CSVTU BE VII Semester IT Fault Tolerant
Systems Syllabus
BY KOPYKITAB ADMIN · JANUARY 11, 2013
(No Ratings Yet)
CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY, BHILAI (C.G.)
Semester: VII Branch: Information Technology.
Subject: Fault Tolerant Systems
Total Theory Periods: 50 Total Tutorial Periods: Nil
Total Marks in End Semester Exam: 80 .
Minimum number of class tests to be conducted: 02.
UNIT I – INTRODUCTION
Definition of fault tolerance, Redundancy, Applications of fault-tolerance, Fundamentals of
dependability.
UNIT II- ATTRIBUTES
Reliability, availability, safety, Impairments: faults, errors and failures, Means: fault
prevention, removal and forecasting
UNIT III- DEPENDABILITY EVALUATION
Common measures: failures rate, mean time to failure, mean time to repair, etc. Reliability
block diagrams ,Markov processes ,
UNIT IV- REDUNDANCY
Hardware redundancy, Redundancy schemes, Evaluation and comparison, Applications
,Information redundancy
UNIT V- CODES
Codes: linear, Hamming, cyclic, unordered, arithmetic, etc. ,Encoding and decoding techniques
,Applications , Time redundancy
UNIT VI- PROGRAMMING
Software fault tolerance, Specific features, Software fault tolerance techniques: N-version
programming, recovery blocks, self-checking software, etc.
Text Books
1 Anderson, T., and P.A. Lee, Fault-Tolerant Principles and Practices, Prentice-Hall
2 Hwang, K., and F.A. Briggs, Computer Architecture and Parallel Processing, McGraw-Hill.
Jalote, P.
3. Fault-Tolerance in Distributed Systems, ISBN 0-13-301367-7, Prentice-Hall,
Reference Book
1. Johnson, B.W., Design and Analysis of Fault-Tolerant Systems, Addison Wesely
2. Leveson, Nancy G., Safeware, system safety and computers, Addison Wesely.
3. Pradhan, D.K., Fault-Tolerant Computing — Theory and Techniques, (2 Volumes), Prentice-Hall.
4. Pradhan, Dhiraj K., Fault-Tolerant Computer System Design, ISBN 0-13-057887-8, Prentice-Hall
PTR
Ad hoc & Sensor Networks
Course Objectives:
To make the student understand the concepts of AD HOC NETWORKS as well as
Wireless Sensor Networks (WSN), their characteristics, novel applications, and technical
challenges.
To understand the issues and solutions of various layers of ad hoc networks, namely
MAC layer, Network Layer & Transport Layer in ad hoc networks and WSN.
To understand the platforms and protocols used in s and WSN.
To make the student take up further research as part of his/her higher studies
Course Outcomes:
Identify challenges in MANET and WSN
Analyze multicasting and broadcasting
Design solution for TCP over ad hoc
Classify sensor networks
Analyze protocols developed for ad hoc and sensor networks
To identify and understand security issues in ad hoc and sensor networks.
Syllabus:
UNIT I: Introduction to Ad Hoc Networks: Characteristics of MANETs, applications of
MANETs, and challenges of MANETs. Routing in MANETs: Criteria for classification,
Taxonomy of MANET routing algorithms, Topology based routing algorithms, Position based
routing algorithms.
Course Outcomes:
To understand challenges in MANETs
To classify routing algorithms in MANETs
UNIT II: Data Transmission: Broadcast storm problem, Broadcasting, Multicasting and
Geocasting
Course Outcomes:
To Identify broadcast problem
To differentiate multicasting and broadcasting
UNIT III: TCP over Ad Hoc: TCP protocol overview, TCP and MANETs, and Solutions for TCP
over Ad hoc
Course Outcomes:
To understand role of TCP
To Design solution for TCP over Ad hoc
UNIT IV: Basics of Wireless Sensors and Applications: Applications, Classification of sensor
networks, Architecture of sensor networks, Physical layer, MAC layer, Link layer
Course Outcomes:
To Classify Sensor networks
To Understand applications of sensor networks
UNIT V: Data Retrieval in Sensor Networks: Routing layer, Transport layer, High-level
application layer support, Adapting to the inherent dynamic nature of WSNs, and Sensor
Networks and mobile robots.
Course Outcomes:
To understand data retrieval process in WSN
To understand working routing process in WSN
UNIT VI: Security: Security in ad hoc networks, Key management, Secure routing, Cooperation
in MANETs, and Intrusion detection systems. Sensor Network Platforms and Tools: Sensor
Network Hardware, Berkeley motes, Sensor Network Programming Challenges, Node-Level
Software Platforms, TinyOS, NS-2 and TOSSIM.
Course Outcomes:
To identify security issues in ad hoc networks
To explore sensor network programming environment
Textbooks:
1. Ad hoc and Sensor Networks - Theory and Applications, by Carlos Cordeiro and Dharma P.
Agrawal, World Scientific Publications, March 2006, ISBN 981-256-681-3.
2. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas
Guibas, Elsevier Science ISBN: 978-1-55860-914-3, (Morgan Kauffman)
References:
1. C.Siva Ram Murthy and B.S.Manoj, ―Ad Hoc Wireless Networks – Architectures and
Protocols, Pearson Education, 2006.
2. Holger Karl, Andreas Willing, ―Protocols and Architectures for Wireless Sensor
Networks, John Wiley & Sons, Inc., 2005.
3. Waltenegus Dargie, Christian Poellabauer, ―Fundamentals of Wireless Sensor
Networks Theory and Practice, John Wiley and Sons, 2010
MOBILE ADHOC NETWORKS
UNIT I: INTRODUCTION
Introduction to ad hoc networks – definition, characteristics features, applications,
Characteristics of Wireless channel, Adhoc Mobility Models:- Indoor and outdoor
models.
UNIT II: MEDIUM ACCESS PROTOCOLS
MAC Protocols: design issues, goals and classification. Contention based protocols- with
reservation, scheduling algorithms, protocols using directional antennas. IEEE
standards: 802.11a, 802.11b, 802.11g, 802.15. HIPERLAN.
UNIT III: NETWORK PROTOCOLS
Routing Protocols: Design issues, goals and classification. Proactive Vs reactive routing,
Unicast routing algorithms, Multicast routing algorithms, hybrid routing algorithm, Energy
aware routing algorithm, Hierarchical Routing, QoS aware routing.
UNIT IV: END-END DELIVERY AND SECURITY
Transport layer : Issues in desiging- Transport layer classification, adhoc transport
protocols. Security issues in adhoc networks: issues and challenges, network security
attacks, secure routing protocols.
UNIT V CROSS LAYER DESIGN AND INTEGRATION
OF ADHOC FOR 4G 9
Cross layer Design: Need for cross layer design, cross layer optimization, parameter
optimization techniques, Cross layer cautionary prespective. Intergration of adhoc with
Mobile IP networks.
TEXT BOOKS
1. C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks Architectures and
protocols, 2nd edition, Pearson Education. 2007
2. Charles E. Perkins, Ad hoc Networking, Addison – Wesley, 2000
REFERENCES
1. Stefano Basagni, Marco Conti, Silvia Giordano and Ivan stojmenovic, Mobilead hoc
networking, Wiley-IEEE press, 2004.
2. Mohammad Ilyas, The handbook of adhoc wireless networks, CRC press, 2002.
3. T. Camp, J. Boleng, and V. Davies “A Survey of Mobility Models for Ad Hoc Network
4. Research,” Wireless Commun. and Mobile Comp., Special Issue on Mobile Ad Hoc
Networking Research, Trends and Applications, vol. 2, no. 5, 2002, pp. 483–502.
5. A survey of integrating IP mobility protocols and Mobile Ad hoc networks, Fekri M.
Abduljalil and Shrikant K. Bodhe, IEEE communication Survey and tutorials, v no.1
2007
6. V.T. Raisinhani and S.Iyer “Cross layer design optimization in wireless protocol
stacks”Comp. communication, vol 27 no. 8, 2004.
7. V.T.Raisinhani and S.Iyer,ӃCLAIR; An Efficient Cross-Layer Architecture for
wireless protocol stacks”,World Wireless cong., San francisco,CA,May 2004.
8. V.Kawadia and P.P.Kumar,”A cautionary perspective on Cross-Layer design,”IEEE
Wireless commn., vol 12, no 1,2005.
click here to read more: http://www.annaunivedu.in/2012/12/ec2050-mobile-adhoc-networks-
syllabus.html#ixzz5lQRYJXaR
more question bank and prevoius year question paper