student hand book for iv b.tech i sem - mlritm hand...student hand book for iv b.tech i sem computer...

120
Department Of Computer Science and Engineering STUDENT HAND BOOK FOR IV B.Tech I Sem

Upload: others

Post on 15-Aug-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Department Of Computer Science and Engineering

STUDENT HAND BOOK

FOR

IV B.Tech I Sem

Page 2: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title Cloud Computing

Course Code A70519

Regulation R13-JNTUH

Course Structure Lectures Tutorials Practical Credits

4 - - 4

Course Coordinator BRAHMAM Assoc.Prof

I. COURSE OVERVIEW:

Cloud Computing is a large-scale distributed computing paradigm which has become a driving

force for information technology over the past several years. The exponential growth data size in

scientific instrumentation/simulation and social media has triggered the wider use of cloud

computing services.We will explore solutions and learn design principles for building large

network-based systems to support both compute and data intensive computing across

geographically distributed infrastructure.

II. PREREQUISITES:

Level Credits Periods / Week Prerequisites UG 4 6 Computer Networks,DBMS

Page 3: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

III. COURSE ASSESSMENT METHODS:

Session Marks

University

End Exam

Marks

Total Marks

Mid Semester Test

There shall be two midterm examinations. Each midterm examination

consists of subjective type and objective type tests.

The subjective test is for 10 marks of 60 minutes duration.

Subjective test of shall contain 4 questions; the student has to answer

2 questions, each carrying 5 marks.

The objective type test is for 10 marks of 20 minutes duration. It

consists of 10 Multiple choice and 10 objective type questions, the

student has to answer all the questions and each carries half mark.

First midterm examination shall be conducted for the first four units of

syllabus and second midterm examination shall be conducted for the

remaining portion.

Assignment

Five marks are earmarked for assignments.

There shall be two assignments in every theory course. Marks shall be

awarded considering the average of two assignments in each course.

75 100

IV. EVALUATION SCHEME:

S. No Component Duration Marks

1 I Mid Examination 80 minutes 20 2 I Assignment - 5 3 II Mid Examination 80 minutes 20 4 II Assignment - 5 5 External Examination 3 hours 75

V. COURSE OBJECTIVES:

I. To impart fundamental concepts in the area of cloud computing

II. To impart knowledge in applications of cloud computing

III. To introduce the broad perceptive of cloud architecture and model.

IV. To understand the concept of virtualization and design of cloud services.

V. To be familiar with the lead players in a cloud.

VI. To understand the features of Cloud Simulator.

VII. To apply different cloud programming model as per need.

VIII. To learn to design the trusted cloud computing system.

VI. COURSE OUTCOMES:

Upon successful completion of this course students will be able to:

1. Ability to use programming principles of computer graphics, including fundamental data-

structures and algorithms for rendering and modeling.

2. Knowledge of computer graphics algorithms and how to implement them.

VII HOW PROGRAM OUTCOMES ARE ASSESSED

Page 4: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Program Outcomes Level Proficiency

assessed by PO1 Engineering knowledge: Apply the knowledge of mathematics,

science, engineering fundamentals, and an engineering specialization

to the solution of complex engineering problems.

S

Assignment,

Exercises

PO2 Problem analysis: Identify, formulate, review research literature,

and analyze complex engineering problems reaching substantiated

conclusions using first principles of mathematics, natural sciences,

and engineering sciences.

S

Exercises

PO3 Design/development of solutions: Design solutions for complex

engineering problems and design system components or processes

that meet the specified needs with appropriate consideration for the

public health and safety, and the cultural, societal, and

environmental considerations.

H

Exercises

PO4 Conduct investigations of complex problems: Use research- based

knowledge and research methods including design of experiments,

analysis and interpretation of data, and synthesis of

the information to provide valid conclusions.

N

-----------

PO5 Modern tool usage: Create, select, and apply appropriate

techniques, resources, and modern engineering and IT tools

including prediction and modeling to complex engineering activities

with an understanding of the limitations.

N

-----------

PO6 The engineer and society: Apply reasoning informed by the

contextual knowledge to assess societal, health, safety, legal and

cultural issues and the consequent responsibilities relevant to the

professional engineering practice.

N

-------------

PO7 Environment and sustainability: Understand the impact of the

professional engineering solutions in societal and environmental

contexts, and demonstrate the knowledge of, and need for

sustainable development.

N

-------------

PO8 Ethics: Apply ethical principles and commit to professional ethics

and responsibilities and norms of the engineering practice. S

Seminars,

Discussions

PO9 Individual and team work: Function effectively as an individual,

and as a member or leader in diverse teams, and in multidisciplinary

settings.

N

--------------

PO10 Communication: Communicate effectively on complex engineering

activities with the engineering community and with society at large,

such as, being able to comprehend and write effective reports and

design documentation, make effective presentations, and give and

receive clear instructions.

N

---------------

PO11 Project management and finance: Demonstrate knowledge and

understanding of the engineering and management principles and

apply these to one‟s own work, as a member and leader in a team, to

manage projects and in multidisciplinary environments.

H

Exercises,

Discussions

PO12 Life-long learning: Recognize the need for, and have the

preparation and ability to engage in independent and life-long

learning in the broadest context of technological change.

N

------------------

N - None S - Supportive H - Highly Related

Page 5: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design suitable

algorithms, develop and maintain software for real world problems.

H

Projects

N - None S - Supportive H - Highly Related

IX. SYLLABUS:

UNIT I

System Modeling, Clustering and Virtualization: distributed system models and enabling

technologies, computer clusters for scalable parallel computing, virtual machines and

virtualization of clusters and data centers.

UNIT II

Foundations: introduction to cloud computing, migrating into cloud, enriching the integration

of service paradigm for cloud era, the enterprise cloud computing paradigm

UNIT III

Infra Structure As Service (IAAS)& Platform And Software Service(PAAS/SAAS): Virtual

machine provisioning and migration services, on the management of virtual machines for

cloud infrastructure, enhancing cloud computing environments using a cluster as service,

secure distributed data storage in cloud computing

Aneka, comet cloud, T-systems, work flow engine for clouds ,understanding scientific

applications for cloud environments

UNIT IV

Monitoring, Management And Applications :An Architecture for federated cloud computing

,SLA management in cloud computing, performance prediction for HPC on clouds, best

practices in Architecting cloud applications in the AWS cloud, building content delivery

networks using clouds, resource cloud mashups.

UNIT V

Governance and case studies: organizational readiness and change management in cloud age,

data security in cloud, legal issues in cloud computing, achieving production readiness for

cloud services.

Text Books 1. Cloud computing: principles and paradigms by rajkumar buyya, james Broberg and Andrzej

M.Goscinski,wiley,2011

2. Distributed and cloud computing , kai Hwang, Geofferyu C.fox, jack J.dongarra, Elsevier,

2012

References 1. Cloud Computing :A practical approach, Anthony T.velte, Toby J.velte, Robert

Elsenpeter,Tata McGraw Hill,2011

2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University press,2010

3. Cloud computing: implementation ,management and security, john W .Ritting house ,james F.

Ransome ,CRC press,rp2012

4. Cloud applications architectures: building Applications and infrastructure in the cloud,George

Reese ,O reilly,SPD,rp2011

5. Cloud security and privacy: An Enterprise perspective on Risks and compliance,im Mather,

Subra Kumaraswamy,Shahed Latif,O reilly,SPD,rp2011

Page 6: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

X. COURSE PLAN:

The course plan is meant as a guideline. There may probably be changes.

Lecture

No.

Learning

Objectives Topics to be covered Reference

1-2 To Understand The Different

Types Of Systems ,System

Models

SYSTEM MODELING,CLUSTURES AND

VIRTUALIZATION

T2:10-58

3

4-5

6

8

17 To Understand Different

Types Of Clusters‟, Different

Types Of Clusters‟

COMPUTER CLUSTURES

T2:68-168

18

19

20

21

22 To Define The Definition Of

Scalable Computing And

Virtualization, Virtual

Machines

Scalable Parallel Computing T2:174-286

23 Computer Clusters For Scalable Parallel

Computing

24 Virtual Machines And Virtualization Of

Clusters And Data Centers

25

26

27 To Understand What Is

Cloud And Able To Define

Cloud And Its Uses

The Enterprise Cloud Computing Paradigm T1:97-158

37

40 To Understand The

Infrastructure Of Cloud And

We Are Accessing That

From Cloud

Infrastructure As A Service(Iaas)&Platform

And Software As A Service(Paas/Saas)

T1:126-130

43-44 Basics Of Infrastructure As A

Service(Iaas)&Platform And Software As A

Service(Paas/Saas):

T1:140-144

45 Virtual Machines Provisioning And

Migration Services

T1:145-154

46 To Manage The Device

Which Are Virtualized

On The Management Of Virtual Machines

For Cloud Infrastructures,

T1:152-185

48 To Understand The Data

Storage In Cloud

Enhancing Cloud Computing Environments

Using A Cluster As A Service ,

T1:193-212

49 Secure Distributed Data Storage In Cloud

Computing.

T1:221-242

50 Aneka, Comet Cloud, T-Systems, T1:252-298

41

To Understand The

Applications Of Cloud And

Monitoring And

Management Of Cloud

Applications

Understanding Scientific Applications For

Cloud Environments.

T1:345-385

52 Monitoring, Management Applications: An

Architecture For Federated Cloud Computing

T1:393-410

53-54 Sla Management In Cloud Computing,

Resource Cloud Mashups

T1:413-429

55 Performance Prediction For Hpc On Cloud T1:437-445

56 Best Practices In Architecting Cloud

Applications In The Aws Cloud,

T1:459-542

57 Governance And Case Studies T1:551-567

58 Organizational Readiness And Change

Management In The Cloud Age,

T1:567-572

59 Data Security In The Cloud, T1:573-588

60 Achieving Production Readiness For Cloud

Services

T1:593-612

Page 7: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF

PROGRAM OUTCOMES:

Course

Objectives

Program Outcomes Program

Specific

Outcom

es PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

I S H H S

II S H S S

III H S

IV S S S

V S S

VI S S H H S

S =Supportive H = Highly Related

XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF THE

PROGRAM OUTCOMES:

Course

Objectives

Program Outcomes Program

Specific

Outco

mes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 S S

2 S S

S =Supportive H = Highly Related

Page 8: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT

Course Name : CLOUD COMPUTING

Course Code : A70519

Class : IV B. Tech ISemester

Branch : Computer Science and Engineering

Year : 2016 – 2017

Course Faculty : BRAHMAM Assoc.Prof

OBJECTIVES:

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be

addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of

quality assurance in higher education. The major emphasis of accreditation process is to measure the

outcomes of the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be

taught through this question bank, which will enhance learner‟s learning process.

S. No. Question Blooms

Taxonomy

Level

Course

Outcome

UNIT - I

1 Define distributed systems Knowledge 2

2 Write about parallel computing Create 1

3 Write about virtual machines Create 1

4 Define single system image Knowledge 2

5 Write about resources sharing in clustures Create 2

6 Explain briefly about HTC Understand 1

7 Write about distributed system models and enabling technologies Create 1

8 Explain in detail about system models and distributed cloud

computing

Understand 2

9 Explain about Design Principles of Computer Clusters Understand 2

10 List out the design principles of computer clustures Understand 1

UNIT – II

1 What is cloud computing? Enlist and Explain three service models,

and four deployment models of cloud computing.

Understand 1

2 Explain the system models for distributed and cloud computing? Understand 2

3 Explain the architecture of P2P system? Understand 2

4 Explain architectural design of compute and storage clouds? Understand 2

5 Explain the infrastructure of Grid computing in detail? Understand 2

6 Explain any six benefits of Software as Service in Cloud

computing?

Understand 2

Page 9: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No. Question Blooms

Taxonomy

Level

Course

Outcome

UNIT – III

1 Explain in detail about RVWS design? Understand 1

2 What is ANEKA cloud platform? Understand 2

3 Explain the technologies for data security in cloud computing? Understand 1

4 Implement in detail about hybrid cloud? Knowledge 2

5 Explain the importance of quality and security in clouds? Knowledge 1

6 Explain in detail about hybrid cloud implementation Understand 2

7 Draw a neat sketch for architectural overview Application 1

8 Explain about ANEKA resource provisioning service? Understand 2

UNIT - IV

1 Write about SAP systems in detail Understand 2

2 List out the business benefits of cloud computing Knowledge 2

3 List out the business benefits of cloud computing Knowledge 2

4 Explain about SLA management in cloud Understand 1

5 Explain about SLA management in cloud Understand 2

6 Draw a neat sketch for automated policy based management with

brief explanation

Application 1

7 Write about HPC systems and HPC on clouds Understand 2

8 List out the technical benefits of cloud computing Knowledge 2

9 Explain in detail about decouple your components Understand 2

UNIT - V

1 Explain about a framework to comprehend the competitive

environment

Understand 1

2 Explain about digital identity and data security Understand 2

3 Write about quality of service and value composition Understand 2

4 Explain about common change management models(CMMM) Understand 2

5 List out the cloud contracting models Knowledge 1

6 List out the data privacy and security issues Knowledge 1

7 Explain about management maturity model Understand 2

Page 10: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

TUTORIAL QUESTION BANK

Course Name : CLOUD COMPUTING

Course Code : A30404

Class : IV B. Tech I Semester

Branch : CSE

Year : 2016 – 2017

Course Faculty : BRAHMAM Assoc.Prof

OBJECTIVES

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to

be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of

quality assurance in higher education. The major emphasis of accreditation process is to measure the

outcomes of the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be taught

through this question bank, which will enhance learner‟s learning process.

S No QUESTION Blooms

taxonomy

level

Course

Outcomes

UNIT - I

System Modeling, Clustering And Virtualization

Part - A (Short Answer Questions)

1 Define distributed systems Remember 1

2 Write about parallel computing Understand 1

3 Write about virtual machines Understand 1

4 Define single system image Understand 2

5 Write about resources sharing in clusters Understand 2

6 Explain briefly about HTC Remember 1

7 Write about middleware support for virtualization Remember 2

8 Explain briefly about HPC Remember 2

9 Write about virtual support at os level Remember 2

10 List the disadvantages of extending os level Remember 2

11 What are the basic characteristics of cloud computing? Understand 2

12 How does cloud computing provides on- demand functionality? Remember 2

13 Define multi core CPU? Remember 1

14 Define GPU? Remember 2

15 Define anything-as-a-service? Understand 1

Page 11: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

16 Define private cloud, public cloud & hybrid cloud? Understand 2

17 Difference between distributed and parallel computing? Understand 2

18 Define cloud provider and cloud broker? Understand 2

19 List the design objectives of cloud computing? Remember 2

20 Why should one prefer public cloud over private cloud? Remember 2

Part - B (Long Answer Questions)

1 Write about distributed system models and enabling

technologies

Remember 1

2 Explain in detail about system models and distributed cloud

computing

Analyze 1

3 Explain about Design Principles of Computer Clusters Evaluate 2

4 List out the design principles of computer clustures Remember 2

5 Explain about Computer Clusters and MPP Architectures Understand 2

6 Write about technologies for network based system with suitable

diagrams

Remember 2

7 Write about Virtual Clusters and Resource Management Understand 2

8 Explain the virtualisation structure/Tools and mechanisms Understand 1

9 Explain the Cluster Architecture in detail? Understand 1

10 What is cloud computing? Enlist and Explain three service models,

and four deployment models of cloud computing

Remember 1

11 Explain the cloud eco system? Understand 1

12 Explain the NIST cloud computing reference architecture? Analyze 2

13 Explain the infrastructure of Grid computing in detail? Analyze 2

14 Explain multithreading model in detail? Understand 2

15 Explain the architecture of P2P system? Remember 2

16 Explain the infrastructure of Grid computing in detail? Remember 1

17 Explain the system models for distributed and cloud computing? Understand 2

18 Explain architectural design of compute and storage clouds? Understand 1

19 What is mean by Virtualization Middleware Understand 1

20 List the design issues in clusters? Remember 2

Part - C (Problem Solving and Critical Thinking Questions)

1 What are the three computing paradigms for cloud computing Analyze 2

2 Draw a neat graph for hype cycle for emerging technologies Evaluate 2

3 Sketch a three cloud service models in a cloud landscape of major

providers

Evaluate 2

4 Explain in detail about evaluation of SOA Evaluate 2

5 Explain in detail about evaluation of SOA Remember 2

6 Explain about parallel and distributed programming models Evaluate 2

7 Discuss GPU clusters for massive parallelism Remember 2

8 How does cloud architecture overcome the difficulties faced by

traditional architecture? What are the three differences that separate

out cloud architecture from the tradition one?

Evaluate 2

9 Explain the virtualization for data center automation? Evaluate 2

10 Explain the concept dynamic deployment of virtual clusters? Evaluate 2

Page 12: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

UNIT - II

Part – A (Short Answer Questions)

1 Define cloud? Remember 1

2 How does cloud computing provides on demand functionality? Remember 2

3 Define cloud computing? Understand 2

4 List out characteristics of cloud computing? Remember 1

5 Define utility computing? Remember 2

6 List out the features of cloud computing? Remember 1

7 Define grid computing? Apply 1

8 What is autonomic computing? Analyze 1

9 List out the challenges in cloud Remember 1

10 What is boomi software? Remember 2

11 List the design goals for generic cloud? Remember 2

12 List the cloud enabling technologies? Create 2

13 Explain the QoS factors in cloud? Evaluate 1

14 Define hardware virtualization? Remember 2

15 Explain the storage virtualization? Remember 2

16 Define VM cloning? Create 1

17 Explain runtime support service? Evaluate 2

18 Define software stack? Remember 2

19 List out different layers which define cloud architecture? Remember 1

20 What is the use of “EUCALYPTUS” in cloud computing? Evaluate 2

Part - B (Long Answer Questions)

1 What is cloud computing? Enlist and Explain three service models,

and four deployment models of cloud computing.

Understand 2

2 Explain the system models for distributed and cloud computing? Analyze 2

3 Explain the architecture of P2P system? Analyze 2

4 Explain architectural design of compute and storage clouds? Understand 1

5 Explain the infrastructure of Grid computing in detail? Understand 1

6 Explain any six benefits of Software as Service in Cloud computing? Understand 2

7 Why is cloud called as eco system? justify Analyze 2

8 Difference between process virtual machines, host VMMs, native

VMMs.

Analyze 1

9 Explain the importance of virtualization Remember 1

10 “SOA as step forward cloud computing”, Explain? Understand 2

11 Discuss inter-cloud resource management. Analyze 2

12 Discuss in detail about global exchange of cloud resources. Understand 2

13 Mention the name of some large cloud providers and

databases?

Understand 2

14 As a infrastructure as a service what are the resources that are

provided by it?

Understand 1

15 Explain the different levels of virtualization implementation? Understand 2

Page 13: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

16 Explain the OS level virtualization? List the pros and cons of

OS level virtualization?

Understand 2

17 Explain in details the tools and mechanisms for virtualization? Remember 2

18 Explain the different types of virtualization in detail? Understand 2

19 Explain the virtualization of CPU, Memory and I/O devices? Understand 2

20 Explain the virtualization of multi core processor? Remember 1

Part – C (Problem Solving and Critical Thinking)

1 Explain cloud computing architecture and cloud components? Evaluate 2

2 Explain the NIST reference architecture of cloud computing in

detail?

Evaluate 2

3 Explain risk from multi tenancy environment. How IDS can be used

in environment?

Evaluate 2

4 Discuss SAAS, PAAS, IAAS and compare them? Evaluate 2

5 Explain Information and Data Model for Virtual machine. Evaluate 2

6 How does cloud architecture overcome the difficulties faced by

traditional architecture? What are the three differences that separate

out cloud architecture from the tradition one?

Evaluate 2

7 Explain the infrastructure of Grid computing in detail? Remember 2

8 Explain multithreading model in detail? Evaluate 2

9 Mention some open source cloud computing platform databases? Evaluate 1

10 Explain the difference between cloud and traditional datacenters? Evaluate 1

UNIT-III

Infra Structure As Service (IAAS)& Platform And Software Service

Part - A (Short Answer Questions)

1 Define fault tolerance? Remember 2

2 What is load balancing? Understand 2

3 Explain in brief about public cloud and infrastructure services Understand 2

4 Write about Google app engine Understand 2

5 Sketch the Aneka architecture Understand 2

6 Draw a neat diagram for Open Nebula high level architecture Understand 2

7 Write about VM life cycle Remember 2

8 Explain in brief about private cloud and infrastructure services Remember 2

9 Write about Microsoft windows azure Understand 1

10 Define on demand service Remember 1

11 List the design goals for generic cloud? Understand 2

12 List the cloud enabling technologies? Understand 2

13 Explain the QoS factors in cloud? Remember 2

14 Define hardware virtualization? Understand 2

15 Explain the storage virtualization? Remember 2

16 Define VM cloning? Remember 2

17 Explain runtime support service? Remember 2

18 Define software stack? Remember 1

19 Define dynamic resource deployment? Remember 2

20 Define the provisioning of compute resources? Remember 2

Page 14: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Part – B (Long Answer Questions)

1 Explain in detail about RVWS design? Understand 2

2 What is ANEKA cloud platform? Remember 2

3 Explain the technologies for data security in cloud computing? Remember 2

4 Implement in detail about hybrid cloud? Understand 1

5 Explain the importance of quality and security in clouds? Evaluate 1

6 Explain in detail about hybrid cloud implementation Understand 2

7 Draw a neat sketch for architectural overview Understand 2

8 Explain about ANEKA resource provisioning service? Evaluate 2

9 Draw a neat a of autonomic cloud bridging Remember 2

10 List out the importance of quality and security in cloud Evaluate 2

11 Explain the cloud architecture with suitable block diagram? Understand 2

12 Explain the layered cloud architecture development? Understand 2

13 Explain the various design challenges for effective cloud computing

environment?

Understand 2

14 Explain the cloud service tasks and trends? Explain the different

methods of resource provisioning and platform deployment in detail

with a neat diagram?

Understand 2

15 Explain the provisioning of storage resources in detail? Understand 1

16

What is quality of service (QoS) monitoring in a cloud computing?

Enlist and Explain different issues in inter-cloud environments.

Understand 2

17 What is the use of “EUCALYPTUS” in cloud computing? Understand 1

18 Mention some open source cloud computing platform databases? Understand 1

19 Mention the name of some large cloud providers and databases? Understand 2

20 As a infrastructure as a service what are the resources that are

provided by it?

Understand 2

Part – C (Problem Solving and Critical Thinking)

1 Explain in detail about VM provisioning process Evaluate 2

2 Sketch a neat diagram for a deployment scenario network with Evaluate 1

3 Explain VM life cycle and VM monitoring Evaluate 2

4 Write about infrastructure enabling technology Evaluate 2

5 Explain in detail about automatic and selection process Evaluate 1

6 List out the technologies for data security in cloud computing Evaluate 1

7 Explain about scheduling techniques for advance reservation of

capacity

Evaluate 1

8 Write about RVWS design in detail Evaluate 1

9 Explain the cloud architecture with suitable block diagram? Evaluate 2

10 Explain the layered cloud architecture development? Evaluate 2

UNIT-IV

Monitoring, Management And Applications

Part – A (Short Answer Questions)

1 Write about federation Remember 1

2 Define isolation Remember 1

3 Explain in brief about the virtual execution environment manager Remember 1

Page 15: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

4 Sketch a neat diagram for hosting of applications on servers Remember 2

5 Define federation scenarios Evaluate 2

6 Draw a flow chart of the SLA management in cloud Remember 2

7 Write about elasticity Apply 2

8 Write about grid and cloud Remember 2

9 Explain in brief about the virtual execution environment host Evaluate 2

10 List out the technical benefits of cloud computing Understand 1

11 Define BigTable? Remember 1

12 What is mean by NOSQL? Apply 1

13 Explain the Google‟s distributed lock service? Apply 1

14 Explain the Google‟s distributed lock service? Remember 2

15 Define SQLAzure? Remember 2

16 Define GFS? Remember 2

17 Define block replication Remember 2

18 List the characteristics of HDFS? Analyze 2

19 Define block replication? Apply 2

20 Define heart beat in Hadoop? Analyze 2

Part – B (Long Answer Questions)

1 Write about SAP systems in detail Remember 2

2 List out the business benefits of cloud computing Understand 2

3 List out the business benefits of cloud computing Remember 2

4 Explain about SLA management in cloud Understand 2

5 Explain about SLA management in cloud Remember 2

6 Draw a neat sketch for automated policy based management with

brief explanation

Apply 2

7 Write about HPC systems and HPC on clouds Apply 2

8 List out the technical benefits of cloud computing Remember 2

9 Explain in detail about decouple your components Remember 2

10 List out the technical benefits of cloud computing Evaluate 2

11 Explain in detail about decouple your components Evaluate 2

12 Explain the dataflow and control flow of MapReduce? Remember 2

13 Explain the architecture of MapReduce in Hadoop? Remember 2

14 Explain a user view of Google App Engine with suitable block

schematic

Remember 1

15 Explain the structure of BigTable data model? Remember 1

16 Explain the programming structure ofAmazon EC2? Remember 1

17 Explain the architecture of Amazon EC2 ? Remember 2

18 Explain the Microsoft Azure programming support? Remember 2

19 Discuss the architecture and components of OpenNebula? Remember 1

20 Explain the architecture of OpenStack system?

Part – C (Problem Solving and Critical Thinking)

1 List out the basic principles of cloud computing Create 2

Page 16: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

2 Sketch a neat diagram for reservoir 1

3 Explain about security considerations Remember 1

4 Write about automated policy based management Create 2

5 Explain about traditional approaches to SLO management Evaluate 1

6 Write about amazon web services cloud Create 2

7 Draw a flow chart of the SLA management in cloud Evaluate 2

8 Write about elasticity Evaluate 1

9 Discuss the cloud software environment of Eucalyptus in detail. Evaluate 2

10 Mention what is Hypervisor in cloud computing and their types?

UNIT-V

Governance and case studies

Part - A (Short Answer Questions)

1 List out the strengths of information cards Evaluate 1

2 Draw a neat sketch of perception of quality Remember 1

3 Distinguish direct versus indirect distribution Remember 1

4 Write about cloud service life cycle Remember 2

5 List out the weakness of information cards Remember 2

6 Define service strategy Understand 2

7 Write about acceptance testing Remember 2

8 What is digital entity Remember 2

9 Write about service design Understand 2

10 What is data security Remember 2

11 What are the security challenges in cloud computing? Remember 1

12 Define security governance? Understand 1

13 Explain the security awareness in cloud? Remember 2

14 Define third party risk management? Understand 2

15 What are the layers in security architecture design? Remember 2

16 Define VM security? Understand 1

17 Explain change management? Understand 2

18 Define security images? Understand 2

19 What is mean by vulnerability assessment? Remember 2

20 Define data shredding technique. Remember 2

21 What is mean by password assurance testing? Remember 2

Part - B (Long Answer Questions)

1 Explain about a framework to comprehend the competitive

environment

Understand 1

2 Explain about digital identity and data security Understand 2

3 Write about quality of service and value composition Apply 2

4 Explain about common change management models(CMMM) Remember 1

5 List out the cloud contracting models Remember 1

6 List out the data privacy and security issues Create 1

7 Explain about management maturity model Remember 1

Page 17: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Prepared By: HOD, CSE

8 Write about acceptance testing Understand 1

9 Explain the Security challenges in cloud computing in detail? Understand 1

10 Explain the security architecture in detail? Understand 1

11 Explain the following

a. Security governance

b. Security monitoring

Remember 2

12 Explain the Secure Software Development Life Cycle? Remember 2

13 Explain in detail about Software-as-a-Service security? Remember 2

14 Explain the application security in detail? Analyze 1

15 Explain the data security and virtual machine security in detail? Analyze 1

16 Explain the identity management and access control in detail? Analyze 1

17 Explain the two fundamental functions, identity management and

access control, which are required for secure cloud computing.

Remember 1

18 Explain the following

a. Autonomic Security

b. Risk management

Analyze 2

19 What are the measures included in GuestOS hardening technique ? Understand 1

20 How is intrusion detection implemented under SAAS model? Understand 1

Part – C (Problem Solving and Critical Thinking)

1 Write about a need for cloud mashups Evaluate 2

2 Write about cloud contracting models Evaluate 2

3 Write about quality of service and value composition. Evaluate 2

4 Explain about common change management models(CMMM) Evaluate 2

5 Explain about common change management models Evaluate 2

6 Explain about a framework to comprehend the competitive

environment

Evaluate 1

7 Define Distributed Denial-of-service attack Evaluate 1

8 Which security mechanism provides an effective control for data

confidentiality and integrity?

Evaluate 1

9 Define security governance Evaluate 1

10 EXPLAIN the layers in security architecture design? Evaluate 1

Page 18: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title DATA WAREHOUSING AND DATA MINING

Course Code A70520

Regulation R13 - JNTUH

Course Structure Lectures Tutorials Practicals Credits

4

- - 4

Course Faculty N PUSHPALATHA Assoc.Prof

I. COURSE OVERVIEW:

The course addresses the concepts, skills, methodologies, and models of data warehousing. The

proper techniques for designing data warehouses for various business domains, and covers concepts

for potential uses of the data warehouse and other data repositories in mining opportunities are

addressed. Data mining, the extraction of hidden predictive information from large databases, is a

powerful new technology with great potential to help companies focus on the most important

information in their data warehouses. Data mining tools predict future trends and behaviors,

allowing businesses to make proactive, knowledge- driven decisions.

II. PREREQUISITE(S):

Level Credits Periods/ Week Prerequisites

UG 4 4 Database Management Systems, Probability & Statistics

Page 19: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

III. COURSE ASSESSMENT METHODS:

University

Total Session Marks End Exam marks marks

Midterm Test

There shall be two midterm examinations. Each midterm examination consists of essay paper, objective paper and assignment.

The essay paper is for 10 marks of 60 minutes duration and shall contain

4 questions. The student has to answer 2 questions, each carrying 5 marks. The objective paper is for 10 marks of 20 minutes duration. It consists of 10 multiple choice and 10 fill-in-the blank questions, the student has to answer all the questions and each carries half mark.

First midterm examination shall be conducted for the first two and half

units of syllabus and second midterm examination shall be conducted for the remaining portion.

Five marks are earmarked for assignments. There shall be two Assignments in every theory course. Assignments are usually issued 75 100

at the time of commencement of the semester. These are of problem

solving in nature with critical thinking. Marks shall be awarded considering the average of two midterm tests in each course.

IV. EVALUATION SCHEME:

S. No Component Duration Marks

1. I Mid Examination 80 minutes 20

2. I Assignment - 5

3. II Mid Examination 80 minutes 20

4. II Assignment - 5

5. External Examination 3 hours 75

V. COURSE OBJECTIVES:

At the end of the course, the students will be able to:

I. Be familiar with mathematical foundations of data mining tools.

II. Understand and implement classical models and algorithms in data warehouses and data mining.

III. Characterize the kinds of patterns that can be discovered by association rule mining,

classification and clustering.

IV. Master data mining techniques in various applications like social, scientific and environmental context.

V. Develop skill in selecting the appropriate data mining algorithm for solving practical problems.

VI. Be familiar with the process of data analysis, identifying the problems, and choosing the

relevant models and algorithms to apply.

Page 20: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VI. COURSE OUTCOMES:

After completing this course the student must demonstrate the knowledge and ability to:

1. Ability to use data mining tools during Projects to build reliable products meeting the present

demands of the industry.

2. Ability to identify components in typical data warehouse architectures.

3. Understanding of why there is a need for data warehouse in addition to traditional Operational

database systems

VII. HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes

Level Proficiency

assessed by

PO1 Engineering knowledge: Apply the knowledge of mathematics,

Assignments, science, engineering fundamentals, and an engineering H Tutorials specialization to the solution of complex engineering problems.

PO2 Problem analysis: Identify, formulate, review research Lectures, literature, and analyze complex engineering problems

reaching

H Assignments, substantiated conclusions using first principles of mathematics, Exams natural sciences, and engineering sciences.

PO3 Design/development of solutions: Design solutions for complex

engineering problems and design system components or

processes that meet the specified needs with appropriate S Mini Projects

consideration for the public health and safety, and the cultural,

societal, and environmental considerations.

PO4 Conduct investigations of complex problems: Use research-

based knowledge and research

methods including design of

S Projects experiments, analysis and interpretation of data, and synthesis of

the information to provide valid conclusions.

PO5 Modern tool usage: Create, select, and apply appropriate

techniques,

resources,

and modern engineering and IT tools

S Projects including prediction and modeling to complex engineering

activities with an understanding of the limitations.

Page 21: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

PO6 The engineer and society: Apply reasoning informed by the

contextual knowledge to assess societal, health, safety, legal and

N -- cultural issues and the consequent responsibilities relevant to the

professional engineering practice.

PO7 Environment and sustainability: Understand the impact of the

professional engineering solutions in societal and environmental

N -- contexts, and demonstrate the knowledge of, and need for

sustainable development.

PO8 Ethics: Apply ethical Principle and

commit to professional

S Discussions ethics and responsibilities and norms of the engineering practice.

PO9 Individual and team work: Function effectively as an

individual, and as a member or leader in diverse teams, and in N --

multidisciplinary settings.

PO10 Communication: Communicate effectively on complex

engineering activities with the engineering community and with

society at large, such as, being able to comprehend and write N --

effective reports and design documentation, make effective

presentations, and give and receive clear instructions.

PO11 Project management and finance: Demonstrate knowledge and

understanding of the engineering and management principles and

N -- apply these to one‟s own work, as a member and leader in a

team, to manage projects and in multidisciplinary environments.

PO12 Life-long learning: Recognize the need for, and have the

preparation and ability to engage in independent and life-long S Projects

learning in the broadest context of technological change.

N - None S - Supportive H - Highly Related

Page 22: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design suitable

algorithms, develop and maintain software for real world problems.

H

Projects

N - None S - Supportive H - Highly Related

IX. SYLLABUS:

UNIT - I

Data warehouse: Introduction to Data warehouse, Difference between operational database systems

and data warehouses, Data warehouse characteristics, Data warehouse Architecture and its

components, Extraction-Transformation-Loading, Logical (Multi-Dimensional), Data Modeling,

Schema Design, Star and show-Flake Schema, Fact Consultation, Fact Table, Fully Addictive, Semi-

Addictive, Non Addictive Measures; Fact-Less Facts, Dimension Table Characteristics; OLAP

Cube, OLAP Operations, OLAP Server Architecture-ROLAP, MOLAP and HOLAP.

UNIT - II Introduction to Data Mining: Introduction, What is Data Mining, Definition, KDD, Challenges,

Data Mining Tasks, Data Processing, Data Cleaning, Missing data, Dimensionality Reduction,

Feature Subset Selections, Discretization and Binaryzation, Data Transformation; Measures of

Similarity and Dissimilarity-Basics.

UNIT - III Association Rules: Problem Definition, Frequent item set generation, The APRIORI Principle,

support and confidence measures, association rule generation; APRIORI algorithm. The Partition

Algorithms, FP-Growth Algorithms, Compact Representation of Frequent item Set-Maximal

Frequent item set, closed frequent item set.

UNIT - IV Classification: Problem Definition, General Approaches to solving classification problem,

Evaluation of Classifiers, Classification techniques, Decision Trees-Decision trees construction,

Methods, for expressing attribute test conditions, Measures for selecting the best split, Algorithm for

Decision tree induction; Naive-Bayes Classifier, Bayesian Belief Network; K-Nearest neighbor

classification-Algorithm and characteristics.

UNIT - V

Clustering: Problem Definition, Clustering Overview, Evaluation of Clustering algorithms,

partitioning clustering-K-Means Algorithm, K-Means Additional issues, PAM Algorithm;

Hierarchical Clustering-Agglomerative Methods and divisive methods, Basic Agglomerative

Hierarchical Clustering Algorithms Specific techniques, Key issues in Hierarchical Clustering,

Strengths and weakness; outlier detection.

Page 23: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Text books: 1. Jiawei Han and Micheline Kamber, “Data Mining: Concepts and Techniques”, 2e, Elsevier,

2008. 2. Pang-ning Tan Vipin Kumar Micaelsteinbanch, “Introduction to data mining “, Pearson

Education.

References: 1. Margaret H Dunham, “Data Mining Introductory and Advanced Topics”, 2e, Pearson Education,

2006. 2. Amitesh Sinha, “Data Warehousing”, Thomson Learning, 2007. 3. Arun K pujari, “Data Mining Techniques”, 3e, Universities Press. 4. VikramPudi, P Radha Krishna, “Data Mining”, Oxford University Press.

IX. COURSE PLAN:

At the end of the course, the students are able to achieve the following course learning

outcomes:

Lecture Topics to be covered

Course Learning Outcomes References

No.

1-3

Introduction to Data warehouse,

Difference between operational database

systems and data warehouses, Data

warehouse characteristics

Distinguish data warehouse

from other databases. T1: 3.1

4-6

Data warehouse Architecture and its

components, Extraction-

Transformation-Loading, Logical

(Multi-Dimensional),

Prepare Data warehouse

architecture. T1: 3.3

7-10

Modeling, Schema Design, Star and

show-Flake Schema, Fact Consultation,

Fact Table, Fully Addictive, Semi-

Addictive, Non Addictive Measures;

Fact-Less Facts, Dimension Table

Characteristics

Design Multidimensional Data

Model.

T1: 3.2

11-14

OLAP Cube, OLAP Operations, OLAP

Server Architecture-ROLAP, MOLAP

and HOLAP.

Implementation of Data

Warehouse. T1: 3.4-3.5

15-18

Introduction, Fundamentals of Data

Mining,

Definition, KDD, Challenges, Data

Mining Tasks

Outline the importance of data mining in big data technology.

T1: 1.1-1.7

19-23

Data Processing, Data Cleaning,

Missing data, Dimensionality

Reduction, Feature Subset Selections,

Data Transformation

List the data Preprocessing techniques.

T1: 2.1-2.5

24-26 Discretization and Binaryzation, Define data Discretization. T1: 2.6

Page 24: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Measures of Similarity and

Dissimilarity-Basics.

27-28

Association Rules: Problem Definition,

Frequent item set generation, The

APRIORI Principle

Illustrate the process of association rule mining T1: 5.3

29-30

Support and confidence measures,

association rule generation; APRIORI

algorithm.

Define basic concepts of Apriori Algorithm. T1: 5.2

31-33 The Partition Algorithms, FP-Growth

Algorithms,

Define basic concepts of frequent pattern mining. T1: 5.2

34-37

Compact Representation of Frequent

item Set-Maximal Frequent item set,

closed frequent item set.

Illustrate frequent item set.

T1: 5.1

38-41

Classification Problem Definition,

General Approaches to solving

classification problem, Evaluation of

Classifiers, Classification techniques.

Describe Classification.

T1: 6.1-6.2

42-45

Decision Trees-Decision trees

construction, Methods, for expressing

attribute test conditions, Measures for

selecting the best split, Algorithm for

Decision tree induction.

Construct an optimal decision tree for a given dataset.

T1: 6.3

46-48 Naive-Bayes Classifier, Bayesian Belief

Network

Classify Bayesian methods. T1: 6.4

49-50 K-Nearest neighbor classification-

Algorithm and characteristics.

Generalize the learning from your neighbors. T1: 6.9

51-52

Clustering Problem Definition,

Clustering Overview, Evaluation of

Clustering algorithms

Differentiate classification and clustering. T1: 7.1-7.3

53-55

partitioning clustering-K-Means

Algorithm, K-Means Additional issues,

PAM Algorithm

Understand partitioning methods used for clustering. T1: 7.4

56-58

Hierarchical Clustering-Agglomerative

Methods and divisive methods, Basic

Agglomerative Hierarchical Clustering

Algorithms Specific techniques

Identify various types of Hierarchical clustering techniques T1: 7.5

59-60

Key issues in Hierarchical Clustering,

Strengths and weakness; outlier

detection.

Analyze outlier detection methods. T1: 7.11

Page 25: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program Specific

Outcomes

Objectives

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

I H S S

II H S S H

III H S S H

IV S S S S H

V S S S

VI H S

S – Supportive

H - Highly Related

XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM

OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program Specific

Outcomes

Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 H S S S H

2 H S H

3 H S

S –Supportive H - Highly Related

Page 26: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT

Course Name DATA WAREHOUSING AND DATA MINING

Course Code : A70520

Class : IV B. Tech I Semester

Branch : Computer Science and Engineering

Year : 2016 - 17

Course Faculty : N PUSHPALATHA Assoc.Prof

OBJECTIVES To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be

taught through this question bank, which will enhance learner‟s learning process.

ASSIGNMENT – I

S. No Question Blooms

Taxonomy Level

Course Outcome

UNIT - 1

1 Explain with an example the different schemas for multidimensional Understand

1 databases?

2 Explain about the concept description? And what are the differences Understand

3 between concept description in large databases and OLAP?

3 Differentiate operational database systems and data warehousing? Understand 2

4 Describe the three-tier data warehousing architecture? Knowledge 1

5 Describe the complex aggregation at multiple granularity? Knowledge 2

6 Discuss briefly about the data warehouse architecture? Understand 2

7 Demonstrate the efficient processing of OLAP queries? Understand 3

8 Compare the schemas for the multidimensional data models? Analyze 2

9 Explain the Data warehouse applications? Understand 2 10 Discuss briefly about the multidimensional data models?

Understand 3

Page 27: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No Question Blooms Taxonomy Level

Course Outcome

UNIT-II

1 Distinguish between the data warehouse and databases? How they

Understand 2

are similar? 2 Describe three challenges to data mining regarding data mining Knowledge 3

methodology and user interaction issues?

3 Discuss briefly about the data smoothing techniques? Understand 2

4 Explain Data Integration and Transformation? Understand 1

5 Describe the various data reduction techniques? Understand 3

6 Define data cleaning? Express the different techniques for handling missing values?

Knowledge 2

7 Explain data mining as a step in the process of knowledge discovery?

Understand 2

8 List and describe the five primitives for specifying a data mining task? Understand 2

9 Explain the difference between discrimination and classification?

Between characterization and clustering? Between classification and prediction? For each of these pairs of tasks, how are they similar?

Understand 2

10 Distinguish between the data warehouses and data mining? Understand 3 UNIT-III

1 Define the terms frequent item sets, closed item sets and association Knowledge 3

rules? 2 Discuss which algorithm is an influential algorithm for mining Understand 2

frequent item sets for boolean association rules? Explain with an

example? 3 Describe the different techniques to improve the efficiency of Knowledge 2

Apriori? Explain? 4 Discuss the FP-growth algorithm? Explain with an example? Understand 2

ASSIGNMENT – II

5 Discuss about mining multilevel association rules from transaction Understand 3

databases in detail? 6 Discuss about constraint-based association mining? Understand 2

7 Discuss about mining multilevel association rules from transaction Understand 3

databases in detail? 8 Describe about the correlation analysis using Chi-square? Knowledge 2

9 Explain what are additional rule constraints to guide mining? Understand 2 3 10 Illustrate about the correlation analysis using All-certainty

Measure?

Apply 2

Page 28: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

UNIT - IV

1 Explain about the classification and prediction? Example with an Understand 3

example? 2 Discuss about basic decision tree induction algorithm? Understand 2

3 Summarize how does tree pruning work? What are some Understand 2 enhancements to basic decision tree induction?

4 Explain how scalable is decision tree induction? Explain? Understand 3

5 Describe the working procedures of simple Bayesian classifier? Knowledge 2

6 Discuss the back propagation algorithm and Explain? Understand 3

7 Explain about classifier accuracy? Explain the process of measuring Understand 2

the accuracy of a classifier? 8 Explain training of Bayesian belief networks? Understand 2

9 Explain briefly about the Navie Bayesian Classification? Understand 3

10 Differentiate classification and prediction methods? Understand 2

UNIT - V 1 Discuss the various types of data in cluster analysis? Understand 2

2 Explain the categories of major clustering methods? Understand 2

3 Write algorithms for k-means and k-medoids? Explain? Understand 2

4 Describe the different types of hierarchical methods? Understand 2

5 Discuss about the DBSCAN density-based methods? Understand 2

6 Demonstrate about the following hierarchical methods Understand 3 a)BIRCH

b)Chamelon 7 Explain the working of CLIQUE algorithm Understand 3

8 Define the distance-based outlier? Illustrate the efficient algorithms Knowledge 2

for mining distance-based algorithm? 9 Explain about the Statistical-based outlier detection? Understand 2

10 Explain about the agglomerative and divisive hierarchical methods? Understand 2

Page 29: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

TUTORIAL QUESTION BANK

Course Name DATA WAREHOUSING AND DATA MINING

Course Code A70520

Class IV B. Tech I Semester

Branch Computer Science and Engineering

Year 2016 – 2017

Course Faculty N PUSHPALATHA Assoc.Prof

OBJECTIVES

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be

addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the

outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating philosophy of outcome based education in the process of problem solving and career development. So, all students of the institute should understand the depth and approach of course to be taught through this question bank, which will enhance learner‟s learning process.

Blooms Course S. No Question Taxonomy Outcome

Level

UNIT - I

PART – A (Short Answer Questions) 1 Define online analytical processing? Knowledge 3 2 List the key features of data warehouse? Understand 3 3 Define data mart? Knowledge 3 4 Define enterprise warehouse? Knowledge 3 5 Define virtual warehouse? Knowledge 2 6 List the metadata repository? Understand 2 7 List the various multidimensional models? Understand 2 8 Explain about the star schema? Understand 2 9 Explain the snowflake schema? Understand 1

10 Define about the fact constellation model? Knowledge 1 11 Name the OLAP operations? Understand 1 12 Express what is slice and dice operation? Understand 1 13 Define Pivot operation? Knowledge 1 14 Distinguish between the OLAP Systems and Statistical databases? Understand 1 15 State the various views of data warehouse design? Understand 1 16 Define Relational OLAP(ROLAP) server? Knowledge 2 17 Explain Multidimensional OLAP(MOLAP) server? Understand 2 18 State what is Hybrid OLAP(HOLAP) server? Understand 3 19 Define Data warehouse? Knowledge 3

Page 30: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

20 Define the use of concept hierarchy? Knowledge 1

Part - B (Long Answer Questions) 1 Differentiate operational database systems and data warehousing? Understand 2 2 Discuss briefly about the multidimensional data models? Understand 1

3 Explain with an example the different schemas for multidimensional databases? Understand 1

4 Describe the three-tier data warehousing architecture? Knowledge 1 5 Discuss the efficient processing of OLAP queries? Understand 2 6 Explain the data warehouse applications? Understand 3 7 Explain the architecture for on-line analytical mining? Understand 3 8 Describe the common techniques are used in ROLAP and MOLAP? Knowledge 1 9 Describe the complex aggregation at multiple granularity? Knowledge 2

10

Explain about the concept description? And what are the differences between concept description in large databases and OLAP? Understand 3

11 Discuss about Metadata Repository? Understand 2 12 Compare the schemas for the multidimensional data models? Analyze 2 13 Explain about the data warehouse implementation with an example? Understand 2 14 Discuss about types of OLAP Servers? Understand 2

15 Explain OLAP operations in the Multidimensional Data Model? Understand 3 16 Compare Enterprise warehouse, data mart, virtual warehouse? Analyze 2 17 Compare Data cleaning, data transformation? Analyze 2 18 Explain what are the differences between the three main types of

data warehouse usage: information processing, analytical processing and data mining? Discuss the motivation behind OLAP mining(OLAM)?

Understand 2

19 Explain a data warehouse can be modeled by either a star schema or a snowflake schema. Briefly describe the similarities and the differences of the two models, and then analyze their advantages and disadvantages with regard to one another?

Understand 3

20 Explain Indexing OLAP Data? Understand 3 Part - C (Problem Solving and Critical Thinking Questions)

1 Analyze that a data warehouse consists of the three dimensions time, doctor and patient, and the two measures count and charge, where charge is the fee that a doctor charges a patient for a visit. (a) Enumerate three classes of schemas classes of schemas that are popularly used for modeling data warehouses. (b) Draw a schema diagram for the above data warehouse using one of the schema classes listed in (a). (c) Starting with the base cuboid [day, doctor, patient], what specific OLAP operations should be performed in order to list the total fee collected by each doctor in 2004? (d) To obtain the same list, write an SQL query assuming the data is stored in a relational database with the schema fee (day, month, year, doctor, hospital,patient, count, charge).

Understand 3

2 State why, for the integration of multiple heterogeneous information sources, many companies in industry prefer the update-driven approach (which constructs and uses data warehouses), rather than the query-driven approach (which applies wrappers and integrators). Describe situations where the query-driven approach is preferable over the update-

Knowledge 3

Page 31: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

driven approach.

3 Suppose that a data warehouse for Big University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg grade measure stores the actual course grade of the student. At higher combination. Compute the number of cuboids(a) Draw a snowflake schema diagram for the data warehouse. (b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year ) Should one perform inorder to list the average grade of CS courses for each Big University student. (c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain(including the base and apex cuboids)?

Apply 3

4 Suppose that a data warehouse consists of the four dimensions, date, spectator location, and game, and the two measures, count and charge, where charge is the fare that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having it‟s own charge rate. Write the following (a) Draw a star schema diagram for the data warehouse. (b) Starting with the base cuboid [ date,spectator,location,game], what specific OLAP operations should one perform in order to list the total charge paid by student spectators at GM_Place in 2004? (c) Bitmap indexing is useful in data warehousing. Taking this cube as an example,briefly discuss advantages and problems of using a bitmap index structure.

Apply 3

5 Design a data warehouse for a regional weather bureau. The weather bureau has about 1,000 probes, which are scattered throughout various land and ocean locations in the region to collect basic weather data, including air pressure, temperature, and precipitation at each hour. All data are sent to the central station, which has collected such data for over 10 years. Your design should facilitate efficient querying and on-line analytical processing, and derive general weather patterns in multidimensional space.

Create 2

6 Explain the computation of measures in a data cube: (a) Enumerate three categories of measures, based on the kind of aggregate functions used in computing a data cube. (b) For a data cube with the three dimensions time, location, and item, which category does the function variance belong to? Describe how to compute it if the cube is partitioned into many chunks. Hint: The formula for computing variance is

where xi is the average of N xis.

Understand 3

Page 32: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

(c) Suppose the function is “top 10 sales”. Discuss how to

efficiently compute this measure in a data cube

7 Suppose that we need to record three measures in a data cube: min,

average, and median. Design an efficient computation and storage method for each measure given that the cube allows data to be deleted incrementally (i.e., in small portions at a time) from the cube.

Understand 3

8 Observe that a data warehouse contains 20 dimensions, each with about five levels of granularity. (a) Users are mainly interested in four particular dimensions, each having three frequently accessed levels for rolling up and drilling down. How would you design a data cube structure to efficiently support this preference? (b) At times, a user may want to drill through the cube, down to the raw data for one or two particular dimensions. How would you support this feature?

Knowledge 3

9 Observe A data cube, C, has n dimensions, and each dimension has exactly p distinct values in the base cuboid. Assume that there are no concept hierarchies associated with the dimensions. (a) What is the maximum number of cells possible in the base cuboid? (b) What is the minimum number of cells possible in the base cuboid? (c) What is the maximum number of cells possible (including both base cells and aggregate cells) in the data cube, C? (d) What is the minimum number of cells possible in the data cube, C?

Knowledge 3

10 Observe A popular data warehouse implementation is to construct a multidimensional database, known as a data cube. Unfortunately, this may often generate a huge, yet very sparse multidimensional matrix. Present an example illustrating such a huge and sparse data cube.

Knowledge 3

UNIT - II Part – A (Short Answer Questions)

1 Define data mining? Knowledge 1 2 Explain the definition of data warehouse? Understand 1 3 Distinguish between data mining and data warehouse? Understand 2 4 Identify any three functionality of data mining? Knowledge 3 5 Interpret major issues in data mining? Understand 1 6 Name the steps in the process of knowledge discovery? Knowledge 1 7 Discuss relational databases? Understand 1 8 State object –oriented Databases? Understand 1 9 Explain the spatial databases? Understand 2

10 Contrast heterogeneous databases and legacy databases? Understand 2 11 Differentiate classification and Prediction? Understand 2 12 Describe transactional data bases? Knowledge 2 13 List the types of data that can be mined? Knowledge 3 14 Define data cube? Knowledge 3 15 Define multidimensional data mining? Knowledge 3 16 Define data characterization? Knowledge 3 17 Express what is a decision tree? Understand 3 18 Explain the outlier analysis? Understand 3 19 Name the steps involved in data preprocessing? Understand 3 20 Interpret the dimensionality reduction? Understand 3

Part - B (Long Answer Questions)

Page 33: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

1 Describe data mining? In your answer, address the following: a)Is it another hype? b)Is it a simple transformation of Technology developed from databases, statistics, and machine learning? c)Explain how the evolutions of database technology lead to data mining? d)Describe the steps involved in datamining when viewed as a process of knowledge discovery.

Understand 2

2 Distinguish between the data warehouse and databases? How they are similar?

Knowledge 2

3 Explain the difference between discrimination and classification? Between characterization and clustering? Between classification and prediction? For each of these pairs of tasks, how are they similar?

Understand 2

4 Describe three challenges to data mining regarding data mining methodology and user interaction issues?

Knowledge 2

5 Distinguish between the data warehouses and data mining? Knowledge 2 6 Discuss briefly about the data smoothing techniques? Understand 2 7 Explain Data Integration and Transformation? Understand 3 8 Describe the various data reduction techniques? Understand 3 9 Define data cleaning? Express the different techniques for

handling missing values? Knowledge 2 10 Differentiate between descriptive and predictive data mining? Understand 2 11 Explain data mining as a step in the process of knowledge discovery? Understand 3

12 Describe briefly Discretization and concept hierarchy generation for numerical data? Knowledge 3

13 Discuss about the concept hierarchy generation for categorical data? Understand 3

14 List and describe the five primitives for specifying a data mining task? Understand 3

15 Discuss issues to consider during data integration? Understand 1 16 Describe the following advanced database systems and applications:

object- relational databases, spatial databases, text databases, multimedia

databases, stream data, the World Wide Web.

Knowledge 2

17 Describe why concept hierarchies are useful in data mining. Knowledge 2 18 Describe the differences between the following approaches for the

integration of a data mining system with a database or data warehouse

system: no coupling, loose coupling, semitight coupling, and tight

coupling. State which approach you think is the most popular, and why

Knowledge 1

19 Explain Data quality can be assessed in terms of accuracy, completeness,

and consistency. Propose two other dimensions of data quality.

Understand 1

20 Apply the two methods below to normalize the following group of data:

200, 300, 400, 600, 1000

(a) min-max normalization by setting min = 0 and max = 1

(b) z-score normalization

Apply 2

Part – C (Problem Solving and Critical Thinking) 1 Suppose that the data for analysis includes the attribute age. The

age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25,25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52,70. Compute the following: (a) Mean of the data? Median? (b) mode of the data? Comment on the data‟s modality( i.e.,bimodal,trimodal,etc.). (c) midrange of the data?

Apply 1

Page 34: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

2 Suppose that the data for analysis includes the attribute age. The age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19,20,20,21,22,22,25,2525, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52,70. Compute the following: (a) Can you find (roughly) the first quartile (Q1) and the third quartile (Q3) of the data? (b) Give the five-number summary of the data. (c) Show a boxplot of the data. (d) How is a quantile-quantile plot different from a quantile plot?

Apply 1

3 Use the data for age given above answer the following. (a) Use smoothing by bin means to smooth the above data, using a bin depth of 3. Illustrate your steps. Comment on the effect of this technique for the given data (b) How might you determine outliers in the data? (c) What other methods are there for data smoothing?

Apply 1

4 Suppose a hospital tested the age and body fat data for 18 randomly selected adults with the following result age 23 23 27 27 39 41 47 49 50 %fat 9.5 26.5 7.8 17.8 31.4 25.9 27.4 27.2 31.2 age 52 54 54 56 57 58 58 60 61 %fat 34.6 42.5 28.8 33.4 30.2 34.1 32.9 41.2 35.7 Examine the following (a) the mean, median and standard deviation of age and %fat. (b) Draw the box plots for age and %fat. (c) Draw a scatter plot and a q-q plot based on these two variables.

Knowledge 2

5 Write an example where data mining is crucial to the success of a business. What data mining functions does this business need? Can they be performed alternatively by data query processing or simple statistical analysis?

Apply 2

6 Suppose your task as a software engineer at Big University is to design a data mining system to examine the university course database, which contains the following infor- mation: the name, address, and status (e.g., undergraduate or graduate) of each student, the courses taken, and the cumulative grade point average (GPA). Describe the architecture you would choose. What is the purpose of each component of this architecture?

Understand 2

7 Outliers are often discarded as noise. However, one person‟s garbage could be another‟s treasure. For example, exceptions in credit card transactions can help us detect the fraudulent use of credit cards. Taking fraudulence detection as an example, Write two methods that can be used to detect outliers and discuss which one is more reliable.

Apply 3

9 Examine the following consider the following data for analysis includes the attribute age. The age values for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70. (a) Usemin-maxnormalizationtotransformthevalue 35 for age on to the range [0.0, 1.0]. (b) Use z-score normalization to transform the value 35 for age, where the standard deviation of age is 12.94 years. (c) Use normalization by decimal scaling to transform the value 35 for age. (d) Comment on which method you would prefer to use for the given data, giving reasons as to why.

Knowledge 3

10 Suppose a group of 12 sales price records has been sorted as follows Knowledge 2

Page 35: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

follows: 5, 10, 11, 13, 15, 35, 50, 55, 72, 92, 204, 215

Examine the following methods by partition them into three bins

(a) equal-frequency (equidepth) partitioning

(b) equal-width partitioning

(c) clustering UNIT-III

Part - A (Short Answer Questions) 1 Define frequent patterns? Knowledge 3 2 Define closed itemset? Knowledge 3 3 State maximal frequent itemset? Understand 3 4 List the techniques of efficiency of Apriori algorithm? Understand 3 5 Explain ECLAT algorithms usage? Understand 1 6 Name the pruning strategies in mining closed frequent itemsets? Understand 2 7 Define substructure of a structural pattern? Knowledge 2 8 Interpret the rule of support for itemsets A and B? Understand 2 9 Classify the confidence rule for itemsets A and B? Understand 1

10 Define itemset? Knowledge 2 11 Name the steps in association rule mining? Understand 3 12 Explain the join step? Understand 1 13 Describe the prune step? Knowledge 1 14 State how can we mine closed frequent itemsets? Understand 2 15 Name the pruning strategies of closed frequent itemsets? Understand 3 16 Explain the two kinds of closure checking? Understand 3 17 Summarize the constraint-based mining? Understand 2 18 Describe the five categories of pattern mining constraints? Knowledge 1 19 List the applications of pattern mining? Understand 2 20 Define Support and Confidence? Knowledge 2

Part – B (Long Answer Questions)

1 Define the terms frequent itemsets, closed itemsets and association rules? Knowledge 2

2

Discuss which algorithm is an influential algorithm for mining frequent itemsets for boolean association rules? Explain with an example? Understand 2

3

Describe the different techniques to improve the efficiency of Apriori? Explain? Knowledge 2

4 Discuss the FP-growth algorithm? Explain with an example? Understand 3

5 Explain how to mine the frequent itemsets using vertical data format? Understand 1

6 Discuss about mining multilevel association rules from transaction databases in detail? Understand 3

7 Explain how to mine the multidimensional association rules from relational databases and data warehouses?

8 Describe briefly about the different correlation measures in association analysis?

9 Discuss about constraint-based association mining? Understand 2 10 Explain the Apriori algorithm with example? Understand 3 11 Discuss the generating association rules from frequent itemsets. Understand 3

Discuss about mining multilevel association rules from transaction databases in detail?

13 Describe multidimensional association rules using static Knowledge 3

Page 36: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Discretization? 14 Explain what are additional rule constraints to guide mining? Understand 3

Explain, how can we tell which strong association rules are really interesting? Explain with an example?

16 Describe about the correlation analysis using Chi-square? Knowledge 3 17 Apply the following rules on a database has five transactions. Let min sup =

60% and min con f = 80%.

TID items bought

T100 {M, O, N, K, E, Y}

T200 {D, O, N, K, E, Y }

T300 {M, A, K, E}

T400 {M, U, C, K, Y}

T500 {C, O, O, K, I ,E}

(a) Find all frequent itemsets using Apriori .

(b) List all of the strong association rules (with support s and

confidence

(c) matching the following metarule, where X is a variable

representing customers, and itemi denotes variables representing items (e.g.,

“A”, “B”, etc.):

∀x ∈ transaction, buys(X , item1) ∧ buys(X , item2) ⇒ buys(X ,

item3) [s, c]

Apply 2

18 Describe about the Mining closed Frequent Itemset Knowledge 2 19 Write a short example to show that items in a strong association rule

may actually be negatively correlated.

Apply 3

20 Explain Association rule mining often generates a large number of rules. Discuss effective methods that can be used to reduce the number of rules generated while still preserving most of the interesting rules.

Understand 3

Part – C (Problem Solving and Critical Thinking Questions) 1 The Apriori algorithm uses prior knowledge of subset support

properties. Analyze (a) That all nonempty subsets of a frequent itemset must also be frequent. (b) The support of any nonempty subset s 0 of itemset s must be at least as great as the support of s. (c) Given frequent itemset l and subset s of l, prove that the confidence of the rule “s 0 ⇒ (l − s 0 )” cannot be more than the confidence of “s ⇒ (l –s)”, where s 0 is a subset of s. (d) A partitioning variation of Apriori subdivides the transactions of a database D into n nonoverlapping partitions. Prove that any itemset that is frequent in D must be frequent in at least one partition of D.

Analyze 3

2 Implement three frequent itemset mining algorithms introduced in this chapter : (1) Apriori [AS94], (2) FP-growth [HPY00], and (3) ECLAT [Zak00] (mining using vertical data format), using a programming language that you are familiar with, such as C++ or Java.

Understand 2

Page 37: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Compare the performance of each algorithm with various kinds of large data set. Write a report to analyze the situations (such as data size, data distribution, minimal support threshold setting, and pattern density) where one algorithm may perform better than the others, and state why.

3 Suppose that a large store has a transaction database that is distributed among four locations. Transactions in each component database have the same format , namely Tj : {i1, . . . , im}, where Tj is a transaction identifier, and ik (1 ≤ k ≤ m) is the identifier of an item purchased in the transaction. Construct an efficient algorithm to mine global association rules (without considering multilevel associations). You may present your algorithm in the form of an outline. Your algorithm should not require shipping all of the data to one site and should not cause excessive network communication overhead.

Apply 3

4 Suppose that frequent itemsets are saved for a large transaction database, DB. Illustrate how to efficiently mine the (global) association rules under the same minimum support threshold if a set of new transactions, denoted as ∆DB, is (incrementally) added in?

Apply 3

5 Most frequent pattern mining algorithms consider only distinct items in a transaction However, multiple occurrences of an item in the same shopping basket, such as four cakes and three jugs of milk, can be important in transaction data analysis.

Analyze how can one mine frequent itemsets efficiently considering multiple occurrences of items? Propose modifications to the well-known algorithms, such as Apriori and FP-growth, to adapt to such a situation.

Analyze 1

6 A database has five transactions. Let min sup = 60% and min con f = 80%.

TID items bought

T100 {M, O, N, K, E, Y}

T200 {D, O, N, K, E, Y }

T300 {M, A, K, E}

T400 {M, U, C, K, Y}

T500 {C, O, O, K, I ,E}

Examine the following

(d) Find all frequent itemsets using FP-growth.

(e) List all of the strong association rules (with support s and confidence c)

matching the following metarule, where X is a variable representing

customers, and itemi denotes variables representing items (e.g., “A”, “B”,

etc.):

∀x ∈ transaction, buys(X , item1) ∧ buys(X , item2) ⇒ buys(X ,

item3)

[s, c]

Knowledge 3

7 The following contingency table summarizes supermarket transaction data, Knowledge 2

Page 38: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

where hot dogs refers to the transactions containing hot dogs, hot dogs refers to the transactions that do not contain hot dogs, hamburgers refers to the transactions containing hamburg- ers, and hamburgers refers to the transactions that do not contain hamburgers.

hot dogs hot dogs row

hamburgers 2,000 500 2,500

hamburgers 1,000 1,500 2,500

col 3,000 2,000 5,000

Observe that the association rule “hot dogs ⇒ hamburgers” is mined.

Given a minimum support threshold of 25% and a minimum

confidence threshold of 50%, is this association rule strong? Based on

the given data, is the purchase of hot dogs independent of the purchase

of hamburgers? If not, what kind of correlation relationship exists

between the two? 8 Sequential patterns can be mined in methods similar to the mining of

association rules. Design an efficient algorithm to mine multilevel sequential patterns from a transaction database. An example of such a pattern is the following: “A customer who buys a PC will buy Microsoft software within three months,” on which one may drill down to find a more refined version of the pattern, such as “A customer who buys a Pentium PC will buy Microsoft Office within three months.”

Create 2

9 The price of each item in a store is nonnegative. The store manager is only interested in rules of the form: “one free item may trigger $200 total purchases in the same transaction.” Describe how to mine such rules efficiently.

Knowledge 2

10 The price of each item in a store is nonnegative. For each of the following cases, identify the kinds of constraint they represent and briefly discuss how to mine such association rules efficiently. (a) Containing at least one Nintendo game (b) Containing items the sum of whose prices is less than $150 (c) Containing one free item and other items the sum of whose prices is at least $200 (d) Where the average price of all the items is between $100 and $500

Understand 2

UNIT-IV Part – A (Short Answer Questions)

1 State classification? Understand 2 2 Define regression analysis? Knowledge 2 3 Name the steps in data classification? Understand 2 4 Define training tuple? Knowledge 2 6 Describe accuracy of a classifier? Knowledge 2 7 Differentiate supervised learning and unsupervised learning? Understand 3 8 Define the decision tree? Understand 2 9 Define information gain? Knowledge 2 10 State gain ratio? Understand 2 11 State Gini index? Understand 3 12 Explain tree pruning? Understand 3 14 Define the construction of naïve Bayesian classification? Understand 2 15 Explain the IF-THEN rules for classification? Understand 3 16 Explain Decision Tree Induction? Understand 3 17 List the Attribute Selection Measures? Knowledge 3 18 Define Bayes‟ Theorem? Understand 3

Page 39: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

19 Define Naïve Bayesian Classification? Knowledge 3 20 Explain K-Nearest-Neighbor Classifiers? Understand 3

Part – B (Long Answer Questions) 1 Explain about the classification and prediction? Example with

an example?

2 Discuss about basic decision tree induction algorithm? Understand 2 3 Explain briefly various measures associated with attribute selection? Understand 3

4 Summarize how does tree pruning work? What are some enhancements to basic decision tree induction?

Understand 3

5 Explain how scalable is decision tree induction? Explain? Understand 3 6 Describe the working procedures of simple Bayesian classifier? Knowledge 2

7 Explain Bayesian Belief Networks? Understand 2

8 Discuss about k-nearest neighbor classifier and case-based reasoning? Understand 1

9 Explain about classifier accuracy? Explain the process of measuring the accuracy of a classifier? Understand 2

10 Describe any ideas can be applied to any association rule mining be applied to classification? Knowledge 3

11 Explain briefly about the Navie Bayesian Classification? Knowledge 3

12 Explain about the major issues regarding classifications and predictions? Understand 3

13 Differentiate classification and prediction methods? Understand 3 14 Explain briefly various measures associated with attribute selection? Understand 3 15 Explain training of Bayesian belief networks? Understand 3 16 Explain how tree pruning useful in decision tree induction? What is a

drawback of using a separate set of tuples to evaluate pruning? Understand 2

17 Explain for a given a decision tree, you have the option of (a) converting the decision tree to rules and then pruning the resulting rules, or (b) pruning the decision tree and then con- verting the pruned tree to rules. What advantage does (a) have over (b)?

Understand 2

18 Compare the advantages and disadvantages of eager classification (e.g., decision tree, Bayesian, neural network) versus lazy classification (e.g., k-nearest neighbor, case- based reasoning).

Understand 2

19 Write an algorithm for k-nearest-neighbor classification given k and n, the number of attributes describing each tuple.

Apply 2

20 Describe each of the following clustering algorithms in terms of the following criteria: (i) shapes of clusters that can be determined; (ii) input para- meters that must be specified; and (iii) limitations. (a) k-means (b) k-medoids

Knowledge 3

Part – C (Problem Solving and Critical Thinking Questions) 1 Illustrate why is tree pruning useful in decision tree induction?

Explain the drawback of using a separate set of tuples to evaluate pruning?

Apply 2

2 Given a decision tree, you have the option of (a) converting the decision tree to rules and then pruning the resulting rules, or (b) pruning the decision tree and then converting the pruned tree to rules. Explain advantage does (a) have over (b)?

Understand 3

3 Outline the major ideas of naive Bayesian classification. Explain why is naïve Bayesian classification called “naive”?

Understand 3

4 Design an efficient method that performs effective naıve Bayesian classification over an infinite data stream (i.e., you can scan the data stream only once). If we wanted to discover the evolution of such classification schemes (e.g., comparing the classification

Create 3

Page 40: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

scheme at this moment with earlier schemes, such as one from a week ago),Construct modified design would you suggest?

5 The support vector machine (SVM) is a highly accurate classification method. However, SVM classifiers suffer from slow processing when training with a large set of data tuples. Explain how to overcome this difficulty and develop a scalable SVM algorithm for efficient SVM classification in large datasets.

Understand 3

6 It is important to calculate the worst-case computational complexity of the decision tree algorithm. Given data set D, the number of attributes n, and the number of training tuples |D|, Show that the computational cost of growing a tree is at most n×|D| × log(|D|).

Understand 3

7 Given a 5 GB data set with 50 attributes (each containing 100 distinct

values) and 512 MB of main memory in your laptop, outline an efficient

method that constructs decision trees in such large data sets. Justify your

answer by rough calculation of your main memory usage.

Create 2

8 What is associative classification? Why is associative classification able to achieve higher classification accuracy than a classical decision tree method? Explain how associative classification can be used for text document classification.

Understand 2

9 It is difficult to assess classification accuracy when individual data objects

may belong to more than one class at a time. In such cases, Explain on

what criteria you would use to compare different classifiers modeled

after the same data.

Understand 2

10 Describe each of the following clustering algorithms in terms of the following criteria: (i) shapes of clusters that can be determined; (ii) input para- meters that must be specified; and (iii) limitations. (a) k-means (b) k-medoids (c) CLARA (d) BIRCH (e) ROCK (f) Chameleon (g) DBSCAN

Understand 3

UNIT-V Part - A (Short Answer Questions)

1 Define Clustering? Knowledge 3 2 Illustrate the meaning of cluster analysis? Apply 2 3 Explain the fields in which clustering techniques are used? Understand 2 4 List out the requirements of cluster analysis? Knowledge 2 5 Express the different types of data used for cluster analysis? Understand 3 6 State interval scaled variables? Knowledge 3

7 Define Binary variables? And what are the two types of binary variables? Knowledge 3

8 Define nominal, ordinal and ratio scaled variables? Knowledge 3 9 Illustrate mean by partitioning method? Apply 3 10 Define CLARA and CLARANS? Knowledge 3 11 State hierarchical method? Knowledge 2 12 Differentiate agglomerative and divisive hierarchical clustering? Analyze 3 13 State K-Means method? Knowledge 3 14 Define Outlier Detection? Knowledge 2 20 Define Chameleon method? Knowledge 2

Part - B (Long Answer Questions) 1 Discuss the various types of data in cluster analysis? Understand 3 2 Explain the categories of major clustering methods? Understand 3

Page 41: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Write algorithms for k-means and k-medoids? Explain? Understand 3 4 Describe the different types of hierarchical methods? Understand 3 5 Demonstrate about the following hierarchical methods

a) BIRCH b) Chamelon

Understand 3

6 Explain about semi-supervised cluster analysis? Understand 3 7 Explain about the outlier analysis? Understand 3 8 Define the distance-based outlier? Illustrate the efficient algorithms

for mining distance-based algorithm?

Knowledge 3

9 Explain about the Statistical-based outlier detection? Understand 2 10 Describe about the distance-based outlier detection? Knowledge 2 11 Discuss about the density-based outlier detection? Understand 2 12 Demonstrate about the deviation-based outlier detection techniques? Apply 3 13 Demonstrate about the BIRCH hierarchical methods? Apply 3 14 Demonstrate about the ROCK(Robust Clustering using links)

hierarchical methods? Apply 3

15 Explain about the agglomerative and divisive hierarchical methods? Understand 3 16 Demonstrate how to compute the dissimilarity between objects

described by the following types of variables: (a) Numerical (interval-scaled) variables (b) Asymmetric binary variables (c) Categorical variables (d) Ratio-scaled variables (e) Nonmetric vector objects

Apply 2

17 Apply the following measurements for the variable age: 18, 22, 25, 42, 28, 43, 33, 35, 56, 28, standardize the variable by the following: (a) Compute the mean absolute deviation of age. (b) Compute the z-score for the first four measurements.

Apply 2

18 Illustrate the strength and weakness of k-means in comparison with the k-medoids algorithm. Also, illustrate the strength and weakness of these schemes in comparison with a hierarchical clustering scheme (such as AGNES).

Understand 2

19 Explain why is outlier mining important? Briefly describe the different approaches behind statistical-based outlier detection, distanced-based outlier detection, density-based local out- lier detection, and deviation-based outlier detection.

Understand 2

20 Apply the given following measurements for the variable age: 28, 32, 15, 42, 28, 43, 30, 32, 55, 26, standardize the variable by the following: (a) Compute the mean absolute deviation of age. (b) Compute the z-score for the first four measurements.

Apply 2

Part – C (Problem Solving and Critical Thinking Questions) 1

Given the following measurements for the variable age: 48, 12, 25, 42, 28,43,33,35, 56, 28, standardize the variable by the following: Compute (a) The mean absolute deviation of age. (b)The z-score for the first four measurements.

Apply 2

2 Given two objects represented by the tuples (22, 1, 42, 10) and (20, 0, 36,8): Compute (a) The Euclidean distance between the two objects. (b)The Manhattan distance between the two objects. (c) The Minkowski distance between the two objects, using p = 3.

Apply 3

Page 42: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Suppose that the data mining task is to cluster the following eight points(with (x,y) representing location) into three clusters. A1(2, 10), A2(2, 5), A3(8, 4), B1(5, 8),B2(7, 5), B3(6, 4), C1(1, 2), C2(4, 9). The distance function is Euclidean distance. Suppose initially we assign A1, B1, and C1 as the center of each cluster, respectively. Use the k-means algorithm to show only (a) The three cluster centers after the first round of execution and (b) The final three clusters

Apply 3

4 Explain why is it that BIRCH encounters difficulties in finding clusters of arbitrary shape but OPTICS does not? Can you propose some modifications to BIRCH to help it find clusters of arbitrary shape?

Analyze 3

5 Clustering has been popularly recognized as an important data mining task with broad applications. Show one application example for each of the following cases: (a) An application that takes clustering as a major data mining function (b) An application that takes clustering as a preprocessing tool for data preparation for other data mining tasks

Apply 2

6 Clustering has been popularly recognized as an important data mining task with broad applications. Give example for each of the following cases: (a) An application that takes clustering as a major data mining function (b) An application that takes clustering as a preprocessing tool for data preparation for other data mining tasks

Understand 3

7 Data cubes and multidimensional databases contain categorical, ordinal, and numerical data in hierarchical or aggregate forms. Based on what you have learned about the clustering methods, Design a clustering method that finds clusters in large data cubes effectively and efficiently.

Create 3

8 Human eyes are fast and effective at judging the quality of clustering methods for two- dimensional data. Design a data visualization method that may help humans visualize data clusters and judge the clustering quality for three-dimensional data? What about for even higher-dimensional data?

Create 3

9 Given the following measurements for the variable age: 29, 31, 25, 41, 27,43,33,35 56, 28, standardize the variable by the following: Compute (a) The mean absolute deviation of age. (b)The z-score for the first three measurements.

Apply 2

10 Given two objects represented by the tuples (21, 2, 41, 11) and (21, 1, 32,6): Compute (a) The Euclidean distance between the two objects. (b)The Manhattan distance between the two objects. (c) The Minkowski distance between the two objects, using p = 2.

Apply 2

Prepared by: HOD, CSE

Page 43: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title : DESIGN PATTERNS

Course Code : 58063

Course Structure : Lectures Tutorials Practicals Credits

4 - - 4

Course Faculty : L DHANA LAKSHMI Assoc.Prof

I. COURSE OVERVIEW: The course covers a wide range of software development concepts, abilities, and skills, from

analyzing a problem to implementing a solution, also discuss the design patterns in Smalltalk MVC

architecture, Express representation invariants, understand their impact on efficiency an66 d ease of

implementation, and implement them as runtime assertions. Outlines the differences between

structural patterns and behavioral patterns of a model. The course Explains about common design

vocabulary. This course helps to determine how to be recognizing a design and they can reduce the

amount of refactoring, helps to use primitive techniques such as objects, inheritance, and

polymorphism. Describes problems that occur in a design how to resolve them and how to evaluate

them.

II. PREREQUISITES:

Level Credits Periods/Week Prerequisites

UG 4 4 Object Oriented Programming concepts, basic notations

of design, and basic data structures such as arrays, hash

tables, trees and lists.

III. COURSE ASSESSMENT METHODS:

Session Marks University End

Exam Marks

Total

Marks Mid Semester Test

There shall be 2 midterm examinations. Each midterm examination

consists of subjective type and Objective type tests.

The subjective test is for 10 marks, with duration of 1 hour.

Subjective test of each semester shall contain 4 questions; the

student has to answer 2 questions, each carrying 5 marks.

The objective type test is for 10 marks with duration of 20

minutes. It consists of 10 Multiple choice and 10 objective type

questions, the student has to answer all the questions and each

carries half mark. First midterm examination shall be conducted for

the first four units of syllabus and second midterm examination

shall be conducted for the remaining four units. Five marks are

given for assignments. There shall be two assignments in every

theory course. Marks shall be awarded considering the average of

two assignments in each course.

75

1000

Page 44: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

IV. EVALUATION SCHEME:

S.No Component Duration Marks

1 I Mid Examination 80 Minutes 20

2 I Assignment - 05

3 II Mid Examination 80 Minutes 20

4 II Assignment - 05

5 External Examination 3 Hours 75

V. COURSE OBJECTIVES:

1. Demonstration of patterns related to object oriented design.

2. Describe the design patterns that are common in software applications.

3. Analyze a software development problem and express it.

4. Design a module structure to solve a problem, and evaluate alternatives;

5. Implement a module so that it executes efficiently and correctly;

6. Appreciate engineering issues in the development of software, such as the importance of addressing the

user's concerns, working with limited resources, maintainability and dependability.

7. Describes creational, structural and behavioural patterns.

8. Demonstrates the Case Study on designing a document editor.

VI. COURSE OUTCOMES:

Upon completion of this course, students will be able to:

1. Construct a design consisting of a collection of modules.

2. Exploit well-known design patterns (such as Iterator, Observer, Factory and Visitor).

3. Express the appropriate roles of sub typing and inheritance, and use them effectively.

4. Ability to understand and apply common design patterns to incremental/iterative development.

5. Ability to identify appropriate patterns for design of given problem.

6. Applying the software development concepts, abilities, and skills, from analyzing a problem for

implementing a solution.

VII. HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes Level Proficiency assessed by PO1 Engineering knowledge: Apply the knowledge of

mathematics, science, engineering fundamentals,

and an engineering specialization to the solution of

complex engineering problems.

H Assignment, Exercises

PO2 Problem analysis: Identify, formulate, review

research literature, and analyze complex

engineering problems reaching substantiated

conclusions using first principles of mathematics,

natural sciences, and engineering sciences.

S Exercises

PO3 Design/development of solutions: Design

solutions for complex engineering problems and

design system components or processes that meet

the specified needs with appropriate consideration

for the public health and safety, and the cultural,

societal, and environmental considerations.

S Exercises

Page 45: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

PO4 Conduct investigations of complex problems:

Use research-based knowledge and research

methods including design of experiments, analysis

and interpretation of data, and synthesis of the

information to provide valid conclusions.

N ……..

PO5 Modern tool usage: Create, select, and apply

appropriate techniques, resources, and modern

engineering and IT tools including prediction and

modelling to complex engineering activities with

an understanding of the limitations.

H Design, Exercises

PO6 The engineer and society: Apply reasoning

informed by the contextual knowledge to assess

societal, health, safety, legal and cultural issues and

the consequent responsibilities relevant to the

professional engineering practice.

N ……..

PO7 Environment and sustainability: Understand the

impact of the professional engineering solutions in

societal and environmental contexts, and

demonstrate the knowledge of, and need for

sustainable development.

H Assignment, Exercises

PO8 Ethics: Apply ethical principles and commit to

professional ethics and responsibilities and norms

of the engineering practice.

S Seminars, Discussions

PO9 Individual and team work: Function effectively

as an individual, and as a member or leader in

diverse teams, and in multidisciplinary settings.

H Workshop

PO10

Communication: Communicate effectively on

complex engineering activities with the

engineering community and with society at large,

such as, being able to comprehend and write

effective reports and design documentation, make

effective presentations, and give and receive clear

instructions.

S Seminars, Paper

presentations

PO11 Project management and finance: Demonstrate

knowledge and understanding of the engineering

and management principles and apply these to

one‟s own work, as a member and leader in a team,

to manage projects and in multidisciplinary

environments.

H Design Exercises,

Discussions

PO12

Life-long learning: Recognize the need for, and

have the preparation and ability to engage in

independent and life-long learning in the broadest

context of technological change.

S Exams, Discussions

Page 46: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design suitable

algorithms, develop and maintain software for real world problems.

H

Projects

N - None S - Supportive H - Highly Related

IX. SYLLABUS: UNIT – I Introduction: What is a Design Pattern?, Design Patterns in Smalltalk MVC, Describing Design Patterns, Catalog of Design Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design Problems, How to Select a Design Pattern, How to Use a Design Pattern. UNIT – II A Case Study: Designing a Document Editor: Design Problems, Document Structure, Formatting, Embellishing the User Interface, Supporting Multiple Look-and-Feel Standards, Supporting Multiple Window Systems, User Operations, Spelling Checking and Hyphenation, Summary. Creational Patterns: Abstract Factory, Builder, Factory Method, Prototype, Singleton, Discussion of Creational Patterns. UNIT – III Structural Patterns Part I: Adapter, Bridge, Composite. Structural Patterns Part II: Decorator, acade , Flyweight, Proxy.

UNIT – IV Behavioral Patterns Part I: Chain of Responsibility, Command, Interpreter, Iterator. Behavioral Patterns Part II: Mediator, Memento, Observer. UNIT – V Behavioral Patterns Part III (Cont‟d): State, Strategy, Template Method, Visitor, Discussion of Behavioral Patterns. What to Expect from Design Patterns, A Brief History, The Pattern Community An Invitation, A Parting Thought.

Text books:

1. Design Patterns by Erich Gamma, Pearson Education.

Reference books:

1. Pattern‟s in JAVA Vol-I by Mark Grand, Wiley DreamTech.

2. Pattern‟s in JAVA Vol-II by Mark Grand, Wiley DreamTech.

3. JAVA Enterprise Design Patterns Vol-III by Mark Grand, Wiley DreamTech.

4. Head First Design Patterns by Eric Freeman-Oreilly-spd.

5. Peeling Design Patterns, Prof. Meda Srinivasa Rao, Narsimha Karumanchi, CareerMonk

Publications.

Page 47: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

6. Design Patterns Explained by Alan Shalloway, Pearson Education.

7. Pattern Oriented Software Architecture, F. Buschmann & Others, John Wiley & Sons.

X. COURSE PLAN:

The course plan is meant as a guideline. There may probably be changes.

Lecture

No

Course Learning Outcomes Topics to be covered References

1-3 Recognize the importance of design

and design patterns.

What is a design pattern?, Design

patterns in Smalltalk MVC. T1 pg:1-6

4-8 Listing contents of catalog of

design patterns.

Describing Design Patterns, The

Catalog of Design Patterns, Organizing

the Catalog.

T1 pg:6-11

9-12 Determine object granularity and

specify object interfaces.

How Design Patterns Solve Design

Problems, How to Select a Design

Pattern, How to use a Design Pattern.

T1 pg:11-29

13-18 Outlines the problems of Lexi‟s

design.

Designing a Document Editor: Design

Problems, Document Structure,

Formatting, Embellishing the User

Interface.

T1 pg:33-43

19-22 Summarize command class and

subclasses.

Supporting Multiple Look-and Feel

Standards, Supporting Multiple

Window Systems.

T1 pg:47-51

23-27 Describe interactor class and

subclasses.

User Operations Spelling Checking and

Hyphenation, Summary. T1 pg:58-76

28-35 Lists out the importance of

creational patterns.

Abstract Factory, Builder, Factory

Method. T1 pg:87-107

36-40 Reviews the importance of prototype

pattern.

Prototype, Singleton, Discussion of

Creational Patterns. T1 pg:117-135

41-44 Identify the importance of structural

patterns.

Adapter, Bridge, Composite. T1 pg:139-163

45-49 Summarizes the implementation

issues when applying the bridge

pattern.

Decorator, Façade, Flyweight, Proxy.

T1 pg:175-207

50-52 Outlines the importance of

behavioral patterns.

Chain of Responsibility, Command,

Interpreter, Iterator. T1 pg:223-257

53-55 Use of observer, state, strategy in

behavioral patterns.

Mediator, Memento, Observer, State,

Strategy. T1 pg:273-315

56-58 Identify the need of template

method.

Template Method, Visitor, Discussion

of Behavioral Patterns. T1 pg:325-345

59 Summarizes the importance of

design patterns.

What to Expect from Design Patterns, A

Brief History. T1 pg:351-355

60 Reviews the template of design

patterns.

The Pattern Community An Invitation,

A Parting Thought. T1 pg:356-358

Page 48: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF

PROGRAM OUTCOMES:

Course

Objectives

Program Outcomes

Program

Specific

Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO9 PO10 PO11 PO12 PSO1 PSO2

1 S H S

2 S H

3 S S S

4 H

5 H S S S

6 H

7 H S S

8 S H S

S= Supportive H = Highly Related

XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF

PROGRAM OUTCOMES:

Course

Outcomes

Program Outcomes

Program

Specific

Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO9 PO10 PO1

1

PO12 PSO1 PSO2

1 S

2 S S H

3 H H S

4 H S

5 S

6 S

S= Supportive H = Highly Related

Page 49: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT

Course Name DESIGN PATTERNS

Course Code A70530

Class IV B. Tech I Semester

Branch Computer Science and Engineering

Year 2015 - 16

Course Faculty L DHANA LAKSHMI Assoc.Prof

OBJECTIVES To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating

philosophy of outcome based education in the process of problem solving and career development. So, all students of

the institute should understand the depth and approach of course to be taught through this question bank, which will

enhance learner‟s learning process.

ASSIGNMENT – I

S. No Question Blooms

Taxonomy Level

Course

Outcome

UNIT - I

1. List the advantages of design patterns. Write short notes on use of

design patterns.

Knowledge 2

2. Discuss the MVC architecture in small talk. Understand 2

3. Explain how to describe design patterns. Understand 1

4. List the different sections of design patterns. Explain about them. Knowledge 1

5. Name the patterns along with their intents that are included in the

catalog of design patterns.

Apply 2

6. State and Explain the classification of design patterns. knowledge 3

7. List the various ways of organizing the design patterns. Knowledge 2

8. Compare inheritance verses parameterized types. Evaluate 3

9. Explain the Design patterns relationships Understand 2

10. Compare run-time and compile-time structure Analyze 4

11. List the common causes for redesigning of design patterns Knowledge 3

12. Explain the Frameworks in detail Understand 2

13. Write about the role of Toolkit in designing pattern Understand 2

14. Explain how Delegation is used in design pattern Knowledge 2

Page 50: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

15. Explain the Catalogs of design patterns Understand 2

UNIT - II

1. Explain the process of recursive composition in building a

document.

Understand 2

2. Explain in detail about the „Glyph‟ abstract class. Understand 3

3. Discuss the goals and constraints in choosing an internal

representation for a document.

Understand 3

4. Explain partial Glyph class hierarchy with a neat diagram. Understand 3

5. Explain composition and compositor class relationship with a

neat diagram.

Understand 2

6. Define formatting. How can the textual analysis problem of

document editor be solved using design patterns?

Knowledge 4

7. Discuss the two embellishments that can be added to Lexi‟s user

interface. Signify the role of decorator pattern in embellishment.

Understand 4

8. Explain about abstracting object creation in detail. Understand 2

9. Memorize the useful techniques for implementing the abstract

factory pattern.

Evaluate 2

10. Give the sample code for abstract factory design pattern. Understand 2

11. Explain the implementation of abstract factory. Understand 2

12. Discuss about structure, applicability, participants of abstract

factory method.

Understand 4

13. Discuss the implementation issues of builder design pattern. Understand 4

14. Explain the structure of builder design pattern with class diagram

and describe the collaboration with a sequence diagram.

Understand 3

15. Describe in detail about how Multiple Window Systems is

supported

Knowledge 2

UNIT – III

1. Describe the intent, motivation and applications of composite

patterns. knowledge 1

2. Discuss the importance of implementation in composite structural

pattern. Understand 2

3. Give the intent, applicability and structure of composite design

pattern and Explain it. Understand 1

4. Explain the structure of composite pattern with a class diagram. Understand 2

5. Describe the consequences of composite design pattern. knowledge 3

6. Explain composite pattern with an example from drawing editor. Understand 2

7. Explain the structure of decorator pattern with suitable example. Understand 2

8. Explain the motivation for decorator method with relevant

patterns. Understand

2

9. Sketch the structure of composite pattern. Knowledge 2

10. Define composite and Proxy pattern Understand 2

ASSIGNMENT – II

Page 51: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

1. Explain the structure of decorator design pattern with a class

diagram.

Understand 2

2. Explain the structure of façade design pattern with class diagram

and consequences.

Understand 2

3. Explain the consequences of flyweight method with its structure. Understand 3

4. Explain structure of flyweight pattern with suitable example. Understand 3

5. Explain the structure of decorator design pattern with a class

diagram.

Understand 2

6. Explain the structure of Proxy design pattern with a class

diagram.

Understand 2

7. Explain the structure of Adapter design pattern with class

diagram and consequences.

Understand 2

8. Define Intent and Consequences of bridge pattern. Understand 2

9. Define Façade pattern. Understand 2

10. Define decorator pattern. Understand 2

UNIT – IV

1. Explain the uses of command design pattern and its structure

with class diagram. Also Explain the implementation issues.

Understand 2

2. Explain the implementation and consequences of command

pattern.

Understand 4

3. Explain the implementation issues of command pattern with

sample code.

Understand 4

4. Explain the collaborations and consequences of command

method.

Understand 4

5. Explain the interpreter design pattern and discuss the

consequences and implementation issues.

Understand 4

6. Discuss the implementation issues of Iterator. Understand 4

7. Explain the structure of mediator design pattern with a class

diagram and discuss the collaboration with a sequence diagram.

Understand 3

8. Discuss about intent, motivation, structure, applicability and

consequences of a mediator behavioral pattern.

Understand 2

9. Explain the participants, collaborations, implementation and

sample code of the mediator pattern.

Understand 2

10. Explain the known uses of memento method. Understand 2

11. Explain the uses of Chain of Responsibility design pattern and its

structure with class diagram. Also Explain the implementation

issues.

Understand

2

12. Explain the Observer design pattern and discuss the

consequences and implementation issues.

Understand 2

13. Discuss the consequences and implementation issues of memento

design pattern.

Knowledge 2

14. Explain the uses of Iterator design pattern and its structure with

class diagram

Understand 2

15. Explain the known uses of Observer method Understand 2

UNIT – V

1. Explain the implementation issues of Strategy design pattern. Understand 2

Page 52: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

2. Explain the implementation issues of observer design pattern. Understand 2

3. Explain how design patterns affect the way object-oriented

software is designed.

Understand 3

4. Discuss the several ways the design pattern affect the way object-

oriented software is designed.

Understand 3

5. Discuss design patterns as a supplement to the existing methods. Understand 4

6. Discuss the history of design patterns. Understand 2

7. Differentiate Alexander‟s patterns and Design patterns. Analyze 4

8. Write about the two ways of grouping the patterns according to

Christopher Alexander.

Apply 3

9. Compare and contrast between Abstract Class vs Concrete Class Analyze 3

10. Discuss about Alexander‟s pattern languages Knowledge 2

11. Discuss a briefly history of design patterns Knowledge 2

12. Discuss the consequences and implementation issues of Visitor

design pattern.

Understand 4

13. Discuss about intent, motivation, structure, applicability and

consequences of a Template Method behavioral pattern.

Knowledge 3

14. Explain the State design pattern and discuss the consequences

and implementation issues.

Understand 3

15. Write the sample code for Template method and Visitor patterns Understand 3

COMPUTER SCIENCE AND ENGINEERING

Page 53: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

TUTORIAL QUESTION BANK

Course Name : DESIGN PATTERNS

Course Code : A70530

Class : IV B. Tech I Semester

Branch : Computer Science and Engineering

Year : 2016 – 2017

Course Faculty : L DHANA LAKSHMI Assoc.Prof

OBJECTIVES

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be

addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality

assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of

the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be taught

through this question bank, which will enhance learner‟s learning process.

PART – A (SHORT ANSWER QUESTIONS)

S No Question Blooms

Taxonomy Level

Course

Outcome

UNIT – I

INTRODUCTION:WHAT IS A DESIGN PATTERN

PART – A (SHORT ANSWER QUESTIONS)

1. Define design pattern. Knowledge 2

2. List the four elements of design patterns. Knowledge 1

3. Distinguish a class and an object. Analyze 1

4. Give an example for class structure. Understand 2

5. Sketch MVC architecture. Knowledge 2

6. State the meaning of a solution. Knowledge 1

7. Write the different sections of design patterns. Apply 3

8. Give the meaning of Intent. Understand 4

9. List the four essential elements of design pattern Knowledge 2

10. Define catalog of design patterns Knowledge 2

11. Define the two categories on which design pattern depends Knowledge 2

12. Explain how design patterns solve design problems Understand 4

13. Differentiate Inheritance and composite Analyze 2

14. Explain how to select a design pattern Understand 4

15. List out the patterns used in design patterns Knowledge 2

PART – B (LONG ANSWER QUESTIONS)

1 List the advantages of design patterns. Write short notes on use of Knowledge 2

Page 54: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

design patterns.

2 Discuss the MVC architecture in small talk. Understand 2

3 Explain how to describe design patterns. Understand 1

4 List the different sections of design patterns. Explain about them. Knowledge 1

5 Name the patterns along with their intents that are included in the

catalog of design patterns.

Apply 2

6 State and Explain the classification of design patterns. knowledge 3

7 List the various ways of organizing the design patterns. Knowledge 2

8 Compare inheritance verses parameterized types. Evaluate 3

9 Explain the Design patterns relationships Knowledge 2

10 Compare run-time and compile-time structure Analyze 4

11 List the common causes for redesigning of design patterns Understand 3

12 Explain the Frameworks in detail Knowledge 2

13 Write about the role of Toolkit in designing pattern Knowledge 2

14 Explain how Delegation is used in design pattern Knowledge 2

15 Explain the Catalogs of design patterns Understand 2

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

1. A reputed software company is developing CAD software. It is

required that the software should read licenses details, number of

simultaneous users, permitted features etc., from a configuration file

with a specific syntax. Design the software with suitable design

pattern and Explain with a class diagram. Briefly discuss the

consequences and implementation issues.

Understand

2

2. Discuss the following aspects of behavioral patterns briefly: (i)

Should communication be encapsulated or distributed. (ii) Decoupling

senders and receivers.

Understand

2

3. Write about (i) documentation and learning aid. (ii) Alexander‟s

pattern languages. Apply

4

4. Write the code for connecting two objects by applying suitable design

pattern. Knowledge

4

5. Explain about which optimization technique is used to hide the data

from client. Understand

2

6. Distinguish between inheritance and composition Analyze 4

7. What is the use of object diagram in modeling? Explain. Knowledge 4

8. Explain the step - by - step approach for selecting the design pattern. Knowledge 4

9. Explain the compile time structure of a object oriented program Understand 2

10. List and Explain the reusable object oriented design

aspects of a pattern. Knowledge

4

UNIT – II

A CASE STUDY: DESIGNING A DOCUMENT EDITOR

PART – A (SHORT ANSWER QUESTIONS)

1. Give the meaning of “WYSIWYG”. Understand 3

2. Define Lexi. Knowledge 2

3. Define an abstract class. Knowledge 2

4. Write the meaning of a document. Apply 4

5. Differentiate compositor and composition. Analyze 2

Page 55: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

6. Define formatting. Knowledge 2

7. Define an Iterator class. Knowledge 2

8. Define creational patterns. Knowledge 2

9. List five types of creational patterns. Knowledge 2

10. Define abstract factory design pattern. Knowledge 1

11. Define builder pattern. Knowledge 1

12. Give example of class diagram. Understand 2

13. Define structure and applicability of abstract factory method. Knowledge 2

14. Define the User operations Understand 4

15. Define Prototype design pattern Understand 4

PART – B (LONG ANSWER QUESTIONS)

1. Explain the process of recursive composition in building a document. Understand 2

2. Explain in detail about the „Glyph‟ abstract class. Understand 3

3. Discuss the goals and constraints in choosing an internal

representation for a document.

Understand 3

4. Explain partial Glyph class hierarchy with a neat diagram. Understand 3

5. Explain composition and compositor class relationship with a neat

diagram.

Understand 2

6. Define formatting. How can the textual analysis problem of document

editor be solved using design patterns?

Knowledge 4

7. Discuss the two embellishments that can be added to Lexi‟s user

interface. Signify the role of decorator pattern in embellishment.

Understand 4

8. Explain about abstracting object creation in detail. Understand 2

9. Memorize the useful techniques for implementing the abstract factory

pattern.

Evaluate 2

10. Give the sample code for abstract factory design pattern. Understand 2

11. Explain the implementation of abstract factory. Understand 2

12. Discuss about structure, applicability, participants of abstract factory

method.

Understand 4

13. Discuss the implementation issues of builder design pattern. Understand 4

14. Explain the structure of builder design pattern with class diagram and

describe the collaboration with a sequence diagram.

Understand 3

15. Describe in detail about how Multiple Window Systems is supported Knowledge 2

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

16. Explain how design patterns can solve the design problems of a

document editor. Knowledge 4

17. Discuss in detail about the representation of a document structure Understand 2

18. What is the importance of creational patterns in design of particular

pattern? Understand

2

19. Draw and Explain the structure of abstract factory and also Explain

the various participants involved in it. Knowledge

4

20. Explain the role of formatting in creation of a document editor Knowledge 4

21. What are the liabilities and techniques for implementing the abstract

factory pattern? Explain them. Knowledge

3

22. Draw and Explain the interaction diagram that illustrates the

cooperation between a builder and director. Knowledge

3

23. What are the different criteria that select the right pattern for a given Knowledge 3

Page 56: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

problem?

24. What is the relationship between different participants present in

prototype pattern? Knowledge

2

25. Explain the importance of Look-and-Feel standards in design of a

document Understand

2

UNIT – III

STRUCTURAL PATTERN PART – A (SHORT ANSWER QUESTIONS)

16. Define structural patterns. Knowledge 2

17. List different types of structural patterns. Knowledge 3

18. Discuss the role of participants. Understand 3

19. Define bridge pattern. Knowledge 2

20. Define Intent and Consequences of bridge pattern. Knowledge 3

21. Define composite design pattern. Knowledge 4

22. Sketch the structure of composite pattern. Knowledge 3

23. Define decorator pattern. Knowledge 2

24. List the use of decorator pattern. Knowledge 2

25. Sketch the structure of decorator pattern. Knowledge 1

26. List the benefits of decorator pattern. Knowledge 3

27. Define Façade pattern. Knowledge 2

28. Sketch the structure of Façade pattern. Knowledge 1

29. Define composite pattern Understand 2

30. Define Proxy pattern Understand 2

PART – B (LONG ANSWER QUESTIONS) 1. Describe the intent, motivation and applications of composite

patterns.

knowledge 1

2. Discuss the importance of implementation in composite structural

pattern.

Understand 3

3. Give the intent, applicability and structure of composite design pattern

and Explain it.

Understand 1

4. Explain the structure of composite pattern with a class diagram. Understand 2

5. Describe the consequences of composite design pattern. knowledge 3

6. Explain composite pattern with an example from drawing editor. Understand 2

7. Explain the structure of decorator pattern with suitable example. Understand 2

8. Explain the motivation for decorator method with relevant patterns. Understand 2

9. Explain the structure of decorator design pattern with a class diagram. Understand 2

10. Explain the structure of façade design pattern with class diagram and

consequences.

Understand 3

11. Explain the consequences of flyweight method with its structure. Understand 3

12. Explain structure of flyweight pattern with suitable example. Understand 2

13. Explain the structure of decorator design pattern with a class diagram. Understand 2

14. Explain the structure of Proxy design pattern with a class diagram. Understand 2

15. Explain the structure of Adapter design pattern with class diagram

and consequences.

Understand 2

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS) 16. Explain the significance of proxy patterns with a suitable example. Understand 2

Page 57: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

17. Explain the applicability and collaborations of a adapter pattern Understand 2

18. Explain how to decouple the abstraction from its implementation. Knowledge 4

19. Write and Explain the consequences, applicability and

implementation issues of a flyweight patterns. Understand 2

20. Explain the role of creational patterns in design of the patterns Knowledge 4

21. Distinguish between abstract class and concrete class Analyze 2

22. Explain the role of interaction diagrams in design patterns. Understand 2

23. What are the different issues to be considered while applying the

decorator pattern? Understand 2

24. What relation exists between the different participants involved in

composite pattern? Explain it in detail. Understand 2

25. Draw and Explain the multiple inheritance interface that illustrates

relation between different participants in the adapter pattern. Knowledge 4

UNIT – IV

BEHAVIORAL PATTERNS

PART – A (SHORT ANSWER QUESTIONS)

16. Define behavioral pattern. Knowledge 2

17. Define behavioral class pattern. Knowledge 2

18. Define behavioral object pattern. Knowledge 2

19. Define command pattern. Knowledge 2

20. Sketch sequence diagram for any example pattern. Knowledge 3

21. Sketch the structure of server in election commission. Knowledge 3

22. Define interpreter pattern. Knowledge 2

23. Write the intentions of mediator pattern. Apply 3

24. Define mediator pattern. Knowledge 2

25. Sketch the structure of mediator pattern. Knowledge 1

26. Write about Chain of Responsibility Understand 2

27. Define Memento pattern Knowledge 2

28. Define Observer pattern Knowledge 2

29. Define Iterator pattern Knowledge 2

30. Sketch the structure and applicability of Observer pattern Knowledge 3

PART – B (LONG ANSWER QUESTIONS)

1. Explain the uses of command design pattern and its structure with

class diagram. Also Explain the implementation issues.

Understand 2

2. Explain the implementation and consequences of command pattern. Understand 4

3. Explain the implementation issues of command pattern with sample

code.

Understand 4

4. Explain the collaborations and consequences of command method. Understand 4

5. Explain the interpreter design pattern and discuss the consequences

and implementation issues.

Understand 4

6. Discuss the implementation issues of Iterator. Understand 4

7. Explain the structure of mediator design pattern with a class diagram

and discuss the collaboration with a sequence diagram.

Understand 3

8. Discuss about intent, motivation, structure, applicability and

consequences of a mediator behavioral pattern.

Understand 2

Page 58: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

9. Explain the participants, collaborations, implementation and sample

code of the mediator pattern.

Understand 2

10. Explain the known uses of memento method. Understand 2

11. Explain the uses of Chain of Responsibility design pattern and its

structure with class diagram. Also Explain the implementation issues.

Understand 2

12. Explain the Observer design pattern and discuss the consequences and

implementation issues.

Understand 2

13. Discuss the consequences and implementation issues of memento

design pattern.

2

14. Explain the uses of Iterator design pattern and its structure with class

diagram

Understand 2

15. Explain the known uses of Observer method Understand 2

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

1. List and Explain the various constructors and functions present in

iterator and list-iterator Understand

2

2. What are the issues to be considered when designing the chain of

responsibility

pattern?

Knowledge

4

3. List and Explain the variants and alternatives of iterator pattern. Understand 2

4. What is the motivation for mediator pattern? Explain Understand 2

5. What is an iterator? Explain the various operations that an iterator

supports. Explain them in detail. Knowledge

4

6. List and Explain the variants and alternatives of iterator pattern. Knowledge 4

7. Give brief description about the command history. Knowledge 4

8. List and Explain the various participants involved

in design of the interpreter Knowledge

4

9. Explain Double Dispatch and Single Dispatch for behavioral design

pattern Understand

2

10. What are the two models used in behavioral pattern? Knowledge 4

UNIT – V

BEHAVIORAL PATTERNS-II

PART – A (SHORT ANSWER QUESTIONS)

1. Write the intent of memento pattern. Apply 3

2. Sketch the structure of memento pattern. Knowledge 3

3. Define the phrase “objects for states”. Knowledge 3

4. Define state pattern. Knowledge 2

5. Sketch the structure of state pattern. Knowledge 3

6. List the situations where state pattern can be used. Knowledge 2

7. Define table driven approach. Knowledge 4

8. Write the sample code for Strategy pattern Understand 2

9. Write about the collaborations of Visitor pattern Knowledge 2

Page 59: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S No Question Blooms

Taxonomy Level

Course

Outcome

10. Explain about the consequences of Template pattern Knowledge 3

11. Write about the Pattern community Knowledge 3

12. Explain about the patterns in software Knowledge 2

13. Write about the lifecycle of Object Oriented Software Understand 4

14. Explain how objects are used as arguments Knowledge 4

15. Define double-dispatch and single-dispatch Understand 3

PART – B (LONG ANSWER QUESTIONS)

1. Explain the implementation issues of Strategy design pattern. Understand 2

2. Explain the implementation issues of observer design pattern. Understand 2

3. Explain how design patterns affect the way object-oriented software

is designed.

Understand 3

4. Discuss the several ways the design pattern affect the way object-

oriented software is designed.

Understand 3

5. Discuss design patterns as a supplement to the existing methods. Understand 4

6. Discuss the history of design patterns. Understand 2

7. Differentiate Alexander‟s patterns and Design patterns. Analyze 4

8. Write about the two ways of grouping the patterns according to

Christopher Alexander.

Apply 3

9. Compare and contrast between Abstract Class vs Concrete Class Analyze 3

10. Discuss about Alexander‟s pattern languages Knowledge 2

11. Discuss a briefly history of design patterns Knowledge 2

12. Discuss the consequences and implementation issues of Visitor design

pattern.

Knowledge 4

13. Discuss about intent, motivation, structure, applicability and

consequences of a Template Method behavioral pattern.

Knowledge 3

14. Explain the State design pattern and discuss the consequences and

implementation issues.

Understand 3

15. Write the sample code for Template method and Visitor patterns Understand 3

PART – C (PROBLEM SOLVING AND CRITICAL THINKING QUESTIONS)

1. Discuss with suitable scenarios, how state, strategy and visitor

patterns can solve design problems. Understand

2

2. What to except from design pattern Understand 3

3. Explain the importance of object diagram in modeling, With the help

of a suitable example Knowledge

4

4. What is a template? In which way a design pattern will be described.

Explain in detail Understand

2

5. Explain the common causes for redesign a design pattern Understand 2

6. Explain the role of behavioral patterns in design of the patterns. Understand 2

7. What is the key idea of state pattern? Explain it in detail. Understand 2

8. Explain Documentation, Learning –Aid and An Adjunct to existing

systems in detail. Knowledge

4

9. “Should Communication encapsulated or distributed” Explain. Knowledge 4

10. Explain Decoupling senders and receivers. Knowledge 4

Page 60: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title INFORMATION RETREVAL SYSTEM

Course Code A70533

Regulation R13 - JNTUH

Course Structure Lectures Tutorials Practical‟s Credits

4 - - 4

Course Faculty K SURESH Asst.Prof

I. COURSE OVERVIEW:

The main objective of this course is to present the scientific support in the field of information

search and retrieval. This course explores the fundamental relationship between information retrieval, hypermedia architectures, and semantic models, thus deploying and testing several

important retrieval models such as vector space, Boolean and query expansion. It discusses implementation and evaluation issues of new algorithms like clustering, pattern searching, and

stemming with advanced data/file structures, indirectly facilitating a platform to implement comprehensive catalogue of information search tools while designing an e-commerce web site.

II. PREREQUISITE(S):

Level Credits Periods/ Week Prerequisites UG 4 4 Computer Programming

Page 61: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

III. COURSE ASSESSMENT METHODS:

University Total

Session Marks End Exam marks marks

Midterm Test

There shall be two midterm examinations. Each midterm examination

consists of essay paper, objective paper and assignment.

The essay paper is for 10 marks of 60 minutes duration and shall contain 4 questions. The student has to answer 2 questions, each carrying 5 marks.

The objective paper is for 10 marks of 20 minutes duration. It consists of

10 multiple choice and 10 fill-in-the blank questions, the student has to

answer all the questions and each carries half mark.

First midterm examination shall be conducted for the first two and half

units of syllabus and second midterm examination shall be conducted for

the remaining portion. 75 100

Five marks are earmarked for assignments. There shall be two assignments

in every theory course. Assignments are usually issued at the time of

commencement of the semester. These are of problem solving in nature

with critical thinking. Marks shall be awarded considering the average of

two midterm tests in each course.

IV. EVALUATION SCHEME:

S. No Component Duration Marks

1. I Mid Examination 80 minutes 20

2. I Assignment - 5

3. II Mid Examination 80 minutes 20

4. II Assignment - 5

5. External Examination 3 hours 75

Page 62: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

V. COURSE OBJECTIVES:

At the end of the course, the students will be able to:

I. Be familiar with genesis and diversity of information retrieval situations for text and hyper

media.

II. Provide hands-on experience store, and retrieve information from www using semantic

approaches

III. Be Familiar with various indexing and pattern search techniques of information retrieval.

IV. Master the usage of different data/file structures in building computational search engines.

V. Master and evaluate the performance of information retrieval using advanced techniques such

as classification, clustering, and filtering over multimedia.

VI. Be familiar with ranked retrieval of a very large number of documents with hyperlinks between

VII. Master Information visualization technologies like Cognition and perception in the Internet or

Web search engine.

VI. COURSE OUTCOMES:

After completing this course the student must demonstrate the knowledge and ability to:

1. An ability to understand information Retrieval System Capabilities

2. Information about cataloging and Indexing

3. Understand User Search Techniques and Text Search Algorithms

Page 63: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VII. HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes

Level

Proficiency assessed by

PO1 Engineering knowledge: Apply

the knowledge of mathematics,

Assignments, science, engineering fundamentals, and an engineering specialization H Tutorials to the solution of complex engineering problems.

PO2 Problem analysis: Identify, formulate, review research literature, and

analyze complex engineering problems

reaching substantiated

H Assignments conclusions using first principles of mathematics, natural sciences, and

engineering sciences.

PO3 Design/development of solutions: Design solutions for complex

engineering problems and design system components or processes that

meet the specified needs with appropriate consideration for the public S Mini Projects

health and safety, and the cultural, societal, and environmental

considerations.

PO4 Conduct investigations of complex problems: Use research-based

knowledge and research methods

including design of experiments,

S Projects analysis and interpretation of data, and synthesis of the information to

provide valid conclusions.

PO5 Modern tool usage: Create, select, and apply appropriate techniques,

resources, and modern engineering and IT tools including prediction

S Mini Projects and modeling to complex engineering activities with an understanding

of the limitations.

PO6 The engineer and society: Apply reasoning informed by the

contextual knowledge to assess

societal, health, safety, legal and

S Assignments cultural issues and the consequent responsibilities relevant to the

professional engineering practice.

PO7 Environment and sustainability: Understand the impact of the

professional engineering solutions in societal and environmental N --

Page 64: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

contexts, and demonstrate the knowledge of, and need for sustainable

development.

PO8 Ethics: Apply ethical principles and commit to professional ethics and

N -- responsibilities and norms of the engineering practice.

PO9 Individual and team work: Function effectively as an individual, and

as a member or leader in diverse teams, and in multidisciplinary N --

settings.

PO10 Communication: Communicate effectively on complex engineering

activities with the engineering community and with society at large,

such as, being able to comprehend and write effective reports and S Assignments

design documentation, make effective presentations, and give

and

receive clear instructions.

PO11 Project management and finance: Demonstrate knowledge and

understanding of

the engineering and management

principles and

N -- apply these to one‟s own work, as a member and leader in a team, to

manage projects and in multidisciplinary environments.

PO12 Life-long learning: Recognize the need for, and have the preparation

and ability to engage in independent and life-long learning in the S Projects

broadest context of technological change.

N - None S - Supportive H - Highly Related

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design suitable

algorithms, develop and maintain software for real world problems.

H

Projects

N - None S - Supportive H - Highly Related

Page 65: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

IX. SYLLABUS:

UNIT - I Introduction: Retrieval Strategies : Vector Space Model , Probabilistic retrieval strategies : Simple term weights, Non binary independence model, Language models.

UNIT – II

Retrieval Utilities : Relevance feedback , Clustering , N-grams , Regression analysis , Thesauri.

UNIT – III

Retrieval Utilities : Semantic networks , Parsing.

Cross-Language Information Retrieval : Introduction, Crossing the Language barrier.

UNIT – IV

Efficiency : Inverted Index , Query Processing ,Signature files , Duplicate document detection.

UNIT – V

Integrated Structured Data and Text: A Historical progression , Information retrieval as a relational

application , Semi-structured search using a relational schema.

Distributed Information retrieval: A Theoretical model of distributed retrieval ,Web search.

Text Books: David A. Grossman,Ophir Frieder,Information Retrieval- Algorithms and Heuristic,

Springer , 2nd edition(Distributed by Universities Press),20004. Reference Books: 1. Gerald J. Kowalski, Mark T. Maybury.Information Storage and Retrieval Systems Springer

2000 2. Soumen Chakrabarti,Mining the Web:Discovering Knowledge from Hypertext Data,Morgan-

Kaufmann Publishers,2002.

3. Christopher D. Manning, Prabhakar Raghavan, Hinrich. Schütze, Introduction to Information Retrieval, Cambridge University Press, Cambridge,England,20009.

Reference/Suggested Papers: Douglass R. Cutting, David R. Kargerd, Jan O. Pedersen, John W. Tukey: Scatter/Gather: a

cluster-based approach to browsing large document collections – 1992 Cited 423 times. Jay M. Ponte, W. Bruce Croft: A language modeling approach to information retrieval - 1998

Cited 721 times. Thomas Hofmann: Probabilistic latent semantic indexing - 1999 Cited 768 times. Jinxi Xu, W. Bruce Croft: Query expansion using local and global document analysis - 1996

Cited 412 times. Yiming Yang, Xin Liu: A re-examination of text categorization methods - 1999 Cited 643

Times. Kalervo jarvelin, Jaana Kekalanin: IR evaluation methods for retrieving highly relevant

documents - 2000 Cited 379 times. Jaime Carbonell, Jade Goldstein: The use of MMR, diversity-based reranking for reordering

documents and producing Summaries - 1998 Cited 478 times.

Page 66: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Jonathan L. Herlocker, Joseph A. Konstan, Al Borchers, and John Riedl: An algorithmic

framework for performing collaborative filtering - 1999 Cited 578 times. Chengxiang Zhai, John Lafferty: A study of smoothing methods for language models applied

to Ad Hoc information Retrieval - 2001 Cited 451 time.

X. COURSE PLAN: At the end of the course, the students are able to achieve the following course learning

outcomes:

Lecture Topics to be covered Course Learning Outcomes Reference

No.

1-2 Introduction to Information Retrieval Understand the Functional T1: 1 Systems. Precision and Recall. overview of IRS

3-4 Retrieval Strategies:Vector space model. Illustrate the model for a query with different documents.

T1: 2.1

5-7 Probabilistic retrieval strategies:simple term weights.

Applying weights to terms. T1: 2.2 – 2.2.1

8 Non binary independence model Illustrate normalization of

document length. T1: 2.2.2

9-11 Language models:Smoothing Understand probability for each term with smoothing.

T1: 2.3

12-14 Retrieval Utilities:Relevance feedback in

the vector space model and probabilistic model

Understand relevance feedback

T1: 3.1

. 15-18 Clustering Understand different

clustering algorithms. T1: 3.2

19-20 N grams Understand the N gram

datastructure. T1: 3.4

21 Regression Analysis Understand the Probability

of relevance. T1: 3.5

22-25 Thesauri Understand the Construction

of and generating thesauri. T1: 3.6

26-27 Retrieval Utilities:Semantic networks Illustrate about different

distance measures T1: 3.7

28-29 Parsing Understand different parses T1: 3.8

30 Cross-Language Information retrieval:Introduction

Understand the evaluation of Cross-Language Information retrieval

T1: 4.1

31-33 Crossing the language barrier Understand query and T1: 4.2

Page 67: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

document translation 34-36 Efficiency:Inverted index

Illustrate the construction and compression of inverted index

T1: 5.1

37-38 Query processing Illustrate index modifications and simplifications

T1: 5.2

39-40 Signature of files Describe the scanning to

remove false positives T1: 5.3

41-42 Duplicate document detection Describe exact and similar

duplicates T1: 5.4

43-44 Integratedstructured data and text:A

Historical progression Understand user defined operators

T1: 6.2

45-49

Information retrieval as a relational application

Illustrate the proximity searches

T1: 6.3

50-51 Semi structured search using a relational

schema Explain the storage and tracking XML documents

T1: 6.4

52-53 Distributed Information Retrieval:A

Theoritical model of distributed retrieval Understand the distributed retrieval models

T1: 8.1

54-55 Web search Understand different web

searches T1: 8.2

XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF

PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program Specific

Outcomes

Objectives

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

I H H S S H S

II S H S H S H S

III H H H S H S H

IV S S S S

V H S S S H

Page 68: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

VI H H S H H H

VII S H S H H S H H

S-Supportive H-Highly Related

XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program Specific

Outcome

s

Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 H S H S S H

2 H S S S

3 H H

S – Supportive H - Highly Related

Page 69: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND NGINEERING

ASSIGNMENT

Course Name INFORMATION RETRIEVAL SYSTEM

Course Code A70533

Class IV B. Tech I Semester

Branch Computer Science and Engineering

Year 2016 – 17

Course Faculty K SURESH Asst.Prof

OBJECTIVES:

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be

addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality

assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of

the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be

taught through this question bank, which will enhance learner‟s learning process.

ASSIGNMENT – I & II

S. No

Questions

Blooms

Taxonomy

Level

Course

Outcome

s

UNIT – I

1 Differentiate DBMS with information retrieval system? Understand 2

2 Explain IRS browse capabilities? Understand 1

3 List 3 differences between data retrieval and information retrieval? Remember 2

4 Explain Precision and Recall?

Understand 1

5 Define similarity coefficient in vector space model? Apply 2

6 Differentiate relevant retrieved and non-relevant retrieved? Apply 2

7 Differentiate browsing vs. Searching? Understand 1

8 Differentiate digital libraries and data warehouses? Understand 1

9 List 5 challenges of searching for information o the web? Remember 1

10 Explain about the objectives of IRS? Apply 2

UNIT – II

1 Explain N-gram data structure? Remember 3

2 Describe regression analysis? Apply 3

3 Define term co-ocurrence? Remember 2

Page 70: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

4 Explain the concept of information extraction? Remember 2

5

Explain top-down and bottom-up procedure used in hierarchically clustered

collections?

Understand 2

6 List six different sort orders to expand initial query in

probabilistic model?

Remember 3

7 Explain relevance feedback? Remember 2

8 Discuss about clustering algorithms? Understand 2

9 Discuss efficiency uses in clustering? Understand 3

10 Define regression analysis? Understand 3

UNIT – III

1 Define K-distance? Apply 2

2 Discuss translation? Apply 2

3 Explain clustering? Understand 3

4 Define cross language information retrieval? Remember 2

5 Define query translation? Remember 3

6 Define phrase translation? Apply 3

7 Define document translation Remember 3

8 Define unbalanced approach of choosing translation? Understand 3

9 Discuss about structured queries? Remember 3

10 Define cross language information retrieval? Remember 2

UNIT – IV

1 Define is term clustering? Remember 3

2 Describe are various types of automatic term clustering techniques? Remember 1

3 Describe hypertext linkages? Understand 2

4 Describe document clustering? Understand 2

5 Define about hierarchy of clusters with example? Remember 1

6 Describe the technique for term clustering? Understand 2

7 Describe the process of thesaurus generation? Understand 2

8

Describe Cliques? Apply 1

9 Define single link? Understand 1

10 Differentiate Cliques and single link? Remember 1

UNIT – V

1 Describe various information visualization technologies? Remember 2

2 Describe in short about searching the internet? Understand 2

3 Define relevance feed back? Understand 2

4 Define Rocchio algorithm for relevance method? Understand 1

5 Describe about relevance feedback techniques? Understand 2

6 Define the features related to cognitions and perception?

Understand 2

7 Describe search statements and binding? Understand 2

8 Define Similarity measures? Understand 3

9 Define ranking? Understand 3

10 Describe Similarity measures and ranking? Understand 3

Page 71: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

TUTORIAL QUESTION BANK

Course Name INFORMATION RETRIEVAL SYSTEM

Course Code A70533

Class IV B. Tech I Semester Branch Computer Science and Engineering

Year 2016 – 17

Course Faculty K SURESH Asst.Prof

OBJECTIVES:

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs

to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means

of quality assurance in higher education. The major emphasis of accreditation process is to measure the

outcomes of the program that is being accredited. In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome-based education in the process of problem solving and career development. So, all students of the institute should understand the depth and approach of course to be taught through this question bank, which will enhance learner‟s learning process.

PART - A (SHORT ANSWER QUESTIONS)

S No

Question Blooms

Taxonomy Level

Course

Outcome

UNIT – I

Part - A (Short Answer Questions) 1 Define information retrieval system? Knowledge 1 2 Differentiate DBMS with information retrieval system? Understand 1 3 Differentiate browsing vs. Searching? Knowledge 1 4 Explain your answer with relevant example Can information retrieval

system be related to a database management system? Knowledge 1

5 Define briefly terms

1. Precision

2. Recall

Knowledge 1

6 List 5 challenges of searching for information o the web? Knowledge 1

7 List 3difference between data retrieval and information retrieval? Knowledge 1

8 Differentiate the terms relevant and retrieved? Understand 1

9 Advantages of information retrieval system? Understand 1

10 Define vector space model? Knowledge 2

11 Define Retrieval Strategies? Knowledge 2

12 Define Smoothing? Understand 2

13 Define similarity coefficient to compute similarity between query

and document?

Understand 2

14 Explain the following statement In order to evaluate the Understand 1

Page 72: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

effectiveness of a web search engine for general users, Would it

generally be more Important to measure precision or recall?

15 Differentiate digital libraries and data warehouses? Knowledge 1

Part - B (Long Answer Questions)

1 Explain the differences between Information Retrieval Systems

and DBMS?

Apply 1

2 Explain similarity coefficient and determine the ranking of

following documents

Q:gold silver truck

D1:shipment of gold damaged in a fire

D2:delivery of silver arrived in a silver truck

D3:shipment of gold arrived in a truck

Knowledge 2

3 Explain the concept of simple term weights for the above query

and documents?

Understand 2

4 Explain inverse document frequency? Evaluate 1

5 Explain about the objectives of IRS? Understand 1

6 Discuss term frequencies? with an example? Evaluate 2

7 Explain, How the information retrieval system is related to

database Management system?

Understand 2

8 Explain about the objectives of IRS?

Understand 2

9 Explain the concept of non binary independence model for the

above query and documents?

Understand 1

10 Explain the concept smoothing for the above query and

documents

Understand 2

11 Discuss Similarities between vector space model and

probabilistic retrieval Strategy?

Understand 1

12 Explain the construction of vector document? Knowledge 2

13 Explain similarity coefficient and determine the ranking of

following documents in Probabilistic retrieval strategy?

Q:gold silver truck

D1:shipment of gold damaged in a fire

D2:delivery of silver arrived in a silver truck

D3:shipment of gold arrived in a truck

Evaluate 2

14 Discuss the term Frequencies for the following

Q:new new times

D1:new York times

D2:new York posts

D3:loss angels times

Evaluate 2

15 Define IDF and calculate the same for the above query and

documents?

Knowledge 2

Part - C (Problem Solving and Critical Thinking Questions)

1 Explain the Estimation of Document Vectors for the following

3 documents

D1:New York Times

D2:New York Post

D3: Los Angeles Times

Q:New New Times

Understand 2

2 Explain the use of invert index in vector space model? Apply 1

Page 73: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Define Term weight? Understand 1

4 Explain inverse document frequency? Apply 2

5 Discuss about vector space model? Understand 2

6 Discuss about Retrieval Strategies? Apply 2

7 Calculate the precision and recall scores for the search A

Database contain 9Records .A Search was Conducted on that

Topic and 7 Records were retrieved .Of the 7 records

retrieved,4 were relevant?

Apply 1

8 Calculate the precision and recall scores for the search A

Database contain 80 Records .A Search was Conducted on that

Topic and 60 Records were retrieved .Of the 60 records

retrieved,45 were relevant?

Understand 1

9 Explain the Estimation of Non-Binary independent model for

the following 3 documents

D1:New York Times

D2:New York Post

D3: Los Angeles Times

Q:New New Times

Knowledge 2

10 Explain the Estimation of Smoothing in language model for

the following 3 documents

D1:New York Times

D2:New York Post

D3: Los Angeles Times

Q:New New Times

Apply 2

UNIT – II

Part - A (Short Answer Questions)

1 Explain the purpose of retrieval utilities? Knowledge 3

2 Explain the concept of clustering as a retrieval utility? Understand 3

3 Explain how Relevance feedback is used to improve the results

of retrieval strategy?

Knowledge 1

4 Explain N-gram data structure? Knowledge 2

5 Describe regression analysis? Knowledge 2

6 Define term co-occurrence? Knowledge 2

7 Explain six different sort orders to expand initial query in

probabilistic model?

Knowledge 2

8 Explain three different bottom-up procedures used in

hierarchically clustered collections?

Understand 3

9 Explain k-means algorithm? Apply 3

10 Discuss efficiency uses in clustering? Understand 3

11 Discuss the formula for the basic weight in the probabilistic

retrieval strategy?

Knowledge 2

12 Discuss four variations for composing the new query? Knowledge 2

13 Discuss three variations used in feedback iterations? Knowledge 2

14 Explain how users are involved in relevance feedback? Knowledge 2

15 Define simple link clustering? Understand 3

Part - B (Long Answer Questions)

1 Explain about relevance feedback in vector space model? Understand 3

2 Explain about relevance feedback in probabilistic model? Understand 3

3 Discuss the use of manually generated thesaurus? Knowledge 2

Page 74: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

4 Explain the concept of thesauri by constructing term-term

similarity matrix?

Knowledge 3

5 Explain the approach of regression analysis to estimate the

probability of relevance?

Knowledge 3

6 Explain how n-grams are used for detection and correction of

spelling errors?

Knowledge 3

7 Define clustering and Explain hierarchical agglomerative

clustering?

Understand 3

8 Explain the usage of document clustering to generate a

thesaurus?

Knowledge 2

9 Explain clustering with single value decomposition? Knowledge 3

10 Explain term context used in thesaurus? Knowledge 2

11 Discuss clustering without a recomputed matrix? Knowledge 3

12 Describe extended relevance ranking with manual thesaurus? Knowledge 2

13 Explain Rocchio and Buckshot clustering algorithm? Apply 3

14 Explain Damshek work for implementing five gram based

measure of relevance?

Knowledge 2

15 Explain six different sort orders to expand initial query with the

number of iterations to perform successful relevance feedback?

Understand 3

Part - C (Problem Solving and Critical Thinking Questions)

1 Explain the use of probabilistic model in relevance feedback? Knowledge 3

2 Differentiate single link clustering, complete linkage and group

average?

Apply 3

3 Explain clustering without pre computed matrix? Understand 3

4 Explain n-gram developed by D Amore and Mah? Understand 2

5 Explain term co-occurrences in automatically constructed

thesauri?

Understand 2

6 Explain relevance feedback process with diagram? Knowledge 3

7 Explain vector space relevance feedback process? Apply 3

8 Discuss about partial query expansion? Understand 2

9 Discuss about hierarchically clustered collections? Understand 3

10 Discuss efficiency uses? Understand 3 UNIT – III

Part - A (Short Answer Questions)

1 Discuss R-distance for calculating distance between query and

document?

Understand 2

2 Describe how ranking is based on constrained spreading

activation?

Knowledge 2

3 Explain how NLP is used to reduce ambiguity in language? Knowledge 2

4 Define cross language information retrieval? Apply 2

5 Define query translation? Understand 2

6 Define phrase translation? Understand 2

7 Explain the concept of pruning translation? Understand 2

8 Define document translation? Knowledge 3

9 Explain the approach of balancing queries? Knowledge 3

10 Discuss about k-distance? Knowledge 3

11 Describe evaluation of distance measures? Knowledge 2

12 Discuss about performance of cross language information

retrieval system?

Apply 1

Page 75: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

13 Define parsing? Understand 2

14 Discuss seven groups of relations into which a thesaurus is

combined?

Understand 3

15 Explain the use of pivot language in translation? Knowledge 1

Part - B (Long Answer Questions)

1 Explain the concept of semantic networks for automatic

relevance ranking?

Create 2

2 Explain why parsing is an essential feature of information

retrieval system?

Understand 2

3 Explain three different types of translations? Apply 2

4 Discuss unbalanced and structured queries approaches for

choosing translations?

Understand 1

5 Explain about syntactic parsing? Understand 3

6 Differentiate R-distance and K-distance? Knowledge 2

7 Discuss balanced and pivot language approaches for choosing

translations?

Knowledge 1

8 Explain what resources used to implement Cross language

retrieval system?

Apply 3

9 Explain the measure to evaluate the performance of Cross

language information retrieval system?

Understand 3

10 Discuss four questions to be answered to Cross language

barrier?

Understand 3

11 Explain about four different approaches in choosing

translations?

Knowledge 1

12 Explain how bilingual term list is used to improve accuracy? Knowledge 1

13 Explain the use of POS word sense tagging? Knowledge 2

14 Explain how message understanding conference focuses on

information extraction?

Knowledge 2

15 Explain the concept of distance measures in a semantic

network?

Knowledge 2

Part - C (Problem Solving and Critical Thinking Questions)

1 Differentiate R-distance and K-distance? Apply 2

2 Explain simple phrases and complex phrases? Understand 2

3 Explain balanced query and structured query? Understand 2

4 Discuss about unbalanced queries? Apply 2

5 Discuss about quality of bilingual term lists? Understand 3

6 Describe the method used to translate a query? Understand 2

7 Explain the measures used to evaluate the performance of

cross-language information retrieval systems?

Apply 2

8 Explain the resources used to implement cross-language

information retrieval systems?

Understand 3

9 Discuss ranking based on constrained spreading activation? Understand 3

10 Describe developing query term based on concepts? Apply 3 UNIT - IV

Part - A (Short Answer Questions)

1 Explain index pruning? Knowledge 2

2 Explain posting list? Understand 2

3 Define document file? Understand 2

Page 76: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

4 Describe index? Understand 3

5 Explain about I-Match? Understand 3

6 Describe the method to find exact duplicates? Understand 3

7 Describe scanning to remove false positives? Understand 2

8 List two advantages of index file? Knowledge 2

9 Classify different types of files? Knowledge 2

10 Define weight file? Understand 2

11 Explain about two top-down algorithms? Understand 2

12 Explain index compression algorithms? Knowledge 2

13 Define Fixed length Index Compression? Knowledge 2

14 Define variable length index compression? Understand 2

15 Explain about cutoff based on document frequency? Understand 2

Part - B (Long Answer Questions)

1 Explain methods to reorder documents prior to indexing? Understand 3

2 Discuss methods to compress an inverted index? Knowledge 3

3 Define efficiency? Explain about inverted index? Knowledge 3

4 Explain about throughput-optimized compression? Create 2

5 Explain various top-down and bottom-up algorithms? Create 2

6 Explain how inverted index allows quick search of a posting

list?

Understand 3

7 Explain about duplicate document detection? Evaluate 3

8 Describe method to build an inverted index? Understand 2

9 Describe the method for finding similar duplicates? Understand 2

10 Explain how signature files are used to detect duplicates? Understand 2

11 Describe three methods to characterize posting list? Create 3

12 Discuss about query processing? Understand 2

13 Discuss about partial result set retrieval? Evaluate 2

14 Explain about I-match used in duplicate document detection? Understand 2

15 Explain vector space simplifications? Understand 13

Part - C (Problem Solving and Critical Thinking Questions)

1 Explain about Digital Libraries and Data Warehouses? Understand 2

2 Differentiate “Digital Library” and an Information Retrieval

System? What new areas of information retrieval research may

be important to support a Digital Library?

Understand 2

3 Explain about Browse Capabilities? Understand 2

4 Define Indexing? Explain the objectives of indexing and also

discuss about Automatic indexing?

Understand 3

5 Define two major data structures in any information system? Understand 3 6 Describe the similarities and differences between term

stemming algorithms and n-grams?

Knowledge 3

7 Explain in detail about Vector Weighting. What are the general

problems with the Vector Model?

Knowledge 2

8 Explain about Natural Language Processing. Describe how use

of Natural Language Processing will assist in the

disambiguation process?

Knowledge 3

9 Explain Similarity Measures and Ranking? Understand 2 1

0 Discuss two major approaches to generating queries? Explain in

detail?

Apply 2

Page 77: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

UNIT - V

Part - A (Short Answer Questions)

1 Define Data Integrity? Knowledge 2

2 Define performance? Understand 1

3 Define Portability? Understand 2

4 Explain are the extensions to SQL? Understand 2

5 List different types of User-defined Operators? Understand 2

6 Explain NFN Approaches? Understand 3

7 Define proximity searches works? Understand 3

8 Explain the operators used in Boolean query? Understand 3

9 Define Boolean Retrieval? Understand 2

10 Define Relational Information Retrieval system? Understand 3

11 Discuss about Relational Schema? Understand 2

12 Explain storing XML Metadata? Knowledge 3

13 Discuss about XML-QL? Knowledge 3

14 What is an Index? Understand 3

15 Define attributes in Index? Understand 3

Part - B (Long Answer Questions)

1 Explain about historical progression? Create 2

2 Discuss briefly about user-defined operators? Understand 2

3 Explain Non-first normal form approaches? Understand 2

4 Discuss about information retrieval as a relational application? Understand 2

5 Explain about Boolean queries? Apply 2

6 Discuss about proximity searches? Understand 2

7 Explain the computation of relevance using unchanged SQL? Create 3

8 Describe semi-structured search using a relational schema? Create 3

9 Explain how static relational schema support XML-QL? Apply 3

10 Discuss about relational information retrieval system? Understand 3

11 Explain the method of tracking XML documents? Understand 3

12 Explain how index table models an XML index? Understand 3

13 Explain about a theoretical model of distributed retrieval? Create 3

14 Describe centralized information retrieval system model? Create 3

15 Describe distributed information retrieval system model? Apply 1

Part - C (Problem Solving and Critical Thinking Questions)

1 Discuss evaluation of web search engines? Knowledge 2

2 Explain how run time performance is a disadvantage of

information retrieval?

Knowledge 2

3 Explain how information retrieval becomes relational

application?

Knowledge 3

4 Explain about relevance ranking? Understand 3

5 Discuss how XML has become the standard for platform –

independent data exchange?

Understand 3

6 Explain how data integrity and portability are disadvantages of

information retrieval?

Understand 3

7 Explain how semi structured search is performed using

relational schema?

Knowledge 3

8 Explain two methods of distributed retrieval? Knowledge 3

9 Discuss briefly about web search? Knowledge 3

Page 78: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title LINUX PROGRAMMING

Course Code A70511

Regulation R13

Course Structure Lectures Tutorials Practicals Credits

4 1 3 4

Course Faculty B SAI MANOGNA Asst.Prof

I. COURSE OVERVIEW:

The main objective of this course is to present the fundamental ideas behind the Linux operating system.

Explores fundamental relationship between principles of Linux file system and Linux system calls,

Implement extensive scripting techniques with the BASH Shell and advanced Programming Languages.

Designing and developing client server applications in Linux using major methods of Inter Process (IPC)

and concurrent programming, it also emphasizes files, process and signals. Provides extensive

implementation skills in multithread based socket programming.

II. PREREQUISITES:

Level Credits Periods / Week Prerequisites

UG 4 5 Computer Programming, Computer Networks

III. MARKS DISTRIBUTION:

Session Marks University End

Exam marks

Total

marks

Mid Semester Test:

There shall be 2 midterm examinations. Each midterm examination consists of

subjective test. The subjective test is for 20 marks, with duration of 2 hours.

Subjective test of each semester shall contain 5 one mark compulsory

questions in part-A and part-B contains 5 questions, the student has to answer

3 questions, each carrying 5 marks.

First midterm examination shall be conducted for the first two and half units

of syllabus and second midterm examination shall be conducted for the

remaining portion.

Five marks are earmarked for assignments. There shall be two assignments in

every theory course. Marks shall be awarded considering the average of two

assignments in each course. Five marks are earmarked for assignments. There

shall be two assignments

75

100

IV. EVALUATION SCHEME:

Page 79: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No Component Duration Marks

1 I Mid Examination 80 minutes 20

2 I Assignment - 05

3 II Mid Examination 80 minutes 20

4 II Assignment - 05

5 External Examination 3 hours 75

V. COURSE OBJECTIVES:

I. Be familiar with genesis and diversity of Both Linux and Unix System utilities.

II. Be familiar with shell scripts in Bourne shell Environment

III. Be familiar with the basics of Kernel support for process and user level process.

IV. Be familiar with File Systems, Signal generation and handling.

V. Master the usage of Inter Process Communication (IPC) and distinguish different concurrent

mechanisms.

VI. Provide hands-on experience to implement multitasking with TCP/UDP socket system calls

VII. Master analyzing and writing solutions to problems using the above techniques.

VI. COURSE OUTCOMES:

1. Able do basic UNIX OS administration tasks, including account management.

2. Able to use the Unix file system.

3. Able to perform basic UNIX networking tasks including setting up a LAN using NIS.

4. Able to use Unix programming tools: compilers, Make utility, debugger, profiler, version control.

5. Able to read-understand-write short scripts in a Unix shell

VII. HOW PROGRAM OUTCOMES ARE ASSESSED:

Program Outcomes Level Proficiency

assessed by

PO1 Engineering knowledge: Apply the knowledge of mathematics,

science, engineering fundamentals, and an engineering specialization

to the solution of complex engineering problems.

H Assignments,

Tutorials

PO2 Problem analysis: Identify, formulate, review research literature, and analyze complex engineering problems reaching substantiated

conclusions using first principles of mathematics, natural sciences, and

engineering sciences.

H

Assignments

PO3 Design/development of solutions: Design solutions for complex

engineering problems and design system components or processes that

meet the specified needs with appropriate consideration for the public

health and safety, and the cultural, societal, and environmental

considerations.

S

Mini Projects

PO4 Conduct investigations of complex problems: Use research-based

knowledge and research methods including design of experiments,

analysis and interpretation of data, and synthesis of the information to

provide valid conclusions.

S

Projects

Page 80: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

PO5 Modern tool usage: Create, select, and apply appropriate techniques,

resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding

of the limitations.

S

Mini Projects

PO6 The engineer and society: Apply reasoning informed by the

contextual knowledge to assess societal, health, safety, legal and

cultural issues and the consequent responsibilities relevant to the

professional engineering practice.

S

--

PO7 Environment and sustainability: Understand the impact of the

professional engineering solutions in societal and environmental

contexts, and demonstrate the knowledge of, and need for sustainable

development.

N

--

PO8 Ethics: Apply ethical principles and commit to professional ethics and

responsibilities and norms of the engineering practice. N --

PO9 Individual and team work: Function effectively as an individual, and

as a member or leader in diverse teams, and in multidisciplinary

settings.

N

--

PO10 Communication: Communicate effectively on complex engineering

activities with the engineering community and with society at large,

such as, being able to comprehend and write effective reports and

design documentation, make effective presentations, and give and

receive clear instructions.

H

Mini Projects

PO11 Project management and finance: Demonstrate knowledge and

understanding of the engineering and management principles and

apply these to one‟s own work, as a member and leader in a team, to

manage projects and in multidisciplinary environments.

S

Projects

PO12 Life-long learning: Recognize the need for, and have the preparation

and ability to engage in independent and life-long learning in the

broadest context of technological change.

S

Projects

N - None S - Supportive H - Highly Related

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design suitable

algorithms, develop and maintain software for real world problems.

H

Projects

N - None S - Supportive H - Highly Related

Page 81: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

IX. SYLLABUS:

UNIT I:

Linux Utilities: File handling utilities, Security by file permissions, Process utilities, Disk utilities,

Networking commands, Filters, Text processing utilities and Backup utilities, sed – scripts, operation,

addresses, commands, applications, awk – execution, fields and records, scripts, operation, patterns,

actions, Associative Arrays,String and Mathematical functions, system commands in awk, Applications.

Shell Programming with Bourne again shell(bash): Introduction, shell responsibilities, pipes and

Redirection, here documents, running a shell script, the shell as a programming language, shell meta

characters, file name substitution, shell variables, command substitution, shell commands, the

environment, quoting, test command, control structures, arithmetic in shell, shell script examples, interrupt

processing, functions, debugging shell scripts.

UNIT II:

Files and Directories: File Concept, File System Structure, File metadata- Inodes, kernel support for

files, System calls, Kernel support for files, System calls for File I/O Operations- open, creat, read, write ,

close, lseek, dup2file, filestatus information- stat family, File and record locking-fcntl function, File

permissions- chmod,fchmod, file ownership-chown, lchown, fchown, links- softlinks and hardlinks-

Symlink, Link,Unlink Directories: Creating, removing and changing directories- mkdir, rmdir, chdir,

obtaining current working directory-getcwd, Directory contents, Scanning Directories- Opendir, readdir,

closedir, rewinddir functions

UNIT III:

Process: Process concept, Layout of a C program image in main memory, Process environment list,

environment variables, getenv, setenv, Kernel support for process, process identification. process control -

process creation, replacing a process image, waiting for a process, process termination, zombie process,

orphan process, System call interface for Process management- fork, vfork, exit, wait, waitpid, exec

family, Process groups, Sessions and controlling Terminal, diff b/n threads and process

Signals: Introduction to signals, Signal generation and handling, Kernel support for signals, Signal

function, unreliable signals, reliable signals, kill, raise , alarm, pause, abort, sleep functions.

UNIT IV:

Inter process Communication: Introduction to IPC, IPC between processes on a single computer system,

IPC between processes on different systems. Pipes- creation, IPC between related processes using unnamed

pipes, FIFOs-creation, IPC between unrelated processes using FIFOs (Named pipes), difference between

unnamed and named pipes, pope n and pclose library functions.

Message Queues: Kernel support for messages, APIs for message queues, client/server example.

Semaphores: Kernel support for semaphores, APIs for semaphores. file locking with semaphores.

UNIT V:

Shared Memory: Kernel support for shared memory, APIs for shared memory, shared memory example.

Sockets – Introduction to Berkeley Sockets, IPC over a network, Client-Server model, Socket address

structures (Unix domain and internet domain), Socket system calls for connection oriented protocol and

connectionless protocol, example-client/server programs-Single Server-Client connection, Multiple

simultaneous Clients, Socket options-stockpot and fcntl system calls, Comparison of IPC mechanisms.

Text Books:

1. T.Chan, “UNIX System Programming using C++”, PHI.

2. Sumitabha Das, “UNIX Concepts and Applications”, 4e, TMH, 2006.

Page 82: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3. N.Matthew, R.Stones, Wrox, “Beginning Linux Programming”, 4e, Wiley India Edition.

References:

1. Robert Love, “Linux System Programming”, O‟Reilly.

2. W.R.Stevens, “UNIX Network Programming”, PHI.

3. Graham Glass, King Ables, “UNIX for programmers and users”, 3e, Pearson Education, 2003.

4. W.R.Stevens, “Advanced Programming in the Unix environment”, 2e, PHI, Pearson Education.

5. A.Hoover, “System Programming with C and UNIX”, Pearson.

6. Kumar Saurabh,”Unix Programming”, 1e, Wiley India pvt Ltd.

7. B.A.Forouzan and R.F.Gilberg, “UNIX and Shell programming”, Cengage Learning.

X. COURSE PLAN:

At the end of the course, the students are able to achieve the following course learning outcomes:

Lectur

e No.

Topics to be covered Course Learning

Outcomes

Reference

1-2 A brief history of Linux,

architecture of Linux, features of

Linux

Understand history of Linux

and its features

T2: 1.1, 2.1-2.2

3-4 Linux utilities-File handling

utilities, Security by file

permissions

Use system level scripts to

create and manage simple file processing operations.

T2: 4.7-4.8,

5.3-5.4

5-6 Process utilities, disk

utilities, Networking

commands, Filters

Illustrate manipulating

of information.

T2: 3.10,15.6,

17.5-17.6

7-8 Text processing utilities,

Backup utilities

Understand restoring

and retrieving text. T2: 12.3-12.9

15.9-15.10

9 sed – scripts, operation, addresses,

commands, applications

Understand two data buffers:

the active pattern space.

T2: 13.4

10-11 awk – execution, fields and

records, scripts, operation,

patterns, actions, Functions, using

system commands in awk

Demonstrate pattern scanning and processing in problem solving.

T2: 18.1-18.12

12-13 Working with the Bourne again

shell(bash): introduction, shell

responsibilities, pipes and input

Redirection, output redirection.

Understand basic shell scripting.

T2: 8.5

14 Documents, running a shell script Understand shell

script execution.

T2: 14.14

15 The shell as a programming language, shell meta characters, file name substitution

Classify use special

characters

T2: 8.9

16-17 Shell command substitution, shell

commands, environment, quoting, test command, control structures

Illustrate forwarding

the command output

into another context

T2: 8.4, 8.10

18-19 Arithmetic in shell, shell script examples, interrupt processing, functions, debugging shell scripts.

Develop solutions to

complex tasks.

T2: 14.5-T14.17

20 Files: File Concept, file system

structure, Inodes, file attributes,

file types, library functions

Demonstrate the use of the formatting specifiers of io.

R4: 4.1-4.14

Page 83: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

21-22 The standard I/O (fopen, fclose,

fflush, fseek, fgetc, getc, getchar,

fputc, putc, putchar, fgets, gets

etc.)

Demonstrate standard stream

and buffer based input and

output system calls.

R4: 5.1-5.9

23 Formatted I/O, stream errors,

kernel support for files

Demonstrate layout of

what's being printed.

R4: 5.10-5.11

24-25 File descriptors ,low level file access

open,create,read,write,close,lseek,stat

family,umask,dup,dup2

Demonstrate modification

and editing.

R4: 3.1-3.12,

4.2

26-27 fcntl, file and record locking Demonstrate security

concepts in files. R4: 3.13

28 File and directory management-

Directory file APIs, symbolic links

and hard links.

Discuss scanning and

linking methods.

R4: 4.20-4.22,

4.15-4.17

29-31 Process kernel support for process,

process attributes, process hierarchy,

process states, process composition,

process creation and termination

Understand internal

procedures and states of IPC

R4: 8.1-8.9

32-33 Zombie process, orphan process. Illustrate daemons and varieties.

R4: 8.6

34 Signals – Introduction to signals,

Signal generation and handling,

Kernel support for signals, Signal

function.

Classify processes to respond

to asynchronous events. R4: 10.1-10.3

35-36 Unreliable signals, reliable

signals, kill, raise, alarm, Pause,

abort, and sleep functions.

Understand and to

handle exceptional

situations.

R4: 10.4-

10.19

37-38 Interprocess Communication:

Introduction to IPC, IPC between

processes on a single computer system,

IPC between processes on different

systems, pipes.

Demonstrate inter

related process

communication

R4: 14.1-14.4

39 FIFOs and examples. Demonstrate named pipes. R4: 14.5

40 Introduction to three types of IPC

(Linux)-message queues,

semaphores and shared memory.

Discuss types of restricting

and accessing different

resources.

R4: 14.6

41-43 Message Queues- Kernel support

for messages, Linux APIs for

messages, Client/server example.

Demonstrate dividing up

work among to balance work

over multiple processes.

R4: 14.7

44 Semaphores- Kernel support for

semaphores

Demonstrate user variables

and semaphore operations,

provided at the kernel level.

R4: 14.8

45-46 File locking with semaphores.

Linux APIs for semaphores

Solve security hurdles using

programming interface of

Linux

R4: 14.8

47 Shared Memory- Kernel support

for shared memory

Demonstrate common

memory portion which other

processes

R4: 14.9

48-49 Linux APIs for shared memory,

semaphore and shared memory

Illustrate common

memory sharing

interfacing example.

R4: 14.9

Page 84: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

50-51 Multithreaded Programming –

Differences between threads and processes, thread structure and

uses, threads and lightweight

Processes.

Demonstrate parallelism

in Linux based system calls.

T1: 13.1-13.2

52 POSIX Thread APIs, Creating

Threads thread attributes

Demonstrate concurrency in Linux APIs.

T1: 13.4

53-54 Thread synchronization

with semaphores

Demonstrate multiple

processes to a common

resource in Linux based

parallel

T1: 13.5

55-57 Thread synchronization with

mutexes, example programs

Demonstrate multiple threads

access the same resource for

read and write.

T1: 13.5

58 Sockets: introduction to sockets Understand end to end network communication

R2: 15.1

59-60 Socket system calls for connection

oriented protocol

Understand tcp based system

calls

R2: 15.5

61-62 Connectionless protocol Understand udp protocol

system calls

R2: 15.5

63-64 Example-client/server programs Demonstrate connection

oriented, connectionless

communications in two and

three

R2: 15.5

XI. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Objectives

Program Outcomes Program

Specific

Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

I H H S S H S

II S H S H S S S

III H H S S H H H

IV S S S S

V H S S S S

VI S H S H H H

VII S H S H H S H H

S– Supportive H - Highly Related

Page 85: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

XII. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT

OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Outcomes

Program Outcomes Program

Specific

Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 H S H S H

2 H S S S

3 H H

4 S S H H

5 S S

S - Supportive H - Highly Related

COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT

Course Name : LINUX PROGRAMMING

Course Code : A70511

Class : IV B. Tech I Semester

Branch : CSE

Year : 2016 – 2017

Course Faculty : B SAI MANOGNA Asst.Prof

OBJECTIVES: To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed,

debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher

education. The major emphasis of accreditation process is to measure the outcomes of the program that is being

accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in incorporating

philosophy of outcome based education in the process of problem solving and career development. So, all students of

Page 86: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

the institute should understand the depth and approach of course to be taught through this question bank, which will

enhance learner‟s learning process.

S. No

Question

Blooms

Taxonomy Level

Course Outcome

UNIT-I

1 Discuss elaborately the Unix kernel architecture with neat block diagram. Apply 1

2 Differentiate windows and Linux operating system and analyze important

system calls?

Understand 1

3 Illustrate security concepts in both Linux and windows operating systems? Apply 1

4 Illustrate „rlogin‟ , „telnet‟, „ftp‟, „arp‟, network commands with example? Apply 1

5 Explain cat, ls, mv, ln commands with examples? Understand 1

6

Illustrate by creating employee file with field eid, ename, designation, salary

each field is separated with pipe( | ). Write Linux commands for the following

queries:

Display part of information i.e eid, salary of all employees using Unix

commands.

Count and display of employee in employee file using Unix command

Search for “manager” in employee file and display all details of employee.

Understand 1

7 Illustrate awk command and write program to print the fields 1 and 4 of a file

that is passed as a command line argument. The file contains lines of

information that is separated by "," as delimiter. The awk program must print

at the end the average of all 4th field data.

Understand 1

8 Discuss how will you emulate wc -l using awk? Understand 1

9 Explain which character is used to search a pattern in the beginning of each

line using grep command?

Knowledge 1

10 Explain line addressing and content addressing using SED, each with an

example.

Knowledge 1

11 Define shell script? How shell programs are executed? Write different types

of shells in Linux programming along with advantages.

Knowledge 2

12 Draw a neat diagram and Explain the relationship between the kernel and

shell of the UNIX Operating system.

Understand 2

13 Write briefly about case control structure in sh with examples. Write briefly

about "||" operator in sh.

Knowledge 2

14 Write a shell script to create a menu which displays the list of files, current

users, and contents of a particular file and process status of the system based

on the user choice.

Apply 2

15 Read a filename, take a variable c for count, and execute cat command in for

loop, increment the variable till loop ends, and display the count/variable.

Write a Shell program to count the number of words in a file.

Apply 2

16 Read a number and initialize a variable res=1, and compute res=res*num,

decrement num by one and perform the same action till num greater than zero.

Write a shell program to calculate the factorial of a given number.

Apply 2

17 Illustrate the Fibonacci numbers are generated by setting F0=0, F1=1, and

then using the recursive formula Fn = Fn - 1 + Fn - 2 to get the rest. Thus the

sequence begins: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34 …. Write a Shell program to

generate above Fibonacci series.

Understand 2

18 Write a shell program to count no of lines in a text file which starts with a Apply 2

Page 87: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No

Question

Blooms

Taxonomy Level

Course Outcome

specified letter (Use grep command).

19 Write a shell script to read starting number and ending number and display

prime numbers in between two numbers using shell script. For eg. 1 to 20 is 2

3 5 7 11 13, 17, 19.

Apply 2

20 Write a shell script to read a file name and convert the content of a file to

uppercase letters.

Apply 2

UNIT-II

1 Create file – student file with fields sid, sname, percentage of marks, address

and store 10 lines of content and display last five lines. Write a program to

implement tail command in C language.

Apply 3

2 Explain the following functions with syntax:

(a) stat() (b) read() (c) fcntl() (d) lseek()

Understand 3

3 Discuss the characters that are used as wild cards by the shell. Explain their

meaning and illustrate their usage. Write a note on character class.

Understand 3

4 Explain about memory management functions malloc(), calloc(), realloc(),

free() with suitable example.

Understand 3

5 Create file – file5 and store 10 lines of content and display line number before

each line. Implement nl command in C language

Knowledge 3

6 Illustrate to create file – file4 and store names of students. Display the

content in descending order and also display number of lines in file4.

Knowledge 3

7 Write a program that takes one or more file/directory names as command line

input and reports the following information on the file.

i.File type.

ii.Number of links.

iii.Time of last access.

Read, Write and Execute permissions.

Apply 3

8 Explain about memory management functions malloc(), calloc(), realloc(),

free() with suitable example.

Understand 3

9 Write a C program for wc command using system calls or library functions. Apply 3

10 Write a C program that demonstrates redirection of standard output to a file.

(ex: ls > f1)

Apply 3

UNIT-III

1 Write a program to find sum of odd numbers by child process and sum of

even numbers by parent processes of given range numbers using fork function.

Apply 4

2 Explain difference between zombie processes and orphan process with

example.

Understand 4

3 Define Signals? Mention the different sources of signals. What are the three

dispositions the process has when signals occur? List an four signals along

with one or two line explanation. Write a program to setup handlers for

SIGINT and SIGALARM signals

Knowledge 4

4 Illustrate to create a new process (using fork()) and find sum of odd numbers

by child process, sum of even numbers by parent process in c language.

Knowledge 4

5 Write a signal handler which catches SIGFPE and performs certain action. Apply 4 6 Explain difference between zombie processes and orphan process with

example.

Understand 4

7 Define region lock? What are the rules about the specification of the region to

be locked or unlocked?

Understand 4

Page 88: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No

Question

Blooms

Taxonomy Level

Course Outcome

8 Write a program to find sum of odd numbers by child process and sum of

even numbers by parent processes of given range numbers using fork function.

Apply 4

UNIT-IV

1 Read a value „n‟ from standard input at sender side and send to receiver to find

power(n,2), Receiver receives the number „n‟ and finds power(n,2) and sends result to

sender. Write a program to implement two way communication using pipe‟s.

Apply 5

2 Define FIFOs? How they are different from pipes? Give an example

application where FIFO can be used.

Knowledge 5

3 Distinguish between pipes and named pipe. Apply 5

4 Write a c program to implement two way communication using fifos to

exchange information between sender and receiver. (Message=”IARE”).

Apply 5

5 Explain about the “Message Queue structures in the Kernel”? Write a c

program to send 3 messages by sender and read 3 messages by receiver using

same message queue id. Implement one way communication using message

queues.

Understand 5

6 Illustrate difference between pipes and message queues IPC. Apply 5

7 Define semaphores? What is their purpose? List and Explain the APIs used to

create and control the semaphores.

Knowledge

5

8 Explain about the “Kernel data structure for a semaphore set”. Write about

the semaphore adjustment on “exit”. Explain about the importance of SEM

UNDO.

Understand 5

9 Define Shared memory? Write various functions implemented in shared

memory. Explain in brief about each function.

Knowledge 5

10 Explain “how to control, attach and detach a shared memory segment. Understand 5

11 Write a program for shared memory forms of IPC using producer consumer

relation in such a way that consumer should read only after the producer has

written some text to the shared memory.

Apply 5

12 Write a C program to allow cooperating processes to lock a resource for

exclusive use, using a) Semaphores b) flock or lockf system calls.

Apply 5

UNIT-V

1 Explain thread synchronization with Mutexes? Give example. Understand 4

2 Explain the following in thread with example:

i. Thread identification

ii. Thread creation

iii. Thread termination

iv. Thread synchronization.

Understand 4

3 Discuss what happens if your main thread terminates before termination of

child thread? How can you prevent a thread becoming a "zombie"?

Understand 5

4 Explain thread synchronization with semaphore? Give example. Understand 4

5 Explain about IPV6 socket address structure and compare it with IPV4 and

Unix socket address structures.

Understand 2

6 Write a program to implement UDP client server application in which client

takes a file name from the command line and sends to the server. Server

returns the content of received file to the client.

Knowledge 3

7 Define socket? Describe the socket API. Write a C program to illustrate the

process of creating socket, initializing the socket address structure and

Knowledge 3

Page 89: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

S. No

Question

Blooms

Taxonomy Level

Course Outcome

establishing a connection from client to the server. Assume the server IP

address as 10.10.2.5 and port number = 8000. The client after establishing a

connection should send “Hello World” message and wait for a reply of reverse

of same string. 8 Write a program to design a TCP client – server application which takes IP

address, Port number and string to be echoed as command line inputs in client

application and implements echo service.

Knowledge 3

9 Write a program to implement TCP client server application in which client

takes an integer value from the command line and sends to the server. Server

returns the factorial of the received integer value to the client.

Knowledge 4

10 List well-known ports? List some well-known ports. Knowledge 3

11 Write a program to implement UDP client server application in which client

takes an file name from the command line and sends to the server. Server

returns the content of received file to the client.

Knowledge 4

Page 90: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

TUTORIAL QUESTION BANK

Course Name : LINUX PROGRAMMING

Course Code : A70511

Class : IV B. Tech I Semester

Branch : Computer Science and Engineering

Year : 2016- 17

Course Faculty : B SAI MANOGNA Asst.Prof

OBJECTIVES

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be

addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality

assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of

the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be taught

through this question bank, which will enhance learner‟s learning process.

S No QUESTION Blooms

taxonomy

level

Course

Outcomes

UNIT – I

Part - A (Short Answer Questions)

1. Explain importance of pyramid architecture in Linux? Knowledge 1

2. Explain kernel and its importance in security concepts of Linux? Understand 2

3. Explain different types of shells in Unix/Linux? Knowledge 2

4. Differentiate BASH and CSH? Knowledge 1

5. Explain vi editor and some editing commands in Linux? Knowledge 2

6. Explain listing of files in Linux? Knowledge 1

7. Explain links and its uses in Linux? Knowledge 2

8. Illustrate moving of files in Linux environment with examples? Understand 2

9. Illustrate „rlogin‟ command with example? Understand 1

10. Illustrate „telnet‟ command with example? Understand 1

11. Explain ftp and its importance in Unix? Knowledge 2

12. Explain importance of arp in Linux Understand 1

13. Differentiate tar and cpio commands? Understand 1

14. Illustrate creating a new directory in Linux with example? Knowledge 2

15. Explain deleting of directory and its contents with examples? Understand 1

Page 91: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

16. Differentiate copying and moving files in Linux environment? Understand 1

17. Explain about „comm‟command? Knowledge 2

18. Explain about „grep‟command? Understand 1

19. Explain about „awk‟ command? Understand 1

20. Explain about „tee‟ command? Knowledge 2

21. Differentiate between a processes and program? Understand 1

22. Illustrateabout job control commands with examples? Understand 1

23. Explainabout background job and foreground job in Linux? Knowledge 2

24. Explain about „ps‟ command Understand 1

25. Explain about „telnet‟ command Understand 1

26. Explain about „ulimit‟ command ulimit. Knowledge 2

27. Illustrate „pg‟ command with example? Understand 1

28. Illustrate „more‟ command with example? Understand 1

29. Illustrate and permissions in Linux environment? Knowledge 4

30. Explain the security and compare with windows and dos operating

systems?

Understand 5

31. Explain how Unix operating system provides more security than any other

operating system.

Knowledge 5

32. Explain command substitutions with examples? Knowledge 3

33. Explain add, delete, view, actions in Linux ? Knowledge 3

34. Explain how debugging can be done in a shell script. Knowledge 4

35. Explain printing login information. Knowledge 4

36. Differentiate between different types of shells available in UNIX. Knowledge 4

37. Demonstrate shell program for the following scenario where printing

current time in upper right corner of the screen, while user can do normal

job at prompt.

Understand 4

38. Explain the significance of single quote and double quote. Understand 5

39. What does the shell do with the meta characters if it finds in the

command line?

Knowledge 4

40. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 4

41. Distinguish between user Defined variables and environment

variables with example?

Understand 5

42. Describe about I/O Redirection operations in Linux? Knowledge 5

43. Describe any four built in variables in Shell and Demonstrate their usage

by example?

Knowledge 3

44. Explain by script to display GOOD MRNG, GOOD AFTERNOON,

GOOD NIGHT based on system time whenever user logs on.

Knowledge 4

45. discuss about here documents? Understand 5

46. Write a shell script that determines the period for which a specified user is

working on the system?

Knowledge 5

47. Explain how the shell treat a command line passed to it. Knowledge 3

48. Write a shell script to find and delete all file with the word “Unix". Knowledge 4

49. Briefly Describe various shell and environment various. Understand 5

50. Write a shell script to count the specified number of lines in a text file

without using wc command

Understand 5

Page 92: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

51. What does the shell do with the meta characters if it finds in the

command line?

Knowledge 5

52. Demonstrate by writing a shell script to find the factorial of a number. Knowledge 3

Part - B (Long Answer Questions)

1 Explain pyramid architecture and kernel in Linux with neat

diagrams?

Knowledge 1

2 Explain different types of shells in Unix/Linux? Differentiate

BASH and CSH?

Knowledge 2

3 Explain vi editor and some editing commands in Linux? Explain

listing of files in Linux?

Understand 2

4 Explain links, file moving and its uses in Linux? Explain cp

command with examples?

Knowledge 1

5 Differentiate ssh and telnet and login procedure? Understand 1

6 Illustrate „rlogin‟ „telnet‟ command with example? Knowledge 2

7 Explain arp command and its options with example? Understand 2

8 Explain ftp and its importance in Unix? Differentiate tar and cpio, tar

commands?

Understand 1

9 Illustrate creating a new directory in Linux os with example and list

out the available files?

Understand 2

10 Explain deleting of directory and its contents with examples?

Differentiate copying and moving files in Linuxenvironment?

Knowledge 1

11 Explain about „comm‟command? Explain about „grep‟ command?

Explainabout „tee‟and more commands?

Understand 2

12 Explain about „awk andsed command? Understand 1

13 Differentiate between a process, and program? Illustrate about job

control commands with examples?

Evaluate 2

14 Explain about background job and foreground jobs in Linux? Explain

about „ps‟ comm. and „telnet‟ command

Understand 2

15 Explain about „ulimit‟and, mount commads? Illustrate„pg‟ and more

command with example?

Understand 2

16 Explain Moving processes to the background and foreground with an

example?

Understand 3

17 Explain the significance of single quote and double quote. Understand 4

18 Explain about meta characters in the command line? Demonstrate by

writing a shell script to find the factorial of a number.

Knowledge 5

19 Distinguish between between user Defined variables and

environment variables with example?

Knowledge 4

20 Describeabout I/O Redirection operations, built in variables in Shell. Knowledge 5

21 Explain by writing a script using system time, toshow GOOD Morning, GOOD AFTERNOON, GOODNIGHT.

Knowledge 4

22 Demonstrate by writing script that determines the period for which a

specified user is working on the system?

Knowledge 5

23 Explain how the shell treat a command line passed to it. Knowledge 5

24 Explain by writing shell script that receives any number of file names as

arguments checks if every argument supplied is a file or a directory?

Knowledge 5

25 Explain by writing an awk script to find the number of characters, words

and lines in a file.

Understand 5

26 Explain by writing shell script to find and delete all file with the word

“Unix".

Understand 4

27 Explain by writing shell script to count the specified number of lines in a

text file without using wc command?

Knowledge 4

Page 93: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

28 Demonstrate by writing a shell script to find the factorial of a number. Knowledge 5

29 Explain by writing shell script that receives any number of file names as

arguments checks if every argument supplied is a file or a directory?

Knowledge 4

30 Explain Moving processes to the background and foreground with an

example?

Understand 3

Part - C (Problem Solving and Critical Thinking Questions)

1 Differentiate windows and Linux operating system and analyse

important system calls?

Understand 1

2 Differentiate DOS and Linux operating system? Knowledge 2

3 Illustratesecurity concepts in both Linux and windows operating

systems?

Understand 2

4 Illustrate script called „sayHi‟, put this script into your startup file

called .bash profile, the script should run as soon as you logon to system,

and it print any one of the following message in info box using dialog

utility, if installed in your system, If dialog utility is not installed then

use echo statement to print message: -Good Morning, GoodAfternoon,

Good Evening, according to system time.

Knowledge 3

5 Illustrateby writing script, that will print, Message "Hello World”, in

Bold and Blink effect, and in different colors like red, brown etc using echo command.

Knowledge 4

UNIT - II

Part – A (Short Answer Questions)

1 Differentiate between advisory locking and mandatory locking. Understand 5

2 Explain about symlink ( ) function with example? Knowledge 4

3 Explain about link ( ) function with example? Knowledge 4

4 Explain about unlink ( ) function with example? Knowledge 3

5 Explain about symlink ( ) function with example? Understand 3

6 Define a system call? Understand 5

7 Differentiate systemcall with library function?. Knowledge 3

8 Explain about dot and dot dot directories in the file system? Understand 4

9 Define symbolic link? Knowledge 5

10 Define hard link? Understand 5

11 Differentiate symbolic link instead of a hard link. Understand 4

12 Define fcntl ( ) function with example? Understand 5

13 Define read () function with example? Knowledge 5

14 Define write () function with example? Knowledge 3

15 Define stat () function with example? Knowledge 4

16 Define create () function with example? Understand 4

17 Define getc ( ) with example? Knowledge 5

18 Define fgetc ( ) with example? Knowledge 3

19 Define fprint ( ) with example? Understand 3

20 Define fscanf ( ).with example? Understand 3

21 Differentiate getc ( ) and fgetc ( ) with example? Understand 5

22 Differentiate stat ( ) and fsat ( ) with example? Understand 3

Page 94: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

23 Differentiate printf ( ) Vs fprint () with example? Understand 3

24 Differentiate scanf ( ) Vs fscanf (with example? Understand 3

25 Differentiate getc ( ) and fgetc ( ) with example? Understand 4

Part - B (Long Answer Questions)

1 Explain fprint (), fscanf () with examples? Understand 5

2 Differentiate between advisory locking and mandatory locking. Understand 2

3 Explain about symlink ( ) function with example? Explain about link ( )

function with example?

Knowledge 3

4 Explain about unlink ( ) functions with example? Explain about symlink ( )

functions with example?

Understand 4

5 Define a system call? Differentiate systemcall with library function? Understand 4

6 Explain about dot and dot dot directories in the file system? Knowledge 5

7 Define symbolic link? Hard link with examples? Knowledge 4

8 Differentiate symbolic link instead of a hard link. Knowledge 4

9 Define fcntl ( ), read (), write () writen () function with examples? Knowledge 5

10 Describe the characteristics of Unix File System. Knowledge 3

11 Describe about Low Level File I/O System Calls. Understand 3

12 Describe usage of dup(), dup2() system calls with example? Understand 4

13 Define stat () and create () function with examples? Knowledge 4

14 Describe open ( ) function in Linux with examples? Knowledge 4

15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 5

9 Explain fprint () and fscanf ( ).with example? Knowledge 3

10 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 3

11 Differentiate stat ( ) and fstat ( ) with example? Understand 3

12 Explain fprint (), fscanf () with examples? Understand 3

13 Differentiate between advisory locking and mandatory locking. Understand 3

14 Describe open ( ) function in Linux with examples? Knowledge 3

15 Explain getc ( ) and fgetc ( ) with examples? Knowledge 3

16 Explain fprint () and fscanf ( ).with example? Knowledge 3

17 Differentiate getc ( ) and fgetc ( ) with example? Knowledge 3

18 Differentiate stat ( ) and fstat ( ) with example? Understand 3

Part – C (Problem Solving and Critical Thinking)

1 Differentiate and analyse non-blocking IO operations in both

windows and Linux operating systems?

Knowledge 5

Differentiate and analyse blocking IO operations in both windows and

Linux operating systems?

Understand 5

2 Illustrate to redirect the standard input (stdin) and the standard output

(stdout) of a process, so that scanf () reads from the pipe and printf ()

writes into the pipe?

Knowledge 4

3 Differentiate and analyse non-blocking IO operations in both

windows and Linux operating systems?

Knowledge 4

UNIT-III

Part - A (Short Answer Questions)

Page 95: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

1 Describe process creation? Understand 3

2 Describe process termination? Understand 3

3 Differentiate process creation and termination? Understand 3

4 Describe signal function? Understand 3

5 Describe reliable signals. Understand 3

6 Describe orphan process with example? Understand 4

7 Illustrate SIGKILL with an example? Knowledge 4

8 Illustrate SIGINT with an example? Understand 5

9 Differentiate SIGKILL and SIGINT? Understand 4

10 Illustrate fork() with example? Knowledge 5

11 Illustrate fork() with example? Knowledge 3

12 Differentiate fork( ) with vfork ( )? Understand 3

13 Describe exec () with example? Understand 3

14 Illustrate exit ( ) function? Understand 3

15 Describe all flavours of excec () function? Knowledge 5

16 Define zombie processes with example?. Understand 3

17 Illustrate redirection of standard output to file abc.txt Understand 4

18 Explain about signal () function? Understand 4

19 Define wait () with example? Understand 5

20 Define waitpid () with example? Understand 2

21 Differentiate between wait ( ) and waitpid ( ). Understand 3

22 Differentiate reliable and unreliable signals with suitable example? Knowledge 3

23 Explain the mechanism for handling a signal with example? Understand 3

Part – B (Long Answer Questions)

1 Describe Process Creation Process Termination with example? Understand 3

2 Describe Signal function and Reliable signals with example? Knowledge 3

3 Define orphan process and zombie process with example? Knowledge 3

4 Describe SIGKILL and SIGINT with examples? Understand 3

5 Illustrate fork (), vfork () with example s? Knowledge 3

6 Differentiate fork ( ) with vfork ( )? Understand 3

7 Describe all versions of exec () with examples? Understand 3

8 Describe all flavours of excec () function? Knowledge 3

9 Illustrate zombie processes with example? Understand 3

10 Illustrate redirection of standard output to file abc.txt Understand 3

11 Explain about signal () function? Understand 3

12 Define wait () and waitpid () with examples? Knowledge 3

13 Differentiate between wait ( ) and waitpid ( ). Knowledge 3

14 Differentiate reliable and unreliable signals with examples. Knowledge 4

15 Explain the mechanism for handling a signal with example? Understand 5

Part – C (Problem Solving and Critical Thinking)

Page 96: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

1 Differentiate and analyse non-blocking IO operations in both

windows and Linux operating systems?

Knowledg

e

3

2 Differentiate and analyse blocking IO operations in both windows and

Linux operating systems?

Understan

d

3

3 Illustrate to redirect the standard input (stdin) and the standard output

(stdout) of a process, so that scanf () reads from the pipe and printf ()

writes into the pipe?

Knowledg

e

4

UNIT-IV

Part – A (Short Answer Questions)

1 Describe message queue with syntax and example? Knowledge 3

2 DescribeFIFO concept with example?? 4

3 Describe simulate sleep and wakeup technology in Linuxipc Understand 4

4 Illustrate making fifo from command prompt? Understand 5

5 Describe mkfifo ( ) system call by example? Understand 5

6 Describe Pipes opening concept with example? Understand 5

7 Describepipes? Explain their limitations. Understand 5

8 Explain how pipes are created and used in IPC with examples?

Explain name space and importance in Linux?

Understand 5

9 Describe msgsnd ( ) with example? Understand 5

10 Describe msgrcv ( ), msgctl () with example? Understand 4

11 Illustrate about IPC_CREAT? Understand 5

12 Illustrate about IPC_EXEC? Knowledge 5

13 Explain about msgtyp with example? Knowledge 5

14 Describe IPC _PRIVATE with example? Understand 4

15 Describe pipe () system call? Understand 5

16 Differentiate between kill() and rise()? Knowledge `4

17 Differentiate low level piping and formatted piping? Knowledge 4

18 Differentiate between named pipes and unnamed pipes? Understand 5

19 Explain about fork () system call? Understand 5

20 Describe O-NDELAY flag with example? Knowledge 5

21 Explain message-queue communication by example? Knowledge 5

22 Explain priority queue with example? Understand 5

23 Explain about shared-memory segment. Knowledge 4

24 Explain about shared-memory segment with example? Knowledge 4

25 Illustrate about V IPC semaphore mechanism with example? Evaluate 3

26 Explain about achieving IPC using shared memory? Understand 3

272 Explain about achieving IPC using semaphores? Understand 5

8 Explain about synchronization? How synchronization is achieved with

semaphores?

Knowledge 5

29 Explain the structure of a thread. Discuss its uses. Knowledge 5

30 Explain the kernel data structure for shared memory with a neat diagram.

Explain the APIs associated for creating and destroying a shared memory

Understand 5

31 Differentiate between thread and light weight process. Understand 4

Page 97: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

32 Explain how semaphores are used to control thread operations on shared

memory

Understand 4

33 Explain about all functions related to semaphores. Understand 4

34 Explain with a program how to copy file data from server to client using

shared memory.

Understand 4

35 Explain with a program how to copy file data from server to client using

semaphores.

Understand 4

36 Explain about shmget() function? Understand 4

37 Differentiate semaphore with shared memory IPC Mechanisms. Knowledge 4

38 Illustrate to transfer data between two unrelated processes using shared

memory.

Understand 4

39 Explain about shmcntl () function? Understand 4

Part – B (Long Answer Questions)

1 Describe message queue with syntax and example? Understand 5

2 Describe FIFO concept with example? Explain name space and

importance in Linux?

Knowledge 5

3 Describe sleep and wakeup technology in Linux PC. Illustrate

making FIFIO from command prompt?

Understand 4

4 Describe mkfifo ( ), pipe opening concept by example? Understand 5

5 Illustrate pipes? Explain their limitations. Explain how pipes are

created and used in IPC with an examples

Understand 4

6 Describe msgsnd ( ), msgrcv ( ) with example? Knowledge 4

7 Illustrate about IPC_CREAT with example? Understand 4

8 Illustrate about IPC_EXEC? Explain about msgtyp with example? Knowledge 4

9 Describe IPC _PRIVATE, pipe () system call with example? Understand 4

10 Differentiate between kill (), raise () with example? Understand 4

11 Explain about fork () and O-NDELAY flag with example? Understand 4

12 Explain message-queue communication by example? Explain

priority queue with example?

Understand 5

13 Explain the advantages of FIFO‟s over pipes. Understand 5

14 Explain two way communication using FIFOs? Understand 5

15 Explain about shared-memory segment with example?. Knowledge 3

16 Illustrate about V IPC semaphore mechanism with example. Understand 3

17 Explain about achieving IPC using shared memory? Knowledge 3

18 Explain about achieving IPC using semaphores? Knowledge 3

19 Explain about synchronization and How synchronization is achieved

with Semaphores?

Knowledge 3

20 Explain the structure of a thread and kernel data structure for shared

memory with a neat diagram?

Understand 3

21 Explain the system functions associated for creating and

destroying a shared memory?

Understand 3

22 Differentiate between thread and light weight process with system calls? Understand 3

23 Explain how semaphores are used to control thread operations on shared

memory

Knowledge 3

24 Explain about all functions related to semaphores? Knowledge 3

25 Explain with a program how to copy file data from server to client using

shared memory.

Knowledge 3

Page 98: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

26 Explain with a program how to copy file data from server to client using

semaphores.

Understand 3

27 Differentiate semaphore with shared memory IPC Mechanisms. Understand 3

28 Illustrate text transfer between two unrelated processes using

shared memory.

Knowledge 3

Part – C (Problem Solving and Critical Thinking)

1 Illustrate by writing c program to handle a user Defined signal by

example?

Knowledge 5

2 Illustrate by writing c program where process forks to a child, then waits

for someone to terminate?

Understand 4

3 Illustrate by writing c program where process forks to a child, and create

a child process by using forks and suddenly terminates itself.

Knowledge 4

4 Illustrate ipc facility to show system limits? Knowledge 4

5 Illustrate to displays last operation time in each ipc facility. Knowledge 5

6 Demonstrate race conditions with shared memory? Knowledge 3

UNIT-V

Part - A (Short Answer Questions)

1 Differentiate between multithreaded programming and single

threaded programming?

Knowledge 2

2 Illustrate pthread create ( ) function? Understand 3

3 Explain pthread kill ( ) function with example? Understand 4

4 Explain about various POSIX APIs for mutual exclusion and locks with

example?

Understand 5

5 Illustrate about thread synchronization with mutex locks? Knowledge 5

6 Illustrate about POSIX APIs of semaphores? Understand 5

7 Explain thread synchronization with semaphores with example? Knowledge 5

8 Explain about Light Weight Processes? Understand 5

9 Explain about Thread structure? Understand 5

10 Explain about Semaphores? Understand 5

11 Explain about Mutexes? Understand 5

12 Explain about Threads? Understand 4

13 Illustrate multithreaded programming? Understand 4

14 Explain about the APIs used to Demonstrate the attributes for a thread Understand 4

15 Define deadlock? Illustrate about the mutex lock to prevent

deadlock condition?

Knowledge 4

16 Differentiate single threaded and multithreaded programming? Understand 4

17 Illustrate with a neat diagram about threads, and light weight processes? Understand 4

18 Explain about separate kernel stack and light weight processes? Understand 5

19 Describe disadvantage of single threaded programming? Understand 5

20 Describe advantages of multithreaded programming? Understand 5

21 Differentiate process and threads? Knowledge 3

22 Demonstrate client and server programming using TCP protocol? Understand 3

23 Differentiate stream sockets and raw sockets? Understand 4

24 Demonstrate client and server programming using UDP protocol? Understand 5

Page 99: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

25 Explain about socket( ) function in Linux? Understand 5

26 Explain about listen( ) function in Linux? Knowledge 5

27 Explain about accept( ) function in Linux? Understand 5

28 Explain about bind( ) function in Linux? Understand 3

29 Explain about read() function in Linux? Understand 5

30 Explain about write() function in Linux? Knowledge 4

31 Explain about „TCP NODELAY‟ syntax? Understand 4

32 Differentiate IP V4 AND IPV6? Understand 4

33 Explain bzero () function? Understand 5

34 Explain about byte ordering in Linux? Understand 5

35 Explain about how TCP connections are established and

terminated.

Understand 3

36 Demonstrate echo server and echo client using 3333 port in tcp style? Knowledge 3

37 Explain how small and big packets handled in transferring client server

environment?

Understand 3

38 Explain tcp socket connection establishment with a neat diagram? Understand 5

39 Explain udp connection establishment with a neat diagram? Understand 5

40 Demonstrate client and server programming using TCP protocol? Understand 5

41 Differentiate client server models in tcp and udp? Knowledge 4

42 Explain sendTo () with example? Understand 4

43 Explain recvFrom () with example? Understand 4

Part - B (Long Answer Questions)

1 Illustrate about thread synchronization with mutex locks with examples? Knowledge 5

2 Differentiate between multithreaded programming and single

threaded programming.

Understand 5

3 Illustrate pthread create ( ) function with examples? Understand 2

4 Explain pthread kill ( ) function with example? Knowledge 4

5 Explain about various POSIX APIs for mutual exclusion and locks

with example

Understand 4

6 Illustrate about POSIX APIs of semaphores? Understand 4

7 Explain thread synchronization with semaphores with example? Understand 4

8 Explain about Thread structure with examples? Knowledge 3

9 Explain about Semaphores with examples? Knowledge 3

10 Explain about Mutexes in Threads. With examples? Knowledge 3

11 Illustrate multithreaded programming? Understand 2

12 Explain about the APIs used to Demonstrate the attributes for a

thread

Understand 3

13 Illustrate about the mutex lock to prevent deadlock condition. Knowledge 3

14 Differentiate single threaded and multithreaded programming? Understand 3

15 Illustrate with a neat diagram about threads, and light weight

processes?

Understand 4

16 Explain about separate kernel stack and light weight processes? Understand 5

17 Describe disadvantage of single threaded programming?

Describe advantages of multithreaded programming.

Knowledge 5

Page 100: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Prepared By: HOD, CSE

18 Explain about Linux API‟s for shared memory with neat diagram? Knowledge 4

19 Illustrate posix thread APIs for basic Process and Threads with

examples?

Knowledge 5

20 Explain about how semaphores values can be incremented or

decremented with examples?

Understand 5

21 Demonstrate client and server programming using TCP protocol with

neat diagram?

Knowledge 5

22 Differentiate stream sockets and raw sockets and related system calls? Understand 5

23 Demonstrate client and server programming using UDP protocol with

neat diagram?

Understand 4

24 Explain about socket ( ) , listen( ), accept( )system calls in Linux? Understand 5

25 Explain about bind (), read (), write () functions in Linux? Knowledge 4

26 Explain about sendTo () and recvFrom () functions in Linux? Knowledge 4

27 Explain about TCP NODELAY syntax with a small program? Knowledge 4

28 Explain all byte ordering and manipulation functions with

examples?

Knowledge 4

29 Explain about how TCP connections are established and

terminated.

Understand 5

30 Demonstrate echo server and echo client using 6666 port in tcp style? Understand 5

31 Explain how small and big packets handled in transferring client

server environment?

Understand 5

32 Explain tcp socket connection establishment with a neat diagram? Knowledge 5

33 Explain udp data transfer with a neat diagram? Knowledge 5

Part – C (Problem Solving and Critical Thinking)

1 Illustrate by writing a c program to implement Thread structure? Knowledg

e

5

2 Illustrate by writing a c program to implement thread_mutex_lock () and

unlock ()?

Knowledg

e

4

3

Illustrate by writing a c program to implement tcp chat client server? Understan

d

5

4 Illustrate by writing a c program to implement udp chat client server? Understan

d

4

Page 101: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

COURSE DESCRIPTION FORM

Course Title MOBILE COMPUTING

Course Code A70536

Regulation R13 – JNTUH

Course Structure Lectures Tutorials Practicals Credits

5

- - 4

Course Faculty Dr.Balarengadurai Prof

I. COURSE OVERVIEW

This course is offered for those who are interested in understanding and building systems support mechanisms for mobile computing systems including client-server web/database/file systems, and mobile ad hoc and sensor networks for achieving the goal of anytime, anywhere computing in wireless mobile environments. The technologies involved to realize such a system will be covered and the fundamental concepts of mobile computing are introduced. These include mobility and service management, data management, routing in mobile ad hoc and sensor networks, and security issues for mobile systems. While mobile computing covers many topics, in this course our main focus will be on mobility, data and service management, and security issues in mobile computing environments.

II. PREREQUISITE(S):

Level Credits Periods/ Week Prerequisites UG 4 5 Computer Networks, Operating

Systems

III. MARKS DISTRIBUTION:

Page 102: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

University Total

Session Marks End Exam

marks

marks

Midterm Test There shall be two midterm examinations. Each midterm examination

consists of essay paper, objective paper and assignment. The essay paper is for 10 marks of 60 minutes duration and shall contain 4 Uuestions. The student has to answer 2 questions, each carrying 5 marks. The objective paper is for 10 marks of 20 minutes duration. It consists of

10 multiple choice and 10 fill-in-the blank questions, the student has to

answer all the questions and each carries half mark.

First midterm examination shall be conducted for the first two and half

units of syllabus and second midterm examination shall be conducted for

the remaining portion. Five marks are earmarked for assignments. There

shall be two assignments in every theory course.

Assignments are usually issued at the time of commencement of the

semester. These are of problem solving in nature with critical thinking

Marks shall be awarded considering the average of two midterm tests in

each course.

75 100

IV. EVALUATION SCHEME:

S. No Component Duration Marks

1. I Mid Examination 80 minutes 20

2. I Assignment - 5

3. II Mid Examination 80 minutes 20

4. II Assignment - 5

5. External Examination 3 hours 75

V. COURSE OBJECTIVES:

At the end of the course, the students will be able to:

Page 103: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

I. Able to understand the concept of mobile computing paradigm, its novel applications and

limitations.

II. To learn the typical mobile networking infrastructure through a popular GSM protocol as well as their architecture.

III. To illustrate the issues and solutions of various layers of mobile networks, namely MAC layer,

Network layer and transport layer.

IV. To estimate the database issues in mobile environments and data delivery models and also issues in the QoS.

V. Be familiar with the ad hoc networks, applications and their

challenges.

VI. To learn the platforms and protocols used in mobile

environment.

VI. COURSE OUTCOMES:

After completing this course the student must demonstrate the knowledge and ability to:

1. An understanding of the characteristics and limitations of mobile hardware devices including

their user-interface modalities.

2. Ability to develop applications that are mobile-device specific and demonstrate current practice

in mobile computing contexts.

3. Awareness of professional and ethical issues, in particular those relating to security and privacy

of user data and user behavior

VII. HOW PROGRAMS ARE ACCESSED:

Program Outcomes

Level

Proficiency

assessed by

PO1 Engineering knowledge: Apply the knowledge of mathematics, Laboratory

science, engineering fundamentals, and an engineering H

Experiments

specialization to the solution of complex engineering problems.

PO2 Problem analysis: Identify, formulate, review research literature,

and analyze complex engineering problems reaching substantiated H --

conclusions using first principles of mathematics, natural sciences,

and engineering sciences.

PO3 Design/development of solutions: Design solutions for complex

engineering problems and design system components or processes Tutorials,

that meet the specified needs with appropriate consideration for H Laboratory

the public health and safety, and the cultural, societal, and Experiments

environmental considerations.

PO4 Conduct investigations of complex problems: Use research-

based knowledge and research methods including design of H Assignments

experiments, analysis and interpretation of data, and synthesis of

the information to provide valid conclusions.

PO5 Modern tool usage: Create, select, and apply appropriate

techniques, resources, and modern engineering and IT tools H

Assignments,

including prediction and modeling to complex engineering Exams

activities with an understanding of the limitations.

Page 104: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

PO6 The engineer and society: Apply reasoning informed by the

contextual knowledge to assess societal, health, safety, legal and N --

cultural issues and the consequent responsibilities relevant to the

professional engineering practice.

PO7 Environment and sustainability: Understand the impact of the

professional engineering solutions in societal and environmental N --

contexts, and demonstrate the knowledge of, and need for

sustainable development.

PO8 Ethics: Apply ethical principles and commit to professional ethics S --

and responsibilities and norms of the engineering practice.

PO9 Individual and team work: Function effectively as an individual,

and as a member or leader in diverse teams, and in S Tutorials,Exams

multidisciplinary settings.

PO10 Communication: Communicate effectively on complex

engineering activities with the engineering community and with

society at large, such as, being able to comprehend and write N --

effective reports and design documentation, make effective

presentations, and give and receive clear instructions.

PO11 Project management and finance: Demonstrate knowledge and

understanding of the engineering and management principles and N --

apply these to one‟s own work, as a member and leader in a team,

to manage projects and in multidisciplinary environments.

PO12 Life-long learning: Recognize the need for, and have the Future scope or

preparation and ability to engage in independent and life-long S projects

learning in the broadest context of technological change. discussion

N - None S - Supportive H - Highly Related

VIII. HOW PROGRAM SPECIFIC OUTCOMES ARE ASSESSED:

Program Specific Outcomes Level Proficiency

assessed by

PSO1 Applications of Computing: Ability to use knowledge in various

domains to provide solution to new ideas and innovations.

H

Lectures,

Assignments

PSO2 Programming Skills: Identify required data structures, design

suitable algorithms, develop and maintain software for real world

problems.

H

Projects

N - None S - Supportive H - Highly Related

IX. SYLLABUS

UNIT – I:

Introduction

Page 105: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Mobile Communications, mobile computing- Paradigm, Promises/Novel Applications and Impediments and Architecture: Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices. GSM: Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS, CSHSD, DECT.

UNIT – II:

Wireless Medium Access Control (MAC) Motivation for a specialized MAC(Hidden and exposed terminals. Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN (IEEE802.11). Mobile Network Layer: IP and mobile IP Network Layers, Packet Delivery and handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP

UNIT – III:

Mobile Transport Layer

Conventional TCP/IP Protocols, Indirect TCP, Snooping TCP, Mobile TCP, other transport layers protocols

for Mobile Networks. Database Issues: Database Hoarding & Caching Techniques, C-S Computing & Adaptation, Transactional Models, Query Processing, Data Recovery Process & QoS Issues.

UNIT – IV: Data Dissemination and Synchronization: Communications Asymmetry, Classification of Data Delivery Mechanisms, Data Dissemination Broadcast Models, Selective Tuning and Indexing Methods, Digital Audio and Video Broadcasting(DAB & DVB). Data Synchronization- Introduction, Software, and Protocols.

UNIT – V:

Mobile Ad hoc Networks (MANETs) Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc., Mobile Agents, Service Discovery. Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, JavaCard,PalmOS,Windows CE, Symbian OS, Linux for Mobile Devices, Android.

Text Books: 1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, 2e, 2004. 2. Raj Kamal, “Mobile Computing”, Oxford University Press, 2007, ISBN: 0195686772.

References: 1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, 2e, 2004.

2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002, ISBN: 047141908.

3. Reza Behravanfar, “Mobile Computing Priniciples: Designing and Developing Mobile Applications with UML and XML”, Cambridge University Press, Oct 2004, ISBN: 0521817331

Page 106: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

X. COURSE PLAN:

At the end of the course, the students are able to achieve the following course learning outcomes:

Lecture Topics to be covered

Course Learning Reference

No. Outcomes

1-3 Introduction to mobile communications, mobile Understand the basic T1:1.1-1.8,

computing- paradigm, applications, architecture concept of mobile T2:1.2

and limitations of mobile and hand held devices. computing

4-7 GSM Services, system architecture, radio Describe the GSM and T1:3.3-3.7

interfaces, protocols, CSHSD, DECT. GPRS architecture T2:2.3

8-9 Localization, calling, handover, security, new Discuss about the GSM T1:3.3

data services. services T2:2.3

10 Wireless Medium Access Control (MAC), Explain about MAC layer T1:4.1

motivation for a specialized MAC (Hidden and

exposed terminals. Near and far terminals).

11-12 MAC protocols for GSM and Wireless LAN Discuss about MAC T1:4.1

(IEEE802.11) protocols

13-14 Collision Avoidance :MACA, MACAW Generalize the Collision T1:3.8,4.1

Protocols Avoidance protocols T2:2.5-3.1

15-17 Mobile IP Network Layer :IP and mobile IP Demonstrate about the T1:4.4

network layers, packet delivery and handover mobile IP network Layer

management

18-21 Location management and registration, Describe about the location T1:4.5,4.6,4

tunneling and encapsulation, route optimization, management and .7

DHCP registration

22-24 Mobile transport layer, conventional TCP/IP Explain about the mobile T1:4.9, 6.1

protocols, indirect TCP, snooping TCP transport layer protocols

25-28 Mobile TCP and other transport protocols Summarize about the T1:5.2

mobile TCP

29-32 Database hoarding & caching techniques, C-S Discuss about the database T1:5.1.5.4

computing & adaptation. issues

33-37 Transactional models, query processing, data Explain about the T1:8.1-8.6

recovery process & QoS issues. transactional models

38-41 Data dissemination and synchronization, Describe about the data T1:6.1-6.7

communications asymmetry, classification of dissemination and

data delivery mechanisms, data dissemination synchronization

broadcast model.

42-46 Selective tuning and indexing methods, digital Illustrate about the T1:7.6,7.7

audio and video broadcasting (DAB & DVB). selective tuning and

data synchronization- introduction, software, indexing methods

and protocols.

47-51 Mobile Adhoc networks(MANETs) Interpret the MANETs and T1:10.1-

introduction, applications & challenges of a their applications 10.5

MANET

52-55 Classification of routing algorithms such as Discuss about the routing T1:11.3 DSR, AODV ,DSDV , etc algorithms

56-59 Mobile agents, service discovery and protocols. Explain about the MANET T1:11.3 services

60-61 Protocols and platforms for mobile computing Analyze about the protocols T1:10.6- WAP, Bluetooth, XML, J2ME and platforms 10.13

62-63 Java Card, Palm OS, Windows CE, Symbian Understand various T2:9.1 OS, Linux for Mobile Devices,Android operating systems

Page 107: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

X. MAPPING COURSE OBJECTIVES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program Specific

Outcomes

Objectives

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

I H S H H

II S H S H

III H S H H

IV S H H H

V H S H S

VI S H H H

S – Supportive H - Highly Related

XI. MAPPING COURSE OUTCOMES LEADING TO THE ACHIEVEMENT OF PROGRAM OUTCOMES AND PROGRAM SPECIFIC OUTCOMES:

Course

Program Outcomes

Program

Specific

Outcomes

Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2

1 H H H

2 H H H

3 H H S H

S – Supportive H - Highly Related

Page 108: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

ASSIGNMENT

Course Name MOBILE COMPUTING

Course Code A70536

Class IV B. Tech I Semester

Branch Computer Science and Engineering

Year 2016 - 17

Course Faculty Dr.Balarengadurai Prof

OBJECTIVES

To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to

be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of

quality assurance in higher education. The major emphasis of accreditation process is to measure the

outcomes of the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a lead in

incorporating philosophy of outcome based education in the process of problem solving and career

development. So, all students of the institute should understand the depth and approach of course to be

taught through this question bank, which will enhance learner‟s learning process.

ASSIGNMENT – I & II

S. No

Questi

on

Blooms

Taxonomy

Level

Course

Outcome

UNIT - 1

1 Explain the system architecture of GSM? Understand 2 2 Discuss the mobile, bearer, supplementary and teleservices of

GSM?

Understand 2 3 Define the following

Fixed and wired

Mobile and wired

Fixed and wireless

Mobile and wireless

Knowledge 1

4 Define mobile computing. Discuss the two kinds of mobility? Knowledge 1 5 Explain the different mobile applications? Understand 1 6 Discuss the types of handover and services available in GSM? Understand 3 7 Explain the GPRS architecture reference model? Understand 3 8 Describe DECT system functions, architecture and protocols? Knowledge 3 9 Describe various protocols used in WLL and Explain the services? Knowledge 3

10 Explain about High-Speed circuit switched data? Understand 3 UNIT – II

1 Explain about MAC Layer? Understand 2 2 Distinguish between classical and slotted aloha multiple access

techniques?

Understand 2

Page 109: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Compare and contrast SDMA,TDMA,FDMA and CDMA

techniques?

Understand 3 4 Explain the following problems of wireless transmission?

i. Exposed terminal and hidden terminal ii .Near and far terminals

Understand 2

5 Describe about TDMA .How does the near/far effect influence

TDMA systems?

Knowledge 3

6 Discuss in detail about MACA? Understand 2 7 Explain about CDMA systems? Understand 2 8 Compare CSMA, DAMA, ISMA and PRMA techniques? Understand 2 9 Discuss briefly about SAMA? Understand 2

10 Define multiplexing and Explain about the different kinds of

multiplexing? Techniques?

Knowledge 3

11 Define the following

I .Mobile and corresponding nodes

Home and foreign networks

Home and foreign agents

Care-Of-address and its variants.

Knowledge 3

12 Explain with neat diagram of Agent advertisement packet of

mobile IP?

Understand 3 13 List all the requirements for a mobile IP? Knowledge 3 14 Describe the methods of tunneling and encapsulation in mobile IP? Knowledge 3 15 Write a note on route optimization in mobile IP? Understand 2 16 Explain with the help of a neat sketch how packet delivery takes

place to and from the mobile node?

Understand 3

17 Discuss agent solicitation and agent advertisement messages are

needed?

Understand 3 18 Explain the various fields of registration request packet of mobile

IP?

Understand 2 19 Describe about DHCP? Knowledge 3 20 Explain IP-in-IP encapsulation? Understand 3

UNIT -III

1 Discuss how traditional TCP cannot be used in mobile network? Understand 3 2 Explain the indirect TCP? Understand 3 3 Distinguish between snooping TCP and Mobile TCP? Understand 2 4 Compare different TCP enhancements? Understand 2 5 Explain in detail classical enhancements to TCP for mobility? Understand 2 6 Explain about mobile TCP? Understand 2 7 Discuss congestion control in traditional TCP and Explain the

concepts of slow start and congestion threshold?

Understand 2

8 Explain the working of transaction-oriented TCP? Understand 3 9 Discuss in detail about the selective retransmission technique in

TCP?

Understand 3 10 Explain the mechanism of fast retransmit/fast recovery in TCP and

transmission/time-out freezing in TCP?

Understand 3

11 Describe hoarding techniques? Knowledge 3 12 Explain about caching invalidation mechanisms? Understand 3 13 Define the following

Cache access protocols

Prefetching

Knowledge 2

14 Discuss data cache and web cache maintenance in mobile

environments?

Understand 2 15 Explain in detail about the client-server computing with

adaptation?

Understand 2 16 Discuss the transactional model of database? Understand 2 17 Explain the Query processing of database? Understand 2 18 Define quality of service and Explain the issues ensuring of QOS

in mobile environment?

Knowledge 2

Page 110: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

19 Explain the process of data recovery? Understand 3 20 Define transaction and Explain the ACID properties associated

with database transaction?

Knowledge 2

UNIT-IV

1 Explain the communication asymmetry that arises in data-

dissemination?

Understand 3 2 Distinguish between push-based and pull-based mechanism of

data dissemination?

Understand 3

3 Explain about Selective tuning and indexing techniques in mobile

computing?

Understand 3

4 Explain in detail about the hybrid push-pull based data delivery

mechanism?

Understand 3

5 Discuss briefly about Directory method and Hash-based methods

of selective tuning and indexing?

Understand 3

6 Define indexing and Explain various types of indexing techniques? Knowledge 3 7 Discuss temporal addressing, broadcast addressing and use of

header selective tuning indexing techniques?

Understand 3

8 Explain the following i .index-based method

i .Distributed index-based method ii .Flexible indexing method

Understand 3

9 Explain about Data Dissemination Broadcast Models? Understand

3 10 Discuss about Data synchronization? Understand 2 UNIT-V

1 Discuss briefly about MANETs? Understand 2 2 Explain about cellular networks and adhoc wireless networks? Understand 2 3 Discuss the challenges /issues faced by mobile ad hoc networks? Understand 2 4 List and Explain the properties of mobile ad hoc networks? Knowledge 2 5 Explain routing algorithms based on the variations in network

topology?

Understand 3 6 Explain about different categories of routing protocols? Understand 3 7 Define the following I.AODV routing ii.DSR

iii.TORA IV.ABR.

Knowledge 3

8 Describe ZRP hybrid routing protocols in MANETs? Knowledge 3 9 Discuss the security issues in MANET? Understand 3

10 Explain about Mobile Agents and Service Discovery? Understand 3 11 Discuss the role of WAP forum in wireless web accessing? Understand 3 12 Define WAP and Explain its characteristics? Knowledge 2 13 Explain the architecture of wireless application protocol? Understand 2 14 Discuss in detail about the Wireless Datagram protocol? Understand 3 15 Explain about wireless transport layer security? Understand 2 16 Explain wireless session protocol of the session layer? Understand 3 17 Discuss the origin of Bluetooth technology and five criteria

satisfied by it?

Understand 3 18 Describe the physical layer of Bluetooth? Knowledge 3 19 Explain about LMP and L2CAP protocol in Bluetooth? Understand 2 20 Discuss the configuration and profile of J2ME in detail? Understand 3

Page 111: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

COMPUTER SCIENCE AND ENGINEERING

TUTORIAL QUESTION BANK

Course Name MOBILE COMPUTING

Course Code A70536

Class IV B. Tech I Semester

Branch Computer Science and Engineering

Year 2016 – 17

Course Faculty Dr.Balarengadurai Prof

OBJECTIVES:

To meet the challenge of ensuring excellence in engineering education, the issue of quality

needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the

principal means of quality assurance in higher education. The major emphasis of accreditation

process is to measure the outcomes of the program that is being accredited.

In line with this, Faculty of Institute of Aeronautical Engineering, Hyderabad has taken a

lead in incorporating philosophy of outcome based education in the process of problem solving

and career development. So, all students of the institute should understand the depth and

approach of course to be taught through this question bank, which will enhance learner‟s

learning process.

S. No.

Questions

Bloom’s

Taxonomy

Level

Course

Outcome

UNIT-I

Part - A (Short Answer Questions)

1 Define wireless communication? Knowledg

e

1 2 Explain the uses of wireless Technology? Understan

d

1 3 Define CDMA? Knowledg

e

2 4 Explain how is localization done in GSM are reflected in the

database? Understan

d

3 5 Define a signal? Knowledg

e

1 6 Explain polarization? Understan

d

3 7 State the challenges in wireless communication? Knowledg

e

3 8 State the types of multiplexing? Knowledg

e

3 9 Explain advantages and disadvantages of CDMA? Understan

d

1 10 Explain the type of wireless networks? Understan

d

3 11 State some limitations of mobile computing? Understan

d

3 12 Define a terms GSM and GPRS? Knowledg

e

3 13 Define Ad hoc Networks? Knowledg

e

1 14 Define function of AuC? Knowledg

e

2

15 Explain the types of multiplexing? Understand 3

Page 112: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

16 Define FDD? Knowledge 1 17 Define the types of antenna? Knowledge 3 18 Define SDMA? Knowledge 1 19 Describe several versions in CSMA? Understand 3 20 Describe two sub layers in DLC. Understand 2

Part - B (Long Answer Questions) 1 Define the process of call handover when a mobile station moves? Knowledge 3 2 Explain functioning of a cellular network. How the given set of

frequencies are used to increase capacity of a network?

Understand 3

3 Explain how interconnected mobile services switching centers

enable a mobile station to communicate to another over long

distance?

Understand 1

4 Describe the functioning of a smartcard. Why is secured hardware

and software required for a smartcard?

Understand 3

5 Show the various subsystems and units in the GSM system

architecture. How do these subsystems and units differ from those in

GPRS?

Understand 2

6 Explain using schematic diagrams the synchronous, asynchronous,

and synchronous packet types of data transfer?

Understand 3

7 Explain the working of a sensor-actuator pair by giving an example? Understand 3

8 Discuss the advantage and disadvantage of cellular system with

small cells?

Understand 3

9 Explain FDMA in detail? Understand 2

10 Discuss SDMA in detail? Understand 2

11 Explain the various applications of mobile computing? Understand 2

12

Explain Why do MAC scheme in wired network fail in wireless

networks and how does the multiple access with collision avoidance

(MACA) scheme work?

Understand

3

13 Explain the architecture of GSM with a neat diagram? Understand 2

14 Explain How is routing carried out in GSM networks? Understand 2

15

Explain in detail about

Mobile Terminated Call

Mobile Originated Call With suitable diagrams?

Understand

2

16 List the various handovers carried out in GSM and Explain any one

of them in detail?

Knowledge 2

17 Explain How is Mobility Management done in GSM ? Understand 2

18 Explain in detail about the General Packet Radio Service (GPRS)? Understand 3

Part - C (Problem Solving and Critical Thinking Questions)

1

Discover the current numbers of subscribers for the different

systems. As mobile communication boom, no printed number is

valid for too long?

Apply

3

2 Check out strategies of different network operators while migrating

towards third generations systems. Why is a single common system

not in sight?

Evaluate

3

3 Explain how will the next generation of wireless systems be

different from the 3G technologies?

Apply 3

4 Briefly Explain why security mechanisms are becoming increasingly

important in wireless networks?

Apply 3

5 Explain why the international availability of the same ISM bands is

important?

Apply 3

Page 113: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

6

Explain why, typically is digital modulation not enough for radio

transmission. What are general goals for digital modulation. What

are typical schemes?

Apply

3

7

Assume all stations can hear all other stations. One station has to

transmit and senses the carrier idle. Why can a collision still occur

after the transmission?

Apply

3

8 Explain the term interference in the space,time,frequency, and code

domain?

Understand 2

9 Consider duplex channels, what are the alternatives for

implementation in wireless networks? What about typical wired

networks?

Apply 2

10

Recall the problem of hidden and exposed terminals . What happens

in the case of such terminals if Aloha,slotted aloha, reservation

Aloha, or MACA is used?

Apply

3

11 Explain how are guard spaces realized between users in CDMA? Understand 2

UNIT – II

Part - A (Short Answer Questions)

1 Analyze the problems of Wireless Transmission? Apply 2 2 List the Services of GSM? Knowledge 3 3 Explain the different types of Satellite Orbits? Understand 2 4 Explain how the Is IEEE 802.11 and Wi Fi same/ State the purpose

of WiFi?

Understand 2

5 Define handover? Knowledge 2 6 Describe the definition for GPRS? Knowledge 1 7 Define DAB? Knowledge 3 8 Define WAP architecture? Knowledge 3 9 Define multipath effects and interference? Knowledge 3

10 List the process of DAB center? Knowledge 2 11 Explain about DVB container? Understand 2 12 List the registers maintained by the gateway of satellite? Knowledge 2 13 State the primary goal of IEE 802.11? Knowledge 2 15 Explain Why generic routing encapsulation is used? Understand 3 16 Explain Advantages of wireless LAN? Understand 3 17 Explain the need for mobile IP? Understand 3 18 List down the goals of wireless LAN? Knowledge 2 19 List the requirements of mobile IP? Knowledge 2 20 Explain the design goals of mobile IP? Understand 3 21 Explain the term mobile node? Understand 3 22 Explain about IP packet delivery? Understand 2 23 Discuss about agent discovery? Understand 3 24 Describe about Tunneling? Understand 3 25 Explain about encapsulation? Understand 2

Part - B (Long Answer Questions)

1 List the frequency bands and number of sub-carriers or carriers in a

CDMA2000 system?

Knowledge 2

2

Define the FHSS frequency-hopping technique. How does it help in

receiving signals in the presence of frequency selective fading of the

signals?

Knowledge

1

3 List the basic features of CDMA systems. Explain soft handover? Knowledge 2

4

Explain how space, time, frequency, and code division methods

control the simultaneous access to the medium by multiple source or

channels of mobile terminals and base transceivers?

Understand

3

Page 114: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

5 Expain the functions of IS-95 processing units for convolution,

symbol repetition, interleaving, long code sequence generator?

Analyze 3

6 Explain the use of multiple carriers by orthogonal coding. How does

an OFDMA system differ from a CDMA system?

Analyze 3

7 Analyze the recommended standards in IMT-2000? Analyze 2

8 Compare the features of HSPA and LTE pre 4G? Understand 3 9 Describe forward-and reverse link structure and frames in IS-95? Understand 3

10 Explain in detail the three phases of EY-NMPA in Hiperlan? Understand 2 11 List the various information bases in Hiperlan and Explain the same? Knowledge 2 12 Discuss the architecture of Bluetooth in detail? Understand 2 13 Explain the architecture of WI FI in detail? Understand 3 14 Explain the architecture of WIMAX in detail? Understand 3 15 Describe Hiperlan architecture with suitable diagrams? Understand 3 16 List out the various MAC management services and Explain any 2

of them in detail?

Knowledge 3

17 Draw the MAC frame format and Explain its various fields in detail? Knowledge 2 18 Explain DFWMAC-DCF using CSMA /CA? Understand 3 19 Explain DFWMAC-DCF with polling? Understand 2 20 Explain mobile TCP. How does supervisory host send TCP packets

to the mobile node and to a fixed TCP connection? Give the

advantages and disadvantages of mobile TCP?

Understand

2

21 Explain IP sec suite of protocols? Understand 3 22 Describe the explicit notification schemes. What are the changes

required at the receiver and the transmitter to enable explicit

notifications?

Understand 3

6 23 Describe slow start of congestion control. How can fast recovery

takes place in the congestion avoidance phase.?

Understand 2

24 Explain the difference between the connection less and connection

oriented protocols. Give Examples.?

Understand 3

25 Explain how registration of a Mobile Node is carried out with

appropriate request and reply packet formats?

Understand 3

26 Explain how

End to End packet delivery is done in mobile IP?

Agent advertisement is done in mobile IP?

Understand

2

27 Explain five layers in the IP protocol? Explain the functions of each

layer?

Understand 3

28 Explain in detail about the IP in IP and minimal encapsulations? Understand 2

29 Explain in detail about GRE encapsulation with the appropriate

packet format?

Understand 3

30 Describe the process of optimization in Mobile IP with a suitable

timeline diagram?

Understand 2

31 Explain in detail about DHCP? Understand 3 32 Discuss DSDV routing in detail? Understand 3 33 Discuss DSR routing in detail? Understand 2 34 Explain Why is conventional routing in wired networks not suitable

for wireless networks? Substantiate your answers with suitable

examples?

Understand 3

35 Explain How is multicast routing carried out in ad-hoc networks? Understand 2 Part - C (Problem Solving and Critical Thinking Questions)

1 Explain the typical data rates in DECT. How are they achieved

considering the TDMA frames?

Understand 3

2 Explain multiplexing schemes that are applied in DECT and for

what purpose?

Understand 2

Page 115: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Explain the new infrastructure needed for GPRS, but not for

HSCSD? Which components are new and what their purpose?

Understand 3

4 Compare the complexity of DECT with that of GSM? Apply 2 5 Name basic applications for satellite communication and describe

the trends?

Apply 2

6 Discuss the concept of handover in connection with the satellite

communication system?

Apply 2

7 Describe indirect TCP. Explain the modifications in indirect TCP as

the selective repeat protocol and mobile end transport protocol?

Apply

3 8 Explain the characteristics do the different orbits have? What are

their pros and cons?

Understand 3

9 List the basic features of CDMA systems. Explain soft handover? Apply 3 10 Write the general problems of satellite signals travelling from a

satellite to a receiver?

Apply 3

UNIT-III

Part - A (Short Answer Questions)

1 State the functions which support service and connection control? Knowledge 3 2 List the three Low Power States provided by Bluetooth? Knowledge 2 3 Explain How user datagram protocol is used? Understand 2 4 Define COA? Knowledge 2 5 Explain different types of handover? Understand 1 6 Explain Advantage and Disadvantage of Mobile TCP? Understand 3 7 Define Transparency? Knowledge 2 8 Show the indirect TCP model with neat diagram? Understand 2 9 Translate other methods of mobile TCP layers? Understand 2

10 Explain about traditional TCP? Understand 2 11 Discuss about congestion control? Understand 3 12 Describe slow start? Understand 3 13 Explain about indirect TCP? Understand 3 14 List advantages of Indirect TCP? Knowledge 3 15 Describe the term snooping TCP? Understand 3 16 Discuss about mobile TCP? Understand 2 17 List the advantages of mobile TCP? Knowledge 2 18 Explain selective retransmission? Understand 2 19 Define generic routing encapsulation? Knowledge 2 20 Discuss about binding request? Understand 2 21 Define the need of routing? Knowledge 2 22 List the requirements for the development of mobile IP standard? Knowledge 3 23 List database transactional models? Knowledge 3 24 Define Perfecting? Knowledge 3 25 List database hoarding techniques? Knowledge 3 26 Explain the mobile node? Understand 3 27 Discuss about the data recovery process? Understand 2 28 Explain need of routing? Understand 3 29 Describe data caching? Understand 2 30 Describe about client server computing? Understand 3 31 List the transaction models? Knowledge 2 32 Discuss about query processing? Understand 2 33 Explain about data recovery process? Understand 3 34 Explain three-tier architecture? Understand 2 35 Define Quality of Service? Knowledge 2 36 List advantages of hoarding the data at mobile device? Knowledge 2

Page 116: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Part - B (Long Answer Questions) 1 Explain the sequence number, window size, and acknowledgement

number fields used in data flow control at TCP transport layer?

Understand 2

2 List the special requirements in transport layer protocols in case of

2.5G/3G mobile networks.?

Knowledge 3

3 Explain fast transmission and fast recovery triggered? Understand 2 4 Explain mobile TCP. How does a supervisory host send TCP

packets to the mobile node and to a fixed connection?

Understand 2

5 Explain transaction oriented TCP. How does the integration of

connection establishment, data transfer, and close functions?

Understand 3

6 Describe the special requirements in transport layer protocols in case

of 2.5G networks?

Understand 2

7 Describe slow start of congestion control. How can fast recovery

takes place in the congestion avoidance phase?

Understand 3

8 Explain the functions of snooping sub layer in the functions? Understand 2 9 List the advantages and disadvantages of snooping TCP? Knowledge 2

10 Describe the modifications in snooping sub-layer functions? Understand 3 11 Write about special requirements in transport layer? Understand 3 12 Explain in detail about WAP architecture? Understand 3

13 Write notes on WDP and WTLS? Understand 3

14 Write notes on wireless sessions protocol? Understand 3 15 Discuss about WAE? Understand 3 16 Discuss about WTP and its classes? Understand 2 17 Explain the following: Snooping TCP and Indirect TCP.? Understand 3 18 Explain classical TCP improvements and snooping TCP? Understand 2 19 Discuss about the WWW programming model in detail? Understand 3 20 Explain about the architecture of WTA? Understand 3 21 Explain the situations in which a database can crush. How does a

database recover using a recovery manager?

database recover using a recovery manager.?database recover using a

recovery manager.?database recover using a recovery manager.?

database recover using a recovery manager.?

Understand 2

22 Discuss in detail about any two Pervasive Applications of your

choice in detail.?

Understand 3

23 Explain about the various hardware components involved in

Pervasive Computing Devices.?

Understand 1

24 Write the advantages of hoarding data at the mobile device? Understand 3 25 Write brief notes on the following.

Speech Recognition

Handwriting recognition

Haptic Interfaces

QWERTY and FITALY keyboards?

3

4

26 Explain in detail about Bio-Metrics. List out its merits and

demerits?

Understand 3

27 Explain how is synchronization carried out in a Pervasive

Environment? Write brief notes on the syncML tool?

Understand 2

28 Explain the various issues related to device management and how

are they dealt with?

Understand 2

29 Explain how a Pervasive Web Application can be secured using an

„Authentication Proxy‟?

Understand 2

30 Describe data caching architecture? Understand 2 31 Explain how security is achieved in MVC and JSP based

applications?

Understand 2 32 Write the advantages and disadvantages of stateless and stateful

cache invalidation?

Understand 3

33 Discuss in detail about the access form PCs.? Understand 2 34 Explain the advantages of using an adaption mechanism in client-

server architecture.?

Understand 3

35 Explain how is access carried out in case of a PDA? Understand 2 36 Explain in detail about access via WAP? Understand 2

Page 117: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

37 Explain the database transaction models and ACID rules? Understand 2 38 Explain data recovery process in detail? Understand 3 39 Explain about power aware computing? Understand 3

Part - C (Problem Solving and Critical Thinking Questions)

1

Explain 2G and 3G systems can bothe transfer data. Compare these

approaches with DAB/DVB and list reasons for and against the use

of DAB/DVB?

Understand

3

2 Explain which web pages would be appropriate for distribution via

DAB/DVB?

Understand 2

3 Define IEEE 802.11, Hiper LAN2, and Bluetooth respectively. Solve

the hidden and terminal problem?

Apply 2

4 Discuss in what solutions can collisions occur in all three networks? Understand 3

5 Distinguish between collisions on PHY and MAC layer? Apply 3

6 If Bluetooth is a commericial success , what are remaining reasons

for the use of infrared transmission for WLANs?

Apply 3

7 Explain packet flow if two mobile nodes communicate and both are

in foreign networks?

Understand 3

8 Explain how tunneling works in general and especially for mobile

IP using IP-in-IP minimal, and generic routing encapsulation,

respectively?

Understand 2

9 Explain the benefits of location information for routing in ad-hoc

networks, which problems arise?

Understand 3

10 List the entities of mobile IP and describe data transfer from a

mobile node to a fixed node and vice-versa. Why and where is

encapsulation needed?

Knowledge

1 11 Name the main difference between multi-hop adhoc networks and

other networks?

Apply 3

UNIT – IV

Part - A (Short Answer Questions)

1 Explain about Push- based data delivery mechanisms? Understand 1 2 Explain about Selective Tuning? Understand 3 3 Define Hash-based method? Knowledge 2 4 Define local optimization? Knowledge 2 5 Define Directory method? Knowledge 2 6 List the various types of indexing techniques? Knowledge 3 7 Define data dissemination broadcast models? Knowledge 3 8 Define data dissemination broadcast models? Knowledge 2 9 Explain flat disk model? Understand 3

10 Explain directory method? Understand 3 11 Explain about communications asymmetry? Understand 2 12 List advantages of pull based mechanisms? Knowledge 2 13 Explain about hybrid mechanisms? Understand 2 14 Discuss about hash based mechanisms? Understand 3 15 Explain about index based mechanisms? Understand 2 16 Write about communication asymmetry? Understand 2 17 Explain temporal addressing? Understand 3 18 Explain about data delivery methods? Understand 2 19 Explain about demand data scheduling? Understand 2 20 Explain distributed index based method? Understand 2

Part - B (Long Answer Questions) 1 Explain with diagram client and server framework? Understand 3 2 Explain different types of synchronization? Understand 2

Page 118: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

3 Explain the need for domain-dependent specific rules. Explain the

term WBXML?

Understand 3

4 Explain digital audio broadcasting..? Understand 3 5 Describe pull-based data delivery mechanism. What are the

advantages and disadvantages of pull-based data delivery?

Understand 3

6 Explain push based data delivery methods in detail? Understand 3 7 Explain selective tuning and indexing techniques? Understand 3 8 Write about communication asymmetry with neat diagram? 3 9 Explain push-pull mechanism. In detail Explain about IPP? Understand 3

10 Which type of indexing is suitable for broad casting data through

wireless channel? Why?

Understand 2

11 List out the advantages of data broad cast over point to point access? Knowledge 3

12

Explain the following selective tuning techniques.

Temporal addressing.

Broadcast addressing

Index based method.

Distributed index based method?

Understand

3

13 Explain data delivery methods in detail? Understand 3 14 The push based broadcast are not suitable for large data size?

Justify.

Analyze 2 15 Explain about on demand data scheduling? Understand 3 16 List the steps involved in retrieving the indexed data frames? Knowledge 3

Part - C (Problem Solving and Critical Thinking Questions) 1 Show the interaction of mobile IP with standard TCP. Draw the

packet flow from a fixed host to a mobile host?

Apply 3

2 Name the requriments for a mobile IP and justify them. Does mobile

IP fulfill them all?

Apply 3

3 List the entities of mobile IP and describe data transfer from a

mobile node to a fixed node and vice versa?

Knowledge 2

4 Show the steps required for a handover from one foreign agent to

another foreign agent including layer 2 and layer3?

Apply 3

5

Explain packet flow if two mobile nodes communicate and both are

in networks. What additional routes do packets take if reverse

tunneling is required?

Understand

3 UNIT-V

Part - A (Short Answer Questions)

1 Mention the sensor networks applications? Understand 2 2 List the properties of MANETs? Knowledge 2 3 Explain fixed infrastructure architecture? Understand 3 4 Define spectrum? Knowledge 3 5 Define applications of MANETs? Knowledge 3 6 Define routing algorithms? Knowledge 1 7 Explain wireless sensor networks? Understand 1 8 Analyze distributed network characteristics? Understand 2 9 Explain flat routing table driven protocol? Understand 3

10 List the characteristics of MANETs? Knowledge 3 11 Explain the need for Ad Hoc networks? Understand 2 12 Explain routing in MANETs? Understand 2 13 List the types of MANET routing algorithms? Knowledge 2 14 Explain DSDV? Understand 2 15 Discuss about dynamic source routing? Understand 2 16 List the advantages in DSR? Knowledge 2 17 Explain CGSR? Understand 1 18 Discuss about security in MANETs? Understand 2

Page 119: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

19 Explain memory and file management? Understand 1 20 Describe java card? Understand 2 21 Write the techniques for composing applications? Understand 2 22 Explain about operating systems? Understand 2 23 Show that an XML document which can be used as Contacts in a

mobile smart phone?

Understand 3

24 Identify the I/O devices in subsystems management? Understand 2 25 Mention the properties in windows phone 7 OS features? Understand 3 26 Explain how does data store in windows CE databases and files? Understand 2 27 Explain how are the applications developed for a windows phone 7

device?

Understand 2

28 Explain memory manager features in Windows CE? Understand 1 29 Write the functions of program and storage memories? Understand 1 30 Define symbian OS? Understand 1

Part - B (Long Answer Questions)

1 Write about the application of wireless sensor networks in home

personal area networking?

Understand 2

2 Explain MANETs. How does a MANETs differ from a fixed

infrastructure network?

Understand 1

3 Describe an application of defining the cluster of nodes and features

of CGSR protocol.

Understand 3

4 Explain how MANETs are deployed in various applications? Understand 1 5 Describe the properties of MANETs? Understand 3 6 Explain the requirements of a mobile file system over the

conventional one?

Understand 3

7 Write the advantages of MANETs and wireless sensor networks

integrated with IPv6?

Understand 1

8 Explain in role of a gateway in connecting using different protocols

?

Understand 3 9 Discuss CODA file system? Understand 2

10 Describe TORA. Compare the features of TORA with DSR and

AODV protocols?

Understand 2

11 Compare the reactive and proactive routing protocols? Understand 2

12

How does dynamic source routing handle routing? What is the

motivation behind dynamic source routing compared to other routing

algorithms fixed networks?

Understand 2

5 13 Explain the security threats to a MANET? Why a MANET faces

grater security threats than a fixed infrastructure networks?

Understand 1

14 Describe security problems in MANETs? Understand 3 15 Explain destination sequence distance vector routing algorithm in

MANETs?

Understand 2

16 Explain in detail AODV routing algorithm for MANETS? Understand 2 17 Explain the disadvantages of MANETS? Understand 1 18 Explain mobile ad-hoc network? Explain in detail about MANETS? Understand

3

19 Explain CLDC and CDC configurations? Understand 2 20 Explain J2ME architecture? Understand 2 21 Write the packages in J2SE? Explain the APIs and class libraries in

each?

Understand 2

22 Compare DOM and SAX models of the documents. How are these

parsed? Explain with examples?

Understand 2

23 Write requirements for JAvaCard virtual machine? Knowledge 2

24 Explain XML based languages used in mobile application? Give

examples?

Understand 2

Page 120: STUDENT HAND BOOK FOR IV B.Tech I Sem - MLRITM hand...STUDENT HAND BOOK FOR IV B.Tech I Sem COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Cloud Computing Course

Prepared by HOD

Part - C (Problem Solving and Critical Thinking Questions)

1

Name mechanisms to improve web access for handheld devices.

What is their common problem and what led finally to the

development of WAP?

Evaluate

2

2 Compare the presented protocol stacks for WAP 2.0 and give

application examples?

Apply 2

3 Name advantages and disadvantages of user acknowledgement in

WTP. What are typical applications for both cases?

Apply 2

4 Explain the primary goals of WAP Forum efforts and how they are

reflected in the intial WAP protocol architecture?

Understand 3

5 Explain why is strong consistency of file systems problematic in a

wireless and mobile environment? What are the alternatives?

Understand 1

6

Name key difference between WAP 1.x and i-mode. What were

problems in the early WAP days and why was i-mode that successful

in Japan?

Apply

2