Part – I
|
B.E. (Information Technology Course) Part – II
|
- Advance Database Management
- Artificial Intelligence
- Compiler Deign
- Advanced Operating Systems
Elective – II
- Embedded System
- Mobile Computing
- Multimedia Systems
Elective – III1. Real Time System
- Software Architecture
- Advanced Graphics
- Advance Computer Networks
Elective – IV1. Bio Informatics
- Neural Network and Expert System
- Geo Informatics Systems
- Open Elective
- Bruice Schneier, “Applied Cryptography- Protocols, Algorithms and Source code in C”, 2nd Edition, Wiely India Pvt Ltd, ISBN 978-81-265-1368-0 Bernard Menezes, “Network Security and Cryptography”, Cengage Learning, ISBN- 978-81-315-1349-1
Reference Books :
- Nina Godbole, “ Information Systems Security”, Wiley India Pvt Ltd, ISBN -978-81265-1692-6
- Willaim Stallings, “Computer Security : Principles and Practices”, Pearson Ed. ISBN : 978-81-317-3351-6
- Mark Merkow, “ Information Security-Principles and Practices”, Pearson Ed. 978-81317-1288-7
- CK Shyamala et el., “Cryptography and Security”, Wiley India Pvt Ltd, ISBN 978-81265-2285-9
- Berouz Forouzan, “Cryptography and Network Security”, 2 edition, TMH, ISBN : 9780070702080
Teaching Scheme: Lectures: 4 Hours/WeekPrerequisites: Software EngineeringObjectives: Introduction to Modeling and Design of software, firmware and business processes.Introduce UML 2.0 and its diagrams as a modeling tool for large and complex systems.Understand the concepts being modeled in UML.Unit I Introduction to OMG Standards: MDA, MOF, XMI, CORBA, UML 2.0. UML (8 Hrs.) History, UML 2.0 New Features. Introduction to UML, UML Meta Model Conceptual Model of UML, Extensibility mechanisms like stereotypes, tagged values, constraints and profiles. OCL. Overview of all diagrams in UML 2.0.Unit II Rational Unified Process emphasizing Inception, Elaboration, Construction, (6 Hrs.) Transition Phases. 4+1 View architecture, Architectural approaches: Use case Centric, Architecture driven, Iterative approach. OO Concepts Review,Overview of Use Case Diagram.Unit III CRC method, Class diagrams, Classes and Relationships, Advanced Classes, (8 Hrs.) Advanced relationships generalization, association with its adornments, dependencies, realization. Interfaces and ports. Packages & diagrams.Instances, Active Objects & object diagram, Composite structure diagrams including composite structures, collaborations Unit IV Interaction diagrams. Interaction Overview diagrams including interactions, (8 Hrs.) signals, exceptions, regions, partitions, Sequence diagrams, Communication diagrams.Unit V Activity diagrams, Activities, sub activities, Events &signals, exceptions, (6 Hrs.) partitions, regions. State Machine diagrams, States, encapsulation of states, transitions, submachine, state Generalization. Timing diagrams. Processes & threads, time & space, Modeling reactive object.Unit VI Support for modeling Architecture in UML. Component diagrams, Deployment (6 Hrs.) diagrams. Collaborations. Pattern & framework.Applications of UML in embedded systems, Web applications, commercial applications.Note: All diagrams are to be assumed for UML 2.0 for each diagram the need, purpose, Concepts, Notation, Forward Engineering, and Reverse Engineering for class diagram must be considered.Text Books :
- Grady Booch, James Rumbaugh, Ivar Jacobson, “Unified Modeling Language User Guide”, The 2nd Edition, Addison-Wesley Object Technology Series.
- Dan PHone, Neil Pitman, “UML 2.0 in a Nutshell (In a Nutshell (O’Reilly)
- Tom Pender, Eugene McSheffrey, Lou Varvels, Wiley “UML 2 Bible”
Reference Books
- Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado “UML 2 Toolkit”
- Martin Fowler, Addision Wesley, “UML Distilled A Brief Guide to the Standard object Modeling Language”, Third Edition
Teaching Scheme: Lectures: 4 Hours/WeekPrerequisites: Software EngineeringObjectives: Introduction to software testing lifecycle.Understanding various types of software tests and quality control standardsUnit I Testing Principles (6 Hrs.)Need of testing, Basic concepts – errors, faults, defects, failures, test bed, unit testing, integration testing system, system testing, regression testing, alpha, beta and acceptance testing , functional testing, performance testing, recovery testing, white box testing, black box testing, verification and validation Unit II Test Management (6 Hrs.)Testing Life Cycle – Roles and activities,Test Planning – forming a test team, develop test plan review Test Cases design strategiesblack box approach: random testing, equivalence class partitioning and boundary value analysis.white box approach: test adequacy criteria, coverage and control flow graphs, paths, loop testing, mutation testing.Test execution: build test data, life cycle of defect, defect tracking, defect detection stages, defect detection stages, defect types, defect severity, defect analysis and prevention.Unit III Software Metrics (6 Hrs.)Scope of software metrics, Classifying software measures, Measurement basics – representational theory, scales, meaningfulness, What to measure – GOM technique, Control flow structure, product quality metrics – MTTF, defect density, customer problems, customer satisfaction, function point,Metrics for software maintenance, In-process quality metrics.Unit IV Quality Assurance (6 Hrs.)Quality concepts – quality, quality control, quality assurance, cost of quality Software quality assurance – SQA activities, software reviews, inspections, audits, Software reviews, inspections, audits, Software reliability Quality Attributes: correctness, reliability, usability, integrity, portability, maintainability, interoperability. Ishikawa’s Seven Basic Tools Unit V Quality Standards (6 Hrs.)Basic concept of – ISO 9000 & 9001, CMM, six sigma.Unit VI Development of CMM (8 Hrs.)CMM – Following KPAs : requirements management (RM), software project tracking and oversight (SPTO), software configuration management (SCM), organization process definition (OPD), software product engineering (SPE), peer reviews (PR), quantitative process management (QPM), defect prevention (DP), process change managementText Books :
- Iien Burnstein, “Practical Software Testing”, Springer Publication.
- William E Perry, “Effective Methods for Software Testing”, Second Edition, Wiley Publication.
- Norman E. Fenton “Software Metrics A Rigorous and Practical Approach”, Second Edition, Thomson Publication.
References Books:
- Stephen H. Kan “Metrics and Models in Software Quality Engineering” Pearson Education.
- Pressman, “Software Engineering “, Fifth Edition, TATA McGraw Hill.
- Pankay Jalote “CMM Practice” Pearson Education.
- A. Silberschatz, H. Korth and S. Sudarshan, “Database System Concepts”, Fifth Edition, McGraw-Hill International Edition.
- Thomas Connolly and Carolyn Begg, “Database Systems – A Practical Approach to Design, Implementation and Management”, Third Edition, Low Price Edition.
Reference Books:
- Ivan Bayross, “SQL, PL/SQL – The Programming Language of ORACLE”, Third Revised
Edition, BPB Publication.
- Jiawei Han and Micheline Kamber, “Data Mining – Concepts and Techniques”, Second
Edition, Elsevier.
- M. Gertz, and S. Jajodia, “Handbook of Database Security- Application and Trends”,
2008, Springer.Examination Scheme: Theory: 100 MarksPrerequisites: Discrete mathematics, basic probability theory and statistics Knowledge of any programming language and data structuresObjectives
- Introduction to the basic principles and applications of Artificial Intelligence.
- Understanding of the basic areas of artificial intelligence such as problem solving, knowledge representation, reasoning, planning, perception, vision and learning
- Students will also be able to design and implement key components of intelligent agents and expert systems of moderate complexity in C++/Java and/or Lisp or Prolog and evaluate their performance.
Unit I Introduction to AI and intelligent agents (8 Hrs.)What is Artificial Intelligence? The Turing Test, AI Problem, AI Techniques, Foundation of Artificial IntelligenceIntelligent Agents – Agents and environments, Good behavior, nature of environments, structure of agents, problem solving agents Application of AI and Swarm intelligent systems Unit II Heuristics search and game playing (8 Hrs.)Defining the problem as a state space search, production system, problem characteristicsHeuristic search techniques- Generate and test, Hill Climbing, Best-First Search, Constraint satisfaction problems (CSP)Application of search in Game playing – Minimax search procedure, Adding alpha-beta cutoffs, additional refinement, State of Art Game programs.Unit III Knowledge representation & NLP (8 Hrs.)Representation and mapping, Approach & Issues in knowledge representation, Prepositional logicFirst order logic – representation revisited, syntax and semantics for first order logic, using first order logic, Knowledge engineering in first order logic, inference in First order logic, unification and liftingWeak-slot and filler structure, Strong slot and filler structures. Reasoning Under Uncertainty – Nonmonotonic reasoning, logic for Nonmonotonic reasoningNatural Language Processing- Introduction, Steps in the process, Spell checkingUnit IV Planning and perception (8 Hrs.)Planning – Block world problem, components of a planning systems, Goal stack planning, Non-linear planning, Hierarchical planning, least commitment strategyPerception – Image formation, Image processing operations, Extracting 3D information, Object Recognition, Using vision for manipulation and navigation Unit V Learning and expert system (8 Hrs.)What is learning?, Forms of learning, Rote learning, learning by taking advice,Learning in problem solving, Induction leaning, Explanation based learning,Formal learning theory. Connectionist models- learning in Neural network Architecture of expert system, expert system shell, explanation, knowledge Acquisition, Two case studies of an expert system.Unit VI AI Programming and Advanced AI (8Hrs.)AI Programming: Converting English to Prolog facts and Rules, Prolog Terminology, Arithmetic operation, Matching, Backtracking, Cuts, Recursion,Lists. Prolog in Artificial IntelligenceAdvanced AI: Genetic Algorithms, Parallel & Distributed AI
- Elaine Rich and Kevin Knight, Shivashankar Nair, “Artificial Intelligence”, 3rd Edition, Tata McGraw-Hill, ISBN-10- 0070087709, ISBN-13- 9780070087705
- Stuart Russell, Peter Norvig, “Artificial Intelligence – A Modern Approach”, 2nd Edition, Pearson Education / Prentice Hall of India, ISBN: 0137903952
Reference Books :
- George F. Luger , “Artificial Intelligence: Structures and Strategies for Complex Problem Solving”, Pearson, ISBN-10: 0321545893
- N.P. Padhy, “Artificial Intelligence And Intelligent Systems”, Oxford University Publishers, ISBN 9780195671544
- Ivan Bratko, “PROLOG : Programming for Artificial Intelligence”, Pearson Education, 3 Edition, ISBN10: 0-201-40375-7
- Saroj Kaushik, “Artificial Intelligence”, Cengage Learning, , ISBN-13: 9788131510995
- Ravi Sethi, “Programming Languages – Concepts and Constructs”. 2nd Edition, Pearson,
- Andrew Appel, “Modern Compiler Implementation in C”, Cambridge University Press.
Reference Books :
- JP Bennett, “Introduction to Compiling Techniques”, Tata McGrawHill Edition, 2002
- H Alblas and A Nymeyer, “Practice and Principles of Compiler Building with C”, PHI, 1998
- Andrew Appel, “Modern Compiler Implementation in C”, Cambridge University Press
- O’Reilly, LEX and YACC,
- Milan Milenkovic,”Operating systems Concepts and design”,Milan Milenkovic TMGH second edition.
- charles crowly,”Operating systems a design oriented approach” , TMGH
- Maurice J. Bach, “The design of the UNIX Operating System”, Prentice Hall India, ISBN- 81-203-0516- 7
- Daniel Bovet: “Understanding the Linux kernel”, 3rd edition, O’Reilly
Reference Books
- Andrew S. Tanenbaum ,“Modern Operating Systems”, , ISBN-13: 978-81-203-2063-5, PHI.
- Richard Stevens ,”UNIX Network Programming”, ISBN-978-81-203-0749-0, PHI.
- Kay Robbins, Steve Robbins,”UNIX Systems Programming Communication, Concurrency and Threads”,2nd Edition, Jun 2003, Hardback, ISBN13: 9780130424112.
- Robert Love ,”Linux Kernel Development”, ISBN 81-297-0359-9, Pearson Education
Teaching Scheme: Examination Scheme:Lectures: 4 Hours/Week Theory: 100 MarksPrerequisite: Digital circuits and Logic Design, Knowledge of microcontrollers, microprocessors Objectives: Understand the basics of embedded systems and its applicationsUnit I Introduction to Embedded System (8 Hrs.)Definition of Embedded System & its classification, characteristics of embedded systems, design parameters/Metrics of embedded systems. Components of embedded systems with review of Microprocessor & Microcontrollers, introduction to embedded processor, Digital signal processor, Application specific system processor, Multiprocessor systems using General Purpose Processor Unit II System Processor (8Hrs.)Standard Single purpose processors: Peripherals, Introduction, Timers,Counters and watchdog Timers, UART, Pulse Width Modulators, Clocking unit, Real Time Clock Reset Circuitry. Processor and memory organization, processor and memory selection, Memory Types, Memory map and addresses.Unit III I/O Interfacing (8 Hrs.)I/O devices: ADC/DAC, Optical Devices such as LED/LCD Display devices,Keyboard controller, Timer & counting devices, serial communication using I2C, SPI,CAN, RS232, & USB. Device drivers & interrupt service Mechanism: ISR concepts and ISR handling mechanisms Unit IV Programming Concepts, Embedded System Programming C & C++ (8Hrs.)Assemble language high level lang. C program Elements, Micros & Function,Data types, Data Structures, Modifiers, Statement, loops & Pointers, queues &Stacks, List & order list, Embedded System Programming in C++ & Java. C Program Compilers & Cross Compilers. In Circuit emulator. Software engineering practices in the embedded software development process.Unit V Real Time Operating Systems (8 Hrs.)Real Time & embedded system OS: off the shelf operating Systems, Embedded OS, Real Time OS, hand held OS. RTOS Tashk and task scheduling, Interrupt Latency & Response time, Strategy for synchronization between the processes, ISR, OS functions & tasks for resource management, Semaphores, message Queue, mailbox, pipes, signals, event registers, memory management, priority Inversion problems and solutions.Unit VI Overview & Applications of Embedded System (8 Hrs.)Case Study of coding for Vending machine system using MUCOSRTOS, Case study coding for send application layer byte streams on A TCP/IP Network Using RTOS Vx works, Case study of an Embedded System for an adapting Cruise control System in a car, Case Study in embedded system for Smart Card, Case Study of Digital camera.Text Books :
- Rajkamal, “Embedded System Architecture Programming Design”, Tata Graw Hill Publication
- Dr. K.V.K.K. Prasad, “Embedded / Real time System : Concepts, Design & Programming – Black book”, Dreamtech Press Publication
- Jonathan Valvano, “Embedded Microcomputer Systems – Real Time Interfacing”, CENGAGE Learning.
- Peckol, “Embedded System”, Wiley Publishers
- David Simon,”An Embedded Software Primer ”
- Sriam Iyer, Pankaj Gupta, “Embedded Real time Systems Programming” Tata Graw Hill
- Tammy Nergaard, “Embedded System Architecture – A Comprehensive Guide For Engineering & Programming”, Elesevier Publication
- Steve Heath Embedded Systems Design”, Elesevier publication.
- Yi Bing Lin,”Wireless and Mobile Network Architectures”, Wiley Publications
- Jochen Schiller,”Mobile Communications”,Pearson Education
Reference Books :
- Asoke Talukder and Roopa Yavagal,”Mobile Computing”, Tata McGraw Hill
- William C.Y.Lee, “Mobile Cellular Telecommunications”, McGraw Hill
- Digital Electronics
- Data Structures and Files Objectives :
- To learn the storage and processing of various Multimedia components.
- To learn the advance graphics.
Unit I Introduction:
- Ranjan Parekh, “Principles of Multimedia”, TMH, ISBN 0-07-058833-3
- Ralf Steinmetz and Klara Nahrstedt “Multimedia Computing, Communication and Applications”, Pearson Education.
Reference Books :
- Ze-Nian Li, Marks S. Drew, “Fundamentals of Multimedia”, Pearson Education.
- Nigel Chapman and Jenny Chapman, “Digital Multimedia”, Wiley
- A. K. Jain,”Fundamentals of Digital Image Processing”, PHI
- Gonzalez, Woods, “Digital Image Processing” Addison Wesley
- Mark Nelson, “Data Compression Book “, BPB.
- Judith Jeffcoate /’Multimedia in Practice”:, Pill.
- Robert Reinhardt, Snow Dowd, “Flash 8 Bible”
- Keith Peters, “Foundation AS Animation: Making Things Move!”
- Sanford Kennedy, “3ds max Animation and Visual Effects Techniques”
- Writing program in C++ or Java to implement RSA algorithm for key generation and cipher verification
- Write a Client – Server programm in C++ or Java for authentication verification.
- Develop and program in C++ or Java based on number theory such as chinese remainder or Extended Euclidian algorithm. ( Or any other to illustrate number theory for security)
Section B Cryptography Library ( API )
- Writing program in C++, C# or Java to implement RSA algorithm using Libraries (API)
- Writing program in C++, C# or Java to implement SHA-1 algorithm using Libraries (API)
- Writing program in C++, C# or Java to implement AES algorithm using Libraries (API)
Section C Security Tools
- Configure and demonstrate use of IDS tool such as snort.
- Configure and demonstrate use of Traffic monitoring tool such as Wireshark with security perspective.
- Configure and demonstrate use of velnerability assessment tool such as NESSUS
- Implement web security with Open SSL tool kit
Students should submit the term work in the form of a journal. Each assignment has to be well documented with problem definition, theory and code documentation. Staff in charge will assess the assignments continuously and grade or mark each assignment on completion date, declared for each assignment.Note: Oral examination will be based on the term work submitted by the student and the associated theory of the subject.414445: Computer Lab Practices IExamination Scheme : Term Work: 50 Marks Practical: 50 MarksPart A Object Oriented Modeling & DesignSelect a hypothetical system of sufficient complexity/ Select a Real Time system of sufficient complexity and implement assignment 1 to 9 using any UML 2.0 Tool.
- Prepare a SRS plan & Draw use case diagram.
- Design class diagram & composite structure diagram.
- Apply advanced notations to same class diagram & do forward engineering.
- Study reverse engineering using C++ code/java code for class diagram.
- Draw p ackage di agram.
- Design sequence & communication diagrams {vice versa}.
- Design interaction overview diagrams
- Design activity diagram & state diagrams.
- Design component & deployment & diagrams.
Every Project group should implement assignment 1 to 9 for their project definition using any UML 2.0 Tool.Part B Software Testing and Quality Assurance
- Manual Testing
a) Write black box test cases for an application using Test Director tool.b) Perform white box testing – Cyclomatic complexity, data flow testing, control flow testing
- Automated Testing
Perform Black Box testing using automated testing tool on an application. Testing Points to be covered – data driven wizard, parameterization, exception handing
- Defect Tracking :
- Log the test results in Test Director
- Prepare a Defect Tracking Report / Bug Report using MS-Excel or Defect Tracking Tool like BugZilla
- a. Calculate Software Metrics for an application using FP analysis
method.b. Prepare any two of the Ishikawa’s Seven tools listed below for an application
- The cause-and-effect or Ishikawa diagram
- The check sheet
- The control chart
- The histogram
- The Pareto chart
- The scatter diagram
- Stratification
Note : All 04 assignments are compulsory.Recommended Tools
a) | Quick Test Professional – preferred |
b) | Win Runner |
c) | Load Runner |
d) | Silk Test |
e) | Rational Robo |
Suggested Applications (not mandatory) – front end (VB) – back end (Oracle / MS Access)
a) | Calculator – Integer operations, add, sub, div |
b) | Login Form and successful & failed login pages |
c) | Inventory management – atleast 2 forms |
d) | Library management – atleast 2 forms |
e) | Training & Placement Cell system |
f) | Online reservation system |
Reference Books :a) Software Testing Techniques : Boris Beizer : dreamTechb) Software Testing Tools : Dr. KVKK Prasad : dreamTech
- Introduction
- Aims and objectives
- Literature survey
- Problem statement
- Proj ect Requirements
- Proposed architecture/ high level design of the project
- Project plan
A panel of examiner will evaluate the viability of project and allot the term work marks.The group will submit at the end of semester II.a) The Workable project.b) Project report (in LATEX) in the form of bound journal complete in all respect – 1 copy for the Institute and 1 copy of each student in the group for certification.The term work will be accessed by the examiners in consultation with the guide. Oral examination will be based on the project work completed by the candidates. Preliminary report work completed by candidates. Preliminary report must also be presented during the oral examination.The project report contains the details.
- Problem definition and requirement specification acceptance test procedure (ATP).
- System definition – requirement Analysis.
- System design.
- System implementation – code documentation – dataflow diagrams/ algorithm, protocols used.
- Test result and procedure – test report as per ATP.
- Platform choice use.
- Conclusions.
- Appendix tools used, References.
Documentation will use UML approach with presentation, Category, Use Case, Class Diagrams etc.
- George Coulouris, Jean Dollimore & Tim Kindberg, “Distributed Systems – Concept and Design” 4th Edition, Publisher: Pearson (LPE). ISBN – 978-81-317-1840-7
- Andrew S. Tanenbaum & Maarten van Steen”, Distributed Systems – Principles and Paradigms”, Publisher: PHI.
Reference Books :
- Randay Chow, Theodore Johnson, “Distributed Operating System and Algorithm Analysis”, Publisher: Pearson (LPE). ISBN – 978-81-317-2859-8
- Yates & Neto, “Modern Information Retrieval”, Pearson Education, ISBN 81-297-0274-6
- C.J. Rijsbergen, “Information Retrieval”, (www.dcs.gla.ac.uk)
- I. Witten, A. Moffat, and T. Bell, “Managing Gigabytes”
- D. Grossman and O. Frieder “Information Retrieval: Algorithms and Heuristics”
Reference Books :
- Mark leven, “Introduction to search engines and web navigation”, John Wiley and sons Inc., ISBN 9780-170-52684-2.
- V. S. Subrahamanian, Satish K. Tripathi “Multimedia information System”, Kulwer Academic Publisher
- Chabane Djeraba, ’’Multimedia mining A highway to intelligent multimedia documents”, Kulwer Academic Publisher, ISBN 1-4020-7247-3
Examination Scheme: Theory: 100 MarksObjective: To get an overview of design and evaluation issues of RTS, Real Time Communication and operating systems.Unit I Introduction to Real Time Systems (8 Hrs.)Definition of RTS, Issues in real time computing -Constraints, Structure of RTS, Typical real time applications — Digital Control, Signal Processing, Characterizing RTS. Performance measures of RTS- properties of performance measure, Performabitity – cost function and hard deadline – Estimating program real time, Analysis of source code, pipelining, dependencies.Unit II Task Assignment and scheduling (8 Hrs.)Types of tasks, Timings, precedence, resource constraints, classification of scheduling algorithms, priority driven approach for periodic and aperiodic task,Non preemptive method(EDD), preemptive methods(EDF and LST), Rate monotonic, deadline monotonic, EDF and its variants for periodic tasks,Resource and resource access scheduling protocols: blocking and priority inversion, priority inheritance and priority ceiling protocolsUnit III Programming languages, tools and databases (8 Hrs.)Language Characteristics. Data typing. Control structures, facilitating hierarchical decomposition, packages, error handling, Overloading & Generics,Use of POSIX Programming API in RTS Basic definition of databases. Real Time versus General Purpose databases, Main memory databases. Transaction priorities, Aborts, Concurrency control issues, Two phase approach to improve predictability, Maintaining serialization consistency, Databases for hard Real Time Systems.Unit IV Real Time Communication (8 Hrs.)Network topologies- Sending messages, Network architecture issues, Protocol – Contention based, Token based. Stop & Go Multi hop Protocol. The Pooled Bus.Hierarchical Round Robin Deadline, based. Fault tolerant Routing, medium access control protocols of broadcast networks, Internet and resources reservation protocols.Unit V Real Time Kernel and Operating Systems (8 Hrs.)Time services, features of RTOS, Program and processes Threads, sharing resources,Resources management: memory management and process management, fore ground/background systems, operating system architecture, Real time POSIX standards, capabilities of RTOS.Unit VI Fault Tolerance and Reliability, UML For Real Time Systems (8 Hrs.)Fault types, detection, error containment, Redundancy- Hardware, Software,Time, Information redundancy, Data diversity. Reversal checks, Malicious or Byzantine failures, Integrated failure handling, Reliability models: Hardware and software error models, Modeling for time, resource, schedulability, performance, RT UML profileText Books :
- C.M. Krishna ,”Real Time systems”, Tata Mc Graw Hills publications
- Jane W.S. Liu,”Real Time Systems”, Pearson Education
- Douglass,”Real Time UML”, Pearson Education
- Peckol,”Embedded System”, WILEY publications Reference Books :
- Stuart bennet, “Real Time Computer control, An Introduction ” Pearson Publications
- C. Sivraman Murthy and G.Maniraman, “Resource Management in real time systems and Network” MIT ISBN – 51-203-2682-2
- Introduction to the software architecture as a discipline.
- Introduction to current architecture approach.
- Introduction to software architecture strategies.
Unit I Architecture Business cycle, What is software architecture, why software (8Hrs.)architecture is important, documenting software architectures.Unit II Understanding quality attributes, architecture and quality attributes, (8 Hrs.)achieving quality attributes.Unit III Design patterns: History, Important principles behind design patterns, (8Hrs.)Programing the interface and concept of delegation.Pune Technical University IT Syllabus