computer science & engineering - mvjce science & engineering ... part - a 1. overview 6 hrs...

79
Near ITPB, Bangalore-560 067 W We eb bs si i t te e: : w ww ww w. . m mv vj jc ce e. . e ed du u. . i in n C C O O M M P P U U T T E E R R S S C C I I E E N N C C E E & & E E N N G G I I N N E E E E R R I I N N G G COURSE D I I A ARY (ACADEMIC YEAR 2011-12) V SEMESTER Name : _____________________________________________ USN : _____________________________________________ Semester & Section : _____________________________________________ The Mission “The mission of our institutions is to provide world class education in our chosen fields and prepare people of character, caliber and vision to build the future world”

Upload: lehanh

Post on 18-May-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

NNeeaarr IITTPPBB,, BBaannggaalloorree--556600 006677

WWeebbssiittee:: wwwwww..mmvvjjccee..eedduu..iinn

CCOOMM PPUUTTEERR SSCCII EENNCCEE && EENNGGII NNEEEERRII NNGG

CCOOUURRSSEE DDII AARRYY (ACADEMIC YEAR 2011-12)

VV SSEEMM EESSTTEERR Name : _____________________________________________ USN : _____________________________________________ Semester & Section : _____________________________________________

The Mission

“The mission of our institutions is to provide

world class education in our chosen fields and

prepare people of character, caliber and vision

to build the future world”

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 2

INDEX

S.No Sub.code Subject Pageno

1 06CS51 Software Engineering 2

2 06CS52 System Software 12

3 06CS53 Operating Systems 18

4 06CS54 Database Management Systems 31

5 06CS55 Computer Networks I 40

6 06CS56 Formal Languages and Automata Theory 56

7 06CSL57 Database Applications Laboratory 65

8 06CSL58 Algorithms Laboratory 70

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 3

SOFTWARE ENGINEERING

06IS51

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 4

SOFTWARE ENGINEERING

SYLLABUS Subject Code: 06IS61 I.A. Marks : 25 Hours/Week : 04 Exam Hours: 03 Total Hours : 52 Exam Marks: 100

PART - A 1. Overview 6 Hrs Introduction: FAQ's about software engineering, Professional and ethical responsibility. Socio-Technical systems: Emergent system properties; Systems engineering; Organizations, people and computer systems; Legacy systems. 2. Critical Systems, Software Processes 6 Hrs Critical Systems: A simple safety-critical system; System dependability; Availability and reliability. Software Processes: Models, Process iteration, Process activities; The Rational Unified Process; Computer-Aided Software Engineering. 3. Requirements 7 Hrs Software Requirements: Functional and Non-functional requirements; User requirements; System requirements; Interface specification; The software requirements document. Requirements Engineering Processes: Feasibility studies; Requirements elicitation and analysis; Requirements validation; Requirements management. 4. System models, Project Management 7 Hrs System Models: Context models; Behavioral models; Data models; Object models; Structured methods. Project Management: Management activities; Project planning; Project scheduling; Risk management.

PART - B 5. Software Design 7 Hrs Architectural Design: Architectural design decisions; System organization; Modular decomposition styles; Control styles.Object-Oriented design: Objects and Object Classes; An Object-Oriented design process; Design evolution. 6. Development 6 Hrs Rapid Software Development: Agile methods; Extreme programming; Rapid application development.Software Evolution: Program evolution dynamics; Software maintenance; Evolution processes; Legacy system evolution. 7. Verification and Validation 7 Hrs Verification and Validation: Planning; Software inspections; Automated static analysis; Verification and formal methods. Software testing: System testing; Component testing; Test case design; Test automation. 8. Management 6 Hrs Managing People: Selecting staff; Motivating people; Managing people; The People Capability Maturity Model. Software Cost Estimation: Productivity; Estimation techniques; Algorithmic cost modeling, Project duration and staffing.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 5

Text Books: 1. Ian Sommerville: Software Engineering, 8th Edition, Person Education Ltd., 2007. (Chapters-: 1, 2, 3, 4, 5, 6, 7, 8, 11, 14, 17, 21, 22, 23, 25, 26) Reference Books: 1. Roger.S.Pressman: Software Engineering-A Practitioners approach, 7th Edition,McGraw-Hill, 2007. 2. Pfleeger: Software Engineering Theory and Practice, 2nd Edition, Pearson Education, 2001. 3. Waman S Jawadekar: Software Engineering Principles and Practice, Tata McGraw Hill, 2004.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 6

M.V.J. COLLEGE OF ENGINEERING

Department of Computer Science & Engineering LESSON PLAN

Subject: 06IS51– Software Engineering Hours / Week: 5 Total Hours: 62 IA Marks: 25 Total marks: 100

Sl. No.

Chapter Hour No.

Topics to be covered

1. OVERVIEW 1 Introduction: FAQ's about software engineering 2 Professional and ethical responsibility. 3 SocioTechnical systems: Emergent system properties

4 Systems engineering

5 Organizations

6 People and computer systems

7 Legacy systems

8 Legacy systems

2. CRITICAL SYSTEMS, SOFTWARE PROCESSES

9 Critical Systems: A simple safety-critical system

10 System dependability

11 Availability and reliability.

12 Software Processes: Models

13 Process iteration

14 Process activities

15 The Rational Unified Process

16 Computer-Aided Software Engineering

3. . REQUIREMENTS 17 Software Requirements: Functional and Non

functional requirements

18 User requirements; 19 System requirements

20 Interface specification

21 Requirements Engineering Processes

22 The software requirements document

23 Feasibility studies

24 Requirements elicitation and analysis

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 7

25 Requirements validation; Requirements management

4. System models,

Project Management

26 System Models: Context models

27 Behavioral models

28 Data models; Object models; 29 Structured methods 30 Project Management 31 Management activities

32 Project planning; 33 Project scheduling

34 Risk management

5. Software Design 35 Architectural Design: Architectural design decisions

36 System organization;

37 Modular decomposition styles;

38 Control styles

39 Object-Oriented design: Objects and Object Classes

40 An Object-Oriented design process

41 Design evolution

6. Development 42 Rapid Software Development: Agile methods

43 Extreme programming;

44 Rapid application development.

45 Software Evolution: Program evolution dynamics

46 Software maintenance; Evolution processes

47 Legacy system evolution

7. Verification and Validation

48 Verification and Validation: Planning;

49 Software inspections; Automated static analysis 50 Verification and formal methods.

51 Software testing: System testing

52 Component testing;

53 Test case design

54 Test automation.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 8

8. Management 55 Managing People: Selecting staff; Motivating people

56 Managing people; The People 57 Capability Maturity Model. 58 Software Cost Estimation

59 Productivity

60 Estimation techniques 61 Algorithmic cost modeling 62 Project duration and staffing.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 9

M.V.J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

QUESTION BANK

Class: VI Semester Hours / Week: 4 Subject: 06IS51– Software Engineering Total Hours: 52 IA Marks: 25 Total marks: 100

1. What is Requirement Engineering? 2. What are Functional and Non Functional Requirements in Software Engineering ? 3. What is SRS? 4. What are the Different types of Architectures in Software Engineering? 5. What are use cases and class diagrams in Software Engineering? 6. What are sequence diagram? What are package diagram? What are collaboration diagram? 7. What is a Good Software Design? 8. What are Design patterns? 9. What are the characteristics of good design? Name some Design Tools? 10. What is SDLC? What are the various SDLC models? Explain them 11. What is RUP and PSP? 12. What are the Different types of Testing? How to design a Test Case? 13. With a neat diagram explain the different stages of Requirement Engineering process. 14. Why elicitation and analysis a difficult process. Explain giving reasons. 15. Explain in detail about View Point Oriented Elicitation. 16. Explain with examples the different types of functional and non-functional requirements. 17. Write the differences between Evolutionary and Throw-away Prototyping. 18. What is Prototyping? What are the benefits of developing a prototype? 19. Give description about the following: 1.domain requirements 2.Enduring requirements 3. Data Dictionary 4.Design abstractions 5. S/W reliability 20. Can you name some limitations of a web environment vs. a Windows environment? 21. What is rapid prototyping technique? Explain the different types of rapid prototyping techniques. 22. Explain different types of user interaction styles. Give advantages, disadvantages. 23. Write in detail about object oriented design process. 24. What are the two approaches to control models at the Architectural level? 25. What is modular decomposition? Explain dataflow model of an invoice processing system. 26. Draw and explain sequence diagram and state diagram for typical weather station. 27. What are the guidelines to be followed while using color in a user interface? 28. With an example describe the repository model and give its advantages and disadvantages. 29. Explain the structure of s/w requirement s document. 30. Illustrate with two examples for object and object class. 31. What is CASE workbench? Describe the tools included in an analysis and design workbench. 32. Write a note about user interface design principles. 33. Describe an s/w process with Throwaway prototyping. What are the problems with this approach? 34 Define Bug Life Cycles? What is Metrics? 35 What is a Test procedure? 36 What is the difference between SYSTEM testing and END-TO-END testing? 37 What is Tractability Matrix? Is there any interchangeable term for Traceability Matrix? Are Tractability Matrix and Test Matrix same or Different? 38 What is the difference between an exception and an error? 39 Correct bug tracking process - Reporting, Re-testing, Debugging?

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 10

40 What is the difference between bug and defect? 41 How much time is/should be allocated for testing out of total Development time based on industry standards? 42 What are test bugs? 43 Define Quality - bug free, Functionality working or both? 44 What is the purpose of software testing’s - Bug removal, System’s functionality working, quality or all? 45 What is the major difference between Web services & client server environment? 46 What is Scalability testing? Which tool is used? 47 What's your favorite Design Pattern? 48 What is custom object? What it contains. Difference between custom & standard objects. 49 Which debugging window allows you to see the methods called in the order they were called? 50 What is the difference between shadow and override? 51 What is class? What is object explain it. Describe the principles of OOPS.What is OOPS? 52 Which items do you normally place under version control? 53 How can you make sure that team members know who changed what in a software project? 54 Do you know the differences between tags and branches? When do you use which? 55 How would you manage changes to technical documentation, like the architecture of a product? 56 How do you deal with changes that a customer wants in a released product? 57 Are there differences in managing versions and releases? 58 How many of the three variables scope, time and cost can be fixed by the customer? 59 Who should make estimates for the effort of a project? Who is allowed to set the deadline? 60 Which kind of diagrams do you use to track progress in a project? 61What is the difference between iteration and an increment?

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 11

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 12

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 13

SYSTEM SOFTWARE 06CS52

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 14

SYSTEMS SOFTWARE

Subject Code: 06CS52 I.A. Marks : 25 Hours/Week : 04 Exam Hours: 03 Total Hours : 52 Exam Marks: 100

PART - A 1. Machine Architecture 6 Hrs Introduction, System Software and Machine Architecture, Simplified Instructional Computer (SIC) - SIC Machine Architecture, SIC/XE Machine Architecture, SIC Programming Examples. 2. Assemblers -1 6 Hrs Basic Assembler Function - A Simple SIC Assembler, Assembler Algorithm and Data Structures, Machine Dependent Assembler Features - Instruction Formats & Addressing Modes, Program Relocation. 3. Assemblers -2 6 Hrs Machine Independent Assembler Features – Literals, Symbol-Definition Statements, Expression, Program Blocks, Control Sections and Programming Linking, Assembler Design Operations - One-Pass Assembler, Multi-Pass Assembler, Implementation Examples – MASM Assembler. 4. Loaders And Linkers 8 Hrs Basic Loader Functions - Design of an Absolute Loader, A Simple Bootstrap Loader, Machine-Dependent Loader Features – Relocation, Program Linking, Algorithm and Data Structures for a Linking Loader; Machine-Independent Loader Features - Automatic Library Search, Loader Options, Loader Design Options - Linkage Editor, Dynamic Linkage, Bootstrap Loaders, Implementation Examples - MS-DOS Linker.

PART - B 5. Editors And Debugging Systems 6 Hrs Text Editors - Overview of Editing Process, User Interface, Editor Structure, Interactive Debugging Systems - Debugging Functions and Capabilities, Relationship With Other Parts Of The System, User- Interface Criteria 6. Macro Processor 8 Hrs Basic Macro Processor Functions - Macro Definitions and Expansion, Macro Processor Algorithm and Data Structures, Machine-Independent Macro Processor Features - Concatenation of Macro Parameters, Generation of Unique Labels, Conditional Macro Expansion, Keyword Macro Parameters, Macro Processor Design Options - Recursive Macro Expansion, General-Purpose Macro Processors, Macro Processing Within Language Translators, Implementation Examples – MASM Macro Processor, ANSI C Macro Processor. 7. Lex and Yacc – 1 6 Hrs Lex and Yacc - The Simplest Lex Program, Recognizing Words With LEX, Symbol Tables, Grammars, Parser-Lexer Communication, The Parts of Speech Lexer, A YACC Parser, The Rules Section, Running LEX and YACC, LEX and Hand- Written Lexers, Using LEX – Regular Expression, Examples of Regular Expressions, A Word Counting Program, Parsing a Command Line.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 15

8. Lex And Yacc - 2 6 Hrs Using YACC – Grammars, Recursive Rules, Shift/Reduce Parsing, What YACC Cannot Parse, A YACC Parser - The Definition Section, The Rules Section, Symbol Values and Actions, The LEXER, Compiling and Running a Simple Parser, Arithmetic Expressions and Ambiguity, Variables and Typed Tokens. Text Books: 1. Leland.L.Beck: System Software, 3rd Edition, Addison-Wesley, 1997. 2. John.R.Levine, Tony Mason and Doug Brown: Lex and Yacc, O'Reilly, SPD, 1998. Reference Books: 1. D.M.Dhamdhere: System Programming and Operating Systems, 2nd Edition, Tata McGraw - Hill, 1999.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 16

M.V. J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

SYSTEMS SOFTWARE

Lesson Plan Subject Code: 06CS52 I.A. Marks : 25 Hours/Week : 05 Exam Hours: 03 Total Hours : 62 Exam Marks: 100

S.No Chapter Hour

Topics to be covered

1. PART- A

Machine Architecture

1 Introduction 2 System Software and Machine Architecture 3 Simplified Instructional Computer (SIC) 4 SIC Machine Architecture 5 SIC/XE Machine Architecture 6 SIC/XE Machine Architecture 7 SIC Programming Examples

2.

Assemblers-1

8 Basic Assembler Function 9 A Simple SIC Assembler 10 Assembler Algorithm and Data Structures 11 Assembler Algorithm and Data Structures 12 Machine Dependent Assembler Features 13 Instruction Formats 14 Addressing Modes 15 Program Relocation

3.

Assemblers-2

16 Machine Independent Assembler Features 17 Literals, Symbol-Definition Statements 18 Expression, Program Blocks 19 Control Sections and Programming Linking 20 Assembler Design Operations, 21 One-Pass Assembler 22 Multi-Pass Assembler, Implementation

Examples – MASM Assembler 4.

Loaders

And Linkers

23 Basic Loader Functions - Design of an Absolute Loader

24 A Simple Bootstrap Loader, Machine-Dependent Loader Features- Relocation

25 Program Linking, Algorithm and Data Structures for a Linking Loader

26 Machine-Independent Loader Features - Automatic Library Search

27 Loader Options, Loader Design Options 28 Linkage Editor 29 Dynamic Linkage, Bootstrap Loaders 30 Implementation Examples - MS-DOS

Linker

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 17

5.

PART- B

Editors and Debugging Systems

31 Text Editors 32 Overview of Editing Process 33 User Interface 34 Editor Structure 35 Interactive Debugging Systems 36 Debugging Functions and Capabilities 37 Relationship With Other Parts Of The System 38 User- Interface Criteria

6.

Macro Processor

39 Basic Macro Processor Functions - Macro Definitions and Expansion

40 Macro Processor Algorithm and Data Structures 41 Machine-Independent Macro Processor Features 42 Concatenation of Macro Parameters 43 Generation of Unique Labels 44 Conditional Macro Expansion 45 Keyword Macro Parameters 46 Macro Processor Design Options - Recursive

Macro Expansion 47 General-Purpose Macro Processors 48 Macro Processing Within Language Translators 49 Implementation Examples – MASM Macro

Processor, ANSI C Macro Processor 7

Lex and Yacc -1 50 Lex and Yacc- The Simplest Lex program 51 Recognizing Words With LEX, Symbol Tables 52 Grammars, Parser-Lexer Communication, The

Parts of Speech Lexer 53 A YACC Parser, The Rules Section 54 Running LEX and YACC, , LEX and Hand-

Written Lexers 55 Using LEX – Regular Expression, Examples of

Regular Expressions 56 A Word Counting Program, Parsing a Command

Line 57 Using YACC – Grammars, Recursive Rules

8 Lex and Yacc -2

58 Shift/Reduce Parsing, What YACC Cannot Parse, A YACC Parser

59 The Definition Section, The Rules Section, Symbol Values and Actions

60 The LEXER, Compiling and Running a Simple Parser

61 Arithmetic Expressions and Ambiguity 62 Variables and Typed Tokens

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 18

M.V.J. College of Engineering

Department of Computer Science& Engineering

Model Question Paper Class: B.E. V Semester Total Hours: 52 Subject: Systems Software Hours / week:04 Subject Code: 06CS52 IA Marks: 25

1. Explain the concept of System Software and Machine Architecture 2. Briefly explain SIC Machine Architecture 3. Briefly explain SIC/XE Machine Architecture 4. Write the instruction format of Traditional (CISC) Machines 5. Briefly explain VAX Architecture & Pentium Pro Architecture 6. Differentiate between JSUB and RSUB. 7. Write the instruction format RISC Machines with example 8. With a diagram explain Ultra SPARC Architecture 9. With a diagram explain Cray T3E Architecture. 10. Write a short note on basic assembler function 11. Briefly explain about A Simple SIC Assembler 12. With a neat example explain Assembler Algorithm and Data Structures 13. Write a short note on Machine Dependent Assembler Features 14. What is Instruction Formats & Addressing Modes in assemblers 15. With a neat diagram Explain Program Relocation 16. Write a Short on Machine Independent Assembler Features 17. Explain Literals, Symbol-Definition Statements Expression with example 18. How Program Blocks, Control Sections and Programming Linking in Assembler will work give

example 19. Briefly Explain One-Pass Assembler 20. What is Multi-Pass Assembler 21. Explain about MASM Assembler, SPARC Assembler 22. Write a short note on Basic Loader Functions – 23. Explain Design of an Absolute Loader 24. Write a algorithm for a Simple Bootstrap Loader and Explain detail 25. Write Machine-Dependent Loader Features 26. What is Relocation 27. What is Program Linking 28. Write Machine-Independent Loader Features 29. Explain Automatic Library Search 30. Explain Linkage Editor 31. Explain briefly Bootstrap Loaders 32. Explain Basic Macro Processor Functions 33. Briefly explain Macro Definitions and Expansion 34. Explain Macro Processor Algorithm and Data Structures 35. Explain features of Machine-Independent Macro Processor 36. Explain with example Concatenation of Macro Parameters 37. How to Generate of Unique Labels 38. Explain with example Conditional Macro Expansion 39. Describe General-Purpose Macro Processors 40. Explain Macro Processing Within Language Translators 41. Write Lex Program to find vowels and consonants

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 19

42. Define Symbol Tables 43. What is Grammars 44. Explain Parser-Lexer Communication 45. Define YACC Parser 46. Explain the sections in YAAC Parser 47. How to Run LEX and YACC 48. Explain - Regular Expression Using LEX, with Examples 49. Write a program to count words in a command line 50. What is Shift/Reduce Parsing,

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 20

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 21

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 22

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 23

OPERATING SYSTEMS 06CS53

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 24

OPERATING SYSTEM

Syllabus Subject Code: 06CS53 I.A. Marks : 25 Hours/Week : 04 Exam Hours: 03 Total Hours : 52 Exam Marks: 100

PART – A 1. Introduction to Operating Systems, System structures 6 Hrs What operating systems do; Computer System organization; Computer System Architecture; Operating System structure; Operating System operations; Process Management; Memory management; Storage management; Protection and security; Distributed system; Special-purpose systems; Computing environments. Operating System Services; User - Operating System interface; System calls; Types of system calls; System programs; Operating System design and implementation; Operating System structure; Virtual machines; Operating System generation; System boot. 2. Process Management 7Hrs Process concept; Process scheduling; Operations on processes; Inter-process Communication. Multi-Threaded Programming: Overview; Multithreading models; Thread Libraries; threading issues. Process Scheduling: Basic concepts; Scheduling criteria; Scheduling algorithms; Multiple-Processor scheduling; Thread scheduling. 3. Process Synchronization 7 Hrs Synchronization: The Critical section problem; Peterson’s solution; Synchronization hardware; Semaphores; Classical problems of synchronization; Monitors. 4. Deadlocks 6 Hrs Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks; Deadlock prevention; Deadlock avoidance; Deadlock detection and recovery from deadlock.

PART - B 5. Memory Management 7Hrs Memory Management Strategies: Background; Swapping; Contiguous memory allocation; Paging; Structure of page table; Segmentation. Virtual Memory Management: Background; Demand paging; Copy-on-write; Page replacement; Allocation of frames; Thrashing. 6. File System, Implementation of File System 7 Hrs File System: File concept; Access methods; Directory structure; File system mounting; File sharing; Protection. Implementing File System: File system structure; File system implementation; Directory implementation; Allocation methods; Free space management. 7. Secondary Storage Structures, Protection 6 Hrs Mass storage structures; Disk structure; Disk attachment; Disk scheduling; Disk

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 25

management; Swap space management. Protection: Goals of protection, Principles of protection, Domain of protection, Access matrix, Implementation of access matrix, Access control, Revocation of access rights, Capability-Based systems. 8. Case Study: The Linux Operating System 6 Hrs Linux history; Design principles; Kernel modules; Process management; Scheduling; Memory management; File systems, Input and output; Inter-process communication. Text Books: 1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: Operating System Principles, 7th edition, Wiley-India, 2006. (Chapters: 1, 2, 3.1 to 3.4 , 4.1 to 4.4, 5.1 to 5.5, 6.1 to 6.7, 7, 8.1 to 8.6, 9.1 to 9.6, 10, 11.1 to 11.5, 12.1 to 12.6, 17.1 to 17.8, 21.1 to 21.9) Reference Books: 1. D.M Dhamdhere: Operating systems - A concept based Approach, 2nd Edition, Tata McGraw- Hill, 2002. 2. P.C.P. Bhatt: Operating Systems, 2nd Edition, PHI, 2006. 3. Harvey M Deital: Operating systems, 3rd Edition, Addison Wesley, 1990.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 26

M.V.J COLLEGE OF ENGINEERING DEPT OF COMPUTER SCIENCE & ENGINEERING

LESSON PLAN - OPERATING SYSTEMS

SUBJECT CODE: 06CS53 IA MARKS: 25 HOURS/WEEK: 5 EXAM HOURS: 3 TOTAL HOURS: 62 EXAM MARKS: 100

SL NO CHAPTER

HOUR NO

TOPICS TO BE COVERED

1 Introduction to Operating Systems, System structures

1 Introduction to OS, What is an OS, Main frame systems, Desktop systems

2 Multiprocessor systems, Distributed system

3 Clustered systems, Real-time systems, Batch systems, concepts of multiprogramming & time sharing

4 Handheld system, Feature migration, computing Environments

5 Operating system structures :Operating system components and services

6 System calls, System programs

7 System structure

8 Virtual machines

2 Process Synchronization

9 Process concept, Process scheduling, operation on processes

10 Introduction to co-operating processes

11 Inter process communication

12 Threads overview, Multi threading models, Threading Issues

13 P Threads, Java Threads

14 Introduction to CPU scheduling criteria

15 Scheduling algorithms

16 Multi-processor scheduling

17 Real time scheduling,

18 Algorithm & evaluation

3 Deadlocks

19 The critical section problem

20 Synchronization hard ware

21 Semaphores

22 Semaphores

23 Classical problems of synchronization

24 Critical regions

25 Monitors

26 Dead locks- system model

27 Dead lock characterization

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 27

28 Methods for handling deadlocks

29 Dead lock prevention

30 Avoidance & detection

31 Recovery from dead lock

4 Memory management

32 Combined approach to dead lock handling 33 Memory management- logical & physical address space.

34 Swapping schemes

35 Contiguous allocation schemes

36 Paging & segmentation concepts

37 Segmentation with paging

38 Virtual memory- demand paging & its performance

39 Process creation

40 Page replacement algorithms 41 Allocation of frames

42 thrashing

5 File System, Implementation of File System

43 File systems concept, access methods

44 Directory structure

45 File system mounting

46 File system Implementation

47 Allocation methods

48 Directory the implementation

49 Free space management

6

Secondary Storage Structures, Protection

50 Mass storage structures: Disk structure, Disk scheduling methods

51 Disk management, swap-space management

52 Protection and Security: Goals of protection

53 Domain of protection

54 Access matrix, Implementation of Access Matrix

55 Revocation of access Rights.

56 The security problem, Authentication 57 Program threats System threats

58 Securing system and facilities, Intrusion Detection, Cryptography

7

Case Study: The Linux Operating System

59 Case study- Linux Os: design principals

60 Kernel modules, process management

61 Scheduling memory management

62 File systems, I/O IPC

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 28

06CS53 OPERATING SYSTEM

QUESTION BANK

1. What is an Operating system? What are the functions of OS? Explain. 2. Define the essential properties of the following types of operating systems:

i. Main Frame ii. Desktop iii. Real-time iv. Multi Processor v. Distributed

vi. Clustered vii. Hand-held

3. What are the five major activities of an operating system in regard to process management? 4. What are the three major activities of an operating system in regard to memory management? 5. What are the three major activities of an operating system in regard to secondary-storage

management? 6. What are the five major activities of an operating system in regard to File management? 7. What is the purpose of command interpreter? Why is it usually separate form the Kernel? 8. List out the services provided by the operating system. 9. Explain the different types of CPU schedulers? 10. What are the differences between user-level threads and kernel supported threads. 11. What is purpose of system calls and system programs? 12. Describe the differences among short-term, medium-term and long term scheduling. 13. Describe the actions taken by a kernel to switch context between processes. 14. Describe the process states with the help of process transition diagram. 15. What are the benefits and demerits of each of the following?

i. Direct and indirect communication ii. Symmetric and asymmetric communication iii. Automatic and explicit buffering iv. Fixed size and variable size messages. v. Send by copy and send by reference

16. Explain multithreading with examples that improve performance over single threaded solutions.

17. What are the two differences between user –level threads and Kernel level threads? Under what circumstances is one type better than the other?

18. What resources are used when a thread is created? How do they differ from those used when a process is created?

19. Define the actions taken by kernel to context switch between kernel level threads. 20. Give the differences between pre-emptive and non-preemptive scheduling. 21. What is CPU scheduling and also explain CPU scheduler 22. Explain the differences in the degree to which the following scheduling algorithms

discriminate in favor of short process. i. FCFS

ii. RR Multilevel Feed back Queues

23. Explain priority scheduling and shortest job first scheduling with an example.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 29

24. What are called as co-operating processes? Explain the necessity of mutual exclusion with an example.

25. What is the meaning of term busy waiting? What other kinds of waiting are there in an operating system.

26. What do you mean by deadlock? Give three general examples not related to computer system

environment. 27. Is it possible to have a deadlock involving only one process? Explain. 28. Define deadlock. List and elaborate the necessary conditions for deadlock to occur. 29. What is semaphore? Explain. 30. Explain the producer consumer problem related to cooperating processes 31. What are monitors? Explain. 32. Explain the Dining Philosophers Problem with respect to Monitors. 33. Explain the differences between Physical and Logical addresses. 34. Write a brief note on overlays. 35. Explain the differences and the internal and external fragmentation. 36. Describe the following allocation algorithms.

i. First-fit ii.Best fit iii.Worst fit 37. Why are segmentation and paging sometimes combined into one scheme? 38. Explain demand paging in detail. 39. Describe a mechanism by which one segment could belong to the address space of two

different processes. 40. Explain why it is easier to share a re-entrant module using segmentation than it is to so when

pure paging is used. 41. What is banker’s algorithm? Explain. 42. Explain the 4 necessary conditions for Deadlock to occur 43. Explain Deadlock Detection Algorithm with an Example. 44. Explain the steps involved in Deadlock Recovery. 45. Discuss the following page replacement algorithm with an example.

i. Optimal ii LRU 46. Explain with neat diagram the internal and external fragmentation. 47. Define file systems? Explain the different directory structure. 48. Discuss the different file protection schemes? 49. What are the different file access methods? Explain. 50. What is disk scheduling? Explain any three disk scheduling methods with e.g.? 51. Explain process and memory management in Linux? 52. Explain the design principles of Linux Operating System.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 30

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 31

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 32

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 33

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 34

DATABASE MANAGEMENT SYTEMS 06CS54

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 35

M.V. J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

DATABASE MANAGEMENT SYSTEMS

Syllabus

Subject Code : 06CS54 IA Marks : 25 No. of Lecture Hrs./ Week : 04 Exam Hours : 03 Total No. of Lecture Hrs. : 52 Exam Marks : 100 PART - A

UNIT – 1 6 Hours

INTRODUCTION: Introduction; An example; Characteristics of Database approach; Actors on the

screen; Workers behind the scene; Advantages of using DBMS approach; A brief history of database

applications; when not to use a DBMS. Data models, schemas and instances; Three-schema architecture

and data independence; Database languages and interfaces; The database system environment;

Centralized and client-server architectures; Classification of Database Management systems.

UNIT – 2 6 Hours

ENTITY-RELATIONSHIP MODEL : Using High-Level Conceptual Data Models for Database

Design; An Example Database Application; Entity Types, Entity Sets, Attributes and Keys; Relationship

types, Relationship Sets, Roles and Structural Constraints; Weak Entity Types; Refining the ER Design;

ER Diagrams, Naming Conventions and Design Issues; Relationship types of degree higher than two.

UNIT – 3 8 Hours

RELATIONAL MODEL AND RELATIONAL ALGEBRA: Relational Model Concepts; Relational

Model Constraints and Relational Database Schemas; Update Operations, Transactions and dealing with

constraint violations; Unary Relational Operations: SELECT and PROJECT;

Relational Algebra Operations from Set Theory; Binary Relational Operations : JOIN and DIVISION;

Additional Relational Operations; Examples of Queries in Relational Algebra; Relational Database

Design Using ER- to-Relational Mapping.

UNIT – 4 6 Hours

SQL - 1: SQL Data Definition and Data Types; Specifying basic constraints in SQL; Schema change

statements in SQL; Basic queries in SQL; More complex SQL Queries.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 36

PART - B

UNIT – 5 6 Hours

SQL - 2: Insert, Delete and Update statements in SQL; Specifying constraints as Assertion and Trigger;

Views (Virtual Tables) in SQL; Additional features of SQL; Database programming issues and

techniques; Embedded SQL, Dynamic SQL; Database stored procedures and SQL / PSM.

UNIT – 6 6 Hours

DATABASE DESIGN - 1: Informal Design Guidelines for Relation Schemas; Functional

Dependencies; Normal Forms Based on Primary Keys; General Definitions of Second and Third Normal

Forms; Boyce-Codd Normal Form.

UNIT – 7 6 Hours

DATABASE DESIGN: Properties of Relational Decompositions; Algorithms for Relational Database

Schema Design; Multivalued Dependencies and Fourth Normal Form; Join Dependencies and Fifth

Normal Form; Inclusion Dependencies; Other Dependencies and Normal Forms.

UNIT - 8

TRANSACTION MANAGEMENT 8 Hours

The ACID Properties; Transactions and Schedules; Concurrent Execution of Transactions; Lock- Based

Concurrency Control; Performance of locking; Transaction support in SQL; Introduction to crash

recovery; 2PL, Serializability and Recoverability; Lock Management; Introduction to ARIES; The log;

Other recovery-related structures; The write-ahead log protocol; Checkpointing; Recovering from a

System Crash; Media Recovery; Other approaches and interaction with concurrency control.

Text Books: 1. Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Pearson Education, 2007.

(Chapters 1, 2, 3 except 3.8, 5, 6.1 to 6.5, 7.1, 8, 9.1, 9.2 except SQLJ, 9.4, 10) 2. Raghu Ramakrishnan and Johannes Gehrke: Database Management Systems, 3rd

Edition, McGraw-Hill, 2003. (Chapters 16, 17.1, 17.2, 18) Reference Books: 1. Silberschatz, Korth and Sudharshan: Data base System Concepts, 6th Edition, Mc-GrawHill, 2010. 2. C.J. Date, A. Kannan, S. Swamynatham: An Introduction to Database Systems, 8th Edition, Pearson Education, 2006.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 37

M.V. J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

DATABASE MANAGEMENT SYSTEMS

Lesson Plan

Subject Code: 06CS54 I.A. Marks : 25 Hours/Week : 04 Exam Hours: 03 Total Hours : 52 (62*50mins) Exam Marks: 100

Sl.No Chapter Hour Topics to be covered

1. INTRODUCTION

1

Introduction; An example; Characteristics of Database approach; Actors on the screen; Workers behind the scene

2 Advantages of using DBMS approach; A brief history of database applications; when not to use a DBMS

3 Data models, schemas and instances

4 Three-schema architecture and data Independence; Database languages and interfaces

5 The database system environment 6 Centralized and client-server architectures 7 Classification of Database Management systems

2. ENTITY-RELATIONSHIP MODEL

8 Using High-Level Conceptual Data Models for Database Design; An Example Database Application

9 Entity Types, Entity Sets, Attributes and Keys 10 Relationship types, Relationship Sets 11 Roles and Structural Constraints 12 Weak Entity Types; Refining the ER Design 13 ER Diagrams 14 Naming Conventions and Design Issues 15 Relationship types of degree higher than two

3.

RELATIONAL MODEL AND RELATIONAL ALGEBRA

16 Relational Model Concepts

17 Relational Model Constraints and Relational Database Schemas

18 Update Operations 19 Transactions and dealing with constraint violations 20 Unary Relational Operations: SELECT and PROJECT 21 Relational Algebra Operations from Set Theory 22 Binary Relational Operations : JOIN and DIVISION

23 Additional Relational Operations; Examples of Queries in Relational Algebra

24 Relational Database Design Using ER- to-Relational Mapping

4. SQL - 1

25 SQL Data Definition and Data Types 26 Specifying basic constraints in SQL 27 Schema change statements in SQL 28 Basic queries in SQL 29 Basic queries in SQL 30 More complex SQL Queries

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 38

5. SQL - 2

31 Insert, Delete and Update statements in SQL 32 Specifying constraints as Assertion and Trigger 33 Views (Virtual Tables) in SQL 34 Additional features of SQL 35 Database programming issues and techniques 36 Embedded SQL, Dynamic SQL 37 Database stored procedures and SQL / PSM.

6. DATABASE DESIGN - 1

38 Informal Design Guidelines for Relation Schemas 39 Informal Design Guidelines for Relation Schemas 40 Functional Dependencies 41 Normal Forms Based on Primary Keys 42 General Definitions of Second 43 Third Normal Forms 44 Boyce-Codd Normal Form

7. DATABASE DESIGN

45 Properties of Relational Decompositions 46 Algorithms for Relational Database Schema Design 47 Multivalued Dependencies 48 Fourth Normal Form 49 Join Dependencies and Fifth Normal Form 50 Inclusion Dependencies 51 Other Dependencies and Normal Forms.

8. TRANSACTION MANAGEMENT

52 The ACID Properties; Transactions and Schedules 53 Concurrent Execution of Transactions 54 Lock- Based Concurrency Control

55 Performance of locking 56 Transaction support in SQL; Introduction to crash recovery 57 2PL, Serializability and Recoverability 58 Lock Management 59 Introduction to ARIES; The log

60 Other recovery-related structures; The write-ahead log protocol

61 Checkpointing; Recovering from a System Crash

62 Media Recovery; Other approaches and interaction with concurrency control.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 39

M.V. J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

Model Questions

Class: B.E. V Semester Total Hours: 52 Subject: Data base management systems Hours / week: 04 Subject Code: 06CS54 IA Marks: 25

51. Write the general architecture of typical DBMS. What are the effects of data independence in

DBMS?

52. What are the different levels of abstraction of a DBMS?

53. Write an ER diagram for a typical bus reservation system.

54. What is cardinality ratio? What are the different types of cardinality ratio in a binary

relationship?

55. Define primary key.

56. Define weak entity.

57. Explain Multi valued attribute.

58. What do you mean integrity w.r.t. database? Explain entity integrity and referential integrity.

59. Define Different set operations in relation algebra. Given on example for each.

60. List of aggregate functions commonly used in relational algebra.

61. Bring out different clauses of SELECT –FROM WHERE statement.

62. What is the significance of views in SQL?

63. Give the example of SQL statement to update data.

64. Use the schema shown in question 3.b and answer the queries SQL.

65. What are the anomalies if the proper design of a database Is not carrier out?

66. Illustrate them with an example for each type.

67. Give different inference rules of functional dependencies.

68. Give the algorithm to check dependency preservation and loss less join.

69. Define the terms: 4NF, BCNF.

70. Define inclusion dependency, DKNF, template dependency, 5NF.

71. Compare discretionary access control with mandatory access control.

72. Explain how strict 2-phase locking is implemented. Show them with an example.

73. What are the 3 properties of a transaction specified in SQL for locking? Define each of them.

74. Illustrate with an example how concurrency is controlled using a B+ tree.

75. Highlight different activities involved in system crash recovery.

76. Explain ER relation mapping

77. Define Embedded SQL.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 40

78. ACID properties

79. Write note on ahead lock

80. Explain Concurrency Control and Performance of locking?

81. Define Transaction support in SQL?

82. Explain Recovering from the System Crash and Media.

83. Illustrate the interaction with concurrency control.

84. Define SQL Data Definition and Data Types.

85. Given the basic constraints in SQL?

86. Write note more complex. Queries

87. List all types of SQL Queries.

88. Illustrate the Database Languages and interface.

89. Classification of Database Management systems.

90. Give note on Centralized and client-server architectures

91. Explain Timestamp ordering with an example

92. Discuss about dead lock and starvation

93. Explain database Recovery technique based on deferred update

94. Discuss discretionary access control based on granting/revoking of privileges

95. Explain the different relational model constraints and possible violation during update operations

96. What is multi valued dependency? What type of constraints does it specify? When does it arise?

97. Why null values are considered bad?

98. Define join dependency and fifth normal form.

99. Explain two phase locking with algorithms

100. Describe the shadow paging recovery technique. Under what circumstances does it not

require a log?

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 41

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 42

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 43

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 44

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 45

COMPUTER NETWORKS 06CS55

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 46

M.V.J COLLEGE OF ENGINEERING Department Of Computer Science & Engineering

SYLLABUS— Computer Networks I

Subject Code :06CS55 IA Marks : 25

No. of Lecture Hrs./ Week : 04 Exam Hours : 03

Total No. of Lecture Hrs. : 52 Exam Marks : 100

PART – A

UNIT – 1 6 Hours

INTRODUCTION: Data Communications; Networks; the Internet; Protocols and Standards; Layered

tasks; The OSI Model and the layers in the OSI model; TCP / IP Protocol Suite.

UNIT – 2 8 Hours

DATA, SIGNALS, AND DIGITAL TRANSMISSION: Analog and digital signals; Transmission

impairment; Data rate limits; Performance; Digital-to-Digital conversion; Analog-to-Digital conversion;

Transmission modes.

UNIT – 3 6 Hours

ANALOG TRANSMISSION AND MULTIPLEXING: Digital - to -Analog conversion; Analog - to -

Analog conversion; Multiplexing; Spread spectrum.

UNIT – 4 6 Hours

TRANSMISSION MEDIA, ERROR DETECTION AND CORRECTION : Twisted pair cable,

Coaxial cable, Fiber-Optic cable, Radio waves, Microwaves, Infrared. Introduction to error detection /

correction; Block coding; linear block codes; Cyclic codes, Checksum.

PART – B

UNIT – 5 7 Hours

DATA LINK CONTROL: Framing; Flow and Error control; Protocols; Noiseless channels; Noisy

channels; HDLC; Point-to-point Protocol-framing, transition phases.

UNIT – 6 7 Hours

MULTIPLE ACCESS, ETHERNET: Random Access; Controlled Access; Channelization. Ethernet:

IEEE standards; Standard Ethernet and changes in the standard; Fast Ethernet; Gigabit Ethernet.

UNIT – 7 6 Hours

WIRELESS LANS AND CONNECTION OF LANS: IEE 802.11; Bluetooth. Connecting devices;

Backbone Networks; Virtual LANs.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 47

UNIT – 8 6 Hours

OTHER TECHNOLOGIES: Cellular telephony; SONET / SDH: Architecture, Layers, Frames; STS

multiplexing. ATM: Design goals, problems, architecture, switching, layers.

TEXT BOOKS:

1. Data Communications and Networking – Behrouz A. Forouzan, 4th Edition, Tata McGraw-Hill, 2006.

REFERENCE BOOKS:

1. Communication Networks: Fundamental Concepts and Key Architectures - Alberto Leon, Garcia and

Indra Widjaja, 3rd Edition, Tata McGraw- Hill, 2004.

2. Data and Computer Communication, William Stallings, 8th Edition, Pearson Education, 2007.

3. Computer Networks: A Systems Approach - Larry L. Peterson and Bruce S. David, 4th Edition,

Elsevier, 2007.

4. Introduction to Data Communications and Networking – Wayne Tomasi, Pearson Education, 2005.

5. Computer and Communication Networks – Nader F. Mir, Pearson Education, 2007.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 48

M.V.J COLLEGE OF ENGINEERING Department Of Computer Science & Engineering

LESSON PLAN— Computer Networks I

SUBJECT CODE: 06CS55 IA MARKS: 25 HOURS/WEEK: 4 EXAM HOURS: 3 TOTAL HOURS: 52[50min *62 classes] EXAM MARKS: 100

SL NO

CHAPTER HOUR

NO TOPICS TO BE COVERED

1

Introduction

1 Data communication, Networks

2 Internet

3 Protocol and Standard

2

Network Models

4 Layered tasks

5 OSI Model

6 Layers in OSI model

7 TCP/IP Protocol Suite

8 Revision

3 Data and Signals 9 Analog and Digital

10 Digital Signals

11 Transmission Impairment

12 Data rate limits

13 Performance

14 Revision

4

Digital Transmission

15 Digital to Analog Conversion

16 Analog to Digital Conversion

17 Transmission Modes

5

Analog Transmission

18 Digital to Analog Conversion

19 Analog to Analog Conversion

20 Revision

6 Bandwidth Utilization:

Multiplexing and

Spreading

21 Multiplexing

22 Spread Spectrum

23 Revision

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 49

7 Transmission Media 24 Guided Media

25 Unguided Media: Wireless

26 Revision

8 Error Detection and

correction

27 Introduction

28 Block Coding

29 Linear Block Codes

30 Cyclic codes

31 Checksum

9 Data link control 32 Framing

33 Flow & Error Control

34 Protocols

35 Noiseless channels

36 Noisy Channels

37 HDLC

38 Point to point control

39 Revision

10 Multiple Access 40 Random Access

41 Controlled Access

42 Channelization

43 Revision

11 Wired LANs: Ethernet 44 IEEE Standards

45 Standard Ethernet

46 Changes in the standard

47 Fast Ethernet

48 Gigabit Ethernet

49 Revision

12 Wireless LANs 50 IEEE 802.11

51 Bluetooth

13 Connecting LANs,

Backbone Networks,

and Virtual LANs

52 Connecting devices

53 Backbone networks

54 Virtual LANs

14 Wireless WANs 55 Cellular Telephony

56 Satellite Networks

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 50

15 SONET/SDH 57 Architecture

58 SONET Layers

59 SONET Frames

60 STS Multiplexing

16 ATM 61 ATM

62 Revision

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 51

COMPUTER NETWORKS-I: QUESTION BANK

1. Besides bandwidth and latency, what other parameter is needed to give characterization of the

quality of service offered by a network used for digitized voice traffic?

2. List two ways in which the OSI reference model and the TCP/IP reference model are the same. Now

list two ways in which they differ?

3. Why does ATM use small, fixed-length cells?

4. List two advantages and two disadvantages of having international standards for network protocols?

5. What signal-to noise ratio is needed to put a 1 carrier on a 50-kHz line?

6. How much bandwidth is there in 0.1 micron of spectrum at a wavelength of 1micron?

7. In a constellation diagram, all the points lie on a circle centered on the origin. What kind of

modulation is being used?

8. How many frequencies does a full-duplex QAM-64 modem use?

9. Compare the maximum data rate of a noiseless 4-kHz channel using

(a)Analog encoding (e.g., QPSK) with 2 bits per sample.

(b)The T1 PCM system.

10. What is the difference, if any, between the demodulator part of a modem and the coder part of a

CODEC/(after all, both convert analog signals to digital ones.)

11. Consider a different way of looking at the orthogonality property of CDMA chip sequences. Each bit

in a pair of sequences can match or not match. Express the orthogonality property in terms of

matches and mismatches.

12. The following data fragment occurs in the middle of a data stream for which the byte– stuffing

algorithm described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after

stuffing?

13. A block of bits with n rows and k columns uses horizontal and vertical parity bits for error detection.

Suppose that exactly 4 bits are inverted due to transmission errors. Derive an expression for the

probability that the error will be undetected.

14. Data link protocols almost always put the CRC in a trailer rather than in a header. Why?

15. Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose

propagation time from the earth is 270msec. Acknowledgements are always piggybacked onto data

frames. The headers are very short. Three-bit sequence numbers are used. What is the maximum

achievable channel utilization for Stop-and-wait protocol?

16. A 100-km-long cable runs at the T1 data rate. The propagation speed in the cable is 2/3 the speed of

light in vacuum. How many bits fit in the cable?

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 52

17. What is the minimum overhead to send an IP packet using PPP? Count only the overhead

introduced by PPP itself, not the IP header overhead.

18. Consider the delay of pure ALOHA versus slotted ALOHA at low load. Which one is less? Explain

your answer?

19. Sketch the differential Manchester encoding for the bit stream of the previous problem. Assume the

line is initially in the low state.

20. How many frames per second can gigabit Ethernet handle? Think carefully and take into account all

the relevant cases. Hint: the fact that it is gigabit Ethernet matters.

21. Give two reasons why networks might use an error-correcting code instead of error detection and

retransmission.

22. Bluetooth supports two types of links between a master and a slave. What are they and what is each

one used for?

23. Explain packets switching?

24. Explain shortest path routing?

25. Explain multicast routing?

26. Explain routing in Ad Hoc networks?

27. Explain in detail about the congestion control Algorithm?

28. Explain the elements of Transport Protocols?

29. Explain UDP?

30. Explain in detail about TCP?

31. Explain in detail about Electronic mail?

32. Explain in detail about the World Wide Web?

33. Explain in detail about cryptography?

34. What is a Cipher text

35. What is a Transposition cipher?

36. What is Symmetric key Algorithm?

37. What is crypt Analysis?

38. What are public and private keys?

39. What is a Substitution Cipher?

40. Explain Triple DES?

41. Explain RSA algorithm?

42. Explain frequency shift keying with neat diagram.

43. Explain the various Digital to analog conversion techniques with neat diagrams.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 53

44. Why do we need Analog to analog conversion? Explain the various analog to analog conversion

techniques with neat diagram

45. What is multiplexing? Explain the various multiplexing techniques with a neat diagram.

46. Explain the application of Frequency Division multiplexing and time division multiplexing with neat

diagram.

47. What is spreading? Explain the various spread spectrum techniques?

48. What is framing? Explain the various techniques of framing with neat diagram.

49. Explain bit stuffing and unstuffy in bit-oriented protocol with examples.

50. What is the difference between noisy and noiseless channel? Explain.

51. Explain stop and wait protocol for noiseless channel.

52. Explain stop and wait ARQ protocol for noisy channels. What are its disambiguates if frames are

unnumbered? Find a solution to the same.

53. Explain Go-Back-N ARQ protocol. What are its disadvantages and how are these disadvantages

overcome by Selective Repeat ARQ? Explain with neat diagrams and algorithms.

54. Explain HDLC protocol with its frame format.

55. Explain Point to point protocol with framing and transition phases.

56. Explain pure ALOHA and derive an equation for throughput S.

57. Explain the term persistent CSMA and non persistent CSMA.

58. Explain the following with example:

a. Reservation

b. Slotted ALOHA

c. CSMA/CA

d. CDMA

e. Polling

f. Channelization

59. Explain the frame format for IEEE 802.3 frame.

60. Explain the various implementations of standard Ethernet at physical layer

61. Explain Fast Ethernet

62. Explain briefly the architecture, frame format, address mechanism and various implementation of

IEEE 802.11 at the physical layer

63. What is blue tooth? Explain its architecture and frame format.

64. Explain back bone network.

65. Explain FDDI and its applications.

66. Explain Virtual LANs.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 54

67. What are transparent bridges? Explain ‘loop problem’ and how is it overcome using various

techniques?

68. How are Hubs different from switches?

69. Write the differences between router, repeater, bridges and gateways.

70. Write a short note on DSL.

71. Explain distance vector routing algorithm by considering an example.

72. Compare data grams and virtual circuits? List the difference between them.

73. What are the different types of routing algorithm? Explain Bellman-ford algorithm with example.

74. Explain flooding algorithm with diagram.

75. Explain with sketches different scheduling approaches to MAC.

76. Explain the classification of LAN based on topology and switching techniques.

77. Describe the token ring LAN structure network along with frame structure.

78. How bridges are used for implementing LANS?

79. Write Short note on DNS.

80. What is the minimum number of bits in a PN sequence if we use FHSS with a channel bandwidth of

B=5 khz and Bss=120 khz

81. If the input slot is 16 bits long (no framing bits) what is the bit stream in each output? The bits arrive

at the demultiplexer as shown below:

82. Define the type of the following destination addresses:

a. 4B:30:10:21:10:1A

b. 46:20:1B:2E:08:EE

c. FF:FF:FF:FF:FF:FF

83. A slotted ALOHA network transmits 200bit frames using a shared channel with 200KBPS

bandwidth. Find the throughput if the system produces:

a. 1000 frames/sec

b. 500 frames/sec

c. 250 frames/sec

84. A radio system uses a 9600B/sec channel for sending call setup requests to a base station the packets

are 120 bits long the time out is 20ms and back-off is uniformly distributed between 1 and 7. What is

10100000 1010101010100000 0111000001111000

TDM

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 55

the Smax possible with ALOHA and slotted ALOHA? What is the average delay in each case when

the load is 30% of maximum S of the ALOHA.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 56

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 57

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 58

FINITE AUTOMATA AND FORMAL LANGUAGES 06CS56

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 59

M.V.J. COLLEGE OF ENGINEERING

Department of Computer Science & Engineering

FORMAL LANGUAGES AND AUTOMATA THEORY

SYLLABUS (Common to CSE & ISE)

Sub. Code: 06CS56 IA Marks: 25 Hrs/Week: 04 Exam Hours: 03 Total Hours: 52 Exam Marks: 100

PART – A

Unit I 7 Hrs Introduction to Finite Automata: Introduction to Finite Automata; The central concepts of Automata theory; Deterministic finite automata; Nondeterministic finite automata. Unit II 7 Hrs Finite Automata, Regular Expressions: An application of finite automata; Finite automata with Epsilon-transitions; Regular expressions; Finite Automata and Regular Expressions; Applications of Regular Expressions. Unit III 6 Hrs Regular Languages, Properties of Regular Languages: Regular languages; Proving languages not to be regular languages; Closure properties of regular languages; Decision properties of regular languages; Equivalence and minimization of automata. Unit IV 6 Hrs Context-Free Grammars And Languages: Context –free grammars; Parse trees; Applications; Ambiguity in grammars and Languages.

PART - B Unit V 7 Hrs Pushdown Automata: Definition of the Pushdown automata; the languages of a PDA; Equivalence of PDA’s and CFG’s; Deterministic Pushdown Automata. Unit VI 6 Hrs Properties of Context-Free Languages: Normal forms for CFGs; The pumping lemma for CFGs; Closure properties of CFLs.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 60

Unit VII 7 Hrs Introduction To Turing Machine: Problems that Computers cannot solve; The turning machine; Programming techniques for Turning Machines; Extensions to the basic Turning Machines; Turing Machine and Computers. Unit VIII 6 Hrs Undecidability : A Language that is not recursively enumerable; An Undecidable problem that is RE; Post’s Correspondence problem; Other undecidable problems. Text Books: 1. John E.. Hopcroft, Rajeev Motwani, Jeffrey D.Ullman: Introduction to Automata Theory, Languages and Computation, 3rd Edition, Pearson education, 2007. (Chapters:1.1, 1.5, 2.2 to 2.5, 3.1 to 3.3, 4, 5, 6, 7, 8.1 to 8.4, 8.6, 9.1, 9.2, 9.4.1, 9.5) Reference Books: 1. Raymond Greenlaw, H.James Hoover: Fundamentals of the Theory of Computation, Principles and Practice, Morgan Kaufmann, 1998. 2. John C Martin: Introduction to Languages and Automata Theory, 3rd Edition, Tata McGraw- Hill, 2007. 3. Daniel I.A. Cohen: Introduction to Computer Theory, 2nd Edition, John Wiley & Sons, 2004. 4. Thomas A. Sudkamp: An Introduction to the Theory of Computer Science, Languages and Machines, 3rd Edition, Pearson Education, 2006

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 61

M.V.J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

LESSON PLAN FORMAL LANGUAGES AND AUTOMATA THEOR Y

Sub. Code: 06CS56 IA Marks: 25 Hrs/Week: 04 Exam Hours: 03 Total Hours: 52 Exam Marks: 100

Sl.No Unit Hr. No TOPICS TO BE COVERED

1 Introduction to Finite

Automata

1 Introduction to Finite Automata 2 Important Terminologies in Finite Automata 3 The central concepts of automata theory 4 Deterministic Finite Automata (Concept) 5 Deterministic Finite Automata (Solving Example) 6 Nondeterministic Finite Automata (Concept) 7 Nondeterministic Finite Automata (Solving Example) 8 Revision & Solving Exercise Questions

2 Finite Automata,

Regular Expressions

9 An application of finite automata 10 Finite automata with Epsilon-transitions 11 Finite automata with Epsilon-transitions (contd) 12 Regular expressions 13 Finite Automata and Regular Expressions 14 Finite Automata and Regular Expressions (contd) 15 Applications of Regular Expressions 16 Revision & Solving Exercise Questions

3

Regular Languages,

Properties of Regular Languages

17 Regular languages; Proving languages not to be regular languages

18 Closure properties of regular languages 19 Closure properties of regular languages (contd) 20 Decision properties of regular languages 21 Equivalence and minimization of automata 22 Equivalence and minimization of automata(contd) 23 Revision & Solving Exercise Questions

4

Context-Free Grammars And

Languages

24 Context –free grammars 25 Context –free grammars (contd) 26 Parse trees 27 Parse trees 28 Applications 29 Ambiguity in grammars and Languages 30 Revision & Solving Exercise Questions

5

Pushdown Automata

31 Definition of the Pushdown automata 32 The languages of a PDA 33 The languages of a PDA (contd) 34 Equivalence of PDA’s and CFG’s

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 62

35 Equivalence of PDA’s and CFG’s (contd) 36 Equivalence of PDA’s and CFG’s (contd) 37 Deterministic Pushdown Automata 38 Revision & Solving Exercise Questions

6

Properties of Context-Free Languages

39 Normal forms for CFGs 40 Normal forms for CFGs 41 The pumping lemma for CFGs;

42 The pumping lemma for CFGs(contd)

43 Closure properties of CFLs 44 Closure properties of CFLs(contd) 45 Revision & Solving Exercise Questions

7

Introduction To Turing Machine

46 Problems that Computers cannot solve 47 The turning machine 48 The turning machine (contd) 49 Programming techniques for Turning Machines 50 Extensions to the basic Turning Machines 51 Extensions to the basic Turning Machines(contd) 52 Turing Machine and Computers 53 Revision & Solving Exercise Questions

8 Undecidability

54 A Language that is not recursively enumerable; 55 An Undecidable problem that is RE 56 Post’s Correspondence problem 57 Post’s Correspondence problem 58 Other undecidable problems 59 Other undecidable problems. 60 Revision & Solving Exercise Questions 61 Solving University Questions 62 Solving University Questions

Signature of Staff Signature of H.O.D

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 63

M.V.J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

QUESTION BANK FORMAL LANGUAGES AND AUTOMATA THEOR Y

Sub. Code: 06CS56 IA Marks: 25 Hrs/Week: 04 Exam Hours: 03 Total Hours: 52 Exam Marks: 100

1. What is DFA.Define DFA mathematically. 2. Define Finite Automata.Metion the applications of Finite Automata. 3. Differentiate NFA,DFA, & ∈-NFA. 4. Obtain DFA to accept strings starting with the ab. 5. Obtain a DFA to accept string of ‘0’s and ‘1’s ending with the string 011. 6. Obtain a DFA to accept strings of a’s and b’s with the substring aab. 7. What is equivalence of DFA’s and NFA’s?Explain. 8. Write the algorithm for converting NFA to an equivalent DFA. 9. Convert the following NFA into an DFA

0 1 0,1 0,1

10. Consider the following ∈-NFA ∈ a b c

p {q,r} φ {q} {r} q φ {p} {r} {p,q}

*r φ φ φ φ i) Compute the ∈-closure of each state. ii) Give all the strings of length three or less accepted by the automata. iii) Convert the automata to DFA. 11. Write the procedure to minimize the states of DFA. 12. Define regular expression. 13. Obtain the RE

i) To accept add number 0’s and 1’s. ii) To accept even number of a’s and b’s.

14. Explain the eqivalence relation between Finite automata and regular Expression.

15. Construct an NFA for the expression 01*1. 16. Explain pumping Lemma for regular sets. 17. Explain decision algorithms for regular sets. 18. Explain Context free grammar and context free languages. 19. Explain L(G) for the following

Q0 Q1

Q2

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 64

V={S},T={a,b] and p={S->Sb,S->ab} 20. Find L(G) for the grammar

G= ({S},{a},{S->Ss},s} 21. Differentiate leftmost derivation and rightmost derivation. 22. Define context free grammar. 23. What are useless symbols? 24. Explain different normal forms. 25. Explain Chomsky classificaion of languages. 26. For the following grammar find an equivalent grammar in CNF

G=({S,A,B},{a,b},P,S) where P is S->bA/aB A->bAA/aS/a B->aBB/bS/b

27. What is a pushdown automaton? 28. Obtain a pda to accept the language l(M)={WCW R} 29. Is the pda to L(M)={anbn/n>=1} is deterministic or not? 30. Explain the concept of Turing machines with a neat diagram. 31. Obtain TM to accept the language L={w/w(-(0+1)*} containing the substring . 32. State and prove pumping Lemma. 33. What are distinguishable and indistinguishable states? 34. Minimize the following DFA using table –filling algorithm 35. Write DFA to accept w which is string of 0’s and 1’s and is w mod 3=0. 36. What language is accepted by TM? 37. What is multi-tape turing machine?Show how it can be simulated using single tape Turing machine. 38. Obtain a TM to accept the language L={ww r|wΣ(a+b)*} 39. What are the applications of Pumping Lemma? 40. What is an instantaneous description?Expain with respect to PDA. 41. What is the procedure to convert to CFG to PDA? 42. for the grammar S �aABB | aAA A �aBB|a B �bBB|A C �a. Obtain the corresponding PDA. 43. Is the foowing grammar ambiguous? S �aSb|SS|ε 44. Remove the unit production from the grammar S �A|B|Cc

0 1 A B E B C F *C D H D E H E F I *F G B G H B H I C *I A E

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 65

A �aBb|B B �aB|bb C �Cc|B 45. Draw a CFG to generate a language consisting of equal number of a’s and b’s

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 66

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 67

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 68

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 69

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 70

DATABASE APPLICATIONS LAB 06CSL57

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 71

M.V.J COLLEGE OF ENGINEERING Department Of Computer Science & Engineering

SYLLABUS— Database Applications Laboratory

Subject Code: 06CSL57 I.A. Marks : 25 Hours/Week : 03 Exam Hours: 03 Total Hours : 42 Exam Marks: 50 I. Consider the Insurance database given below. The primary keys are underlined and the data types are specified. PERSON (driver – id #: String, name: string, address: strong) CAR (Regno: string, model: string, year: int) ACCIDENT (report-number: int, date: date, location: string) OWNS (driver-id #: string, Regno:string) PARTICIPATED (driver-id: string, Regno:string, report-number:int, damage amount:int) (i) Create the above tables by properly specifying the primary keys and the foreign keys. (ii) Enter at least five tuples for each relation. (iii) Demonstrate how you a. Update the damage amount for the car with a specific Regno in the accident with report number 12 to 25000. b. Add a new accident to the database. (iv) Find the total number of people who owned cars that were involved in accidents in 2008. (v) Find the number of accidents in which cars belonging to a specific model were involved. (vi) Generate suitable reports. (vii) Create suitable front end for querying and displaying the results. II. Consider the following relations for an order processing database application in a company. CUSTOMER (cust #: int , cname: string, city: string) ORDER (order #: int, odate: date, cust #: int, ord-Amt: int) ORDER – ITEM (order #: int, Item #: int, qty: int) ITEM (item # : int, unit price: int) SHIPMENT (order #: int, warehouse#: int, ship-date: date) WAREHOUSE (warehouse #: int, city: string) (i) Create the above tables by properly specifying the primary keys and the foreign keys. (ii) Enter at least five tuples for each relation. (iii) Produce a listing: CUSTNAME, #of orders, AVG_ORDER_AMT, where the middle column is the total numbers of orders by the customer and the last column is the average order amount for that customer. (iv) List the order# for orders that were shipped from all the warehouses that the company has in a specific city. (v) Demonstrate how you delete item# 10 from the ITEM table and make that field null in the ORDER_ITEM table. (vi) Generate suitable reports. (vii) Create suitable front end for querying and displaying the results.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 72

III. Consider the following database of student enrollment in courses & books adopted for each course. STUDENT (regno: string, name: string, major: string, bdate:date) COURSE (course #:int, cname:string, dept:string) ENROLL ( regno:string, course#:int, sem:int, marks:int) BOOK _ ADOPTION (course# :int, sem:int, book-ISBN:int) TEXT (book-ISBN:int, book-title:string, publisher:string, author:string) (i) Create the above tables by properly specifying the primary keys and the foreign keys. (ii) Enter at least five tuples for each relation. (iii) Demonstrate how you add a new text book to the database and make this book be adopted by some department. (iv) Produce a list of text books (include Course #, Book-ISBN, Book-title) in the alphabetical order for courses offered by the ‘CS’ department that use more than two books. (v) List any department that has all its adopted books published by a specific publisher. (vi) Generate suitable reports. (vii) Create suitable front end for querying and displaying the results. IV. The following tables are maintained by a book dealer. AUTHOR (author-id:int, name:string, city:string, country:string) PUBLISHER (publisher-id:int, name:string, city:string, country:string) CATALOG (book-id:int, title:string, author-id:int, publisher-id:int, category-id:int, year:int, price:int) CATEGORY (category-id:int, description:string) ORDER-DETAILS (order-no:int, book-id:int, quantity:int) (i) Create the above tables by properly specifying the primary keys and the foreign keys. (ii) Enter at least five tuples for each relation. (iii) Give the details of the authors who have 2 or more books in the catalog and the price of the books is greater than the average price of the books in the catalog and the year of publication is after 2000. (iv) Find the author of the book which has maximum sales. (v) Demonstrate how you increase the price of books published by a specificpublisher by 10%. (vi) Generate suitable reports. (vii) Create suitable front end for querying and displaying the results. V. Consider the following database for a banking enterprise BRANCH (branch-name:string, branch-city:string, assets:real) ACCOUNT (accno:int, branch-name:string, balance:real) DEPOSITOR (customer-name:string, accno:int) CUSTOMER (customer-name:string, customer-street:string, customer-city:string) LOAN (loan-number:int, branch-name:string, amount:real) BORROWER (customer-name:string, loan-number:int) (i) Create the above tables by properly specifying the primary keys and the foreign keys (ii) Enter at least five tuples for each relation (iii) Find all the customers who have at least two accounts at the Main branch. (iv) Find all the customers who have an account at all the branches located in a specific city. (v) Demonstrate how you delete all account tuples at every branch located in a specific city. (vi) Generate suitable reports. (vii) Create suitable front end for querying and displaying the results.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 73

Instructions: 1. The exercises are to be solved in an RDBMS environment like Oracle or DB2. 2. Suitable tuples have to be entered so that queries are executed correctly. 3. Front end may be created using either VB or VAJ or any other similar tool. 4. The student need not create the front end in the examination. The results of the queries may be displayed directly. 5. Relevant queries other than the ones listed along with the exercises may also be asked in the examination. 6. Questions must be asked based on lots.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 74

M.V.J COLLEGE OF ENGINEERING Department Of Computer Science & Engineering

LESSON PLAN— Database Applications Laboratory

SUBJECT CODE: 06CSL57 IA MARKS: 25 HOURS/WEEK: 03 EXAM HOURS: 03 TOTAL HOURS: 42 EXAM MARKS: 50

SL NO

Programs to be implemented HOUR NO

1 Introduction- Creating tables & inserting values 1

2 Introduction-Updation, deletion 2

3 Introduction-Report generation 3

4 Insurance database creating & updating tables 4

5 Insurance database, solving queries & report generation 5

6 Company database creating & updating tables 6

7 Company database, solving queries & report generation 7

8 Student database creating & updating tables 8

9 Student database, solving queries & report generation 9

10 Book database creating & updating tables 10

11 Book database, solving queries & report generation 11

12 Bank database creating & updating tables 12

13 Bank database, solving queries & report generation 13

14 Revision 14

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 75

ALGORITHMS LAB 06CSL58

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 76

M.V.J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

ALGORITHMS LABORATORY

SYLLABUS Sub Code : 06CSL58 IA Marks : 25 Hrs/Week : 03 Exam Hours : 03 Total Hrs : 42 Exam Marks : 50 Implement the following using C/C++ Language.

1. Implement Recursive Binary search and Linear search and determine the time required to search an element. Repeat the experiment for different values of n, the number of elements in the list to be searched and plot a graph of the time taken versus n.

2. Sort a given set of elements using the Heapsort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

3. Sort a given set of elements using Merge sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

4. Sort a given set of elements using Selection sort and determine the time required to sort elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

5. Implement 0/1 Knapsack problem using dynamic programming.

6. From a given vertex in a weighted connected graph, find shortest paths to other vertices using Dijkstra's algorithm.

7. Sort a given set of elements using Quick sort method and determine the time required sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

8. Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm.

9. a. Print all the nodes reachable from a given starting node in a digraph using BFS method.

b. Check whether a given graph is connected or not using DFS method.

10. Find a subset of a given set S = {sl,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1, 2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 77

11. a. Implement Horspool algorithm for String Matching.

b. Find the Binomial Co-efficient using Dynamic Programming.

12. Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.

13. a. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.

b. Compute the transitive closure of a given directed graph using Warshall's algorithm.

14. Implement N Queen's problem using Back Tracking.

Note: In the examination questions must be given on lots. Each student must be given one questions.

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 78

M.V.J. COLLEGE OF ENGINEERING Department of Computer Science & Engineering

LESSON PLAN

ALGORITHMS LABORATORY

Sub Code : 06CSL58 IA Marks : 25 Hrs/Week : 03 Exam Hours : 03 Total Hrs : 42 Exam Marks : 50 Sl no

Programs to be implemented Hour no

1 Implement Recursive Binary search and Linear search and determine the time required to search an element. Repeat the experiment for different values of n, the number of elements in the list to be searched and plot a graph of the time taken versus n.

1 – 3

2 Sort a given set of elements using the Heapsort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

4 – 6

3 Sort a given set of elements using Merge sort method and determine the time required to sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

7 – 9

4 Sort a given set of elements using Selection sort and determine the time required to sort elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

10 – 12

5 Implement 0/1 Knapsack problem using dynamic programming. 13 – 15

6 From a given vertex in a weighted connected graph, find shortest paths to other vertices using Dijkstra's algorithm.

16 – 18

7 Sort a given set of elements using Quick sort method and determine the time required sort the elements. Repeat the experiment for different values of n, the number of elements in the list to be sorted and plot a graph of the time taken versus n.

19 – 21

8 Find Minimum Cost Spanning Tree of a given undirected graph using Kruskal's algorithm.

22 – 24

9 a. Print all the nodes reachable from a given starting node in a digraph using BFS method.

b. Check whether a given graph is connected or not using DFS method.

25 – 27

10 Find a subset of a given set S = {sl,s2,.....,sn} of n positive integers whose sum is equal to a given positive integer d. For example, if S= {1, 2, 5, 6, 8} and d = 9 there are two solutions{1,2,6}and{1,8}.A suitable message is to be displayed if the given problem instance doesn't have a solution.

28 – 30

11 a. Implement Horspool algorithm for String Matching.

b. Find the Binomial Co-efficient using Dynamic Programming.

31 – 33

12 Find Minimum Cost Spanning Tree of a given undirected graph using Prim’s algorithm.

34 – 36

MVJCE

DEPT OF COMPUTER SCIENCE AND ENGINEERING 79

13 a. Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.

b. Compute the transitive closure of a given directed graph using Warshall's algorithm.

37 – 39

14 Implement N Queen's problem using Back Tracking. 40 – 42

Signature of Staff Signature of H.O.D