- assessment of viability, formulation, evaluation, financing, field-study and collection of information, preparation of project report, demand analysis, material balance and output methods, benefit cost analysis, discounted cash flow, internal rate of return and net present value methods.
Module III
Accountancy- Preparation of balance sheets and assessment of economic viability, decision making, expected costs, planning and production control, quality control, marketing, industrial relations, sales and purchases, advertisement, wages and incentive, inventory control, preparation of financial reports, accounts and stores studies.
Module IV
Project Planning and control: The financial functions, cost of capital approach in project planning and control. Economic evaluation, risk analysis, capital expenditures, policies and practices in public enterprises. profit planning and programming, planning cash flow, capital expenditure and operations. control of financial flows, control and communication.
Laws concerning entrepreneur viz, partnership laws, business ownership, sales and income taxes and workman compensation act
References:
1. Forbat, John, “Entrepreneurship” New Age International.
2. Havinal, Veerbhadrappa, “Management and Entrepreneurship” New Age International
3. Joseph, L. Massod, “Essential of Management", Prentice Hall of India.
In master’s thesis Phase-I, the students are expected to select an emerging research area in Computer Science or related fields, After conducting a detailed literature survey, they should compare and analyze research work done and review recent developments in the area and prepare an initial design of the work to be carried out as Master’s Thesis. It is expected that the students should refer National and International Journals and proceedings of National and International conferences while selecting a topic for their thesis. He/She should select a recent topic from a reputed International Journal, preferably IEEE/ACM. Emphasis should be given for introduction to the topic, literature survey, and scope of the proposed work along with some preliminary work carried out on the thesis topic.
Students should submit a copy of Phase-I thesis report covering the content discussed above and highlighting the features of work to be carried out in Phase-II of the thesis. Students should follow standard practice of thesis writing. Presenting the work, carried out by the students in a National/International Conference is encouraged.
The candidate should present the current status of the thesis work and the assessment will be made on the basis of the work and the presentation, by a panel of internal examiners in which one will be the internal guide. The examiners should give their suggestions in writing to the students so that it should be incorporated in the Phase–II of the thesis.
MITNE 401
|
MASTER’S THESIS
|
L
|
T
|
P
|
C
|
0
|
0
|
30
|
15
|
In the fourth semester, the student has to continue the thesis work and after the successful completion of the work, he / she have to submit a detailed thesis report. The work carried out should lead to a publication in a National / International Conference. They should submit the paper before the evaluation of the thesis and specific weightage will be given to accepted papers in reputed conferences.
MITNE 402
|
MASTER’S COMPREHENSIVE VIVA
|
|
|
|
|
|
|
|
|
A comprehensive viva-voce examination will be conducted at the end of the fourth semester by an internal examiner and external examiners appointed by the university to assess the candidate’s overall knowledge in the respective field of specialization.
Share with your friends: