dev bhoomi institute of technology dehradun · dev bhoomi institute of technology dehradun...

143
DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017-18 Class :7th Sem/4th Year

Upload: phamthien

Post on 06-May-2018

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DEV BHOOMI INSTITUTE OF

TECHNOLOGY

DEHRADUN Department of Computer Science and Engineering

HAND BOOK

Session 2017-18

Class :7th Sem/4th Year

Page 2: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Knowledge of advanced topics in computer architectures focusing on emerging uni processor

and multiprocessor architectures, implementation issues (architect's perspective) in deep sub micron CMOS

Objective:

1) To identify and analyze the attributes of computer architecture design with recent trend technology

2) To identify the techniques to improve the speed and performance of computers – Parallelism in Instruction

level – Hardware approaches - pipelining,dynamic scheduling, superscalar processors, and multiple issue of

instructions.

3) To implement the design aspects and categorize various issues , causes and hazards due to parallelisms

4) To examine and compare the performance with benchmark standards

5) Its important to understand and apply that design principles in real systems.

Unit 1 Parallel computer models: The state of computing, Classification of parallel computers,

Multiprocessors and multicomputers, Multivector and SIMD computers.

Program and network properties: Conditions of parallelism, Data and resource Dependences,

Hardware and software parallelism, Program partitioning and scheduling, Grain Size and latency,

Program flow mechanisms, Control flow versus data flow, Data flow Architecture, Demand driven

mechanisms, Comparisons of flow mechanisms

Unit 2 System Interconnect Architectures: Network properties and routing, Static interconnection Networks,

Dynamic interconnection Networks, Multiprocessor system Interconnects, Hierarchical bus systems,

Crossbar switch and multiport memory, Multistage and combining network.

Advanced processors: Advanced processor technology, Instruction-set Architectures, CISC Scalar

Processors, RISC Scalar Processors, Superscalar Processors, VLIW Architectures, Vector and

Symbolic processors

Unit 3 Pipelining: Linear pipeline processor, nonlinear pipeline processor, Instruction pipeline Design,

Mechanisms for instruction pipelining, Dynamic instruction scheduling, Branch Handling techniques,

branch prediction, Arithmetic Pipeline Design

Memory Hierarchy Design: Cache basics & cache performance, reducing miss rate and miss

penalty, multilevel cache hierarchies, main memory organizations, design of memory hierarchies.

Memory consistency models: SC, PC,WO/WC, RC;

Unit 4

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title: ADVANCE COMPUTER

ARCHITECTURE

Course Code: TCS-702 Duration of External Exam: 3 Hours

Page 3: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Multiprocessor architectures: Symmetric shared memory architectures, distributed shared memory

architectures, cache coherence protocols (MSI, MESI, MOESI), scalable cache coherence, overview of

directory based approaches, design challenges of directory protocols, memory based directory

protocols, cache based directory protocols, synchronization. Introduction of OpenMP and MPI,

threads, mutex etc.

Unit 5 Introduction to multi-core architectures, multiprocessor Chip architecture case studies: Intel core 2

duo, Core i3, Core i5

Text Books:

1. Kai Hwang, “Advanced computer architecture”; TMH. 2000

2. D. A. Patterson and J. L. Hennessey, “Computer organization and design”, Morgan

Kaufmann, 2nd Ed. 2002

3. www.intel.com

Reference Books:

1. J.P. Hayes, “computer Architecture and organization”; MGH. 1998.

2. V. Rajaranam & C.S.R. Murthy, “Parallel computer- Theory and practices”; PHI. 2002.

3. J. Quin, “Parallel Computing”, TMH

4. R.K. Ghose, Rajan Moona & Phalguni Gupta, “Foundation of Parallel Processing”, Narosa

Publications, 2003

5. Kai Hwang and Zu, “Scalable Parallel Computers Architecture”, MGH. 2001

6. Stalling W, “Computer Organization & Architecture”, PHI. 2000

7. D.A. Patterson, J.L. Hennessy, “Computer Architecture :A quantitative approach”; Morgan

Kauffmann, 2002.

Course Outcome Description

CO1 Describe the operations of performance such as parallel computers ,SIMD computers

and have good knowledge of program and network properties.

CO2 Ability to utilize various techniques developed for System Interconnect Architectures

and Advanced processors

CO3 Describe the operations of performance such as pipelines ,dynamic scheduling branch

predictions, caches

CO4 Describe the operations of performance such as Symmetric shared memory

architectures, distributed shared memory architectures, cache coherence protocols

(MSI, MESI, MOESI).

CO5 Ability to understand the need for multi-core architectures and multiprocessor Chip

architecture

Page 4: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DBIT DEHRADUN

LESSON PLAN

SEM/YEAR: 8th

/4th

DEPARTMENT : CSE

COURSE: Advanced Computer Architecture COURSE CODE: TCS-702

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

Unit-1

1. The state of computing T1 1 Chalk

&Talk

2. Classification of parallel computers T1 1 PPT

3. Multiprocessors and multicomputers T1 & R1 2 PPT

4. Multivector and SIMD computers T1 & R1 1 PPT

7. Conditions of parallelism T1 & R1 1 Chalk

&Talk

8. Data and resource Dependences T1 & R1 1 Chalk

&Talk

9. Hardware and software parallelism T1 & R1 1 Chalk

&Talk

10. Program partitioning and scheduling T1 1 Chalk

&Talk

11. Grain Size and latency T1 1 Chalk

&Talk

12. Program flow mechanisms, Control flow versus data flow T1 1 PPT

13. Data flow Architecture, Demand driven

mechanisms, Comparisons of flow mechanisms

T1 1 PPT

Unit-2

14. System Interconnect Architectures: Network properties and

routing

T1 1 Chalk

&Talk

15. Static interconnection Networks T1 1 PPT

16. Dynamic interconnection Networks T1 1 PPT

17. Multiprocessor system Interconnects T1 1 Chalk

&Talk

18. Hierarchical bus systems T1 1 Chalk

&Talk

19. Crossbar switch and multiport memory R2 1 Chalk

&Talk

20. Multistage and combining network R2 1 PPT

21. Advanced processor technology T1 1 Chalk

&Talk

22. Instruction-set Architectures, CISC Scalar Processors T1 1 Chalk

&Talk

23. RISC Scalar Processors, Superscalar Processors T1 1 PPT

24. VLIW Architectures, Vector and Symbolic processors T1 1 PPT

Unit-3

25. Pipelining: Linear pipeline processor T1 1 Chalk

&Talk

26. nonlinear pipeline processor, Instruction pipeline Design T1 1 PPT

27. Mechanisms for instruction pipelining T1 1 PPT

28. Dynamic instruction scheduling, Branch Handling techniques T1 1 PPT

29. branch prediction, Arithmetic Pipeline Design T1 1 PPT

30 Memory Hierarchy Design: Cache basics & cache performance, T1 2 Chalk

Page 5: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

reducing miss rate and miss

penalty

&Talk

31. multilevel cache hierarchies, main memory organizations T1 1 Chalk

&Talk

32. design of memory hierarchies. T1 1 PPT

33. Memory consistency models: SC, PC,WO/WC, RC; T1 2 Chalk

&Talk

Unit-4

34. Multiprocessor architectures: Symmetric shared memory

architectures

T1 1 PPT

35. distributed shared memory

architectures, cache coherence protocols (MSI, MESI, MOESI)

T1 1 PPT

36. scalable cache coherence, overview

of directory based approaches

T1 1 Chalk

&Talk

37. design challenges of directory protocols, memory based directory

protocols,

T1 1 Chalk

&Talk

38. cache based directory protocols, synchronization T1 1 Chalk

&Talk

39. Introduction of OpenMP and MPI,

threads, mutex etc

T1 1 Chalk

&Talk

Unit-5

40. Introduction to multi-core architectures T1 1 Chalk

&Talk

41. multiprocessor Chip architecture case studies T1 1 Chalk

&Talk

42. Intel core 2 duo T1 1 Chalk

&Talk

43. Core i3, Core i5 T1 1 Chalk

&Talk

Total Lectures: 45

REMARKS/RECOMMENDATIONS FOR FUTURE:

EXTRA CLASS TAKEN (IF ANY):

TEXT BOOKS:

[T1] Diane Tiare and Catherine Paquet, Campus Network Design Fundamentals , Pearson Education, 2006.

REFERENCE BOOKS:

[R1] Craig Zacker, The Complete Reference: Upgrading and Troubleshooting Networks , Tata

[R2] William Stallings, Cryptography and Network Security: Principals and Practice , Prentice Hall, New

Jersy.McGraw-Hill, 2000.

Signature of HOD:__________

Date: __________

Page 6: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is the difference between Serial and Parallel Processing?

2. Discuss architectural evaluation from sequential scalar to vector processor and parallel

computers in detail.

3. What is the different system attributes used to judge the performance of the system?

4. What do you mean by parallelism in uniprocessor system? Identify the various

mechanisms that have been developed for this.

5. Discuss different ways to improve system performance.

6. Discuss architectural evaluation from sequential scalar to vector processor and parallel

computers in detail.

7. Explain any one classification of Parallel computers.

8. What is the different system attributes used to judge the performance of the system?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: Advanced Computer Architecture Assignment No. 1

Course Code: TCS-702

Faculty : Mr. Dhajvir Singh Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 1 Date of Issue: Date of Submission:

Page 7: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Differentiate between CISC and RISC scalar processor. Write an example of each.

2. Differentiate between static and dynamic Interconnection network. Name five

example of each.

3. Show recursive construction of baseline network. Draw a baseline network with 16(0-

15)nodes.

4. Differentiate between static and dynamic Interconnection network. Name five

example of each.

5. Explain VLIW architecture. How pipeline is done in VLIW architecture?

6. Differentiate between direct and indirect Interconnection network. Give two example

of each.

7. What is hypercube static interconnection network? Draw routing by-

a. By least significant bit Co

b. By middle bit C1

c. By most significant bit C2

For a 3-cube with modes denoted by in C2C1C0 binary

8. What is the significance of vector computing over scalar computing? Discuss multi-

vector supercomputer with the help of a diagram.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: Advanced Computer Architecture Assignment No. 2

Course Code: TCS-702

Faculty : Mr. Dhajvir Singh Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 2 Date of Issue: Date of Submission:

Page 8: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain cache addressing models. Differentiate between physical address caches and

virtual address caches?

2. Explain the aliasing problem in cache. Discuss the possible solution.

3. Compare and contrast set-associative mapping and sector caches.

4. Write short notes on cache performance issues.

5. Explain the role of memory manager in an operating system kerne.

6. What is hypercube static interconnection network? Draw routing by-

i.By least significant bit Co

ii.By middle bit C1

iii.By most significant bit C2

7. What is crossbar switches in interconnection network? Draw a 8*8 omega network

and explain how many nodes are required to build a 8*8 omega network?

8. Explain Data flow architecture. Write short on drawback of data flow architecture.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: :Advanced Computer Architecture Assignment No. 3

Course Code: TCS -702

Faculty : Mr. Dhajvir Singh Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 3 Date of Issue: Date of Submission:

Page 9: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1 Differentiate between DSB model and TSO model for week consistency memory

systems?

2 What are clocks skewing? Derive the effect of skew ‘s’ on clock period.

3 Derive speed up, efficiency and throughput for pipeline.

4 Discuss different mechanisms for instruction pipelining.

5 Differentiate between static instruction scheduling and dynamic instruction scheduling.

6 Discuss the effect of branching on pipeline throughput and efficiency. Derive the

expression for effective throughput.

7 What is pipeline stalling? Discuss.

8 Differentiate between in-order issue and out-of-order issue pipeline.

9 Consider the following reservation table for a four stage pipeline with a clock cycle of

2ns.

I. What are the forbidden latencies and initial collision vector.

II. Determine the MAL associated with the shortest Greedy cycle.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: Advanced Computer Architecture Assignment No. 4

Course Code: TCS-702

Faculty : Mr. Dhajvir Singh Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 4 Date of Issue: Date of Submission:

Page 10: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Write an algorithm that performs an SIMD matrix multiplication with a time

complexity.

2. Describe a multiport memory with private memories.

3. Describe how 1-by-8 demultipluxer is derived from 2*2 switches.

4. Given the circular diagram of a buffered 2*2 crossbar.

5. Write asynchronous parallel algorithms for finding the zeroes of a function f(x) using

Newton’s iteration method.

6. Explain briefly the methodology for everlasting the performance of a parallel

algorithm.

7. Compare data driven and dependence driven computing models.

8. Explain the multilevel program abstraction in the event driven data flow computing

model.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: :Advanced Computer Architecture Assignment No. 5

Course Code: TCS-702

Faculty : Mr. Dhajvir Singh Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 5 Date of Issue: Date of Submission:

Page 11: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Consider the following HLL program. Detect the parallelism embedded in five

statements P1 P2 =P3 P4 and P5 in order

P1 C=D*E

P2 M= G+C

P3 A= B+C

P4 C=C+M

P5 F=G/E

Show the execution sequence with the diagram.

2. Explain different level of Instruction (Granularity of a program) in detail.

3. What Is the significance of grain packing in program? Explain with the help of an

example.

4. Two 2*2 matrix A and B are multiplied to compute the sum of the four elements in

matrix C=A*B. To calculate sum of C11,C12,C21,C22 calculate grain size and

communication latency if communication delay between two successive stages of

processors is 212 cycles.

Multiplication 101 cycles and addition fuses 8 cycles.

5. Differentiate between dataflow and control flow mechanism of computing.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 1

Course Code: TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester:7th

Unit/Title: Unit 1 Date of Discussion:

Page 12: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. An 8*8 omega network is built with 2*2 switches and perfect shuffle Interstage

connection . Answer the following

a) How many stages are required?

b) Calculate total number of switches

c) Permutation 𝜋=(0,7,6,4,2) (1,3) (5) is blocking or not ?

2. Show recursive construction of baseline network. Draw a baseline network with 16(0-

15) nodes.

3. Write short note-

a) Superscalar and vector processor

b) Vector and Symbolic processor

4. Differentiate between CISC and RISC scalar processor. Write an example of each.

5. Explain different Vector processing methods with suitable illustrations.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 2

Course Code : TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 2 Date of Discussion:

Page 13: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

7. Explain demand paging memory system with examples.

8. Explain the effects of block size, set number, associativity, and cache size on the

performance of set-associative cache organisation.

9. With each cache organization, explain the effect of block mapping policies on the hit

ratio issues.

10. With respect to flexibility in implementing block replacement algorithm, rank the four

cache organizations. Also justify the ranking order.

11. Determine the similarities and subtle differences among the conditions on sequential

consistency imposed by:

Lamport

Dubois et al

Sindhu et al

Respectively.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 3

Course Code : TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 3 Date of Discussion:

Page 14: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain in detail MESI and MOESI.

2. Explain computer arithmetic principles.

3. Explain cache basics and cache performance.

4. Explain multilevel cache hierarchies.

5. Explain static arithmetic principles.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 4

Course Code: TCS -702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 4 Date of Discussion:

Page 15: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

9. Explain the staging memory concept in MPP and instruction set of the MPP.

10. How new image processing techniques are developed using MPP.

11. Explain Asynchronous and synchronous pipelining models in detail with proper

diagram.

12. What is the mechanism of Instruction pipelining?

13. Explain branch prediction.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 5

Course Code: TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 5 Date of Discussion:

Page 16: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain hazard avoidance in instruction pipelining.

2. What is internal data forwarding?

3. Explain non linear pipelining?

4. Explain Instruction pipelining design?

5. Explain branch handling techniques?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 6

Course Code : TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester:7th

Unit/Title: Unit 4 Date of Discussion:

Page 17: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is the difference between Pipelining and Parallel Processing?

2. Discuss in brief how system attributes like instruction set architecture and compiler

technology effect different performance factor?

3. Classify different shared memory multiprocessor architectures.

4. What are different data and resource dependencies of parallelism? How Berstein

conditions are used to detect maximum parallelism?

5. Discuss the mismatch between software and hardware parallelism. How it can be

solved?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 7

Course Code: TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 1 Date of Discussion:

Page 18: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain linear pipelining.

2. Explain Distributed shared memory architecture.

3. Explain cache based directory protocols.

4. Explain OpenMP.

5. Define threads?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Advanced Computer Architecture Tutorial Sheet No. 8

Course Code: TCS-702

Faculty : Mr. Dhajvir Rai

Branch: CSE Semester: 7th

Unit/Title: Unit 3 Date of Discussion:

Page 19: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Fundamentals of database systems design and SQL

Objective:

1. Provide students with the opportunity to build upon the knowledge learned in Database Systems 2. Prepare students for an entry-level database administration position 3. Demonstrate to students how to manage database services and clients

4. Demonstrate to students how to implement and configure a database environment

5.Explain to students best practices for data management

6.Demonstrate and apply database optimization, maintenance and recovery procedures

UNIT 1 DBA Fundamental I

Oracle Architectural Components, Getting Started With Oracle Server , Managing an Oracle Instance,

Creating a Database, Data Dictionary Contents and Usage, Maintaining the Control File, Redo Log Files,

Managing Tablespaces and Data Files, Storage Structures and Relationships, Managing Undo Data, Tables,

Indexes, Maintaining Data Integrity, Managing Password, Managing Security, Resources, users, Privileges &

Roles, Loading Data Into a Database & Globalization Support

UNIT 2 DBA Fundamental II

Networking Overview, Basic Oracle Net Architecture, Server-Side Configuration, Basic Oracle Net Services

Client-Side Configuration, Usage and Configuration of the Oracle Shared Server, Backup and Recovery

Overview, Instance and Media Recovery Structures, Configuring the Database Archiving Mode, Oracle

Recovery Manager Overview and Configuration, User Managed Backups, RMAN Backups, User Managed

Complete & Incomplete Recovery, RMAN Complete Recovery, Incomplete Recovery & Maintenance,

Recovery Catalog Creation and Maintenance, Transporting Data Between Databases

UNIT 3 Performance Tuning

Overview Of Oracle 9i Performance Tuning, Diagnostic and Tuning Tools, Sizing the Shared Pool & the

Buffer Cache, Sizing The Other SGA Structures, Database Configuration and I/O Issues, Optimizing Sort

Operations, Diagnosing Contention For Latches, Tuning Rollback Segments, Monitoring and Detecting Lock

Contention, Tuning The Oracle Shared Server, Application Tuning, Using Oracle Blocks Efficiently

SQL Statement Tuning, Tuning the OS and Using Resource Manager

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Intermediate Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title : DATABASE

ADMINISTRATION Course Code: TCS-082/TIT-083 Duration of External Exam: 3

Hours

Page 20: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

UNIT 4 Managing Oracle

Oracle10i: Overview, Preparing the Operating System & Install Oracle9i Software, Create a Custom Oracle

Database, Install and Configure Enterprise Manager, Customize the Oracle Database Linux Measurement

Tools, Oracle Measurement Tools, Tuning Oracle

UNIT 5 Database Troubleshooting

One Time Troubleshooting, Adhoc Troubleshooting, Escalations, Connectivity, Business Continuity, High

Availability and Scalability, Data Sharing and information Integration

BOOKS: For Oracle:

1. Oracle Database Administrator’s Guide 2. Oracle DBA Handbook

Course Outcome Description

CO1 To learn the basic concepts of DBMS and Oracle architecture

CO2 Explain and analyze oracle net architecture and services

CO3 Ability to understand Oracle 9i Performance Tuning

CO4 Preparing the Operating System & Install Oracle9i Software and understanding oracle

measurement tools.

CO5 Understanding database troubleshooting techniques

Page 21: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Knowledge of UNIX & Shell Programming

Objective: 1. To understand the various techniques of Administration tool and processes.

2. To design and implement network, utilities and security features.

3. Understanding NT/Novell environment interoperating with WAN/LAN connectivity.

4. Understanding TCP/IP and network security.

Unit-I

Introduction: Duties of the Administrator, Administration tools, Overview of permissions.

Processes: Process status, Killing processes, process priority. Starting up and Shut down:

Peripherals, Kernel loading, Console, The scheduler, init and the inittab file, Run-levels, Run

level scripts.

Managing User Accounts: Principles, password file, Password security, Shadow file,

Groups and the group file, Shells, restricted shells, user management commands, homes and

permissions, default files, profiles, locking accounts, setting passwords, Switching user,

Switching group, Removing users.

Unit - II

Managing Unix File Systems: Partitions, Swap space, Device files, Raw and Block files,

Formatting disks, Making file systems, Superblock, I-nodes, File system checker, Mounting

file systems, Logical Volumes, Network File systems, Boot disks

Configuring the TCP/IP Networking : Kernel Configuration; Mounting the /proc File

system, Installing the Binaries, Setting the Hostname, Assigning IP Addresses, Creating

Subnets, Writing hosts and networks Files, Interface Configuration for IP, ifconfig, netstat

command, Checking the ARP Tables; Name service and resolver configuration.

Unit- III

TCP/IP Firewall : Methods of Attack, What Is a Firewall? What Is IP Filtering? Setting Up

Linux for Firewalling Testing a Firewall Configuration; A Sample Firewall Configuration:

IPAccounting, Configuring the Kernel for IP Accounting, Configuring IP Accounting, Using

IPAccounting Results

IP Masquerade and Network Address Translation : Side Effects and Fringe Benefits,

Configuring the Kernel for IP Masquerade, Configuring IP Masquerade.

Unit-IV

The Network Information System : Getting Acquainted with NIS, NIS Versus NIS+ , The

Client Side of NIS, Running an NIS Server, NIS Server Security.

Network file system: Preparing NFS, Mounting an NFS Volume, The NFS Daemons, The

exports File.

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title: System Administration Course Code: TCS- 701 Duration of External Exam: 3

Hours

Page 22: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

System Backup & Recovery: Log files for system and applications; Backup schedules and

methods (manual and automated).

Unit- V

Active Directory, LDAP

Text Books:

1. L.L. Beck – “System Software “ (3rd Ed.)- Pearson Education 2. Michel Ticher – “PC System Programming”, Abacus 3. Kirch – “ Linux network Administrator’s guide (2nd Ed.)” – O’Rielly 4. Maxwell – “Unix system administration” – TMH 5. Limoncelli –“The Practice of System & Network Administration”-Pearson 6. Wells, LINUX Installation & Administration, Vikas

Reference Books:

E. Nemeth, G. Snyder, S. Seebass, T. R. Hein – “ Unix system administration

handbook” – Pearson Education

Course Outcome Description

CO1 Demonstrate essential IT support skills including installing, configuring,

securing and troubleshooting operating systems and hardware.

CO2 Ability to develop a network and file system according requirement.

CO3 Demonstrate the ability to research technology problems, provide

security to various web threats, and to learn new technology tools.

CO4 Troubleshoot software and hardware problems on a personal computer

(PC); install new PC components; develop skills required to research

hardware components and their associated software drivers.

CO5 Ability to understand new technology such as LDAP

DBIT DEHRADUN

Page 23: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

LESSON PLAN

SEMESTER/YEAR: VIIth

/4th

DEPARTMENT: CSE

COURSE: SYSTEM ADMINISTRATION COURSE CODE: TCS-701

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

1. Introduction: Duties of the Administrator T1 1 Chalk &Talk

2. Administration tools, Overview of permissions T1 1 Chalk &Talk

3. Processes: Process status, Killing processes, process priority R1 1 Chalk &Talk

4. Starting up and Shut down: Peripherals, Kernel loading T2 2 Chalk &Talk

and PPT

5. Console, The scheduler, init and the inittab file, Run-levels,

Runlevel scripts.

T2 1 Chalk &Talk

6. Managing User Accounts: Principles,password file, Password

security, Shadow file,Groups and the group file, Shells,

restricted shells

R1 2 Chalk &Talk

and PPT

7. user management commands, homes and permissions, default

files, profiles, locking accounts, setting passwords

R1 2 Chalk &Talk

8. Switching user,Switching group, Removing users. T2 1 Chalk &Talk

and PPT

9. Managing Unix File Systems: Partitions, Swap space, Device

files

T1 1 Chalk &Talk

10. Raw and Block files,Formatting disks, Making file systems,

Superblock, I-nodes

T2 1 Chalk &Talk

11. File system checker, Mountingfile systems, Logical Volumes,

Network File systems, Boot disks

R1 2 Chalk &Talk

12. Configuring the TCP/IP Networking : Kernel Configuration;

Mounting the /proc Filesystem

R1 1 PPT

13. Installing the Binaries, Setting the Hostname, Assigning IP

Addresses, CreatingSubnets

R1 2 PPT

14. Writing hosts and networks Files, Interface Configuration for IP,

ifconfig

T1 2 Chalk &Talk

15. netstatcommand, Checking the ARP Tables; Name service and

resolver configuration

T1 1 PPT

16. TCP/IP Firewall : Methods of Attack, What Is a Firewall? What Is

IP Filtering?

T1 2 Chalk &Talk

17. Setting UpLinux for Firewalling Testing a Firewall Configuration;

A Sample Firewall Configuration

T2 1 Chalk &Talk

18. IPAccounting, Configuring the Kernel for IP Accounting T2 1 PPT

19. Configuring IP Accounting, UsingIPAccounting Results R1 2 PPT

20. IP Masquerade and Network Address Translation : Side Effects

and Fringe Benefits

T2 1 Chalk &Talk

21. Configuring the Kernel for IP Masquerade, Configuring IP

Masquerade

T1 1 PPT

22. The Network Information System : Getting Acquainted with NIS R1 1 Chalk &Talk

Page 24: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Total Lectures: 41

REMARKS/RECOMMENDATIONS FOR FUTURE:

EXTRA CLASS TAKEN (IF ANY):

TEXT BOOKS:

[T1] L.L. Beck – System Software (3rd Ed.)- Pearson Education

[T2] Michel Ticher – PC System Programming , Abacus

Reference Books:

[R1] E. Nemeth, G. Snyder, S. Seebass, T. R. Hein – Unix system administration handbook – Pearson

Education

Signature of HOD:__________

Date: __________

23. NIS Versus NIS+ , The Client Side of NIS, Running an NIS Server,

NIS Server Security

R1 2 Chalk &Talk

24. The NFS Daemons, exports File. T1 2 PPT

25. System Backup & Recovery: Log files for system and

applications

R1 1 PPT

26. Backup schedules andmethods (manual and automated). T2 2 PPT

27. Active Directory T1 2 PPT

28. LDAP T2 2 PPT

Page 25: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. What is the need of system administrator?

Q2. How do you change file access permissions?

Q3. What is a process? How UNIX identifies a process?

Q4. What are different administrative tools? Explain kill process with the help of an

example.

Q5. What do you mean by run level? Explain the difference between a shell and kernel.

DEV BHOOMI INSTITUTE OF TECHNOLOGY,

DEHRADUN ASSIGNMENT SHEET

Course Name: System Administration Assignment No. 1

Course Code: TCS 701 Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title:1

Date of Conduction:

Page 26: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. How do you change file access permissions?

Q2. Explain various information which password file contain. How do we provide

password security?

Q3. Explain locking and unlocking of account with an example.

Q4. What is a shell? Explain the working of a shell.

Q5. What is a file structure? How it is organized.

DEV BHOOMI INSTITUTE OF TECHNOLOGY,

DEHRADUN ASSIGNMENT SHEET

Course Name: System Administration Assignment No. 2

Course Code: TCS 701 Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title:2

Date of Conduction:

Page 27: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. Define firewall. Explain its types.

Q2. Explain the function of IP masquerade and Network address translation.

Q3. What are different methods of attack?

Q4. Write down the steps to configure firewall in Linux operating system.

Q5. Discuss in detail configuration settings of firewall in Linux.

DEV BHOOMI INSTITUTE OF TECHNOLOGY,

DEHRADUN ASSIGNMENT SHEET

Course Name: System Administration Assignment No. 3

Course Code: TCS 701 Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title:3

Date of Conduction:

Page 28: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. What do you mean by starting and stopping NFS?

Q2. What do you mean by mounting a NFS Volume?

Q3. What are shadow files? How they work?

Q4. Why is backup important? Explain different kinds of tools for it.

Q5. State features of NFS and NFS daemons. What is function of export file in NFS?

Q6. What is NIS? Explain various maps used in NIS.

DEV BHOOMI INSTITUTE OF TECHNOLOGY,

DEHRADUN ASSIGNMENT SHEET

Course Name: System Administration Assignment No. 4

Course Code: TCS 701 Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title:4

Date of Conduction:

Page 29: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. State the differences between LDAP and active directories.

Q2. Explain the active directory in Linux Operating system.

Q3. What are the different partitions in active directory? Explain all of them.

Q4. What do you mean by active directory and LDAP?

Q5. What is LVM? What is the use of ns switch and host configuration file?

DEV BHOOMI INSTITUTE OF TECHNOLOGY,

DEHRADUN ASSIGNMENT SHEET

Course Name: System Administration Assignment No. 5

Course Code: TCS 701 Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title:5

Date of Conduction:

Page 30: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the 5-major role of the System Administration.

2. Give an overview of various permissions and roles for a System Administration.

3. What are the various components of a process?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 1

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 1 Introduction Date of Discussion:

Page 31: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. How can you kill a process using the kill command?

2. Write the short notes on: Swap Space and File System Checker.

3. Explain boot process and shut down process in Linux system.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 2

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 1 Introduction Date of Discussion:

Page 32: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the duties of the kernel with real time example.

2. How can you access any file system under LINUX SYSTEM.

3. Write the process of swap partition.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 3

Course Code: TCS 701

Faculty : Ankit Maithani Branch: CSE Semester: 7th

Unit/Title: Unit-I&II Introduction, Managing Unix File Systems Date of Discussion:

Page 33: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain any eight commands with syntax in LINUX operating System?

2. Write the short notes on Kernel loading and Console in Linux.

3. Explain mounting and unmounting in file system.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 4

Course Code: TCS 701

Faculty : Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: Unit-I&II Introduction, Managing Unix File Systems Date of Discussion:

Page 34: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Describe Raw and Block files in Linux system.

2. Explain Name service and resolver configuration in Linux system.

3. How do you mean by formatting? How formatting is done in UNIX?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 5

Course Code: TCS 701

Faculty : Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: Unit-II Managing Unix File Systems Date of Discussion:

Page 35: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Discuss the importance of firewall in networks?

2. What do you mean by IP Accounting? Why it is so important?

3. How can we mount an NFS volume?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 6

Course Code: TCS 701

Faculty : Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: Unit-II&III Managing Unix File Systems,TCP/IP Firewall Date of Discussion:

Page 36: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is the difference between NIS and NIS+ ?

2. What do you mean by soft mounted and hard mounted?

3. What is Network File System? Explain its main feature?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 7

Course Code: TCS 701

Faculty : Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: Unit-IV The Network Information System Date of Discussion:

Page 37: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain NIS client and server over the network.

2. Define Light weighted Directory Access Protocol (LDAP)? Define its main goals?

3. What are Single server operations in Active Directory?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: System Administration Tutorial Sheet No. 8

Course Code: TCS 701

Faculty : Ankit Maithani Branch: CSE Semester: 7th

Unit/Title: Unit-IV& V Date of Discussion:

Page 38: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the essential role of the System Administration.

2. Give an overview of various permissions and roles for a System Administration.

3. What do you mean by a process? What are the various components of a process?

4. How can you kill a process using the kill command? Also give its syntax.

5. Define process states. Give all the states of the process.

6. How can boot process and shutdown process is executed in Linux system.

7. What is kernel? Explain the duties of the kernel.

8. What is meant by multi user and multi tasking operating system?

9. What is Password file? Explain various information which password file contain?

How do we provide password security?

10. What is the RUN Level in UNIX/LINUX Operating System? Describe RUN level

Script?

11. Explain the different types of permissions assigned to System Administration?

12. Write the short notes on: Swap Space and File System Checker

13. Explain any five commands with syntax in LINUX operating System?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: System Administration Question bank no. 1

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Date of Conduction:

Page 39: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is I-NODE? What is the use of I-NODE? What information is stored in I-NODE?

2. What are the various steps involved in logging into UNIX/LINUX/WINDOWS?

3. What is Partition? What are the benefits of Partitions?

4. Discuss in details about log files.

5. Discuss the various steps to mounting the proc file system and kernel configuration.

6. What is Network File System? How can you access any file system under LINUX?

Explain the format of the mount command with the help of examples.

7. How can you manage swap space in LINUX?

8. How do you mean by formatting? How formatting is done in UNIX?

9. What do you mean by logical volume? What are different types of logical volume ?

10. Write the methods of setting the hostnames in unix ?

11. What is Interface configuration for IP ? Explain various types of interfaces in details ?

12. What are the commands for checking the ARP tables in UNIX?

13. Explain the different issues in TCP/IP networking.

14. How DNS works? Explain its working in details.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: System Administration Question bank no. 2

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 2

Date of Conduction:

Page 40: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is Firewall? Discuss the importance of firewall in networks?

2. What do you mean by Network Address Translation (NAT)?

3. What do you mean by IP masquerade? What are the side effects and fringe benefits of IP

masquerade?

4. Discuss various methods of attack and methods to prevent them.

5. What is IP Filtering? How we can build Linux IP firewalls?

6. What do you mean by IP Accounting? Why it is so important?

7. What are the side effects and fringe benefits of IP masquerade ?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: System Administration Question bank no. 3

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 3

Date of Conduction:

Page 41: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Differentiate between NIS and NIS+? How can we run an NIS Server?

2. What is Network File System? Explain its main feature? How can we mount an NFS

volume?

3. What do you means by Soft-mounted and Hard-mounted? Explain exports File.

4. Explain Network Information System?

5. What are main security flaw in NIS Server? How can we overcome from them?

6. What do you mean by soft mounted and hard mounted?

7. What do you mean by term Backups? Why we make backup?

8. What are the other types of backup products available in Linux?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: System Administration Question bank no. 4

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 4

Date of Conduction:

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Page 42: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Define Light weighted Directory Access Protocol (LDAP)? Define its main goals?

2. What are the various components of an LDAP entry?

3. What are the various operations of LDAP?

4. What do you mean by the term “Schema”? Define it.

5. What do you mean by Active Directory?

6. What are Single server operations in Active Directory?

7. What is Active Directory Lightweight Directory Service?

QUESTION BANK

Course Name: System Administration Question bank no. 5

Course Code: TCS 701

Faculty: Ankit Maithani

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Conduction:

Page 43: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Knowledge of Computer Network

Objective:

1. To understand the history of networks and their evolution and describe the various forms of

network addressing, including DNS 2.To investigate novel ideas in the area of Networking via term-long research projects 3. List and describe different network standards and protocols

Unit – 1 Introduction

Liberalization of communications Industry, Digitalization of content, changes in spectrum

management, cellular reuse, drive towards broadband, IEEE 802.11 networks

Unit – 2 Wireless Network Systems

Cellular networks

Tthe GSM circuit switched network, GSM channel structure, Authentication and location

updating, physical channels, TMN

GPRS

Introduction to GPRS, contexts, PDP context, Mobility management context, MS-SGSN

physical layer, MS-SGSN protocols, GPRS operations

Unit – 3 Principles of access network planning

Circuit voice networks

Introduction to CVN, coverage, capacity, planning for circuit multimedia services

Planning for packet multimedia services

Planning approaches, buffer-pipe model, characterization of applications, practical modeling

methodologies, multiuser packet transport configurations

Unit – 4 Planning and design

RAN, GSM RAN, UMTS RAN, Cellular OFDM RAN, Mesh network

Unit – 5 Network operation and optimization

Enhanced telecom operations model (eTOM), wireless network life cycle – strategy,

infrastructure and product, operations, enterprise management, GSM network performance

optimization – principles and key performance indicators, coverage optimization, GPRS RAN

optimization, UMTS network performance optimization

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title :WIRELESS NETWORKS Course Code: TCS-073/TIT-073 Duration of External Exam: 3

Hours

Page 44: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Text Books:

1. Deploying Wireless networks, Andy wilton, Tim charity, Cambridge university press

2. Fundamental of Wireless Networking, Ron Price, TMH

3. 3G Wireless Networks, Clint Smity, TMH

4. Essentials

Course Outcome Description

CO1 Understand and analyze proposed protocols at computer network, MAC and routing

layers of WSN

CO2 Ability to design and evaluate a component or system to meet desired needs within the

field of wireless network

CO3 Ability to apply knowledge of mathematics, basic science, and engineering to solve

problems encompassing fundamental areas of wireless communications, with greatest

emphasis by option

CO4 Understanding of contemporary engineering and societal issues, and the impact of

engineering decisions on society in both a local and global context

CO5 Understand and analyze Network operation and optimization

Page 45: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What are the applications and limitation of wireless networks?

2) Discuss about the cellular system.

3) Describe the features of IEEE 802.11

4) What are the uses of communication in industries?

5) Explain the various types of Handover/Hand off in GSM.

6) What is spread spectrum in wireless communication network?

7) What is the difference between FDMA and TDMA?

8) What is the difference between TDMA and CDMA?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

ASSIGNMENT SHEET

Course Name: Wireless Networks Assignment No. 1

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: I/ Introduction of Wireless Network

Date of Issue: Date of

Submission:

Page 46: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What is PDP context and also explain about the Ad Hoc network.

2) Explain in detail the difference types of channels used in GSM network. Explain the

architecture of GSM.

3) Explain the process of planning the UMTS radio access network design.

4) What do you understand by Mesh Network? Explain the working of orthogonal frequency

multiplexing cellular system.

5) Explain the functioning of GPRS architecture with suitable diagram and also describe its

services and applications.

6) Explain the concept of frequency reuse in cellular networks with suitable example and

diagram.

7) Explain buffer-pipe model used in packet multimedia services with an example.

8) What are the principles and key performance indicators for GSM network performance

optimization. Discuss GPRS radio access network optimization.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

ASSIGNMENT SHEET

Course Name: Wireless Networks Assignment No. 2

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: II/ Wireless Network Systems

Date of Issue: Date of

Submission:

Page 47: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Explain Circuit Voice Network in Details and also describe its applications.

2) What are the required principles to access network planning?

3) Describe the planning for circuit multimedia services.

4) Describe the planning for packet multimedia services.

5) What is the buffer pipe model explain it with diagram and detail.

6) What are parameters used to design for the circuit voice network?

7) Differentiate between Circuit switching and packet switching network.

8) Explain the practical medeling methodologies and multiuser packet transport

configurations.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

ASSIGNMENT SHEET

Course Name: Wireless Networks Assignment No. 3

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: III/ Circuit Voice Network

Date of Issue: Date of

Submission:

Page 48: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What do you mean by Radio Access Network? Explain its application.

2) Explain the type of Radio Access Network in details.

3) Draw the architecture of UMTS RAN and describe it’s working.

4) What is cellular OFDM Radio Access Network?

5) Explain the Mesh Network. What is role of Mesh Network in the Wireless

Communication?

6) Explain the different techniques of technologies for Wireless Geo location with necessary

diagram.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

ASSIGNMENT SHEET

Course Name: Wireless Networks Assignment No. 4

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: IV/ Planning and Design

Date of Issue: Date of

Submission:

Page 49: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Discuss the Enhanced Telecom Operation Model (eTOM) used as standard for business

processes in the telecommunications industry in detail.

2) What are the principles and key performance indicators for GSM network performance

optimization.

3) Discuss GPRS radio access network optimization.

4) Define the 3G cellular system.

5) What is meant by cell breathing effect?

6) Discuss the Universal Mobile Telecommunication system (UMTS) network performance

optimization through design.

7) What is the use of Channels in the wireless network and how many types of channels

used?

8) Explain the GSM network performance optimization – principles and key performance

indicators, coverage optimization and UMTS network performance optimization

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

ASSIGNMENT SHEET

Course Name: Wireless Networks Assignment No. 5

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: V/ Network operations and Optimization.

Date of Issue: Date of

Submission:

Page 50: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What is the wireless network in industries and explain its real life application.

2) Discuss the Generations of Wireless Communication or Network.

3) Write the Short notes on:

a. First Generation (1G)

b. Second Generation(2G)

c. Third Generation(3G)

4) Differentiate the Analog Technology and Digital Technology in Details with example

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 1

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: I/ Introduction Date of Discussion:

Page 51: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Write the Short Notes on:

a. TDMA

b. FDMA

c. CDMA

2) What is Spread Spectrum? Explain the Cellular Network.

3) Discuss the Frequency Reuse in Cellular Network with diagram

4) Describe the IEEE 802.1 1 Networks.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 2

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: I/ Introduction Date of Discussion:

Page 52: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Explain the GSM Circuit Switched Network in Deetail.

2) Draw the GSM architecture and also explain its services and applications.

3) How many types of channels works during a call. Explain these in details.

4) Explain the Hand off and Handover technique.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 3

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: II/ Wireless Network System Date of Discussion:

Page 53: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Explain GPRS architecture, its service and applications.

2) Discuss the TDMA frame structure.

3) What is PDP address and PDP Context in the wireless system?

4) What are the types of GPRS operations? Explain these with details.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 4

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: III/ Wireless Network System Date of Discussion:

Page 54: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What is Circuit switched network? Discuss Circuit Voice network.

2) How to install the BTS in the real life and what are the parameters used to install them.

3) How to increase the network capacity and call routing.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 5

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: IV/ Planning and Design Date of Discussion:

Page 55: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Discuss the planning for packet multimedia services.

2) Discuss the buffer pipe model for the packet based network.

3) Explain planning for Coverage and capacity.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 6

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: IV/ Planning and Design Date of Discussion:

Page 56: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Discuss the Radio Access Network with Network.

2) Discuss the RAN types in wireless network.

3) Discuss the Cellular Orthogonal Frequency Division Modulation Radio Access Network.

4) How to create Mesh Network in Wireless Network.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 7

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: IV/ Planning and Design Date of Discussion:

Page 57: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) Discuss the Enhanced telecom operations model (eTOM) in Wireless Network.

2) Discuss the wireless network life cycle and strategy.

3) Discuss GSM network performance optimization – principles and key performance

indicators, coverage optimization.

4) Discuss the RAN optimization and UMTS optimization.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 8

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: V/ Planning and Design Date of Discussion:

Page 58: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1) What do you mean by “capacity on Demand” principle in GPRS network.

2) Explain the function of GPRS support node in a GPRS network. Also differentiate between

GGSN and SGSN.

3) Short Notes on:

i. HPNA and Home Access Network

ii. Simulation and ARC tool

4) Explain the MAC management sub layer in terms of hand off and power management.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Course Name: Wireless Networks Tutorial Sheet No. 9

Course Code: CS-014

Faculty : Preeti Raturi

Branch: CSE Semester: VII

Unit/Title: V/ Planning and Design Date of Discussion:

Page 59: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Define – Spread Spectrum

2. What are the spread spectrum techniques?

3. What is the principle behind FHSS?

4. What are the major issues in WLAN?

5. List out the applications of WLAN

6. What is IEEE 802.11?

7. What is WIMAX?

8. Write the throughput feature in WIMAX.

9. What is UMTS? List important features of the UMTS air interface.

10. Discuss forward and reverse link channels in the CDMA 2000.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: Wireless Networks Question bank no. 1

Course Code: CS-014

Faculty: Preeti Raturi

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Date of Conduction:

Page 60: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Differentiate between frequency hopping and direct sequence spread spectrum.

2. What are various states in Bluetooth system? Explain difference between them.

3. Difference between registration and call establishment.

4. What are the reasons to perform handoff?

5. Difference between network decided and mobile assisted handovers?

6. Name five most important logical channels in GSM.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: Wireless Networks Question bank No. 2

Course Code: CS-014

Faculty: Preeti Raturi

Branch: CSE Semester: 7th

Unit/Title: UNIT 2

Date of Conduction:

Page 61: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are the three types of bursts?

2. What are the three types of control channels?

3. Draw the protocol architecture of GSM and explain in detail

4. What is GPRS? Explain in detail about GPRS.

5. Name three sub systems in the GSM architecture. 15.

6. What are VLR and HLR and why we need them?

7. Name the connectionless and connection oriented services provided by the GPRS?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: Wireless Networks Question bank No. 3

Course Code: CS-014

Faculty: Preeti Raturi

Branch: CSE Semester: 7th

Unit/Title: UNIT 3

Date of Conduction:

Page 62: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Expand ESS and BSS in the IEEE802.11?

2. What is buffer pipe model?

3. Explain the architecture of GSM RAN.

4. Explain the wireless network life cycle. What is the significance of strategy and infrastructure in

wireless life cycle?

5. How the CVN networks are characterized according to coverage and capacity?

6. Why the cellular concept gave hexagonal pattern to denote a geographical location?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: Wireless Networks Question bank No. 4

Course Code: CS-014

Faculty: Preeti Raturi

Branch: CSE Semester: 7th

Unit/Title: UNIT 4

Date of Conduction:

Page 63: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is cell? What are the cell reuse factors?

2. What is frequency reuse? How is it achieved?

3. Explain the liberalization of communication industry.

4. Explain the different phases of PDP context.

5. Give the architecture of GSM channel structure.

6. How authentication and location updating performed in a GSM network?

7. Give the architecture of GPRS network.

8. What are the roles of GGSN and SGSN?

9. What is mobility management in GSM networks?

10. What are handovers? How are they handled?

11. Explain eTOM.

12. What are the various factors that influence the performance of a wireless network?

13. Explain cellular OFDM RAN with its architecture.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Course Name: Wireless Networks Question bank No. 5

Course Code: CS-014

Faculty: Preeti Raturi

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Conduction:

Page 64: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: To understand fundamentals in 2-D digital image processing with emphasis in image

processing techniques, image filtering design and applications.

Objective: 1.Develop a theoretical foundation of fundamental Digital Image Processing concepts

2. Provide mathematical foundations for digital manipulation of images; image acquisition; preprocessing;

segmentation; Fourier domain processing; and compression.

3. Gain experience and practical techniques to write programs using MATLAB language for digital manipulation

of images; image acquisition; preprocessing; segmentation; Fourier domain processing; and compression.

UNIT-I Introduction and Fundamentals

Motivation and Perspective, Applications, Components of Image Processing System, Element of Visual

Perception, A Simple Image Model, Sampling and Quantization.

Image Enhancement in Spatial Domain: Introduction; Basic Gray Level Functions – Piecewise- Linear Transformation Functions: Contrast Stretching; Histogram Specification; Histogram

Equalization; Local Enhancement; Enhancement using Arithmetic/Logic Operations – Image

Subtraction, Image Averaging;

Basics of Spatial Filtering; Smoothing - Mean filter, Ordered Statistic Filter; Sharpening – The

Laplacian.

UNIT-II

Image Enhancement in Frequency Domain

Fourier Transform and the Frequency Domain, Basis of Filtering in Frequency Domain, Filters –

Low-pass, High-pass; Correspondence Between Filtering in Spatial and Frequency Domain;

Smoothing Frequency Domain Filters – Gaussian Lowpass Filters; Sharpening Frequency Domain

Filters – Gaussian Highpass Filters; Homomorphic Filtering.

Image Restoration: A Model of Restoration Process, Noise Models, Restoration in the presence of

Noise only-Spatial Filtering – Mean Filters: Arithmetic Mean filter, Geometric Mean Filter, Order

Statistic Filters – Median Filter, Max and Min filters; Periodic Noise Reduction by Frequency Domain

Filtering – Bandpass Filters; Minimum Mean-square Error Restoration.

UNIT-III

Color Image Processing

Color Fundamentals, Color Models, Converting Colors to different models, Color Transformation,

Smoothing and Sharpening, Color Segmentation.

Morphological Image Processing: Introduction, Logic Operations involving Binary Images, Dilation

and Erosion, Opening and Closing, Morphological Algorithms – Boundary Extraction, Region Filling,

Extraction of Connected Components.

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title : DIGITAL IMAGE

PROCESSING Course Code: TCS-071 Duration of External Exam: 3

Hours

Page 65: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

UNIT-IV

Registration

Introduction, Geometric Transformation – Plane to Plane transformation, Mapping, Stereo Imaging –

Algorithms to Establish Correspondence, Algorithms to Recover Depth

Segmentation: Introduction, Region Extraction, Pixel-Based Approach, Multi-level Thresholding, Local Thresholding, Region-based Approach, Edge and Line Detection: Edge Detection, Edge

Operators, Pattern Fitting Approach, Edge Linking and Edge Following.

UNIT-V

Feature Extraction: Representation, Topological Attributes, Geometric Attributes

Description: Boundary-based Description, Region-based Description, Relationship.

Object Recognition: Deterministic Methods, Clustering, Statistical Classification, Syntactic

Recognition, Tree Search, Graph Matching

Books:

1. Rafael C. Gonzalvez and Richard E. Woods, Digital Image Processing 2nd Edition,.; PHI.

2. B. Chanda, D.D. Majumder, “Digital Image Processing & Analysis”, PHI

3. R.J. Schalkoff; Digital Image Processing and Computer Vision, John Wiley and Sons, NY

4. A.K. Jain; Fundamentals of Digital Image Processing, Prentice Hall, Upper Saddle River, NJ.

UK Tech University, Dehradun B. Tech. CSE 4th

Year 25

Course Outcome Description

CO1 Have a clear understanding of the principals the Digital Image Processing

terminology used to describe features of images.

CO2 Have a good understanding of the mathematical foundations for digital manipulation

of images; image acquisition; preprocessing; segmentation; Fourier domain

processing, compression and analysis

CO3 Be able to write programs using Matlab language for digital manipulation of images;

image acquisition; preprocessing; segmentation; Fourier domain processing; and

compression.

CO4 Be able to understand the documentation for, and make use of, the MATLAB library

and MATLAB Digital Image Processing Toolbox (IPT).

CO5 Understand the Image Restoration, Compression, Segmentation, Recognition,

Representation and Description.

Page 66: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DBIT DEHRADUN

LESSON PLAN

SEMESTER/YEAR: VII /IV DEPARTMENT: CSE

COURSE: DIGITAL IMAGE PROCESSING COURSE CODE: TCS-071

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

UNIT - I

1 Motivation and Perspective, Applications T1,R1 1 Chalk &Talk

2 Components of Image Processing System, Element of Visual

Perception

T1,R1 2 Chalk &Talk

3 A Simple Image Model, Sampling and Quantization T1,R1 1 Chalk &Talk

4 Image Enhancement in Spatial Domain: Introduction; Basic

Gray Level Functions

T1,R1 1 Chalk &Talk

5 PiecewiseLinear Transformation Functions: Contrast Stretching T1,R1 1 Chalk &Talk

6. Histogram Specification; Histogram Equalization; Local

Enhancement

T1,R1 1 Chalk &Talk

7 Enhancement using Arithmetic/Logic Operations – Image

Subtraction, Image Averaging

T1,R1 1 Chalk &Talk

8 Basics of Spatial Filtering; Smoothing - Mean filter, Ordered

Statistic Filter; Sharpening – The Laplacian

T1,R1 1 Chalk &Talk

UNIT – II

9 Fourier Transform and the Frequency Domain, Basis of Filtering

in Frequency Domain

T1,R1 2 Chalk &Talk

10 Filters – Low-pass, High-pass; Correspondence Between

Filtering in Spatial and Frequency Domain

T1,R1 2 Chalk &Talk

11 Smoothing Frequency Domain Filters – Gaussian Lowpass

Filters; Sharpening

T1,R1,R2 1 Chalk &Talk

12 Frequency Domain Filters – Gaussian Highpass Filters;

Homomorphic Filtering

T1,R1 2 Chalk &Talk

13 Image Restoration: A Model of Restoration Process, Noise

Models,

T1,R1,R2 2 Chalk &Talk

14 Restoration in the presence of Noise only-Spatial Filtering –

Mean Filters: Arithmetic Mean filter

T1,R1 2 Chalk &Talk

15 Geometric Mean Filter, Order Statistic Filters – Median Filter,

Max and Min filters

T1,R1 1 Chalk &Talk

16 Periodic Noise Reduction by Frequency Domain Filtering –

Bandpass Filters

T1,R1 2 Chalk &Talk

17 Minimum Mean-square Error Restoration T1,R1 1 Chalk &Talk

UNIT – III

18 Color Image Processing Color Fundamentals, Color Models,

Converting Colors to different models

T1,R2 2 Chalk &Talk

19 Color Transformation, Smoothing and Sharpening, Color

Segmentation

T1,R1 1 Chalk &Talk

20 Morphological Image Processing: Introduction, Logic T1,R2 2 Chalk &Talk

Page 67: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Operations involving Binary Images, Dilation and Erosion

21 Opening and Closing, Morphological Algorithms – Boundary

Extraction

T1,R2 2 PPT

22 Region Filling, Extraction of Connected Components T1,R2 2 Chalk &Talk

UNIT – IV

23 Registration Introduction, Geometric Transformation – Plane to

Plane transformation

T2,W2,R1 1 Chalk &Talk

24 Mapping, Stereo Imaging – Algorithms to Establish

Correspondence

T2,W1,W2 2 Chalk &Talk

25 Algorithms to Recover Depth T2,W2,R1 1 Chalk &Talk

26 Segmentation: Introduction, Region Extraction, Pixel-Based

Approach, Multi-level Thresholding

T2,W2,R2 2 Chalk &Talk

27 Local Thresholding, Region-based Approach, Edge and Line

Detection

T2,W2,R2 2 Chalk &Talk

28 Edge Detection, Edge Operators, Pattern Fitting Approach,

Edge Linking and Edge Following

T2,W2 2 PPT

UNIT – V

29 Feature Extraction: Representation, Topological Attributes,

Geometric Attributes

T1,R1,R2 2 Chalk &Talk

30 Description: Boundary-based Description, T1,R1,R2 1 Chalk &Talk

31 Region-based Description, Relationship T1,R1,R2 1 Chalk &Talk

32 Object Recognition: Deterministic Methods, Clustering,

Statistical Classification

T2,W2,R2 2 Chalk &Talk

33 Syntactic Recognition, Tree Search, Graph Matching T2,W2,R2 1 Chalk &Talk

Page 68: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is gray level slicing?

2. What linear transformation will change an image f(x,y) with gray levels ranging from 4

through 18 to an image g(x,y) with gray levels ranging from 10 through 50?

3. Consider the image shown below; compute the equalized image with eight

possible gray levels. Show each step carefully. Draw the histograms of the

original and equalized images as well as the equalization transformation.

1 2 1 1 2 0

0 1 5 1 0 1

1 6 7 6 1 2

4. The gray levels at four pixels are shown below. What would be the gray level

values at a position 1.3 pixels to the right of, and 1.8 of a pixel below, the

upperleft original pixel assuming (i) zero-order interpolation, (ii) first-order

interpolation using average, and (iii) first-order interpolation using a bilinear

function.

1 5

7 15

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 1

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Date of Issue: Date of Submission:

Page 69: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Find the DFT and plot the DFT spectrum (i.e., magnitude) of the discrete signal h(n)

defined as follows: h(n)=1 for n=0,1,2,3,4 and h(n)=0 otherwise.

2. Find the FT of the function f(x) = e−Πx2

3. Find and plot the Fourier transform of f(x)=cos(4πx)cos(6πx) 4. If we were to sample f(x), what would be the largest sampling step that still avoids

aliasing?

5. Find and plot the convolution of the following discrete sequences:

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 2

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 2 Date of Issue: Date of Submission:

Page 70: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Implement the histogram specification technique. It is suggested that you debug your

algorithm using a small “test” image (e.g., 5 x 5) to make sure that it works correctly.

2. Name the categories of Image Enhancement and explain?

3. What Do You Meant By Zooming Of Digital Images?

4. What Do You Meant By Zooming Of Digital Images?

5. What Are The Applications Of Transform?

6. What Are The Properties Of Unitary Transform?

7. Write the expression to find the number of bits to store a digital image?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 3

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 3 Date of Issue: Date of Submission:

Page 71: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Why Might Menu-Driven Interfaces Be Bad?

2. Write The Expression Of One-dimensional Discrete Fourier Transforms?

3. Give The Properties Of One-dimensional Dft?

4. What Is Cosine Transform?

5. Name the Categories of Image Enhancement And Explain?

6. What do you mean by edge and line detection?

7. Why is stereo imaging used for?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 4

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 4 Date of Issue: Date of Submission:

Page 72: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. List the application of color models.

2. How will you recover the depth information?

3. What is simultaneous contrast?

4. What is clustering in object recognition?

5. Write the application of sharpening filters.

6. What are various deterministic methods object Recognition? Also explain their use.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 5

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Issue: Date of Submission:

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : DIGITAL IMAGE PROCESSING Assignment No: 5

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Issue: Date of Submission:

Page 73: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. .List the hardware oriented color models?

2. Define Image Sampling.

3. What is Dynamic Range?

4. Define Mach band effect.

5. What is meant by Tapered Quantization?

6. What is Hue of saturation?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No.1

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: UNIT 1 Date of Discussion:

Page 74: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Write the properties of Hadamard transform.

2. What is recognition and interpretation?

3. What is Image Transform?

4. Give the Conditions for perfect transform.

5. Write the expression of one-dimensional discrete Fourier transforms.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No. 2

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: UNIT 2 Date of Discussion:

Page 75: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is contrast stretching?

2. What is the effect of Mach band pattern?

3. Name the categories of Image Enhancement and explain?

4. What do you mean by Point processing?

5. What is spatial filtering?

6. Define averaging filters.

7. What is a Median filter?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No.3

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: Unit 3 Date of Discussion:

Page 76: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is meant by mutual exclusion?

2. Define Restoration.

3. How a degradation process id modeled?

4. What is homogeneity property and what is the significance of this property?

5. Define circulant matrix.

6. What is the concept behind algebraic approach to restoration?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No. 4

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 4 Date of Discussion:

Page 77: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Which is the most frequent method to overcome the difficulty to formulate thespatial

relocation of pixels?

2. How the blur is removed caused by uniform linear motion?

3. What is inverse filtering?

4. Draw the image observation model.

5. What is run length coding?

6. What are topological attributes of in image extraction?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No. 5

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 5 Date of Discussion:

Page 78: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Write about linking edge points.

2. What are the three types of discontinuity in digital image?

3. How the derivatives are obtained in edge detection during formulation?

4. What is clustering?

5. What is meant by object point and background point?

6. Define region growing.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No. 6

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 4/5 Date of Discussion:

Page 79: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is meant by markers?

2. What are the two principle steps involved in marker selection?

3. What are the demerits of chain code?

4. What is polygonal approximation method?

5. Specify the various polygonal approximation methods.

6. Name few boundary descriptors.

7. Define length of a boundary.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : DIGITAL IMAGE PROCESSING Tutorial Sheet No. 7

Subject Code : TCS -071

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 2/3/4/5 Date of Discussion:

Page 80: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What do you mean by Gray level?

2. What are the steps involved in DIP?

3. What is recognition and Interpretation?

4. Specify the elements of DIP system.

5. What are the types of light receptors?

6. Explain the categories of digital storage?

7. . What is simultaneous contrast?

8. Write short notes on sampling and quantization.

9. Explain Mean filter, Ordered Statistic Filter

10. Explain Sharpening.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : DIGITAL IMAGE PROCESSING

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Page 81: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the properties of 2D Fourier Transform.

2. Explain convolution property in 2D fourier transform.

3. Explain Fast Fourier Transform (FFT) in detail.

4. Discuss the properties and applications of 1)Hadamard transform II) Discrete Cosine

Trnsforms

5. Explain low pass and high pass filters.

6. Differentiate between Gaussian Highpass Filters and Homomorphic Filters

7. Explain Periodic Noise Reduction using band pass filters.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : DIGITAL IMAGE PROCESSING

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT II

Page 82: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Define Image.

2. Define image subtraction.

3. Explain the concept of Morphological Image Processing.

4. What do you mean by boundary extraction? Explain.

5. What are the two approaches for blind image restoration? Explain in detail.

6. Explain Region Filling.

7.With example explain in detail about spatial averaging. Describe in detail about various

types of mean filters.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : DIGITAL IMAGE PROCESSING

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT III

Page 83: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Discuss the following terms

(i) Region merging

(ii) Erosion and dilation

2. How edge detection is performed in digital images using

(a)Laplacian operator

(b)Sobel operator

(c)Prewit oprator and compare their outcomes

3. How morphological processing is applicable for image processing?

4. What do you mean by optimal thresholding? How do you obtain the threshold for image

processing?

5. Explain Different types of thresholding for segmentation

6. What is Geometric Transformation?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : DIGITAL IMAGE PROCESSING

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT IV

Page 84: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Discuss about edge detection and edge linking method in brief.

2. Describe constrained least square filtering for image restoration and derive its transfer

function.

3. How do you link edge pixels through global processing?

4. Describe segmentation algorithm.

5. Explain region based segmentation and region growing with example.

6. Discuss how to construct dams using morphological operations.

7. Explain Syntactic Recognition.

8. Differentiate between Tree Search, Graph Matching.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : DIGITAL IMAGE PROCESSING

Subject Code : TCS -071

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT V

Page 85: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Knowledge of Computer Network

Objective:

1. To increase professional skills in terms of information security management and technology

2. To continually strengthen and improve the overall capabilities of the information security

management system

3. To understand security services and policies under information security

4. Integrity of Data or Systems-System and data integrity relate to the processes, policies, and

controls used to ensure information has not been altered in an unauthorized manner and that

systems are free from unauthorized manipulation that will compromise accuracy, completeness,

and reliability

5. Confidentiality of Data or Systems-Confidentiality covers the processes, policies, and controls

employed to protect information of customers and the institution against unauthorized access or

use.

UNIT I Introduction: Security problem in computing, Secure system characteristics, What to secure –How to secure- at what cost?

Elementary Cryptography – DES – AES – Public Key Encryption – Uses of Encryption.

UNIT II Program Security: Security Programs – Non-malicious Program Errors – Virus and other

Malicious Code – Targeted Malicious Code – Control against program Threats.

UNIT III Security in Operating Systems: Protected Objects and Methods of Protection – Memory and

Address Protection –Control of Access generated Objects – File Protection Mechanisms – User

Authentication – Trusted Operating Systems – Models of Security.

UNIT IV Database and Network Security: Database Security Requirements – reliability and integrity – Sensitive Data – Inference – Multilevel Databases and Multilevel Security – Threats in Networks –Network Security Controls – Firewalls – Intrusion Detection Systems – Secure Email.

UNIT V Administering Security and Ethical Issues: Security Planning – Risk Analysis – Organizational Security Policies – Physical Security – Protecting Programs and Data – Information and the Law –Software Failures – Computer Crime – Privacy – Ethical Issues.

TEXT BOOK

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title: INFORMATION SECURITY Course Code: TCS -084 Duration of External Exam: 3

Hours

Page 86: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Charles B. Pfleeger, and Shari Lawrence Pfleeger, “Security in Computing”, Pearson

Education, Third edition, 2003.

REFERENCES 1. Matt Bishop, “Computer Security – Art and Science”, Pearson Education,

First edition, 2003.

2. William Stallings, “Cryptography and Network Security – Principles and Practices”, Prentice-Hall of India, Third edition, 2003.

3. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.

Course Outcome Description

CO1 Have a strong background of appropriate techniques to tackle and solve

problems in the discipline of information security management.

CO2 Describe the significant differences between security considerations for email

over a public network and encrypted traffic over a wireless local area network.

CO3 How an information security management system should be planned,

documented, implemented and improved, according to the BSi standard on

information security management how an information security management

system should be planned, documented, implemented and improved, according

to the BSI standard on information security management.

CO4 Explain the differences between the three major goals of information security:

confidentiality, integrity and availability, and can list and explain one

technique for ensuring each.

CO5 Ability to understand ethical issues of the network and making the information

secure.

Page 87: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DBIT DEHRADUN

LESSON PLAN

SEMESTER/YEAR: VII /IV DEPARTMENT: CSE

COURSE: INFORMATION SECURITY COURSE CODE: TCS-074

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

UNIT - I

1 Introduction: Security problem in computing, Secure system

characteristics-What to secure –How to secure- at what cost

T1,R1 1 Chalk &Talk

2 Elementary Cryptography – DES T2,R2 2 Chalk &Talk

3 AES – Public Key Encryption T1,R2 1 Chalk &Talk

4 Uses of Encryption T2,R2 1 Chalk &Talk

UNIT – II

5 Program Security: Security Programs – Non-malicious Program

Errors

T2,R2 2 Chalk &Talk

6 Virus and other Malicious Code – Targeted Malicious Code T2,R1 2 Chalk &Talk

7 Control against program Threats T1,R1,R2 1 Chalk &Talk

UNIT – III

8 Security in Operating Systems: Protected Objects and Methods

of Protection

T1,R2 2 Chalk &Talk

9 Memory and Address Protection –Control of Access generated

Objects

T2,R2 2 Chalk &Talk

10 File Protection Mechanisms – User Authentication T1,R1 1 Chalk &Talk

11 Trusted Operating Systems – Models of Security T2,R2 2 PPT

UNIT – IV

12 Database and Network Security: Database Security T2,W2,R1 1 Chalk &Talk

13 Requirements – reliability and integrity T2,W1,W2 1 Chalk &Talk

14 Sensitive Data – Inference – Multilevel Databases T2,W2,R1 1 Chalk &Talk

15 Multilevel Security – Threats in Networks T2,W2,R2 2 Chalk &Talk

16 Network Security Controls – Firewalls T2,W2,R2 1 Chalk &Talk

17 Intrusion Detection Systems – Secure Email. T2,W2 2 PPT

UNIT – V

18 Administering Security and Ethical Issues: Security Planning –

Risk Analysis

T1,R1,R2 2 Chalk &Talk

Page 88: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

19 Organizational Security Policies – Physical Security T1,R1,R2 1 Chalk &Talk

20 Protecting Programs and Data – Information and the Law T1,R1,R2 1 Chalk &Talk

21 Software Failures – Computer Crime – Privacy – Ethical Issues T2,W2,R2 2 Chalk &Talk

Total Lectures: 30

REMARKS/RECOMMENDATIONS FOR FUTURE:

EXTRA CLASS TAKEN (IF ANY):

TEXT BOOKS:

[T1]. Charles B. Pfleeger, and Shari Lawrence Pfleeger, “Security in Computing”, Pearson Education, Third edition,

2003

[T2]. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.

REFERENCE BOOKS:

[R1]. Matt Bishop, Computer Security – Art and Science , Pearson Education, First edition, 2003

[R2]. William Stallings, Cryptography and Network Security – Principles and Practices , Prentice-Hall of India, Third

edition, 2003

WEB RESOURCE:

1: https://www.coursera.org/courses?languages=en&query=information%20security

2: https://www.infosecinstitute.com/topics/information-security

3: www.cyberdegrees.org/resources/free-online-courses/

Signature of HOD:__________

Date: __________

Page 89: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain DES and RSA alogorithms.

2. Discuss security problems in computing.

3. What are secure system characteristics?

4. What is public key encryption?

5. Mention what is data leakage? What are the factors that can cause data leakage?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : INFORMATION SECURITY Assignment No: 1

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Date of Issue: Date of Submission:

Page 90: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are ASSET risks?

2. Mention what are personal traits you should consider protecting data?

3. Explain what is phishing? How it can be prevented?

4. Mention what are web server vulnerabilities?

5. For security analyst what are the useful certifications?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : INFORMATION SECURITY Assignment No: 2

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 2 Date of Issue: Date of Submission:

Page 91: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1.How do you change your DNS settings in Linux/Windows?

2. Describe the process of a TLS session being set up when someone visits a secure website.

3.If someone steals the server’s private key can they decrypt all previous content sent to that

server?

4.What are some common ways that TLS is attack, and/or what are some ways it’s been

attacked in the past?

5.What is Forward Secrecy?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : INFORMATION SECURITY Assignment No: 3

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 3

Date of Issue: Date of Submission:

Page 92: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are implementation issues in Firewall?

2. What’s the difference between encoding, encryption, and hashing?

` 3. What’s more secure, SSL or HTTPS?

4. What’s the difference between symmetric and public-key cryptography?

5. What are reliability and integrity issues in network security?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : INFORMATION SECURITY Assignment No: 4

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 4

Date of Issue: Date of Submission:

Page 93: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What do you mean by ethical hacking?

2. Explain Cyber law.

3. How do you classify information security risks across an organization?

4. Why would you want to use SSH from a Windows pc?

5. What is data protection in transit vs data protection at rest?

6. What is administrative level security?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : INFORMATION SECURITY Assignment No: 5

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Issue: Date of Submission:

Page 94: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. On a Windows network, why is it easier to break into a local account than an AD

account?

2. What is the CIA triangle?

3. What is the difference between an HIDS and a NIDS?

4. You find out that there is an active problem on your network. You can fix it, but it is out

of your jurisdiction. What do you do?

5. You are an employee for a tech department in a non-management position. A high-level

executive demands that you break protocol and allow him to use his home laptop at work.

What do you do?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No.1

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VII

Unit/Title: UNIT 1 Date of Discussion:

Page 95: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What’s the difference between Symmetric and Asymmetric encryption?

2. What is SSL and why is it not enough when it comes to encryption?

3. How would you find out what a POST code means?

4. How would you login to Active Directory from a Linux or Mac box?

5. How would you judge if a remote server is running IIS or Apache?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No. 2

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VI

Unit/Title: UNIT 2 Date of Discussion:

Page 96: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What’s the difference between Diffie-Hellman and RSA?

2. What kind of attack is a standard Diffie-Hellman exchange vulnerable to?

3. How would you implement a secure login field on a high traffic website where

performance is a consideration?

4. What is the difference between HTTP and HTML

5. What’s the goal of information security within an organization?.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No.3

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VII

Unit/Title: Unit 3 Date of Discussion:

Page 97: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Describe a UNIX traceroute hitting google.com at all seven layers of the OSI model.

Declare the structure for monitors.

2. Explain file protection mechanism.

3. What practical controls can be put in place to minimise the risk?

4. What are operational risks?

5. What are communications security risks?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No. 4

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VII

Unit/Title: 3 Date of Discussion:

Page 98: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are the primary design flaws in HTTP, and how would you improve it?

2. If you could re-design TCP, what would you fix?

3. What is the one feature you would add to DNS to improve it the most?

4. What is likely to be the primary protocol used for the Internet of Things in 10 years?

5. What are some common ways that TLS is attack, and/or what are some ways it’s been

attacked in the past?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No. 5

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VII

Unit/Title: 4 Date of Discussion:

Page 99: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. How do you evaluate the risk of a security flaw you find in a network?

2. How Vulnerability assessment done on Windows machines using various tools?

3. Differentiate between tokenization and encryption.

4. What is anonymous FTP?

5. A software company owns four branches and Internet connection is available at every

branch what will be required to build a Virtual Private Network between them and how it

will be done.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No. 6

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VI

Unit/Title: 5 Date of Discussion:

Page 100: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Describe the packet flow of ASA between 2 different sites via L2L VPN with nat control

enabled.

2. What is sensitive data?

3. What are Brute Force Attacks?

4. What are the differences among encoding, encryption and hashing?

5. What makes the technology moving to a threatened world?

6. What are advanced encryption standards?

7. Is performing virtual assistant important?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : INFORMATION SECURITY Tutorial Sheet No. 7

Subject Code : TCS-074

Faculty : Mr. Himanshu Dewedi

Branch: CSE

Semester: VII

Unit/Title: 3/4/5 Date of Discussion:

Page 101: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. With a neat block diagram explain the single round of DES algorithm.

2. Explain the various modes in which DES can be used for different applications.

3. What is an intrusion? Briefly write about any eight IDPS terminologies.

4. What are the differences between digital signature and digital certificate?

5. What is an encryption? Discuss the symmetric and asymmetric encryption methods?

6. Who can attack cryptosystems? Discuss different categories of attacks on cryptosystems.

7. What are the components of information system?

8. Differentiate between DES and AES algorithms.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : INFORMATION SECURITY

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Page 102: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are the differences between active and passive security attacks?

2. What is meant by information security? Discuss the three aspects of information security.

3. Briefly explain the four types of security attacks that are normally encountered .Also

distinguish between active and passive attacks.

4. What is a brute force attack?

5. What are the two levels of alerts? List the alerts under them?

6. Discuss how SSL record protocol provides confidentiality and message integrity for SSL

connections?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : INFORMATION SECURITY

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch:CSE Semester: 7th

Unit/Title: UNIT II

Page 103: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1.Describe the need of operating system detecting tools.

2.With a neat diagram, explain network security model.

3.Describe the benefits of IPSec.

4.What are sniffers?

5. Define a Security attack. Explain in detail about the various types of attacks an Internetwork

is vulnerable to.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : INFORMATION SECURITY

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch:CSE Semester: 7th

Unit/Title: UNIT III

Page 104: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the firewall rules.

2. Explain the screened subnet firewall.

3. What is a firewall? Show the working of a screened host and dual homed firewalls.

4. What is VPN? Explain two modes of a VPN.

5. Explain network based intrusion detection and prevention

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : INFORMATION SECURITY

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT IV

Page 105: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Write short notes on: 1) SSL handshake protocol 2) SSL alert protocol.

2. What are the services provided by SSL record protocol? Describe the operation of this

protocol, with suitable illustration.

3. Explain the format of an ESP packet in IP Security.

4. What are the general categories of unethical and illegal behavior?

5. Explain the substitution techniques a) Ceaser Cipher b) Play Fair Cipher c) Hill Cipher

6. Explain the various web security threats?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : INFORMATION SECURITY

Subject Code : TCS -074

Faculty : Mr. Himanshu Dewedi

Branch: CSE Semester: 7th

Unit/Title: UNIT V

Page 106: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: To understand fundamentals of Fuzzy logic and artificial neural network.

Objective: 1.Understand basics of fuzzy system, genetic algorithms & their relations.

2.Learn artificial neural n/ws, models 7 their functions.

3.Apply genetic algorithms & artificial neural N/ws as computation tools to solve a variety of problems in various

areas of interest ranging from optimization problems to text analytics.

Unit –I Introduction to soft computing. Applications of Artificial Neural Networks, fuzzy logic,

genetic algorithms and other soft-computing techniques. Their strengths and weaknesses.

Synergy of soft computing techniques. Artificial neural networks : over view of history,

Mathematical Models of Neurons, ANN architecture.

Unit-II

Introduction to artificial neural network

Neural Networks: Learning rules, Learning Paradigms-Supervised, Unsupervised and

reinforcement Learning, ANN training Algorithms-perceptions, Training rules, Delta, Back

Propagation Algorithm, Multilayer Perceptron Model, Competitive learning networks, Kohonen

self organizing networks, Hebbian learning; Hopfield Networks,

Unit-III

Fuzzy Logic: Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets,

Membership Function, Fuzzy rule generation. Operations on Fuzzy Sets: Compliment,

Intersections, Unions, Combinations of Operations, Aggregation Operations. Fuzzy Arithmetic:

Fuzzy Numbers, Linguistic Variables, Arithmetic Operations on Intervals & Numbers, Lattice of

Fuzzy Numbers, Fuzzy Equations.

Unit - IV

Genetic algorithms(Gas), Evolution strategies(Ess), Evolutionary programming(EP), Genetic

Programming(GP),Selecting, crossover, mutation, schema analysis, analysis of selection

algorithms; convergence; Markov & other stochastic models.

Unit - V

Other Soft computing approaches Simulated Annealing, Tabu Search, Ant colony based

optimization.

Text:

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit:

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title : SOFT COMPUTING Course Code: TCS-072/TIT-074 Duration of External Exam: 3

Hours

Page 107: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. “Neuro-Fuzzy and Soft computing”, Jang, Sun, Mizutani, Pearson

2. “Neural networks: a comprehensive foundation”, Haykin,

3. “Genetic Algorithms”, Goldberg,

4. “Fuzzy Sets & Fuzzy Logic”, G.J. Klir & B. Yuan, PHI.

Reference:

1. Anderson J.A., “An Introduction to Neural Networks”, PHI, 1999

2. Hertz J. Krogh, R.G. Palmer, “Introduction to the Theory of Neural Computation”, Addison- Wesley, California,

3. Melanie Mitchell, “An Introduction to Genetic Algorithm”, PHI, 1998.

4. “Neural Networks-A Comprehensive Foundations”, Prentice-Hall International, New Jersey,

1999

5. Freeman J.A. & D.M. Skapura, “Neural Networks: Algorithms, Applications and

Programming Techniques”, Addison Wesley, Reading, Mass, (1992).

Course Outcome Description

CO1 To explain the fuzzy sets, fuzzy logic systems and its various applications in real life

problem solving.

CO2 To illustrate the concept of Artificial Neural Network and its applications.

CO3 To discuss on the concept of Fuzzy logic.

CO4 To discuss on the concept of Genetic Algorithm and its various applications

CO5 To elaborate the basics of Simulated Annealing, Tabu search, Ant colony optimization

(ACO), Particle Swarm Optimization (PSO).

Page 108: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DBIT DEHRADUN

LESSON PLAN

SEMESTER/YEAR: VII /IV DEPARTMENT: CSE

COURSE: SOFT COMPUTING COURSE CODE: TCS-072

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

UNIT - I

1 Introduction to soft computing T1,R1 1 Chalk &Talk

2 Applications of Artificial Neural Networks, fuzzy logic T1,R1 1 Chalk &Talk

3 genetic algorithms and other soft-computing techniques and

their strengths and weaknesses

T1,R1 1 Chalk &Talk

4 Synergy of soft computing techniques T1,R1 1 Chalk &Talk

5 Artificial neural networks : over view of history, Mathematical

Models of Neurons, ANN architecture

T1,R1 2 Chalk &Talk

UNIT – II

6 Neural Networks: Learning rules, Learning Paradigms-

Supervised, Unsupervised and reinforcement Learning

T1,R1 2 Chalk &Talk

7 ANN training Algorithms-perceptions, Training rules T1,R1 1 Chalk &Talk

8 Delta, Back Propagation Algorithm, Multilayer Perceptron

Model

T1,R1,R2 1 Chalk &Talk

9 Competitive learning networks, Kohonen self organizing

networks

T1,R1 2 Chalk &Talk

10 Hebbian learning; Hopfield Networks T1,R1,R2 2 Chalk &Talk

UNIT – III

11 Fuzzy Logic: Introduction to Fuzzy Logic, Classical and Fuzzy Sets T1,R2 2 Chalk &Talk

12 Overview of Classical Sets, Membership Function, Fuzzy rule

generation

T1,R1 1 Chalk &Talk

13 Operations on Fuzzy Sets: Compliment, Intersections, Unions,

Combinations of Operations

T1,R2 1 Chalk &Talk

14 Aggregation Operations. Fuzzy Arithmetic: Fuzzy Numbers,

Linguistic Variables

T1,R2 1 PPT

15 Arithmetic Operations on Intervals & Numbers T1,R2 1 Chalk &Talk

16 Lattice of Fuzzy Numbers, Fuzzy Equations T1,R1,R2 2 Chalk &Talk

UNIT – IV

17 Genetic algorithms(Gas), Evolution strategies(Ess) T2,W2,R1 1 Chalk &Talk

Page 109: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

18 Evolutionary programming(EP), Genetic Programming(GP) T2,W1,W2 1 Chalk &Talk

19 Selecting, crossover, mutation, schema analysis T2,W2,R1 1 Chalk &Talk

20 analysis of selection algorithms T2,W2,R2 1 Chalk &Talk

21 convergence; Markov & other stochastic models. T2,W2,R2 2 Chalk &Talk

UNIT – V

22 Other Soft computing approaches T1,R1,R2 1 Chalk &Talk

23 Simulated Annealing T1,R1,R2 1 Chalk &Talk

24 Tabu Search T1,R1,R2 1 Chalk &Talk

25 Ant colony based optimization T2,W2,R2 2 Chalk &Talk

Total Lectures: 27

REMARKS/RECOMMENDATIONS FOR FUTURE:

EXTRA CLASS TAKEN (IF ANY):

TEXT BOOKS:

[T1]. “Neuro-Fuzzy and Soft computing”, Jang, Sun, Mizutani, Pearson

[T2]. “Neural networks: a comprehensive foundation”, Haykin, REFERENCE BOOKS:

[R1 Anderson J.A., An Introduction to Neural Networks , PHI, 1999

[R2]. Neural Networks-A Comprehensive Foundations , Prentice-Hall International, New Jersey, 1999

WEB RESOURCE:

1:http://www.howtogeek.com/

2:https://www.cs.uic.edu

3:https:// https://onlinecourses.nptel.ac.in/noc18_cs13

Page 110: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is the role a transfer function in artificial neural networks?

2. Draw a 4-5-1 artificial neural network.

3. Compare between soft computing and hard computing.

4. Discuss various applications of artificial neural networks.

5. Write short notes on (a) transfer functions (b) recurrent neural networks.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : SOFT COMPUTING Assignment No: 1

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Date of Issue: Date of Submission:

Page 111: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Write a short note on RBF network.

2. Explain error back propagation training algorithm with the help of a flowchart.

3. Write a short note on Learning vector Quantization.

4. Write a short note on Character Recognition using neural network.

5. Write a short note on Kohonen self organizing network.

6. What is supervised and unsupervised learning? Compare different learning rules.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : SOFT COMPUTING Assignment No: 2

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 2 Date of Issue: Date of Submission:

Page 112: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain the different Fuzzy membership function.

2. Explain cylindrical extension and projection operation of fuzzy relation with example.

3. A neuron with 3 inputs has the weight vector w=[0.1, 0.3 -0.2]. The activation function is

binary sigmoidal activation function. If input vector is [0.8 0.6 0.4] then find the output of

neuron.

4. Explain the Radial Basis function neural network for the solution of XOR.

5. Compare Mamdani and Sugeno fuzzy models.

6. Write any two fuzzy membership functions with diagrams.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : SOFT COMPUTING Assignment No: 3

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 3

Date of Issue: Date of Submission:

Page 113: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain Genetic algorithm with the help of example.

2. Compare between soft computing and hard computing.

3. Why do we use a mutation in genetic algorithm?

4. Draw any binary and real valued chromosome in a genetic algorithm.

5. What is particle swarm optimization?

6. What is Markov model? Explain.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : SOFT COMPUTING Assignment No: 4

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 4 Date of Issue: Date of Submission:

Page 114: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are alpha cuts and strong alpha cuts, explain by taking any suitable example.

2. Write a short note on TSP using simulated Annealing.

3. What are the various types of Mutation techniques?

4. Explain Travelling salesperson problem using simulated Annealing.

5. Learning vector quantization.

6. Derivative based optimization.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Subject Name : SOFT COMPUTING Assignment No: 5

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 5

Date of Issue: Date of Submission:

Page 115: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. How many types of random variables are available? Which systems are called tightly

coupled systems?

2. Name any four techniques used in soft computing.

3. What is a fuzzy number?

4. What is the role a transfer function in artificial neural networks?

5. What are the 2 types of learning?

6. Supervised Learning is

A. learning with the help of examples

B. learning without teacher

C. learning with the help of teacher

D. learning with computers as supervisor

7. Unsupervised learning is

A. learning without computers

B. problem based learning

C. learning from environment

D. learning from teachers

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No.1

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: UNIT 1 Date of Discussion:

Page 116: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th
Page 117: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Conventional Artificial Intelligence is different from soft computing in which sense?

2. In Sugeno Fuzzy model the first order polynomial is a constant the model is of which

order?

3. In which type of partitioning does orthogonality hold in XxY but not in X, Y alone?

4. In Fuzzy modeling the Second Stage is the Identi6ication of which structure?

5. ANN is composed of large number of highly interconnected processing elements(neurons)

working in unison to solve problems.(T/F)

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No. 2

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: UNIT 1 Date of Discussion:

Page 118: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What is process and process control block (PCB)? Explain its different states.

2. Artificial neural network used for

A. Pattern Recognition

B. Classification

C. Clustering

D. All of these

3. A Neural Network can answer

A. For Loop questions

B. what-if questions

C. IF-The-Else Analysis Questions

D. None of these

4. Ability to learn how to do tasks based on the data given for training or initial experience

A. Self Organization

B. Adaptive Learning

C. Fault tolerance

D. Robustness

5.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No.3

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: Unit 2 Date of Discussion:

Page 119: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are linguistic variables?

2. Feature of ANN in which ANN creates its own organization or representation of

information it receives during learning time is

A. Adaptive Learning

B. Self Organization

C. What-If Analysis

D. Supervised Learniing

3. What is soft computing? Explain the main components of soft computing paradigm.

4. What are hybrid systems? Explain the types of hybrid systems.

5. Compare and contrast artificial neurons with biological neurons.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No. 4

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 3 Date of Discussion:

Page 120: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain how fuzzy logic is different from classical two-valued logic.

2. Explain the applications of fuzzy logic in control systems.

3. Explain the types of Neural Network architecture with diagram.

4. What is Adaptive Resonance Theory? Explain the structure of ART 1.

5. Explain the main neuron signal functions commonly used.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No. 5

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 4 Date of Discussion:

Page 121: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. What are advantages and disadvantages of TABU search?

2. What is Associative Memory? Explain the types of Associative Memory.

3. Explain Counterpropagation learning process.

4. Explain Individual Decision making model.

5. Describe the stages in the development of expert systems.

6. Explain the working of ant-colony systems.

7. Give an account of various tools used in expert systems.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN TUTORIAL SHEET

Subject Name : SOFT COMPUTING Tutorial Sheet No. 6

Subject Code : TCS-072

Faculty :

Branch: CSE

Semester: VII

Unit/Title: 5 Date of Discussion:

Page 122: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain Neural Network architecture.

2. Explain model of an artificial neuron.

3. Explain Unsupervised Learning Neural Networks.

4. Explain Competitive Learning Networks.

5. Explain Fuzzy Rule based system.

6. Explain Mathematical Models of Neurons.

7. Difference between Traditional Algorithms and Genetic Algorithm.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : SOFT COMPUTING

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT 1

Page 123: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain learning in neural network..

2. Explain back propagation algorithm.

3. Explain Kohonen Self-Organizing Networks.

4. Write application of neural network.

5. Explain Cross Over process.

6. Write applications for Adaptive Systems.

7. Explain fuzzy associative memory.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : SOFT COMPUTING

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT II

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : SOFT COMPUTING

Page 124: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1.Explain basic Fuzzy Set Operations..

2.Explain Fuzzy Inference Systems.

3.Differentiate between fuzzy and crisp sets.

4.Write application of Fuzzy logic.

5.Explain Fuzzy Relations.

6.Explain Fuzzy Reasoning.

7.Explain Neuro-Fuzzy Systems.

8.Write the membership functions corresponding to the fuzzy sets. Hence answer the question:

How cool is 36F?

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT III

Page 125: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Explain Boltzman selection.

2. Explain Neuro-Genetic hybrid Systems.

3. Explain the operational summary of genetic algorithm.

4. Give an account of various tools used in expert systems.

5. What is defuzzification and what are the advantages of Fuzzy controller?

6. Define mutation.

7. What is the main function of cross over operation in Genetic Algorithm?

8. State the different selection methods in GA.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : SOFT COMPUTING

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT IV

Page 126: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

1. Define the term cross over rate in GA. and Define mutation rate in GA.

2. Explain TABU search.

3. Explain Cross Over process.

4. How does the ANT colony optimization differ from evolutionary program of GA.?

5. What are the parameters of GA?

6. Mention the role of fitness function in GA and what are the requirements of GA.

7. What are the limitations of GA? And when does one go for GA?

8. Mention some applications of Ant colony search.

9. What are the disadvantages of ANT algorithm?

10. What ware the components and the characteristics of TABU search?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN QUESTION BANK

Subject Name : SOFT COMPUTING

Subject Code : TCS -072

Faculty :

Branch: CSE Semester: 7th

Unit/Title: UNIT V

Page 127: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Prerequisite: Basic knowledge of products, quality of Product

Objective:

1.Knowledge of various quality standards.

2.Knowledge of registration and accreditation in quality system-certification

Introduction Definition, need of quality systems, role of quality standards, stages of quality assurance

systems. Quality charts, control charts for variables and attributes, acceptance sampling.

Quality Systems Overall responsibility for progress of quality systems. quality manuals, procedures and role of

auditing, auditing for conformance versus quality for effectiveness, auditing a tool for quality

improvement. ISO 9000 quality systems, British Standards BS5750/ISO 9000 origin of standards,

requirements, issues associated with implementation.

Registration Registration and accreditation in quality system-certification, approval, registration of leading

accessors.

Recommended Books: 1. Mohamed Isiri, " Total Quality Management for Engineers". 2. Juran, J., " Quality Planning and Analysis, Mc -Graw Hill. 3. James R. Evans,& J.W. Dean," Total Quality-management, Organization and

Strategy," Thomson Asia Pvt. Ltd., Singapore.

Course Outcome Description

CO1 Have the knowledge of quality system, quality chart and control chart for

variable and attributes

CO2 Study about the overall responsibility for progress of quality system.

CO3 Study about registration and accreditation in quality system-certification and

approval

Dev Bhoomi Institute Of Technology

SEMESTER: IV

Department of Computer Science & Engineering

Course Level: Beginner Course Type: Core Credit: 4

Total Contact Hours: 40 LTP -3-1-0 External Marks/Internal Marks:

100/50

Course Title : QUALITY SYSTEM &

MANAGEMENT

Course Code: TOE-08 Duration of External Exam: 3

Hours

Page 128: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

DBIT DEHRADUN

LESSON PLAN

SEMESTER/YEAR: 8th

/4th

DEPARTMENT : CSE

COURSE: Quality System and Management COURSE CODE: TOE-08

S.

No.

Topic Name

Reference/

Text Book/

Web

(R/T/W)

No. Of

Lectures

Delivery

Method

Remarks

1. Definition, need of quality systems T1, R1 1 Discussion

2. Role of quality standards,stages of quality assurance systems T1, R2 2 PPT

3. Quality charts T1, R1 2 PPT

4. Control charts for variables and attributes T1, R2 2 PPT

5. Acceptance sampling T1, R1 1 PPT

6. Overall responsibility for progress of quality systems T1, R2 2 Chalk &Talk

7. Quality manuals T1, R1 1 Chalk &Talk

8. Procedures and role of auditing T1, R2 2 PPT

9. Auditing for conformance versus quality for effectiveness T1, R1 1 Chalk &Talk

10. Auditing a tool for quality improvement T1, R2 2 Discussion

11. ISO 9000 quality systems T1, R2 2 Chalk &Talk

12. British Standards BS5750/ISO 9000 origin of standards T1, R2 2 PPT

13. Requirements, issues associated with implementation T1, R1 1 Chalk &Talk

14. Registration and accreditation in quality system-certification T1, R2 1 Chalk &Talk

15. Approval of quality system-certification T1, R3 1 Chalk &Talk

16. Registration of leading accessors T1, R1 2 PPT

Total Lectures: 25

REMARKS/RECOMMENDATIONS FOR FUTURE:

EXTRA CLASS TAKEN (IF ANY):

TEXT BOOKS:

[T1] Total Quality Management - K.Shridhara Bhatt

REFERENCE BOOKS:

[R1] Mohamed Isiri, " Total Quality Management for Engineers".

[R2] Juran, J., " Quality Planning and Analysis, Mc -Graw Hill.

[R3] James R. Evans,& J.W. Dean," Total Quality-management, Organization and Strategy,"Thomson Asia Pvt.

Ltd., Singapore.

Signature of HOD:__________

Date: __________

Page 129: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 Explain quality manuals.

Q2 Explain acceptance sampling.

Q3 What is zero defect concept

Q4 What are the various needs of quality systems?

Q5 What is quality assurance? What are the objectives of quality assurance?

Q6 What are control charts? Write the differences between variable and attribute with example.

Explain the importance of quality in detail

Q7 What is Audit execution.

Q8 What are the steps for implementing zero defect program?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: B Tech Assignment No. 1

Course Code:TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Quality, Acceptance Sampling, Zero Defect Concept Date of Issue: Date of Submission:

Page 130: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1What are the three principles of quality assurance? Explain.

Q2What are the different steps of quality control procedure?

Q3What are variables ? Give Examples.

Q4What are the three Basic applications of control charts.

Q5Explain the following terms in any quality audit in Short:

(a) Client

(b) Auditor

(c) Audience

Q6What do you think “Audit is necessary in an organization or not” justify.

Q7what is the difference between defect and defective. Give examples.

Q8 What are the elements of total quality system?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: B Tech Assignment No. 2

Course Code:TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: QualityAssurance, Total Quality System, Defect &

Defectives

Date of Issue: Date of Submission:

Page 131: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1What is the difference between new quality and old quality?

Q2What is quality assurance? What are the objectives of quality assurance?

Q3What do you understand by quality? what are the benefits of quality to a firm? What is the role of quality

standards?

Q4Define acceptance Sampling in detail? What are the different types of acceptance inspection? Explain in detail

with advantages and disadvantages.

Q5Construct the number of defect chart for the following data.

Sample number number of defect sample number number of defect

1 2 11 0

2 3 12 1

3 0 13 0

4 1 14 2

5 3 15 4

6 5 16 1

7 3 17 2

8 1 18 0

9 2 19 3

10 2 20 2

Q6 What is the difference between ‘p’ chart and ‘np’ chart? why would an ‘np’ chart be used? Also explain

difference between ‘c’ chart and ‘u’’ chart.

Q7 What do you mean by registration and accreditation in quality system? Explain in brief.

Q8 Explain the process of implementation and registration in ISO.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: B Tech Assignment No. 3

Course Code: TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Control Charts, ISO Date of Issue: Date of Submission:

Page 132: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 Construct a fraction defective chart for the following data. The sample size is n=100 for each sample

of the 20 samples.

Sample number number of defectives sample number number of defectives

1 6 11 6

2 5 12 1

3 0 13 8

4 1 14 7

5 4 15 5

6 2 16 4

7 5 17 11

8 3 18 3

9 3 19 0

10 2 20 4

Q2 Write a short note on TYPE ONE ERROR and TYPE TWO ERROR.

Q3 Differentiate between maintainability and reliability.

Q4 What conditions could make acceptance sampling appropriate?

Q5 Differentiate between:

A) Efficiency and Effectiveness

B) Random and assignable causes

C) Variable charts and attribute charts

D) Type A OC(operating characteristics)Curve and Type B OC Curve

Q6 Explain the contribution of Gilb’s and his quality.

Q7 What are the advantages of having ISO certification?

Q8 What do you mean by Statistical process control and discuss its advantages?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name: B Tech Assignment No. 4

Course Code:TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Defective Charts, Statistical Process Control Date of Issue: Date of Submission:

Page 133: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 Define elements or Stages of quality assurance systems.

Q2 Give procedure of quality audit work .

Q3 What are the sources of variation which we consider in control charts?

Q4 What are the different stages of Quality audit.

Q5 What are the different elements of ISO 9000 series requirements?

Q6 Define certification process.

Q7 What are the various needs of quality systems.

Q8 Define Quality Audit as given by ISO 9402-1986.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN ASSIGNMENT SHEET

Course Name:B Tech Assignment No. 5

Course Code:TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Audit, Certification Process Date of Issue: Date of Submission:

Page 134: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 Explain acceptance sampling with its advantages and disadvantages.

Q2 Write short notes on quality policy and quality manuals

Q3 What is quality assurance? What are the objectives of quality assurance?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial

Course Name : B Tech Tutorial No. 1

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Acceptance Sampling

Date of Conduction:

Page 135: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 What are control charts? Write the differences between variable and attribute with example.

Q2 Explain the zero defect concept.What are the steps for implementing zero defect program?

Q3 Define quality system as defined by American society for quality control.What are the

various needs of quality systems?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial

Course Name : B Tech Tutorial No. . 2

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Control chart

Date of Conduction:

Page 136: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 What do you think “Audit is necessary in an organization or not” justify.

Q2 Define quality charts.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial

Course Name : B Tech Tutorial No. 3

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Audit

Date of Conduction:

Page 137: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 Define barriers in ISO implementation ?

Q2 What are the elements of total quality system?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial

Course Name : B Tech Tutorial No. 4

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Total Quality System

Date of Conduction:

Page 138: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 What do you mean by registration and accreditation in quality system? Explain in brief.

Q2 Write a short note on TYPE ONE ERROR and TYPE TWO ERROR.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN Tutorial

Course Name : B Tech Tutorial No. 5

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Registration & Accredation

Date of Conduction:

Page 139: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 What are the various needs of quality systems?

Q2 What is quality assurance? What are the objectives of quality assurance?

Q3 What are control charts? Write the differences between variable and attribute with example.

Q4.Explain the importance of quality in detail

Q5 What is Audit execution.

Q6 What are the steps for implementing zero defect program?

Q7.Explain acceptance sampling with its advantages and disadvantages.

Q8.Write short notes on quality policy and quality manuals

Q9.What is quality assurance? What are the objectives of quality assurance?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Question Bank

Course Name : B Tech Question Bank No. 1

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Acceptance Sampling

Date of Conduction:

Page 140: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. What are control charts? Write the differences between variable and attribute with example.

Q2 Explain the zero defect concept.What are the steps for implementing zero defect program?

Q3 Define quality system as defined by American society for quality control.What are the

various needs of quality systems?

Q4. What are the three principles of quality assurance? Explain.

Q5.What are the different steps of quality control procedure?

Q7.What are variables ? Give Examples.

Q8.What are the three Basic applications of control charts.

Q9.Explain the following terms in any quality audit in Short:

(d) Client

(e) Auditor

(f) Audience

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Question Bank

Course Name : B Tech Question Bank No. 2

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Control chart

Date of Conduction:

Page 141: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1. What is quality assurance? What are the objectives of quality assurance?

Q2. What do you understand by quality? what are the benefits of quality to a firm? What is the

role of quality standards?

Q3. Define acceptance Sampling in detail? What are the different types of acceptance

inspection? Explain in detail with advantages and disadvantages

Q4. What do you think “Audit is necessary in an organization or not” justify.

Q5. Define quality charts.

Q6 What is the difference between ‘p’ chart and ‘np’ chart? why would an ‘np’ chart be used?

Also explain difference between ‘c’ chart and ‘u’’ chart.

Q7 What do you mean by registration and accreditation in quality system? Explain in brief.

Q8 Explain the process of implementation and registration in ISO.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Question Bank

Course Name : B Tech Question Bank No. 3

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Audit

Date of Conduction:

Page 142: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1, Write a short note on TYPE ONE ERROR and TYPE TWO ERROR.

Q2. Differentiate between maintainability and reliability.

Q3 What conditions could make acceptance sampling appropriate?

Q4. Differentiate between:

E) Efficiency and Effectiveness

F) Random and assignable causes

G) Variable charts and attribute charts

H) Type A OC(operating characteristics)Curve and Type B OC Curve

Q5. Explain the contribution of Gilb’s and his quality.

Q6. What are the advantages of having ISO certification?

Q7. What do you mean by Statistical process control and discuss its advantages?

Q8. Define barriers in ISO implementation ?

Q9.What are the elements of total quality system?

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Question Bank

Course Name : B Tech Question Bank No. 4

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Total Quality System

Date of Conduction:

Page 143: DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN · DEV BHOOMI INSTITUTE OF TECHNOLOGY DEHRADUN Department of Computer Science and Engineering HAND BOOK Session 2017- 18 Class :7th Sem/4th

Q1 What are the different stages of Quality audit.

Q2. What are the different elements of ISO 9000 series requirements?

Q3 Define certification process.

Q4 What are the various needs of quality systems.

Q5 Define Quality Audit as given by ISO 9402-1986.

Q6.What do you mean by registration and accreditation in quality system? Explain in brief.

Q7. Write a short note on TYPE ONE ERROR and TYPE TWO ERROR.

DEV BHOOMI INSTITUTE OF TECHNOLOGY, DEHRADUN

Question Bank

Course Name : B Tech Question Bank No. 5

Course Code : TOE-08

Faculty : HIMANSHU KUMAR DIWEDI

Branch: CSE Semester: 7th

Unit/Title: Registration & Accredation

Date of Conduction: