- About MeitY
- Vision & Mission
- Organization Chart
- Functions of Ministry of Electronics and Information Technology
- Who's Who
- Official Language Activities
- Citizens' Charter
- Vigilance & Grievances
- Performance Management
- Integrated Finances
- Acts & Policies
- Controller of Accounts
- Immovable Property Return
- Web Information Manager
- Know Your Ministers
- Visitor Pass
Details of Courses of Two Semester Diploma Course
Tue, 02/09/2010 - 19:48 — webmaster
Details of Courses of Two Semester Diploma Course
1.Basic concepts and notation, mathematical background
Stacks and Queues. Quicksort - A sorting method using stacks. Representations of stacks and queues: linked, sequential.
Trees: Definitions and basic concepts, linked tree representations, representations in contiguous storage, binary tree traversal algorithms, additional tree structures and their applications.
Tables: Searching sequential tables, hash tables and symbol tables.
Lists: List representation techniques, storage reclamation, multilinked, structures, dynamic storage allocation techniques, management algorithms for multilinked structures.
Strings: representations of strings in contiguous storage, string conversions, representations of variable-length strings, examples of operations on strings.
Arrays: storage allocation functions, linked allocation, hashed allocation techniques.
Files: properties of physical storage media, file organization techniques.
2. Operating systems
Process management: process synchronization and mutual exclusion, two process solution and Dekker's algorithm, semaphores, examples (producer- consumer, readers-writer, dining philosophers, etc.).
CPU scheduling: multiprogramming and time sharing, scheduling approaches (SJF, FIFO, round robin, etc.).
Input/Output: device controllers and device drivers, disks, other devices.
Memory management: with and without swapping, virtual memory - paging and segmentation, page replacement algorithms, implementation.
File systems: FS services, disk space management, directory and data structure.
Deadlocks: modeling, detection and recovery, prevention and avoidance. Example Systems: Unix, MSDOS.
3. Computer networks
Introduction: Advantages of computer networks, LAN vs. WAN, ISO/OSI seven-layer architecture, networks topologies.
Physical Layer: transmission media, analog transmission, digital transmission.
Data Link Layer: Framing, Error detection and correction, Stop-and-wait protocol, Sliding window protocols.
MAC Layer: Aloha protocols, CSMA/CD; Ethernet, Token ring, Token bus. Logical link control. May be some other MAC protocols like, FDDI, Gigabit ethernet, wireless, etc.
Network Layer: Routing Algorithms -- Shortest path, distance vector, link state routing, flooding, hierarchical routing. Internetworking -Tunneling,
Encapsulation, Fragmentation. Virtual circuits, datagrams. Internet Protocol (IP) - Header structure, addresses, options, etc.
Routing protocols (examples: RIP, HELLO, OSPF, BGP). Classless
Inter-Domain Routing. Congestion Control Algorithms. Multicasting. Other protocols: ICMP. ARP, RARP, BOOTP, DHCP.
Transport Layer: Flow and error control, multiplexing, establishing and releasing a connection. Transmission Control Protocol-- header, services, connection management, congestion control, sliding window, timers. User Datagram Protocol. Domain Name Service.
Unix network programming, socket abstraction. client-server architecture. Session, Presentation, Application Layers. Example protocols: Email (SMTP), Telnet, FTP, etc.
4.Computer organisation and architecture
Memory: organization inside a memory chip, interfacing of memory with processor. Bus protocols. Number representation: integer representation, character representation, real number representation.
Processor organization: computer arithmetic, adders - ripple carry and carry look-ahead, multipliers, ALU design, control structure, hardware, microprogramming, nanoprogramming, assembly language programming.
Input Output organization: program controlled, interrupt driven, DMA driven.
Computer peripheral organization: keyboard design and processor interface, hard disk design and processor interface, floppy disk drive and processor interface, VDU and concept of graphics adapters. Printers: dot matrix, line printer and laser printer.
Pipelining. Introduction of virtual memory and cache systems. Newer features, e.g., RISC, parallel architectures, etc.
5- Programming tools and techniques
Software management tools such as SCCS and make;
Programming tools such as Perl, Tcl/Tk; Shell programming, awk.
Programming in the windows environment;
Document preparation systems such as text and metafont;
Interesting problems from the book "Programming pearls."
Information Security Courses
Basics of finite fields.
Private and Public-key cryptography, existing cryptosystems and their security.
Cryptanalysis of existing systems.
Zero-knowledge protocols, One-way functions.
Advanced protocols for different applications, e.g. e-cheque, e-cash etc.
Network and System level security issues.
Introduction: need and basic goals for computer security, security threats etc.
Operating System Security: low-level protection mechanisms, access control: models for access control, some confidentiality, integrity, and hybrid models of access control such as Bell-La Padula, Biba, Chinese Wall etc., discretionary v/s mandatory access control.
Case studies: Java access control policy specifications, SELinux - security model and implementation.
Program flaws: bugs which have security implications such as buffer overflows, race conditions etc.
Malicious code: viruses, worms, Trojan horses; how they work and how to defend against them.
Authentication and authorization techniques . Passwords, shadow files, one-time passwords, Bio-metric based identification and authentication systems. Smart cards. Kerberos.
Dealing with spam. Secure email systems. PGP, SMIME, etc.
Encryption of multimedia data. Digital Watermarking. Steganography. Transaction security.
Disaster management. Forensics
Key exchange protocols. Diffie-hellman and its variants. Man in the middle attack. PKI and certificate based key exchange. Key management.
Protocol weaknesses in IP/TCP and other protocols. Various types of attacks.
Security protocols at application level:PGP, SHTTP, SSH, etc.
Security protocols at socket layer: SSL/TLS.
Security protocols at network layer: IPSec.
Security protocols for remote connections through dial-up etc.: PPTP, L2TP. Firewalls and packet filtering.
Proxy or application level gateways as security devices.
Virtual private networks.
Intrusion Detection Systems.
Privacy protection and anonymity services.
Electronic payment systems.
4-Advanced Computer Network
Introduction: Overview of computer networks, seven-layer architecture, TCP/IP suite of protocols, etc.
MAC protocols for high-speed LANs, MANs, and wireless LANs. (For example, FDDI, DQDB, HIPPI, Gigabit Ethernet, 802.11, bluetooth, etc.) Fast access technologies. (For example, ADSL, Cable Modem, etc.)
IPv6: Why IPv6, basic protcol, extensions and options, support for QoS, security, etc., neighbor discovery, auto-configuration, routing.
Changes to other protocols. Application Programming Interface for IPv6. 6bone.
Mobility in networks. Mobile IP. Security related issues.
IP Multicasting. Multicast routing protocols, address assignments, session discovery, etc.
TCP extensions for high-speed networks, transaction-oriented applications. Other new options in TCP.
Quality-of-service, RSVP, MPLS, QoS routing, admission control, queuing disciplines, etc.
5-Lab courses on security tools
Installing Linux, configuring Linux for secure usage.
Configuring sendmail, apache, squid, FTP, and other servers.
Analyzing various log files
Configuring Router, DHCP, DNS, Firewall, etc.
Running tools to find vulnerabilities like port scanner, and those which finger print operating systems.
Downloading, installing, and running tools which exploit vulnerabilities in a system.