SlideShare a Scribd company logo
1 of 2
IT801:AdvanceComputerNetwork
BroadbandWideAreaNetworking;SDH,FrameRelayandATM
Bandwidth-On-Demand Technologies, Limitations of Traditional Fixed Capacity NetworksPacket Switching; First
and Subsequent Generations, In-Band vs. Out-of-Band Control MethodsCongestion Control, Flow Control &
Throughput
CellRelayandATMInternetworking
ATM Features, Adaptation Layers & Cell Structure, Virtual Path, Switching and Traffic ShapingATM Classes of
Service and Traffic Partitioning , LANE, MPOA and PNNI Developments
DistributedComputingandTheNFS
The distributed computing environment architecture , Intra-cell communication and threadsThe network file system,
Remote procedure calls and distributed processes
TheNextGenerationProtocols
IP and TCP performance issues, Limitations of current generation TCP and IPIpv4 pressure points that demand
solutions , Internet protocol version 6 featuresAddressing options and strategies , Ipv6 extension headers, options
and featuresTCP next generation issues and header details, Changes to ICMP and DNS
TransitiontoNextGenerationProtocols
Mobile IP; Technology and Applications, Requirements of mobile, portable and ubiquitouscomputing , Radio
propagation issues, Evolving device features and form factors
QualityofServiceandReal-TimeApplicationIssues
Quality of service; motivation, issues and options, Integrated vs. Differentiated servicesMulti-protocol label
switching , Real time protocol; features and applications
Multicast
The Multicast Backbone (MBONE), Relating IP multicast to IEEE 802.1, Multicast tunnelsMBONE routing
challenges,
VoiceOverIP
Technical and economic opportunities, Configuration models, Packet delay issuesVoice encoding methods,
Signaling and revenue coordination issues
TDMAandCDMA;FeaturesComparedandContrasted
TDMA and CDMA concepts/issues/features/limitations, Global system for mobile (GSM) technicalfeatures,
Enhanced data rates for GSM and TDMA/136 evolution (EDGE)Comparing suitability for supporting data
applications
MobileIP;ConceptsandIssues
Disconnecting from fixed infrastructure, Mobile computing addressing issuesOverview; IP connectivity with a
mobile unit, Functions of the mobile agent, home agent andforeign agent, Tunnel delivery methods
WirelessApplicationProtocol
The case for an unwired web architecture, The WAP architecture; concepts and featuresWAP data presentation;
cards and decks, The wireless application environment, Protocols elementsof WAP, Bearer services that support
WAP
PartialMobilitywithWirelessLocalLoops
Wideband Code Division Multiple Access (WCDMA), Applications of wireless subscriber loopsBroadband
wireless; LMDS, MMDS and related technologies, Applications, economics and marketfor WLLPractical and Term
work The practical and Term work will be based on the topics covered in the syllabus.Minimum 5 experiments
should be carried out.
Reference:
1.Internetworking with ISDN, Frame Relay & ATM -By William Stallings
2.ATM - protocols, applications and standards -By Hueber et al
3.Internetworking with TCP/IP : volume 1 & 3 -By Douglas Comer
4 . Co mp ut er Ne t wo r ks -B y A. T a ne nba um
5.Unix Network Programming - 1 & 2 -By Richard Stevens
6. WAP Specifications www.wapforum.org
7. Various RFCs, Technical Journals, Papers & Internet Drafts
DataCompression
IntroductionToDataCompression
The Audience, Why C?, Which C?, Keeping Score, The Structure
TheDataCompressionLexicon,WithAHistory
The Two Kingdoms, Data Compression = Modeling + Coding, The Dawn Age, Coding AnImprovement
Modeling, Statistical Modeling, Ziv & Lempel LZ77 LZ78, Lossy Compression,Programs to Know
TheDawnAge:MinimumRedundancyCoding
The Sahnnon-Fano Algorithm, The Huffman Algorithm, Huffman in C, BITIO.C, A Reminder
aboutPrototypes, MAIN-C.C & MAIN-E.C, MAIN-C.C, ERRHAND.C, Into the Huffman Code,Counting the
Symbols, Saving the Counts, Building the Tree, Using the Tree
ASignificantImprovement:AdaptiveHuffmanCoding
Adaptive Coding, Updating the Huffman Tree, What swapping Does, The Algorithm, AnEnhancement, The
Escape Code, The Overflow Bonus, A Rescaling Bonus, The Code, Initializationof the Array, The Compress
Main Program, The Expand Main Program, Encoding the Symbol,Decoding The Symbol
HuffmanOneBetter:ArithmeticCoding
Difficulties, Arithmetic Coding: A Step Forward, Practical Matters, A Complication, Decoding,Where’s the Beef
Dictionary-BasedCompression
An Example, Static vs. Adaptive, Adaptive Methods, A Representative Example, Israeli
Roots,History, ARC: The Father of MS-DOS Dictionary Compression, Dictionary Compression, Danger Ahead-
Patents, Conclusion
SlidingWindowCompression
The Algorithm, Problems with LZ77, An Encoding Problem, LZSS compression, Data structures, A balancing
Act Greedy vs. Best Possible. The Expansion Routine, Improvements.
SpeechCompression
D i g i t a l A u d i o C o n c e p t s , F u n d a m e n t a l s , S a m p l i n g V a r i a b l e s , P C -
B a s e d s o u n d , L o s s l e s s Compression of Sound, Problems and Results, Loss
compression, Silence Compression, Other Techniques.
LossyGraphicsCompression
E n t er Co m p r es si o n , St a ti st ical A n d D ic ti o na r y C om p r ess io n M eth o ds L os sy C o m p r
es si o n Differential Modulation Adaprive Coding, A Standard That Works: JPEG, JPEG Compression,
TheD i s c r et e C os i n e T ra n sf o r m, DC T S p ec if ic s, Why Bo th er ? Im pl em en t i ng T h e D C T
. Ma t ri x Mul t i pli cat i on , C p mt o mi ed I mp r o vem en t s , Ou t pu t Of T he D C T , Q ua n ti za ti o
n , S el ec ti n g A Qualtization Matrix. The Sample Program, Input Format, Initialization, The Forward DCT
Routine,Write DCT Data(), File Expansion, Read DCT Data(), The Inverse DCT.Practical and Term work The
practical and Term work will be based on the topics covered in the syllabus.
Text Books:
1 . “ Da ta C o mp r ess i o n” , Ma rk N el so n
2.“Data Compression”, Khalid shayood, Morgon Kaufmann
3.“Data Compression : The Complete Reference”, David Saloman, Springer

More Related Content

Similar to It syllabus

Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorialcybercbm
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...confluent
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...confluent
 
icert_syllabus_scientistB.pdf
icert_syllabus_scientistB.pdficert_syllabus_scientistB.pdf
icert_syllabus_scientistB.pdfVishnumayaN1
 
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st CenturyThe von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st CenturyPerry Lea
 
Computer sci & applicat set syllabus
Computer sci & applicat set syllabusComputer sci & applicat set syllabus
Computer sci & applicat set syllabusbehappymdgotarkar
 
Syllabus lect computer_engineering(tech_edudeptt)
Syllabus lect computer_engineering(tech_edudeptt)Syllabus lect computer_engineering(tech_edudeptt)
Syllabus lect computer_engineering(tech_edudeptt)Naveen Saini
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
3EE1108 Digital Signal Processing
3EE1108  Digital Signal Processing3EE1108  Digital Signal Processing
3EE1108 Digital Signal ProcessingKimberly Pulley
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisDeepak Shankar
 
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...inside-BigData.com
 
Session 1 - The Current Landscape of Big Data Benchmarks
Session 1 - The Current Landscape of Big Data BenchmarksSession 1 - The Current Landscape of Big Data Benchmarks
Session 1 - The Current Landscape of Big Data BenchmarksDataBench
 
Full resume dr_russell_john_childs_2013
Full resume dr_russell_john_childs_2013Full resume dr_russell_john_childs_2013
Full resume dr_russell_john_childs_2013Russell Childs
 

Similar to It syllabus (20)

Bca 207
Bca 207Bca 207
Bca 207
 
Cluster Tutorial
Cluster TutorialCluster Tutorial
Cluster Tutorial
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi and Eri...
 
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
How To Use Kafka and Druid to Tame Your Router Data (Rachel Pedreschi, Imply ...
 
icert_syllabus_scientistB.pdf
icert_syllabus_scientistB.pdficert_syllabus_scientistB.pdf
icert_syllabus_scientistB.pdf
 
Par com
Par comPar com
Par com
 
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st CenturyThe von Neumann Memory Barrier and Computer Architectures for the 21st Century
The von Neumann Memory Barrier and Computer Architectures for the 21st Century
 
Computer sci & applicat set syllabus
Computer sci & applicat set syllabusComputer sci & applicat set syllabus
Computer sci & applicat set syllabus
 
Giacomo Cernicchi - MSc_ENG
Giacomo Cernicchi - MSc_ENGGiacomo Cernicchi - MSc_ENG
Giacomo Cernicchi - MSc_ENG
 
Syllabus lect computer_engineering(tech_edudeptt)
Syllabus lect computer_engineering(tech_edudeptt)Syllabus lect computer_engineering(tech_edudeptt)
Syllabus lect computer_engineering(tech_edudeptt)
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
3EE1108 Digital Signal Processing
3EE1108  Digital Signal Processing3EE1108  Digital Signal Processing
3EE1108 Digital Signal Processing
 
Webinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System AnalysisWebinar on Functional Safety Analysis using Model-based System Analysis
Webinar on Functional Safety Analysis using Model-based System Analysis
 
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...
State-Of-The Art Machine Learning Algorithms and How They Are Affected By Nea...
 
Session 1 - The Current Landscape of Big Data Benchmarks
Session 1 - The Current Landscape of Big Data BenchmarksSession 1 - The Current Landscape of Big Data Benchmarks
Session 1 - The Current Landscape of Big Data Benchmarks
 
course description
course descriptioncourse description
course description
 
Full resume dr_russell_john_childs_2013
Full resume dr_russell_john_childs_2013Full resume dr_russell_john_childs_2013
Full resume dr_russell_john_childs_2013
 
7th sem syllabus
7th sem syllabus 7th sem syllabus
7th sem syllabus
 
Sigcomm16 sdn-nvf-topics-preview
Sigcomm16 sdn-nvf-topics-previewSigcomm16 sdn-nvf-topics-preview
Sigcomm16 sdn-nvf-topics-preview
 

It syllabus

  • 1. IT801:AdvanceComputerNetwork BroadbandWideAreaNetworking;SDH,FrameRelayandATM Bandwidth-On-Demand Technologies, Limitations of Traditional Fixed Capacity NetworksPacket Switching; First and Subsequent Generations, In-Band vs. Out-of-Band Control MethodsCongestion Control, Flow Control & Throughput CellRelayandATMInternetworking ATM Features, Adaptation Layers & Cell Structure, Virtual Path, Switching and Traffic ShapingATM Classes of Service and Traffic Partitioning , LANE, MPOA and PNNI Developments DistributedComputingandTheNFS The distributed computing environment architecture , Intra-cell communication and threadsThe network file system, Remote procedure calls and distributed processes TheNextGenerationProtocols IP and TCP performance issues, Limitations of current generation TCP and IPIpv4 pressure points that demand solutions , Internet protocol version 6 featuresAddressing options and strategies , Ipv6 extension headers, options and featuresTCP next generation issues and header details, Changes to ICMP and DNS TransitiontoNextGenerationProtocols Mobile IP; Technology and Applications, Requirements of mobile, portable and ubiquitouscomputing , Radio propagation issues, Evolving device features and form factors QualityofServiceandReal-TimeApplicationIssues Quality of service; motivation, issues and options, Integrated vs. Differentiated servicesMulti-protocol label switching , Real time protocol; features and applications Multicast The Multicast Backbone (MBONE), Relating IP multicast to IEEE 802.1, Multicast tunnelsMBONE routing challenges, VoiceOverIP Technical and economic opportunities, Configuration models, Packet delay issuesVoice encoding methods, Signaling and revenue coordination issues TDMAandCDMA;FeaturesComparedandContrasted TDMA and CDMA concepts/issues/features/limitations, Global system for mobile (GSM) technicalfeatures, Enhanced data rates for GSM and TDMA/136 evolution (EDGE)Comparing suitability for supporting data applications MobileIP;ConceptsandIssues Disconnecting from fixed infrastructure, Mobile computing addressing issuesOverview; IP connectivity with a mobile unit, Functions of the mobile agent, home agent andforeign agent, Tunnel delivery methods WirelessApplicationProtocol The case for an unwired web architecture, The WAP architecture; concepts and featuresWAP data presentation; cards and decks, The wireless application environment, Protocols elementsof WAP, Bearer services that support WAP PartialMobilitywithWirelessLocalLoops Wideband Code Division Multiple Access (WCDMA), Applications of wireless subscriber loopsBroadband wireless; LMDS, MMDS and related technologies, Applications, economics and marketfor WLLPractical and Term work The practical and Term work will be based on the topics covered in the syllabus.Minimum 5 experiments should be carried out. Reference: 1.Internetworking with ISDN, Frame Relay & ATM -By William Stallings 2.ATM - protocols, applications and standards -By Hueber et al 3.Internetworking with TCP/IP : volume 1 & 3 -By Douglas Comer 4 . Co mp ut er Ne t wo r ks -B y A. T a ne nba um 5.Unix Network Programming - 1 & 2 -By Richard Stevens 6. WAP Specifications www.wapforum.org 7. Various RFCs, Technical Journals, Papers & Internet Drafts
  • 2. DataCompression IntroductionToDataCompression The Audience, Why C?, Which C?, Keeping Score, The Structure TheDataCompressionLexicon,WithAHistory The Two Kingdoms, Data Compression = Modeling + Coding, The Dawn Age, Coding AnImprovement Modeling, Statistical Modeling, Ziv & Lempel LZ77 LZ78, Lossy Compression,Programs to Know TheDawnAge:MinimumRedundancyCoding The Sahnnon-Fano Algorithm, The Huffman Algorithm, Huffman in C, BITIO.C, A Reminder aboutPrototypes, MAIN-C.C & MAIN-E.C, MAIN-C.C, ERRHAND.C, Into the Huffman Code,Counting the Symbols, Saving the Counts, Building the Tree, Using the Tree ASignificantImprovement:AdaptiveHuffmanCoding Adaptive Coding, Updating the Huffman Tree, What swapping Does, The Algorithm, AnEnhancement, The Escape Code, The Overflow Bonus, A Rescaling Bonus, The Code, Initializationof the Array, The Compress Main Program, The Expand Main Program, Encoding the Symbol,Decoding The Symbol HuffmanOneBetter:ArithmeticCoding Difficulties, Arithmetic Coding: A Step Forward, Practical Matters, A Complication, Decoding,Where’s the Beef Dictionary-BasedCompression An Example, Static vs. Adaptive, Adaptive Methods, A Representative Example, Israeli Roots,History, ARC: The Father of MS-DOS Dictionary Compression, Dictionary Compression, Danger Ahead- Patents, Conclusion SlidingWindowCompression The Algorithm, Problems with LZ77, An Encoding Problem, LZSS compression, Data structures, A balancing Act Greedy vs. Best Possible. The Expansion Routine, Improvements. SpeechCompression D i g i t a l A u d i o C o n c e p t s , F u n d a m e n t a l s , S a m p l i n g V a r i a b l e s , P C - B a s e d s o u n d , L o s s l e s s Compression of Sound, Problems and Results, Loss compression, Silence Compression, Other Techniques. LossyGraphicsCompression E n t er Co m p r es si o n , St a ti st ical A n d D ic ti o na r y C om p r ess io n M eth o ds L os sy C o m p r es si o n Differential Modulation Adaprive Coding, A Standard That Works: JPEG, JPEG Compression, TheD i s c r et e C os i n e T ra n sf o r m, DC T S p ec if ic s, Why Bo th er ? Im pl em en t i ng T h e D C T . Ma t ri x Mul t i pli cat i on , C p mt o mi ed I mp r o vem en t s , Ou t pu t Of T he D C T , Q ua n ti za ti o n , S el ec ti n g A Qualtization Matrix. The Sample Program, Input Format, Initialization, The Forward DCT Routine,Write DCT Data(), File Expansion, Read DCT Data(), The Inverse DCT.Practical and Term work The practical and Term work will be based on the topics covered in the syllabus. Text Books: 1 . “ Da ta C o mp r ess i o n” , Ma rk N el so n 2.“Data Compression”, Khalid shayood, Morgon Kaufmann 3.“Data Compression : The Complete Reference”, David Saloman, Springer