COURSE STRUCTURE, SYLLABUS AND
SCHEME OF EXAMINATION
FOR
MASTER OF COMPUTER APPLICATION
(MCA 2 YEAR COURSE)
2020-21 Onwards
1
SEMESTER III
Computer Network
MCA 301
UNIT – I Data Communications
Data communication Components – Data representation and Data flow – Networks –
Types of Connections – Topologies – Protocols and Standards – OSI model –
Transmission Media – LAN –Wired LANs, Wireless LANs, Connecting LANs, Virtual
LANs.
UNIT – II Data Link Layer
Error Detection and Error Correction – Introduction–Block coding–Hamming Distance –
CRC–Flow Control and Error control – Stop and Wait – Go back – N ARQ – Selective
Repeat ARQ – Sliding Window – Piggybacking – Random Access – CSMA/CD,
CDMA/CA.
UNIT – III Network Layer
Switching–Logical addressing – IPV4 – IPV6–Address mapping–ARP, RARP, BOOTP
and DHCP–Delivery, Forwarding and Unicast Routing protocols.
UNIT – IV Transport Layer
Process to Process Delivery – User Datagram Protocol – Transmission Control Protocol –
SCTP – Congestion Control with Examples.
UNIT - V Application Layer
Domain Name Space – DDNS – TELNET – EMAIL – File transfer WWW – HTTP –
SNMP – Cryptography – Basic concepts.
Reference Books:
1. Behrouz A. Forouzan, “Data communication and Networking”, Tata McGraw–
Hill, Fourth Edition, 2011.
2. Larry L.Peterson, Peter S. Davie, “Computer Networks”, Elsevier, Fifth Edition,
2012.
3. William Stallings, “Data and Computer Communication”, Eighth Edition, Pearson
Education, 2007.
4. James F. Kurose, Keith W. Ross, “Computer Networking: A Top–Down
Approach Featuring the Internet”, Pearson Education, 2005.
16
SEMESTER III
Artificial Intelligence
MCA 302
UNIT-I Introduction
Introduction to Artificial Intelligence, Foundations and History of Artificial Intelligence,
Applications of Artificial Intelligence, Intelligent Agents, Structure of Intelligent Agents.
Computer vision, Natural Language Possessing.
UNIT-II Introduction to Search
Searching for solutions, Uniformed search strategies, Informed search strategies, Local
search algorithms and optimistic problems, Adversarial Search, Search for games, Alpha
- Beta pruning.
UNIT-III Knowledge Representation & Reasoning
Propositional logic, Theory of first order logic, Inference in First order logic, Forward &
Backward chaining, Resolution, Probabilistic reasoning, Utility theory, Hidden Markov
Models (HMM), Bayesian Networks.
UNIT-IV Machine Learning
Supervised and unsupervised learning, Decision trees, Statistical learning models,
Learning with complete data - Naive Bayes models, Learning with hidden data - EM
algorithm, Reinforcement learning,
UNIT-V Pattern Recognition
Introduction, Design principles of pattern recognition system, Statistical Pattern
recognition, Parameter estimation methods - Principle Component Analysis (PCA) and
Linear Discriminant Analysis (LDA), Classification Techniques – Nearest Neighbour
(NN) Rule, Bayes Classifier, Support Vector Machine (SVM), K – means clustering.
Reference Books:
1. Stuart Russell, Peter Norvig, “Artificial Intelligence – A Modern Approach”,
Pearson Education
2. Elaine Rich and Kevin Knight, “Artificial Intelligence”, McGraw-Hill
3. E Charniak and D McDermott, “Introduction to Artificial Intelligence”, Pearson
Education
4. Dan W. Patterson, “Artificial Intelligence and Expert Systems”, Prentice Hall of
India
17
SEMESTER III
Software Engineering
MCA 303
UNIT – I Introduction
Introduction to Software Engineering, Software Components, Software Characteristics,
Software Crisis, Software Engineering Processes, Similarity and Differences from
Conventional Engineering Processes, Software Quality Attributes. Software
Development Life Cycle (SDLC) Models: Water Fall Model, Prototype Model, Spiral
Model, Evolutionary Development Models, Iterative Enhancement Models.
UNIT – II Software Requirement Specifications (SRS)
Requirement Engineering Process: Elicitation, Analysis, Documentation, Review and
Management of User Needs, Feasibility Study, Information Modeling, Data Flow
Diagrams, Entity Relationship Diagrams, Decision Tables, SRS Document, IEEE
Standards for SRS.
Software Quality Assurance (SQA): Verification and Validation, SQA Plans, Software
Quality Frameworks, ISO 9000 Models, SEI-CMM Model.
UNIT – III Software Design
Basic Concept of Software Design, Architectural Design, Low Level Design:
Modularization, Design Structure Charts, Pseudo Codes, Flow Charts, Coupling and
Cohesion Measures, Design Strategies: Function Oriented Design, Object Oriented
Design, Top-Down and Bottom-Up Design. Software Measurement and Metrics: Various
Size Oriented Measures: Halestead’s Software Science, Function Point (FP) Based
Measures, Cyclomatic Complexity Measures: Control Flow Graphs.
UNIT – IV Software Testing
Testing Objectives, Unit Testing, Integration Testing, Acceptance Testing, Regression
Testing, Testing for Functionality and Testing for Performance, Top-Down and Bottom-
Up Testing Strategies: Test Drivers and Test Stubs, Structural Testing (White Box
Testing), Functional Testing (Black Box Testing), Test Data Suit Preparation, Alpha and
Beta Testing of Products.
Static Testing Strategies: Formal Technical Reviews (Peer Reviews), Walk Through,
Code Inspection, Compliance with Design and Coding Standards.
UNIT V Software Maintenance and Software Project Management
Software as an Evolutionary Entity, Need for Maintenance, Categories of Maintenance:
Preventive, Corrective and Perfective Maintenance, Cost of Maintenance, Software Re-
Engineering, Reverse Engineering. Software Configuration Management Activities,
Change Control Process, Software Version Control, An Overview of CASE Tools.
Estimation of Various Parameters such as Cost, Efforts, Schedule/Duration, Constructive
Cost Models (COCOMO), Resource Allocation Models, Software Risk Analysis and
Management.
Reference Books:
1. RS Pressman, Software Engineering: A Practitioners Approach, McGraw Hill.
2. Pankaj Jalote, Software Engineering, Wiley
3. Rajib Mall, Fundamentals of Software Engineering, PHI Publication.
4. KK Aggarwal and Yogesh Singh, Software Engineering, New Age International
Publishers.
18
ELECTIVE - 1
E-11 - Cryptography & Network Security
UNIT-I Introduction
Security attacks, services and mechanism, introduction to cryptography. Conventional
Encryption: Conventional encryption model, classical encryption techniques- substitution
ciphers and transposition ciphers, cryptanalysis, stereography, stream and block ciphers.
Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and
diffusion, fiestal structure, data encryption standard(DES), strength of DES, differential
and linear crypt analysis of DES, block cipher modes of operations, triple DES, IDEA
encryption and decryption, strength of IDEA, confidentiality using conventional
encryption, traffic confidentiality, key distribution, random number generation.
UNIT-II Introduction to Graph
Ring and field, prime and relative prime numbers, modular arithmetic, Fermat’s and
Euler’s theorem, primality testing, Euclid’s Algorithm, Chinese Remainder theorem,
discrete logarithms. Principals of public key crypto systems, RSA algorithm, security of
RSA, key management, Diffle-Hellman key exchange algorithm, introductory idea of
Elliptic curve cryptography, Elganel encryption.
UNIT-III Message Authentication and Hash Function
Authentication requirements, authentication functions, message authentication code, hash
functions, birthday attacks, security of hash functions and MACS, MD5 message digest
algorithm, Secure hash algorithm(SHA). Digital Signatures: Digital Signatures,
authentication protocols, digital signature standards (DSS), proof of digital signature
algorithm.
UNIT-IV Authentication Applications
Kerberos and X.509, directory authentication service, electronic mail security pretty good
privacy (PGP), S/MIME.
UNIT-V IP Security
Architecture, Authentication header, Encapsulating security payloads, combining security
associations, key management. Web Security: Secure socket layer and transport layer
security, secure electronic transaction (SET). System Security: Intruders, Viruses and
related threads, firewall design principals, trusted systems.
Reference Books:
1. William Stallings, “Cryptography and Network Security: Principals and Practice”,
Pearson Education.
2. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill
3. C K Shyamala, N Harini, Dr. T.R.Padmnabhan Cryptography and Security, Wiley
4. Bruce Schiener, “Applied Cryptography”. John Wiley & Sons
5. V.K. Jain, Cryptography and Network Security, Khanna Publishing House
6. Bernard Menezes,” Network Security and Cryptography”, Cengage Learning. 6.
Atul Kahate, “Cryptography and Network Security”, Tata McGraw Hill
19
UNIT V Code Optimization
Local optimization- Loop Optimization techniques – DAG – Dominators- Flow graphs –
Storage allocations- Peephole optimization – Issues in Code Generation.
Reference Books:
1. Alfred V Aho , Jeffery D Ullman , Ravi Sethi, " Compilers , Principles techniques
and tools ", Pearson Education 2011
2. Raghavan V., “Principles of Compiler Design”, Tata McGraw Hill Education Pvt.
Ltd., 2010.
3. David Galles, “Modern Compiler Design”, Pearson Education, Reprint 2012.
4. Dasaradh Ramaiah. K., “Introduction to Automata and Compiler Design”, PHI,
2011
ELECTIVE - 2
E-22 – Web Technology
UNIT – I Introduction & Web Design
Introduction: Concept of WWW, Internet and WWW, HTTP Protocol: Request and
Response, Web browser and Web servers, Features of Web 2.0
Web Design: Concepts of effective web design, Web design issues including Browser,
Bandwidth and Cache, Display resolution, Look and Feel of the Website, Page Layout
and linking, User centric design, Sitemap, Planning and publishing website, Designing
effective navigation.
UNIT – II Html & Style Sheets
HTML: Basics of HTML, formatting and fonts, commenting code, color, hyperlink, lists,
tables, images, forms, XHTML, Meta tags, Character entities, frames and frame sets,
Browser architecture and Web site structure. Overview and features of HTML 5
Style sheets : Need for CSS, introduction to CSS, basic syntax and structure, using CSS,
background images, colors and properties, manipulating texts, using fonts, borders and
boxes, margins, padding lists, positioning using CSS, CSS2, Overview and features of
CSS3
UNIT – III Javescript & Xml
JavaScript : Client side scripting with JavaScript, variables, functions, conditions, loops
and repetition, Pop up boxes, Advance JavaScript: JavaScript and objects, JavaScript own
objects, the DOM and web browser environments, Manipulation using DOM, forms and
validations, DHTML : Combining HTML, CSS and JavaScript, Events and buttons
XML: Introduction to XML, uses of XML, simple XML, XML key components, DTD
and Schemas, Using XML with application. Transforming XML using XSL and XSLT
UNIT – IV PHP
PHP : Introduction and basic syntax of PHP, decision and looping with examples, PHP
and HTML, Arrays, Functions, Browser control and detection, string, Form processing,
Files, Advance Features: Cookies and Sessions, Object Oriented Programming with PHP
UNIT V MYSQL
PHP and MySQL : Basic commands with PHP examples, Connection to server, creating
database, selecting a database, listing database, listing table names, creating a table,
23
inserting data, altering tables, queries, deleting database, deleting data and tables, PHP
myadmin and database bugs
Reference Books:
1. Developing Web Applications, Ralph Moseley and M. T. Savaliya, Wiley-India
2. Web Technologies, Black Book, Dreamtech Press
3. HTML 5, Black Book, Dreamtech Press
4. Web Design, Joel Sklar, Cengage Learning
5. Developing Web Applications in PHP and AJAX, Harwani, McGraw Hill
6. Internet and World Wide Web How to program, P.J. Deitel & H.M. Deitel,
Pearson
ELECTIVE - 2
E-23 – Big Data
UNIT-I Understanding Big Data
What is big data, why big data, convergence of key trends, unstructured data, industry
examples of big data, web analytics, big data and marketing, fraud and big data, risk and
big data ,credit risk management, big data and algorithmic trading, big data and
HealthCare, big data in medicine, advertising and big data, big data technologies,
Introduction to Hadoop, open source technologies, cloud and big data mobile business
intelligence, Crowd sourcing Analytics ,inter and trans firewall analytics
UNIT-II NoSQL Data Management
Introduction to NoSQL, aggregate data models, aggregates, key-value and document data
models, relationships, graph databases, schema less databases ,materialized views,
distribution models ,sharing , masters slave replication , peer-peer replication , sharing
and replication , consistency , relaxing consistency , version stamps , map reduce ,
partitioning and combining , composing map-reduce calculations
UNIT-III Basics of Hadoop
Data format, analyzing data with Hadoop, scaling out , Hadoop streaming , Hadoop pipes
, design of Hadoop distributed file system (HDFS) , HDFS concepts , Java interface , data
flow ,Hadoop I/O , data integrity , oppression ,serialization , Avro file-based data
structures
UNIT-IV Map Reduce Applications
Map Reduce workflows, UNIT tests with MR UNIT, test data and local tests – anatomy
of Map Reduce job run , classic Map-reduce , YARN , failures in classic Map-reduce and
YARN , job scheduling , shuffle and sort , task execution , MapReduce types , input
formats , output formats
UNIT-V Hadoop Related Tools
HBase, data model and implementations, Hbase clients, Hbase examples – praxis.
Cassandra, cassandra data model, cassandra examples ,cassandra clients , Hadoop
integration.Pig , Grunt , pig data model , Pig Latin , developing and testing PigLatin
scripts. Hive, data types and file formats, HiveQL data definition, HiveQL data
manipulation – HiveQL queries
24