ME Computer Network Information 1 Syllabus Mumbai University


ME Computer Network Information 1 Syllabus Mumbai University by munotes

Page 1

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

AC 14/ 7/2016
Item No. 4.26

UNIVERSITY OF MUMBAI


Revised Syllabus
For
Master of Engineering
Program: M. E. (Computer Network & Information
Security )
Under
FACULTY OF TECHNOLOGY
(As per Choice Based Credit and Grading System)
from
Academic Year 2016 -17

Page 2

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

From Co -ordinator’s Desk:

To meet the challenge of ensuring excellence in engineering education, the issue of quality
needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the
principal means of quality assurance in higher education. The major emphasis of accreditation
process is to measure the outcomes of the program that is being accredited. In line with this
Faculty of Technology of University of Mumbai has taken a lead in incorporating philoso phy of
outcome based education in the process of curriculum development.
Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that,
each Board of Studies shall prepare some Program Educational Objectives (PEO’s) and give
freedom to affiliated Institutes to add few (PEO’s) and course objectives and course outcomes
to be clearly defined for each course, so that all faculty members in affiliated institutes
understand the depth and approach of course to be taught, which will e nhance learner’s learning
process. It was also resolved that, maximum senior faculty from colleges and experts from
industry to be involved while revising the curriculum. I am happy to state that, each Board of
studies has adhered to the resolutions passed by Faculty of Technology, and developed
curriculum accordingly. In addition to outcome based education, Choice Based Credit and
Grading System is also introduced to ensure quality of engineering education.
Choice Based Credit and Grading System enables a much -required shift in focus from teacher -
centric to learner -centric education since the workload estimated is based on the investment of
time in learning not in teaching. It also focuses on continuous evaluation which will enhance
the quality of education . University of Mumbai has taken a lead in implementing the system
through its affiliated Institutes Faculty of Technology has devised a transparent credit
assignment policy adopted ten points scale to grade learner’s performance. Choice Based Credit
and G rading System were implemented for First Year Master of Engineering from the academic
year 2016 -2017. Subsequently this system will be carried forward for Second Year Master of
Engineering in the academic year 2017 -2018.


Dr. Suresh K. Ukarande

Co-ordinator,
Faculty of Technology,
Member - Academic Council
University of Mumbai, Mumbai

Page 3

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Preamble:
The M. E. in Computer Network & Information Security is specialization programme in the
field of Computer science and Engineering. This programme is offered to students who are
interested in advanced learning and research in any area of Computer Science and
Engineering. Applicants to this programme are expected to have a background in Computer
Science and Engineering or Information Te chnology.
The o bjective of the p rogram me is to enable the l earner to apply his/her enhanced skill and
knowledge at the top research laboratories and companies in the country and even abroad.
The programme is a 72 -credit degree programme, which is usually spread over 4 semesters
for a full -time student. About two -thirds of the credits involve coursework, and the r emaining
consists of project work. The emphasis is on conducting original research and writing a thesis
individ ually. The programme is fle xible enough to allow a student to specialize in any topic
of interest by taking elective (optional) courses and working on a research project in that area.
University of Mumbai feels that it is desirable to provide specialized ME programme in
Computer N etwork & Information Security to address the needs of the industry, which
today req uires more specialized resource in each field.
Faculty of Technology, University of Mumbai has taken a lead in incorporating philosophy of
Choice Based E ducation in the process of curriculum development.

Dr. Subhash K. Shinde
Chairperson,
Adhoc Board of Studies in Computer Engineering,
University of Mumbai, Mumbai.





Page 4

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Program Structure for ME Computer Network & Information Security ,
(With Effect from 2016 -2017)
University of Mumbai
Semester –I

Course Code
Course Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC101 Mobile & Adaptive System 04 -- -
- 04 -
- -
- 04
CISC102 Advanced Network
Programming 04 -- -
- 04 -
- -
- 04
CISC103 Information Security System 04 -- -
- 04 -
- -
- 04
CISDLO -I Department Level Optional
Course -I 04 -- -
- 04 -
- -
- 04
ILO-I Institute Level Optional
Course -I 03 -- -
- 03 -
- -
- 03
CISL101 Computational Laboratory -I -
- 03 -
- 01 -
- 01
CISL102 DEC Laboratory -I -
- 02 -
- 01 - 01
Total 19 04 -
- 21 -- -
- 21

Course
Code Course
Name Examination Scheme
Theory
TW Oral/
Pract Total Internal Assessment End
Sem.
Exam Exam
Duration
( in Hrs) Test 1 Test 2 Avg.
CISC101 Mobile & Adaptive System 20 20 20 80 3 -- --- 100
CISC102 Advanced Network Programming 20 20 20 80 3 -- --- 100
CISC103 Information Security System 20 20 20 80 3 -- --- 100
CISDLO -I Department Level Optional Course -I 20 20 20 80 3 -- --- 100
ILO-I Institute Level Optional Course -I 20 20 20 80 3 -- --- 100
CISL101 Computational Laboratory -I --- --- --- ---- ---- 25 25 50
CISL102 DEC Laboratory -I --- --- --- ---- ---- 25 25 50
Total 100 100 100 400 ---- 50 50 600

Course Code Department Level Optional Course -I Course Code Institute Level Optional Course -I
CISDLO 1011 Ad-hoc and Sensor Networks ILO1011 Product Lifecycle Management
CISDLO 1012 Grid and Cloud Computing ILO1012 Reliability Engineering
CISDLO 1013 Network Vulnerabilities & Risk Management ILO1013 Management Information System
CISDLO 1014 Advanced Computer Forensic Analysis ILO1014 Design of Experiments
CISDLO 1015 High Speed and Broadband Networks ILO1015 Operation Research
ILO1016 Cyber Security and Laws
ILO1017 Disaster Management & Mitigation
Measures
ILO1018 Energy Audit and Management

Page 5

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Program Structure for ME Computer Network & Information Security ,
(With Effect from 2016 -2017)
University of Mumbai
Semester –II

Course
Code
Course Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC201 Internet Routing Design 04 -- --
04 -- -- 04
CISC202 Mobile Wireless Security 04 -- -- 04 -- -- 04
CISC203 Web Application Security 04
--
-- 04
--
-- 04
CISDLO -II Department Level Optional
Course -II 04 -- -- 04 -- -- 04
ILO-II Institute Level Optional
Course -II 03 -- -- 03 -- -- 03
CISL201 Computational Laboratory -II -- 02 -- 01 -- -- 01
CISL202 DEC Laboratory -II -- 02 -- 01 -- -- 01
Total
19 04 --- 21 -- -- 21

Course
Code Course
Name Examination Scheme
Theory
TW Oral/
Pract Total Internal Assessment End
Sem.
Exam Exam
Duration
( in Hrs) Test 1 Test 2 Avg.
CISC201 Internet Routing Design 20 20 20 80 3 -- --- 100
CISC202 Mobile Wireless Security 20 20 20 80 3 -- --- 100
CISC203 Web Application Security
20 20 20 80 3 -- --- 100
CISDLO -II Department Level Optional Course -II 20 20 20 80 3 -- --- 100
ILO-II Institute Level Optional Course -II 20 20 20 80 3 -- --- 100
CISL201 Computational Laboratory -II --- --- --- ---- ---- 25 25 50
CISL202 DEC Laboratory -II --- --- --- ---- ---- 25 25 50
100 100 100 400 ---- 50 50 600

Course Code Department Level Optional Course -II Course Code Institute Level Optional Course -I
CISDLO 2021 TCP/IP Technology ILO2021 Project Management
CISDLO 2022 Database Issues and Security ILO2022 Finance Management
CISDLO 2023 Network Management and Performance
Evaluation ILO2023 Entrepreneurship Development and
Management
CISDLO 2024 Information Hacking Techniques ILO2024 Human Resource Management
CISDLO 2025 Internet of Things ILO2025 Professional Ethics and CSR
ILO 2026 Research Methodology
ILO2027 IPR and Patenting
ILO2028 Digital Business Management
ILO2029 Environmental Management

Page 6

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Program Structure for ME Computer Network & Information Security,
(With Effect from 2016 -2017)
University of Mumbai

Semester –III

Course
Code
Course Name Teaching Scheme (Contact
Hours) Credits Assigned
Theory Pract Tut Theory Prac
t Tut Total
CIS301 Special Topic
Seminar -- 06 -- -- 03 -- 03
CIS302 Dissertation I -- 24 -- -- 12 -- 12
Total
---- 30 -- --- 15 -- 15
Course
Code Course
Name Examination Scheme
Theory
TW Oral/
Pract Total Internal Assessment End
Sem. Exam Exam
Duration
( in Hrs) Test 1 Test 2 Avg.
CIS301 Special Topic
Seminar --- --- --- --- --- 50 50 100
CIS302 Dissertation -I --- --- --- --- --- 100 --- 100
Total --- --- --- ---- --- 150 50 200

Seme ster –IV

Course Code
Course Name Teaching Scheme (Contact
Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CIS4 01 Dissertation -II -- 30 -- --- 15 -- 15
Total -- 30 -- --- 15 -- 15
Course
Code Course
Name Examination Scheme
Theory
TW Oral/
Pract Total Internal Assessment End
Sem.
Exam Exam
Duratio
n ( in
Hrs) Test 1 Test 2 Avg.
ME-CIS401 Dissertation -II -- --- --- --- --- 100 100 200
Total -- --- --- --- --- 100 100 200



Page 7

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC101 Mobile and
Adaptive
System 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
Oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Understand various Mobile and wireless systems
2. Study Architecture and various processes of GSM
3. Provide the knowledge of concept of Mobile IP and related issues
4. Detailed study of security issues in Ad -hoc networks

Course Outcomes: Learner will able to -
 Gain knowledge about Voice and Data communication wireless systems
 Able to develop and design mechanisms for Mobile and wireless communication.
 Demonstrate the technical competence necessary for solving problems in Mobile and
wireless systems.
Sr.
No. Module Detailed Content Hours
1 Introduction and
overview
General issues that will be addressed on this module.
Properties of wireless PANs, LANs, WANs, Basic
structure and operation, Ad -hoc and Infrastructure
networks. Physical constraints and limitations
(transmission & reception). 8
2 Network
structures and
architectures Hand -off and mobility support at the physical/link level.
Technologies at physical link layer. PANs Bluetooth,
LANs IEEE802.11, Hiper LAN. 8
3 Global system
for mobile
communication
(GSM) Mobile Services, System Architecture, Protocols,
Localization & Calling, Handover, Security. GPRS :
GPRS System Architecture. UMTS: UMTS System
Architecture.LTE: Long Term Evolution. 10
4 Mobile IP Mobile IPv4 and Mobile IPv6. Problems with routing,
QoS and security. Overview of use of intelligence in
mobile systems, Power management, replication,
adaptation. Power management issues. From the lowest
(physical device) levels, through communication
protocols, broadcast methodologies, trans coding, etc. 8
5 File Systems CODA, Mobile Infrastructure support, Mobile
middleware, Adaptive and reconfigurable Systems, Next
generation wireless overview (4G/5G): UMTS, IMT 2000
and W -CDMA.

8

Page 8

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
6 Mobile
multimedia and
their relationship
to proxying Programmable networking and Applications for mobile
systems. Code mobility and control/signaling. 6

Text Books:
1. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition,
2008.
2. Dr. Sunilkumar, “Wireless and Mobile Networks: Concepts and Protocols”, Wiley
Publication .
Reference Books:
1. Raj Kamal, “Mobile Computing”, OXFORD UNIVERSITY PRESS.
2. Ed. Dejan Milojicic, Frederick Douglis and Richard Wh eeler, “Mobility: Processes,
computers and agents. " ACM Press.

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nat ure (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hou rs as mention in the syllabus.















Page 9

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016


Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC102 Advanced
Network
Programming 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
Oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Provide students with a thorough introduction to a variety of important principles in
networking, with a strong focus on the Internet.
2. Learn to writ e programs using the socket interface.
3. Give an introduction to the TCP/IP client -server model of interaction, and to writing
networking applications using the client/server technology .
4. Discussion on writing of secure software.
Course Outcomes: Learner will able to -
 Write socket API based programs
 Design and implement client -server applications using TCP and UDP sockets
 Understand with several common programming interfaces for network
communication
 Formulate the basic concept of socket programming and client server model
Sr. No. Module Detailed Content Hours
1 Transport Layer
TCP and UDP with policy control, TCP Connection
Establishment and Termination, TIME_WAIT State, Port
Numbers and Concurrent Servers, Buffer Sizes and
Limitations. 6
2 Sockets and
Socket
Programming Introduction, Socket Address Structures, Value -Result
Arguments, Byte Ordering Functions, Byte Manipulation
Functions, socket Function. 8
3 Application
Development TCP Echo Server: main and str_echo Function, TCP Echo
Client: main and str_cli Function, Normal Startup,
Normal Termination, POSIX Signal Handling, SIGPIPE
Signal, wait and waitpid function Connection abort before
accept return, Termination of server proces s, Crashing of
Server Host, Crashing and Rebooting of Server Host and
Shutdown of Server Host. 10
4 Socket Option
and Elementary
UDP Socket Getsocket and setsocket functions – generic socket
options, IP socket options, ICMP socket options,
Elementary UDP sockets: UDP echo Server, UDP echo
Client, Multiplexing TCP and UDP sockets. 8

Page 10

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
5 Advanced
Sockets IPv4 and IPv6 Interoperability: IPv4 Client, IPv6 Server,
IPv6 Client, IPv4 Server, IPv6 Address Testing Macros,
IPV6_ADDRFORM Socket Option ICMPv4 and
ICMPv6.
Name and Address Conversions: Domain Name System,
Functions. Advanced Name and Address Conversi ons:
Functions and Implementation
Threads: Thread Functions: Creation and Termination,
Thread -Specific Data, Web Client and Simultaneous
Connections 8
6 Routing Sockets Data link Socket, Address Structure, Reading and Writing,
Interface Name and Index Functions, data link access, raw
socket (creation input, output)
Client -Server Design Alternatives:
TCP Client Alternatives, TCP Test Client, Iterative Server,
Concurrent Server, Thread Locking around accept,
Descriptor Passing, TCP Concurrent Server, One Thread
per Client, TCP Pre -threaded Server. 8

Text Books:
1. Richard Stevens, Bill Fenner, “UNIX network programming Volume -1 - The Sockets
Networking API”, 3rd edition.
2. W. Richard Stevens, “Advanced Programming in the Unix Environment”, Addison
Wesley.

Reference Books:
1. UNIX Internals – “A new Frontier”, PHI

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minim um 2 Modules) and the other is either a class test or
assignment on live problems or course project.


Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.


Page 11

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016


Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC103 Information
Security
System 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
Oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Develop an understanding of information assurance as practiced in computer
operating systems, distributed systems, networks and representative applications.
2. Gain familiarity with prevalent network and distributed system attacks, defenses
against them.
3. Build up a basic understanding of cryptography, how it has evolved, and some key
encryption techniques used today.

Course Outcomes: Learner will able to -
 Master fundamentals of secret and public cryptography, protocols for security
services.
 Understand the network security threats and counter measures, network security
designs using available secure solutions.
 Familiar with advanced security issues and technologies
Sr. No. Module Detailed Content Hours
1 Computer
Security
Overview Computer Security Concepts, OSI Security Architecture,
Secu rity Attacks, Security Services , Security Mechanism,
A Model for Network Security. Classical Encryption
Techniques – Substitution Techniques & Transformation
Techniques. 06
2 Symmetric Key
Cryptography DES Structure, DES Analysis, Security of DES. AES
Intro, Transformation, Key Expansions, AES Ciphers,
Analysis of AES. IDEA Modern Symmetric Key
cryptography ECB, CBC, CFD, OFB and CTR. 08
3 Asymmetric
Key
Cryptography Number Theory: Primes, Primarily Testing, Factorization,
Chinese Remainder Theorem, Exponentiation and
logarithm. Public key Cryptography RSA, RABIN
Cryptosystem EIGamal Cryptosystem, Elliptic Curve
Cryptosystems. 10
4 Digital Attacks on Digital Signature, Digital Signature Schemes,
Variations and Applications. Entity Authentication: 08

Page 12

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Signature Introduction, Password, Challenges -Response, Zero
Knowledge authentication: Fiat Shamin Protocol, Feige
Fiat Shamin Protocol, Biometrics.
5 Cryptographic
Hash Function Application of Cryptographic Hash Functions, Two
simple Hash Functions, Requirements and Security, Hash
Functions Based on Cipher Block Chaining, Secure Hash
Algorithm(SHA),SHA -3. 08
6 Key
Management &
Distribution Symmetric Key Distribution , Kerberos, Symmetric –Key
Agreement , Public –Key Distribution ,Hijacking. System
Security: Buffer Overflow & Malicious Software,
Malicious Programs, Intrusions Detection System,
Firewalls, Legal and Ethical Issues. 08

Text Books:
1. B.A. Forouzan and Debdeep Mukhopadhyay , Tata “ Cryptography and Network
Security, Mc Graw Hill , 2nd Edition.
2. William Stalling, “Cryptography and Network Security, Principles & Practices,
Pearson Education Publicati on Fifth Edition.
Reference Books:
1. Matt Bishop and S.S. Venkatramanayya , “Introduction to Computer Security ”, Pearson
Education Publicati on.
2. Atul Kahate , “Cryptography and Network Security ”, Tata McGraw Hill, 2nd Edition.

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.
In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.





Page 13

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISDLO 1011 Ad-hoc and
Sensor
Networks 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Understand Ad-hoc networks and issues .
2. Provide understand ing of routing in Ad -hoc networks and related issues
3. Study of wireless sensor networks
4. Detailed of security issues in Ad -hoc networks
Course Outcomes: Learner will able to -
 Gain knowledge about Ad -hoc and sensor networks and required protocols.
 Develop Routing protocol for Ad -hoc and sensor networks.
 Demonstrate the technical competence necessary for solving problems in Ad -hoc
networks.
Sr. No. Module Detailed Content Hours
1
Introduction
Issues in Ad -Hoc Wireless Networks, Applications in
Adhoc networks and challenges, IEEE 802.11 MAC
Protocols – Issues, Classifications of MAC protocols,
Design issues and goals in MAC, synchronous and
asynchronous MAC, Multi channel MAC & Power control
MAC proto col.
6

2
Ad-hoc
Network
Routing & TCP Issues – Classifications of routing protocols –
Hierarchical and Power aware. Multicast routing –
Classifications, Tree based, Mesh based. Ad Hoc
Transport Layer Issues. TCP Over Ad Hoc – Feedback
based, TCP with explicit link, TCP -Bus, Ad Hoc TCP,
and Spl it TCP. 10

3
Wireless Sensor
Networks –
MAC Introduction – Sensor Network Architecture, Data
dissemination, Gathering. MAC Protocols – self-
organizing, Hybrid TDMA/FDMA and CSMA based
MAC. 8
Issues in WSN routing – OLSR, AODV. Localization – 8

Page 14

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
4 WSN Routing,
Localization &
QOS Indoor and Sensor Network Localization. QoS in WSN.
5
Mesh
Networks
Necessity for Mesh Networks – MAC enhancements –
IEEE 802.11s Architecture – Opportunistic routing – Self
configuration and Auto configuration – Capacity Models
– Fairness – Heterogeneous Mesh Networks – Vehicular
Mesh Networks.
8
6
Security
Security in wireless Ad hoc wireless Networks, Network
security requirements, Issues & challenges in security
provisioning, secure routing in ad -hoc and sensor
networks.
QoS:
Introduction, Issues and challenges in providing QoS in
Ad hoc wireless Networks, Classifi cation of QoS
solutions. 8

Text Books:
1. C.Siva Ram Murthy and B.Smanoj, “Ad Hoc Wireless Networks – Architectures and
Protocols”, Pearson Education, 2004.
2. Feng Zhao and Leonidas Guibas, “Wireless Sensor Networks”, Morgan Kaufman
Publishers, 2004.

Reference Books:
1. C.K.Toh, “Ad Hoc Mobile Wireless Networks”, Pearson Education, 2002.
2. Thomas Krag and Sebastin Buettrich, “Wireless Mesh Networking”, O’Reilly
Publishers, 2007.

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project .

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.

Page 15

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISDLO 1012 Grid and Cloud
Computing 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
Oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 100 -- -- 100
Course Objectives:
1. Classify and describe the architecture and taxonomy of parallel and distributed
computing,
2. Get familiarized with the role of Cloud computing.
3. Make the students understand basic knowledge of grid computing
4. Familiarized with virtualization concepts and Service Oriented A rchitectures (SOA).

Course Outcomes: Learner will able to -
 Understand the benefits of Cloud Computing
 Learn how to provide Flexible and scalable infrastructures
 Simulate characterize the distinctions between Infrastructure, Platform and Software
as a Service (IaaS, PaaS, SaaS)
 Identify the concept of Public and Private Clouds, and analyze their advantages and
disadvantages.

Sr. No. Module Detailed Content Hours


1 System models
for Distributed
and Cloud
Computing
Clusters of cooperative computers, Grid computing and
cloud computing; software environment for advanced
computing, Service oriented Architecture (SOA), Parallel
and distributed programming models, Features of grid and
cloud platform.

6

2 Cloud
Computing
services models
and features
SaaS, Paa S and IaaS , Service oriented architecture and
web services; Features of cloud computing architectures
and simple case studies.
10


3 Virtualization Characteristic features, Taxonomy Hypervisor,
Virtualization and Cloud Computing, Pros and Cons of
Cloud Computing, Technology Examples/Case Studies.
8

4 Cloud
programming
Environmental
Map Reduce Hadoop Library from Apache, Open Source
Cloud Software Systems –Eucalyptus.
8

5 Grid Computing
Grid Architecture and Service modeling, Grid resource
management, software and Middleware for grid
computing, Grid Application trends.
8
6 Ubiquitous
clouds and the Cloud Trends in supporting Ubiquitous Computing,
Enabling Technology for the Internet of Things, 8

Page 16

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Internet of
Things Innovative Applications of the Internet of Things .

Text Books:
1. Distributed and Cloud Computing, Kaittwang Geoffrey C.Fox and Jack J Dongrra,
Elsevier India 2012.
2. Mastering Cloud Computing - Raj Kumar Buyya, Christian Vecchiola and S.Tanurai
Selvi, TMH, 2012.
Reference Books:
1. Cloud Computing, John W. Ritting House and James F Ramsome, CRC Press, 2012.
2. Enterprise Cloud Computing, Gautam Shroff, Cambridge University Press, 2012.

Internal Assessment:
Assessment consists of two tests out of which; one should be compulsory class test (on
minimum 02 `Modules) and the other is either a class test or assignment on live problems or
course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) f rom
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.













Page 17

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISDLO 1013 Network
Vulnerabilities
and Risk
Management 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Make students aware of various types of vulnerabilities which are faced by the network.
2. Knowledge of the basic principles of network security, IDS and web security services
3. Learn about various laws, regulations and different types of risk assessing methods.
4. Understand the concept of vulnerabilities by using various techniques.
Course Outcomes: Learner will able to -
 Identity various ty pes of vulnerabilities to which network may be subjected.
 Understand various types of network security, IDS and web security services.
 Study about the various legal techniques through which network can be saved from
getting exposed to various sorts of vuln erabilities.


Sr. No. Module Detailed Content Hours
1 Introduction to
assessing
Network
Vulnerabilities Type and procedure of n etwork vulnerability assessment .
Non-Cryptographic Protocol Vulnerabilities: DoS and D DoS,
Session Hijacking and Spoofing, Pharming Attacks, Wireless
LAN Vulnerabilities Software Vulnerabilities: Phishing, Buffer
Overflow, Format String Attacks, Cross -Site Scripting(XSS),
SQL Injection Access Control in the Operating System:
Preliminaries, Discretionary Access Control
8
2 Principles of
Security
Information Classification, Policy framework, role based
security in an organization 6
3 Intrusion
Prevention and
Detection Introduction, Prevention versus Detection, Types of
Intrusion
Detection systems, DdoS Attack Prevention/Detection,
Malware Defense
Web Services Security: Motivation, Technologies for
Web Services: XML, SOAP, WSDL and UDDI 10
4 Risk
Assessment Laws, Mandates and Regulations, Risk assessment best
practices, Risk assessment best practice. Risk Asses sment
Methodologies: Defense –in depth approach, risk analysis,
Asset valuation approach, Quantitative and Qualitative
risk- assessment approaches. Scoping the project, 8

Page 18

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Understanding the attacker.
5 Performing the
Assessment
Vulnerability scan and Exploitation: Internet Host and
network enumeration, IP network Scanning, Assessing
Remote Information Services, Assessing Web servers,
Assessing Web Applications, Assessing Remote
Maintenance Services, Assessing Database services,
Assessing Windows Networking Services, Assessing
Email services. 8
6 Tools Open source tools used for Assessment and Evaluat ion,
and exploitation framework . 8

Text Books:
1. Network Security assessment, Chris McNab, O’reilly Second Edition.
2. Security in Computing, Charles Pfleeger, Pearson Education Publication, 4th edition


Reference Books:
1. The Se curity Risk Assessment Handbook, Douglas LanDoll, Auerbach Publication.
2. Cyber Security , Sunit Belapur, Wiley Publication
3. Whitman & Mattord. Management of Information Security. Thomson Course

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or cours e project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.











Page 19

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISDLO 1014 Advanced
Computer
Forensic
Analysis 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Provide students with contemporary knowledge in Computer forensics.
2. Equipped students with skills to analyze different terrorists and Rogues forensic
activities.

Course Outcomes: Learner will able to -
 Understand different computer forensic technology.
 Analyze Computer forensic evidence.
 Appreciate Cybercrime Provisions in Indian Laws in dealing with Cyber Crimes.
 Appreciate the future direction of computer forensics.

Sr. No. Module Detailed Content Hours
1 Overview of
computer
Forensics
Technology Introduction to computer forensics, Role of computer in
crime, use of forensics in law enforcement, employment
proceedings, computer Forensics services. Types of
computer Forensics Technology - Military, law, spyware
and Adware, Biometrics security systems . 08
2 Types of
Computer
Forensics
systems Internet security, IDS, Firewall, Public key, net privacy
systems, vendor and computer Forensics services. Identity
management security sy stem, Identity theft. 08
3 Preserving and
recovering
Computer
Forensics
evidence Data recovery, evidence collection and data seizure, Type
of evidence, The rules of evidence, duplication and
preservation of digital evidence, Method of collection
computer image verification and authentication evidence . 06
4 Computer
Forensics
Analysis Discovery of electronic evidence - electronic document
discovery, identification of data - Time keeping, forensic
identification and analysis of technical surveillance
devices. Reconstructing fast events: Usable File Formats,
Unusable File Formats, Converting Files, Investigating
Network Intrusions and Cyber Crime, Network Forensics
and Investigating logs, Investigating network Traffic,
Investigating Web attacks, Router Forensic s. 10

Page 20

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
5 Cybercrime
Provisions in
Indian Laws Cybercrime Provisions in Indian Laws in dealing with
Cyber Crimes and its critical analysis Information
Technology Act, 2000. Penalties Under IT Act , Offences
Under IT Act, Offences Related With Digital Signature
and El ectronic Signature Under IT Act, Statutory
Provisions Establishment of Authorities under IT Act and
their functions, powers, etc. 08
6 Arsenal and
Tactics of
terrorists and
Rogues and
Advanced
Forensics The Terrorist profile, the dark worl d of the cyber
underground, new tools of terrorism, information warfare,
Arsenal and Tactics of private companies. Advanced
computer Forensics systems and future directions,
advanced encryption, hacking, advanced trackers, case
studies. 08

Text Books:
1. Cyber Security , Sunit Belapur, Wiley Publication
2. Computer forensics: computer crime scene investigation , John R. Vacca , Firewall
Media.
Reference Books:
1. Cyber Laws Simplified , Vivek Sood, Mc Graw Hill Publications.
2. B.A. Forouzan and Debdeep Mukhopadhyay.“Cryptography and Network
Security, 2nd Edition.Tata Mc Graw Hill Publications.

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.






Page 21

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISDLO 1015 High Speed &
Broadband
Networks 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract /
oral Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- 100

Course Objectives:
1. Basics knowledge of High Speed Networks.
2. Understand Optical fiber and Optical communication system components.
3. Learn asynchronous transmission and ATM components.

Course Outcomes: Learner will able to -
 Analyze and design High Speed Networks.
 Set up Optical fiber networks as per the requirement.
 Simulate asynchronous data transmission and design ATM System.
Sr. No. Module Detailed Content Hours
1 Introduction
Introduction to modern networking trends Optical
networking: principles and challenges; evolution of
optical networks, wavelength routed network, wavelength
division multiplexing (WDM) network technology, sub -
carrier multiplexing optical networks. Enabling
technologies: optical transmitter, optical fiber, optical
receivers, optical amplifiers, optical switching elements,
optical cross -connects (OXC), multiplexers/de -
multiplexers, wavelength routers, optical wavelength
converters, WDM network test beds. Netw ork
architecture, IP over WDM. 8
2

Optical
Communication
Systems
Block diagrams of optical communication systems, direct
intensity modulation, digital communication systems,
Laser semiconductor transmitter, Generations of optical
fiber link, description of 8 Mb/s optical fiber
communication link, description of 2.5 Gb/s optical fiber
communication link. 8
3
Components of
fiber optic
Networks
Overview of fiber optic networks, Transreceiver,
semiconductors optical amplifiers, couplers/splicers,
wavelength division multiplexers and demultiplexers,
filters, isolators and optical switches. 8

Page 22

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
4 Fiber Optic
Networks
Basic networks, SONET/SDH, Broa d cast and select
WDM Networks, wavelength routed networks, optical
CDMA. 10
5 ATM
The WAN Protocol : Faces of ATM, ATM Protocol
operations (ATM cell and Transmission) ATM
Networking basics, Theory of Operations, 6
6 ATM Layers
B-ISDN reference model, PHY layer , ATM Layer (
Protocol model), ATM layer and cell, Traffic Descriptor
and parameters, Traffic Congestion control defined, AAL
Protocol model, Traffic contract and QoS, User Plane
overview, Control Plane AAL, Management Plane, Sub -
DS3 ATM, ATM public services. 8

Text Books:
1. Optical fiber communications – Gerd Keiser, 3 rd Ed. MGH.
2. Fiber Optic Communication Technology – Djafar K. Mynbaev and Lowell L.
Scheiner, (Pearson Education Asia)

Reference Books:
1. Optoelectronic devices and systems , S.C. Gupta, PHI, 2005.
2. Fiber Optics Communications , Harold Kolimbiris (Pearson Education Asia)
3. Optical Fiber Communications and its applications , S.C. Gupta (PHI) 2004.
4. WDM Optical Networks , C. Siva Ram Murthy and Mohan Guru Swamy, PHI.
5. Fiber Optic co mmunications , D.C. Agarwal, S.Chand Publications, 2004.
6. Multiwavelength Optical Networks: A Layered Approach by Thomas E. Stern,
Krishna Bala.
7. DWDM Network Designs and Engineering Solutions , Ashwin Gumaste, Tony
Antony, Pearson Education.

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question pape r weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.


Page 23

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016


Course Code Course Name Credits
ILO 1011 Product Life Cycle Management 03

Objectives :
1. To familiarize the students with the need, benefits and components of PLM
2. To acquaint students with Product Data Management & PLM strategies
3. To give insights into new product development program and guidelines for designing
and developing a product
4. To familiarize the students with Virtual Product Development
Outcomes: Learner will be able to…
1. Gain knowledge about phases of PLM, PLM strategies and methodology for PLM
feasibility study and PDM implementation.
2. Illustrate various approaches and techniques for designing and developing products.
3. Apply product engineering guidelines / thumb rules in designing products for
moulding, machining, sheet metal working etc.
4. Acquire knowledge in applying virtual product development tools for components,
machining and manufacturing plant

Module Detailed Content s Hrs
01 Introduction to Product Lifecycle Management (PLM): Product Lifecycle
Management (PLM), Need for PLM, Product Lifecycle Phases, Opportunities of
Globalization, Pre -PLM Environment, PLM Paradigm, Importance & Benefits of PLM,
Widespread Impact of PLM, Focus and Application, A PLM Project, Starting the PLM
Initiative, PLM Applications
PLM Strategies: Industrial strategies, Strategy elements, its identification, selection and
implementation, Developing PLM Vision and PLM Strategy , Change management f or
PLM 10
02 ProductDesign: Product Design and Development Process, Engineering Design,
Organization and Decomposition in Product Design, Typologies of Design Process
Models, Reference Model, Product Design in the Context of the Product Development
Process, Relation with the Development Process Planning Phase, Relation with the Post
design Planning Phase, Methodological Evolution in Product Design, Concurrent
Engineering, Characteristic Features of Concurrent Engineering, Concurrent
Engineering and L ife Cycle Approach, New Product Development (NPD) and
Strategies, Product Configuration and Variant Management, The Design for X System,
Objective Properties and Design for X Tools, Choice of Design for X Tools and Their
Use in the Design Process 09
03 Product Data Management (PDM): Product and Product Data, PDM systems and
importance, Components of PDM, Reason for implementing a PDM system, financial
justification of PDM, barriers to PDM implementation 05
04 Virtual Product Development Tools: For components, machines, and manufacturing
plants, 3D CAD systems and realistic rendering techniques, Digital mock -up, Model
building, Model analysis, Modeling and simulations in Product Design, Examples/Case
studies 05

Page 24

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
05 Integration of Environmental Aspect s in Product Design: Sustainable Development,
Design for Environment,Need for Life Cycle Environmental Strategies, Useful Life
Extension Strategies, End -of-Life Strategies, Introduction of Environmental Strategies
into the Design Process, Life Cycle Environ mental Strategies and Considerations for
Product Design 05
06 Life Cycle Assessment and Life Cycle Cost Analysis: Properties, and Framework of
Life Cycle Assessment, Phases of LCA in ISO Standards, Fields of Application and
Limitations of Life Cycle Assess ment, Cost Analysis and the Life Cycle Approach,
General Framework for LCCA, Evolution of Models for Product Life Cycle Cost
Analysis 05

Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

End Semester Theory Examination:
Some guidelines for setting up the question paper.Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respective lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four question need to be solved.



REFERENCES:
1. John Stark, “Product Lifecycle Management: Paradigm for 21st Century Product
Realisation”, Springer -Verlag, 2004. ISBN: 1852338105
2. Fabio Giudice, Guido La Rosa, AntoninoRisitano, “Product Design for the environment -A
life cycle approach”, Taylor & Francis 2006, ISBN: 0849327229
3. SaaksvuoriAntti, ImmonenAnselmie, “Product Life Cycle Management”, S pringer,
Dreamtech, ISBN: 3540257314
4. Michael Grieve, “Product Lifecycle Management: Driving the next generation of lean
thinking”, Tata McGraw Hill, 2006, ISBN: 0070636265

Page 25

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Course Code Course Name Credits
ILO 1012 Reliability Engineering 03

Objectives :
1. To familiarize the students with various aspects of probability theory
2. To acquaint the students with reliability and its concepts
3. To introduce the students to methods of estimating the system reliability of simple and
complex systems
4. To unders tand the various aspects of Maintainability, Availability and FMEA procedure
Outcomes: Learner will be able to…
1. Understand and apply the concept of Probability to engineering problems
2. Apply various reliability concepts to calculate different reliability parameters
3. Estimate the system reliability of simple and complex systems
4. Carry out a Failure Mode Effect and Criticality Analysis

Module Detailed Contents Hrs
01 Probability theory: Probability: Standard definitions and concepts; Conditional
Probability, Baye’s Theorem.
Probability Distributions: Central tendency and Dispersion; Binomial, Normal,
Poisson, Weibull, Exponential, relations between them and their significance.
Measures of Dispersion: Mean, Median, Mode, Range, Mean Deviation, Standard
Deviation, Variance, Skewness and Kurtosis. 08
02 Reliability Concepts: Reliability definitions, Importance of Reliability, Quality
Assurance and Reliability, Bath Tub Curve.
Failure Data Analysis: Hazard rate, failure density, Failure Rate, Mean Time To
Failure (MTTF), MTBF, Reliability Functions.
Reliability Hazard Models: Constant Failure Rate, Linearly increasing, Time
Dependent Failure Rate, Weibull Model. Distribution functions and reliability
analysis. 08
03 System Reliability : System Configurations: Series, parallel, mixed configuration,
k out of n structure, Complex systems. 05
04 Reliability Improvement : Redundancy Techniques: Element redundancy, Unit
redundancy, Standby redundancies. Markov analysis.
System Reliability Analysis – Enumeration method, Cut -set method, Success
Path method, Decomposition method. 08
05 Maintainability and Availability : System downtime, Design for Maintainability:
Maintenance requirements, Design methods: Fault Isolation and self -diagnostics,
Parts standardization and Interchangeability, Modularization and Accessibility,
Repair Vs Replacement.
Availability – qualitative aspects. 05
06 Failure Mode, Effects and Criticality Analysis: Failure mode effects ana lysis,
severity/criticality analysis, FMECA examples. Fault tree construction, basic
symbols, development of functional reliability block diagram, Fau1t tree analysis
and Event tree Analysis 05

Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

Page 26

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016



End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respective lecture hours as mention in th e syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four quest ion need to be solved.



REFERENCES:
1. L.S. Srinath, “Reliability Engineering”, Affiliated East -Wast Press (P) Ltd., 1985.
2. Charles E. Ebeling, “Reliability and Maintainability Engineering”, Tata McGraw Hill.
3. B.S. Dhillion, C. Singh, “Engineering Reliability”, John Wiley & Sons, 1980.
4. P.D.T. Conor, “Practical Reliability Engg.”, John Wiley & Sons, 1985.
5. K.C. Kapur, L.R. Lamberson, “Reliability in Engineering Design”, John Wiley & Sons.
6. Murray R. Spiegel, “Probability and Statistics”, Tata McGraw -Hill Publishing Co. Ltd.

Page 27

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Course Code Course Name Credits
ILO 1013 Management Information System 03

Objectives :
1. The course is blend of Management and Technical field.
2. Discuss the roles played by information technology in today’s business and define various
technology architectures on which information systems are built
3. Define and analyze typical functional information systems and identify how they meet the
needs of the firm to deliver efficiency and competitive advantage
4. Identify the basic steps in systems development
Outcomes: Learner will be able to…
1. Explain how information systems Transform Business
2. Identify the impact information systems have on an organization
3. Describe IT infrastructure and its components and its current trends
4. Understand the principal tools and technologies for accessing information from databases to
improve business performance and decision making
5. Identify the types of systems used for enterprise -wide knowledge management and how they
provide value for businesses

Module Deta iled Contents Hrs
01 Introduction To Information Systems (IS): Computer Based Information
Systems, Impact of IT on organizations, Imporance of IS to Society.
Organizational Strategy, Competitive Advantages and IS. 4
02 Data and Knowledge Management: Database Approach, Big Data, Data
warehouse and Data Marts, Knowledge Management.
Business intelligence (BI): Managers and Decision Making, BI for Data
analysis and Presenting Results 7
03 Ethical issues and Privacy: Information Security. Threat to IS, and Security
Controls 7
04 Social Computing (SC): Web 2.0 and 3.0, SC in business -shopping,
Marketing, Operational and Analytic CRM, E -business and E -commerce –
B2B B2C. Mobile commerce. 7
05 Computer Networks Wired and Wireless technology, Pervasive computing,
Cloud computing model. 6
06 Information System within Organization: Transaction Processing Systems,
Functional Area Information System, ERP and ERP support of Business
Process.
Acquiring Information Systems and Applications: Various System
deve lopment life cycle models. 8


Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

Page 28

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016


End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respec tive lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module o ther than module 3)
4. Only Four question need to be solved.



REFERENCES:
1. Kelly Rainer, Brad Prince ,Management Information Systems , Wiley
2. K.C. Laudon and J.P. Laudon, Management Information Systems: Managing the Digital Firm ,
10th Ed., Prentice Hall, 2007.
3. D. Boddy, A. Boonstra, Managing Information Systems: Strategy and Organization, Prentice
Hall, 2008

Page 29

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Course Code Course Name Credits
ILO 1014 Design of Experiments 03

Objectives:
1. To understand the issues and principles of Design of Experiments (DOE).
2. To list the guidelines for designing experiments.
3. To become familiar with methodologies that can be used in conjunction with
experimental designs for robustness and optimization

Outcomes: Learner will be able to…
 Plan data collection, to turn data into information and to make decisions that lead to
appropriate action.
 Apply the methods taught to real life situations.
 Plan, analyze, and interpret the results of experiments

Module Detailed Contents Hrs
01 Introduction: Strategy of Experimentation, Typical Applications of
Experimental Design, Guidelines for Designing Experiments, Response Surface
Methodology. 06
02 Fitting Regression Models: Linear Regression Models, Estimation of the
Parameters in Linear Regression Models, Hypothesis Testing in Multiple
Regression, Confidence Intervals in Multiple Regression, Prediction of new
response observation, Regression model diagnostics, Testing for l ack of fit. 08
03 Two -Level Factorial Designs: The 22Design, The 23 Design, The General 2k
Design, A Single Replicate of the 2kDesign, The Addition of Center Points to the
2kDesign, Blocking in the 2kFactorial Design, Split -Plot Designs. 07
04 Two -Level Fractional Factorial Designs: The One -Half Fraction of the 2k
Design, The One -Quarter Fraction of the 2k Design, The General 2k-p Fractional
Factorial Design, Resolution III Designs, Resolution IV and V Designs,
Fractional Factorial Split -Plot D esigns. 07
05 Conducting Tests: Testing Logistics, Statistical aspects of conducting tests,
Characteristics of good and bad data sets, Example experiments, Attribute Vs
Variable data sets. 07
06 Taguchi Approach: Crossed Array Designs and Signal -to-Noise Ratios,
Analysis Methods, Robust design examples. 04


Page 30

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Assessment:
Internal: Assessment consists of two tests out of which; one should
be compulsory class test (on minimum 02 Modules) and the
other is either a class test or assignment on live problems or
course project.

End Semester Examination: Some guidelines for setting the question papers are as, six
questions to be set each of 20 marks, out of these any four
questions to be attempted by students. Minimum 80%
syllabus should be covered in question papers of end
semester examination. In question paper weightage of
each module will be proportional to num ber of
respective lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

REFERENCES:
1. Raymond H. Mayers, Douglas C. Montgomery, Christine M. Anderson -Cook,
Response Surface Methodology: Process and Product Optimization using Designed
Experiment, 3rd edition, John Wiley & Sons, New York, 2001
2. D.C. Montgomery, Design and Analysis of Experiments, 5th edition, John Wiley &
Sons, New York, 2001
3. George E P Box, J Stuart Hunter, William G Hunter, Statics for Experimenters:
Design, Innovation and Discovery, 2nd Ed. Wiley
4. W J Dimond, Peactical Experiment Designs for Engineers and Scintists, John Wiley
and Sons Inc. ISBN: 0 -471-39054 -2
5. Design and Analysis of Experiments (Springer text in Statistics), Springer by A.M.
Dean, and D. T.Voss
6. Philip J Ross, “Taguchi Technique for Quality Engineering,” McGraw Hill.
7. Madhav S Phadake, “Quality Engineering using Robust Design,” Prentice Hall.

Page 31

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Course Code Course Name Credits
ILO 1015 Operations Research 03

Objectives :
1. Formulate a real -world problem as a mathematical programming model.
2. Understand the mathematical tools that are needed to solve optimization problems.
3. Use mathematical software to solve the proposed models.
Outcomes: Learner will be able to…
1. Understand th e theoretical workings of the simplex method, the relationship between a linear
program and its dual, including strong duality and complementary slackness.
2. Perform sensitivity analysis to determine the direction and magnitude of change of a model’s
optimal solution as the data change.
3. Solve specialized linear programming problems like the transportation and assignment
problems, solve network models like the shortest path, minimum spanning tree, and
maximum flow problems.
4. Understand the applications of inte ger programming and a queuing model and compute
important performance measures

Module Detailed Contents Hrs
01 Introduction to Operations Research : Introduction, , Structure of the Mathematical
Model, Limitations of Operations Research
Linear Programming : Introduction, Linear Programming Problem, Requirements of
LPP, Mathematical Formulation of LPP, Graphical method, Simplex Method Penalty
Cost Method or Big M -method, Two Phase Method, Revised simplex method,
Duality , Primal – Dual construc tion, Symmetric and Asymmetric Dual, Weak Duality
Theorem, Complimentary Slackness Theorem, Main Duality Theorem, Dual Simplex
Method, Sensitivity Analysis
Transportation Problem : Formulation, solution, unbalanced Transportation problem.
Finding basic fea sible solutions – Northwest corner rule, least cost method and Vogel’s
approximation method. Optimality test: the stepping stone method and MODI method.
Assignment Problem : Introduction, Mathematical Formulation of the Problem,
Hungarian Method Algorithm, Processing of n Jobs Through Two Machines and m
Machines, Graphical Method of Two Jobs m Machines Problem Routing Problem,
Travelling Salesman Problem
Integer Programming Problem : Introduction, Types of Integer Programming
Problems, Gomory’s cutting plane Algorithm, Branch and Bound Technique .
Introduction to Decomposition algorithms. 14
02 Queuing models : queuing systems and structures, single server and multi -server
models, Poisson input, exponential service, constant rate service, finite and infinite
population 05
03 Simulation : Introduction, Methodology of Simulation, Basic Concepts, Simulation
Procedure, Application of Simulation Monte -Carlo Method: Introduction, Monte -Carlo
Simulation, Applications of Simulation, Advantages of Simulation, Limitati ons of
Simulation 05
04 Dynamic programming . Characteristics of dynamic programming. Dynamic
programming approach for Priority Management employment smoothening, capital 05

Page 32

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
budgeting, Stage Coach/Shortest Path, cargo loading and Reliability problems.
05 Game Theory . Competitive games, rectangular game, saddle point, minimax
(maximin) method of optimal strategies, value of the game. Solution of games with
saddle points, dominance principle. Rectangular games without saddle point – mixed
strategy for 2 X 2 games. 05
06 Inventory Models : Classical EOQ Models, EOQ Model with Price Breaks, EOQ with
Shortage, Probabilistic EOQ Model, 05

Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respective lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four question need to be solved.


REFERENCES:
1. Taha, H.A. "Operations Research - An Introduction", Prentice Hall, (7th Edition), 2002.
2. Ravindran, A, Phillips, D. T and Solberg, J. J. "Operations Research: Principles and Practice",
John Willey and Sons, 2nd Edition, 2009.
3. Hiller, F. S. and Liebermann, G. J. "Introduction to Operations Research", Tata McGraw Hill,
2002.
4. Operations Research, S. D. Sharma, KedarNath Ram Nath -Meerut.
5. Operations Research, KantiSwarup, P. K. Gupta and Man Mohan, Sultan Chand & Sons.

Page 33

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Course Code Course Name Credits
ILO 1016 Cyber Security and Laws 03

Objectives :
1. To understand and identify different types cyber crime and cyber law
2. To recognized Indian IT Act 2008 and its latest amendments
3. To learn various types of security standards compliances
Outcomes: Learner will be able to…
1. Understand the concept of cybercrime and its effect on outside world
2. Interpret and apply IT law in various legal issues
3. Distinguish different aspects of cyber law
4. Apply Information Security Standards compliance during software design and development

Module Detailed Contents Hrs
01 Introduction to Cybercrime: Cybercrime definition and origins of the world,
Cybercrime andinformation security, Classifications of cybercrime, Cybercrime and
the
Indian ITA 2000, A global Perspective on cybercrimes. 4
02 Cyber offenses & Cybercrime: How criminal plan the attacks, Social Engg, Cyber
stalking, Cyber café and Cybercrimes, Botnets, Attack vector, Cloud computing,
Proliferation ofMobile and Wireless Devices, Trends in Mobility, Credit Card
Frauds in
Mobile and Wireless Computing Era, Security Challenges Posed byMobile Devices,
Registry Settings for Mobile Device s, AuthenticationService Security, Attacks on
Mobile/Cell Phones, Mobile Devices:Security Implications for Organizations,
Organizational Measures forHandling Mobile, Devices -Related Security Issues,
OrganizationalSecurity Policies and Measures in Mobile Co mputing Era, Laptops 9
03 Tools and Methods Used in Cyberline
Phishing, Password Cracking, Keyloggers and Spywares, Virus and Worms,
Steganography, DoS and DDoS Attacks, SQL Injection, Buffer Over Flow, Attacks
on Wireless Networks, Phishing, Identity Th eft (ID Theft) 6
04 The Concept of Cyberspace
E-Commerce , The Contract Aspects in Cyber Law ,The Security Aspect of Cyber
Law ,The Intellectual Property Aspect in Cyber Law
, The Evidence Aspect in Cyber Law , The Criminal Aspect in Cyber Law, Global
Trends in Cyber Law , Legal Framework for Electronic Data Interchange Law
Relating to Electronic Banking , The Need for an Indian Cyber Law 8
05 Indian IT Act.
Cyber Crime and Criminal Justice : Penalties, Adjudication and Appeals Under the
IT Act, 2000 , IT Act. 2008 and its Amendments 6
06 Information Security Standard compliances
SOX, GLBA, HIPAA, ISO, FISMA, NERC, PCI. 6


Page 34

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination.
In ques tion paper weightage of each module will be proportional to number of respective
lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supp osed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four question need to be solved.



REFERENCES:
1. Nina Godbole, Sunit Belapure, Cyber Security , Wiley India, New Delhi
2. The Indian Cyber Law by Suresh T. Vishwanathan; Bharat Law House New Delhi
3. The Information technology Act, 2000; Bare Act - Professional Book Publishers, New Delhi.
4. Cyber Law & Cyber Crimes By Advocate Prashant Mali; Snow White Publications, Mumbai
5. Nina Godbole, Information Systems Security, Wiley India, New Delhi
6. Kennetch J. Knapp, Cyber Security &Global Information Assurance Information Science
Publishing.
7. William Stallings , Cryptography and Network Security, Pearson Publication
8. Websites for more information is available on : The Information Technology ACT, 2008 -
TIFR : https://www.tifrh.res.in
9. Website for more information , A Compliance Primer for IT professional :
https://www.sans.org/reading -room/whitepapers/compliance/compliance -primer -
professionals -33538

Page 35

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Course Code Course Name Credits
ILO 1017 Disaster Management and Mitigation Measures 03
Objectives:
1. To understand physics and various types of disaster occurring around the world
2. To identify extent and damaging capacity of a disaster
3. To study and understand the means of losses and methods to overcome /minimize it.
4. To understand role of individual and various organization during and after disaster
5. To understand application of GIS in the field of disaster management
6. To understand the emerg ency government response structures before, during and after
disaster
Outcomes: Learner will be able to…
1. Get to know natural as well as manmade disaster and their extent and possible effects on
the economy.
2. Plan of national importance structures based upon the previous history.
3. Get acquainted with government policies, acts and va rious organizational structure
associated with an emergency.
4. Get to k now the simple do’s and don’ts in such extreme events and act a ccordingly.

Module Detailed Contents Hrs
01 Introduction
1.1 Definition of Disaster, hazard, global and Indian scenario, general
perspective, importance of study in human life, Direct and indirect effects of
disasters, long term effects of disasters. Introduction to global warming and
climate change. 03
02 Natural Disaster and Manmade disasters:
2.1 Natural Disaster: Meaning and nature of natural disaster, Flood, Flash flood,
drought, cloud burst, Earthquake, Landslides, Avalanches, Volcanic
eruptions, Mudflow, Cyclone, Storm, Storm Surge, climate change, globa l
warming, sea level rise, ozone depletion
2.2 Manmade Disasters: Chemical, Industrial, Nuclear and Fire Hazards. Role of
growing population and subsequent industrialization, urbanization and
changing lifestyle of human beings in frequent occurrences of manmade
disasters. 09
03 Disaster Management, Policy and Administration
3.1 Disaster management: meaning, concept, importance, objective of disaster
management policy, disaster risks in India, Paradigm shift in disaster
management.
3.2 Policy and administration:
Importance and principles of disaster management policies, command and
co-ordination of in disaster management, rescue operations -how to start with
and how to proceed in due course of time, study of flowchart showing the
entire process. 06
04 Institutional Framework for Disaster Management in India:
4.1 Importance of public awareness, Preparation and execution of emergency
management programme.Scope and responsibilities of National Institute of
Disaster Management (NIDM) and National disaster management authority
(NDMA) in India.Methods and measures to avoid disasters, Management of
casualties, set up of emergency facilities, importance of effective
communication amongst different agencies in such situations. 06

Page 36

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
4.2 Use of Internet and softwares for effective disaster management.
Applications o f GIS, Remote sensing and GPS in this regard.
05 Financing Relief Measures:
5.1 Ways to raise finance for relief expenditure, role of government agencies and
NGO’s in this process, Legal aspects related to finance raising as well as
overall management of disasters. Various NGO’s and the works they have
carried out in the past on t he occurrence of various disasters, Ways to
approach these teams.
5.2 International relief aid agencies and their role in extreme events. 09
06 Preventive and Mitigation Measures:
6.1 Pre -disaster, during disaster and post -disaster measures in some even ts in
general
6.2 Structural mapping: Risk mapping, assessment and analysis, sea walls and
embankments, Bio shield, shelters, early warning and communication
6.3 Non Structural Mitigation: Community based disaster preparedness, risk
transfer and risk financing, capacity development and training, awareness
and education, contingency plans.
6.4 Do’s and don’ts in case of disasters and effective implementation of relief
aids. 06

Assessment :
Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respective lecture hours as mention in the syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questio ns will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

REFERENCES:
1. ‘Disaster Management’ by Harsh K.Gupta, Universities Press Public ations.
2. ‘Disaster Management: An Appraisal of Institutional Mechanisms in India’ by O.S.Dagur,
published by Centre for land warfare studies, New Delhi, 2011.
3. ‘Introduction to International Disaster Management’ by Damon Copolla, Butterworth
Heinemann Elseve ir Publications.
4. ‘Disaster Management Handbook’ by Jack Pinkowski, CRC Press Taylor and Francis group.
5. ‘Disaster management & rehabilitation’ by Rajdeep Dasgupta, Mittal Publications, New
Delhi.
6. ‘Natural Hazards and Disaster Management, Vulnerability and Mitigation – R B Singh,
Rawat Publications
7. Concepts and Techniques of GIS –C.P.Lo Albert, K.W. Yonng – Prentice Hall (India)
Publications.
(Learners are expected to refer reports published at national and International level and updated
information available on authentic web sites)



Page 37

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Course Code Course Name Credits
ILO 1018 Energy Audit and Management 03

Objectives:
1. To understand the importance energy security for sustainable development and the
fundamentals of energy conservation.
2. To introduce performance evaluation criteria of various electrical and thermal installations to
facilitate the energy management
3. To relate the data collected during performance evaluation of systems for identification of
energy saving opportunities.

Outcomes: Learner will be able to…
1. To identify and describe present state of energy security and its importance.
2. To identify and describe the basic principles and methodologies adopted in energy audit of an
utility.
3. To describe the energy performance evaluat ion of some common electrical installations and
identify the energy saving opportunities.
4. To describe the energy performance evaluation of some common thermal installations and
identify the energy saving opportunities
5. To analyze the data collected during performance evaluation and recommend energy saving
measures

Module Detailed Contents Hrs
01 Energy Scenario:
Present Energy Scenario, Energy Pricing, Energy Sector Reforms, Energy Security,
Energy Conservation and its Importance, Energy Conservation Act -2001 and its
Features. Basics of Energy and its various forms, Material and Energy balance 04
02 Energy Audit Principles:
Definition, Energy audit - need, Types of energy audit, Energy management (audit)
approach -understanding energy costs, Bench marking, Energy performance, Matching
energy use to requirement, Maximizing system efficiencies, Optimizin g the input
energy requirements, Fuel and energy substitution. Elements of monitoring& targeting;
Energy audit Instruments; Data and information -analysis.
Financial analysis techniques: Simple payback period, NPV, Return on investment
(ROI), Internal rate of return (IRR) 08
03 Energy Management and Energy Conservation in Electrical System:
Electricity billing, Electrical load management and maximum demand Control; Power
factor improvement, Energy efficient equipments and appliances, star ratings.
Energ y efficiency measures in lighting system, Lighting control: Occupancy sensors,
daylight integration, and use of intelligent controllers.
Energy conservation opportunities in: water pumps, industrial drives, induction motors,
motor retrofitting, soft starters, variable speed drives. 10
04 Energy Management and Energy Conservation in Thermal Systems:
Review of different thermal loads; Energy conservation opportunities in: Steam
distribution system, Assessment of steam distribution losses, Steam leakag es, Steam
trapping, Condensate and flash steam recovery system.
General fuel economy measures in Boilers and furnaces, Waste heat recovery, use of
insulation - types and application. HVAC system: Coefficient of performance, Capacity,
factors affecting Refr igeration and Air Conditioning system performance and savings
opportunities. 10

Page 38

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
05 Energy Performance Assessment:
On site Performance evaluation techniques, Case studies based on: Motors and variable
speed drive, pumps, HVAC system calculations; Lighting System: Installed Load
Efficacy Ratio (ILER) method, Financial Analysis. 04
06 Energy conservation in Buildings:
Energy Conservation Building Codes (ECBC): Green Building, LEED rating,
Application of Non -Conventional and Renewable Energy Sources 03

Assessment :

Internal:
Assessment consists of two tests out of which; one should be compulsory class test and the other is
either a class test or assignment on live problems or course project.

End Semester Theory Examination:
Some guidelines for setting up the question paper. Minimum 80% syllabus should be covered in
question papers of end semester examination. In question paper weightage of each module will be
proportional to number of respective lecture hours as mention in th e syllabus.
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from module 3 then
part (b) will be from any module other than module 3)
4. Only Four question need to be solved.


REFERENCES:
1. Handbook of Electrical Installation Practice, Geofry Stokes, Blackwell Science
2. Designing with light: Lighting Handbook, By Anil Valia, Lighting System
3. Energy Management Handbook, By W.C. Turner, John Wiley and Son s
4. Handbook on Energy Audits and Management, edited by A. K. Tyagi, Tata Energy
Research Institute (TERI).
5. Energy Management Principles, C.B.Smith, Pergamon Press
6. Energy Conservation Guidebook, Dale R. Patrick, S. Fardo, Ray E. Richardson, Fairmont
Press
7. Handbook of Energy Audits, Albert Thumann, W. J. Younger, T. Niehus, CRC Press
8. www.energymanagertraining.com
9. www.bee -india.nic.in







Page 39

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISL 101 Computational
Laboratory -I -- 02 -- 01 -- -- 01
Examination Scheme
Theory Examination
Term
Work Pract Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
-- -- -- -- 25 25 50


Subject teacher shall design mini projects based on core subjects.
Design and implement using latest 64 -bit C++/JAVA/ Python programming tools.
Use development tools such as MATLAB/OPENCV/Wireshark/VNC/PUTTY or equivalent
may be used if required to interface the developed classes to the s imulators.
Develop a mini project based on java socket programming.



Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISL102
DEC
Laboratory -I -- 02 -- 01 -- -- 01
Examination Scheme
Theory Examination
Term
Work Pract Total Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
-- -- -- -- 25 25 50


Students should study the tools and techniques related to the elective subject.
Students should complete a mini project based on the elective subject using various tools.








Page 40

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC201 Internet
Routing Design 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract Oral Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- --
Course Objectives:
1. To understand in depth Routing protocols used on Internet
2. To know about routing related issues on Internet
3. To develop the thinking about how to analyze Network Algorithms
4. To become familiar with the concepts of Traffic Engineering

Course Outcomes: Learner will able to –
 gain knowledge about various Routing protocols used on Internet.
 design Routing protocol for Internet.
 demonstrate the technical competence necessary for solving problems in Routing on
Internet.
Sr. No. Module Detailed content Hours
1 Networking and
Network Routing:
An Introduction
Addressing and Internet Service: An Overview, Network
Routing, IP Addressing, Service Architecture, Protocol
Stack Architecture, Router Architecture, Network
Topology, Architecture, Network Management
Architecture, Public Switched Telephone.

8
2 Routin g Algorithms OSPF and Integrated IS -IS: OSPF: Protocol Features,
OSPF Packet Format, Integrated IS -IS, Key Features,
comparison BGP: Features, Operations, Configuration
Initialization, phases, Message Format. IP Routing and
Distance Vector Protocol Family: RIPv1 and RI Pv2.
8
3 Routing Protocols
:Framework and
Principles
Routing Protocol, Routing Algorithm, and Routing
Table, Routing Information Representation and
Protocol Messages .
Internet Routing and Router Architectures:
Architectural View of the Internet, Allocation of IP
Prefixes and AS Number, Policy -Based Routing, Point
of Presence, Router Architectures: Functions, Types,
Elements of a Router, Packet Flow, and Packet
Processing: Fast Path versus Slow Path, Router
Archi tectures.
8
4 Analysis of Network
Algorithms
Network Bottleneck, Network Algorithmic, Thinking
Algorithmically, Refining the Algorithm, Cleaning up,
Characteristics of Network Algorithms. IP Address
Lookup Algorithms : Impact, Address Aggregation,
10

Page 41

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016

Text Books:
1. Network Routing: Algorithms, Protocols, and Architectures Deepankar Medhi and
Karthikeyan Ramasamy (Morgan Kaufmann Series in Networking)
2. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked
Devices George Varghese ( Morgan Kaufmann Series in Networking)
Reference Books :
1. Sam Halabi and Danny McPherson, Internet Routing Architecture, Second Edition, Cisco
Press

Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.

Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.
Longest Prefix Matching, Naïve Algorithms, Binary,
Multi -bit and Compressing Multi -bit Tries, Search by
Length Algorithms, Search by Value Approaches,
Hardware Algorithms, Comparing Different
Approaches.
IP Packet Filtering and Classification: Classificat ion,
Classification Algorithms, Naïve Solutions, Two -
Dimensional Solutions, Approaches for d Dimensions.
5 Quality of Service
Routing
QoS Attributes, Adapting Routing: A Basic
Framework. Update Frequency, Information
Inaccuracy, and Impact on Routing, Dynamic Call
Routing in the PSTN, Heterogeneous Service, Single -
Link Case, A General Framework for Source -Based
QoS Routing with Path Cach ing
8
6 Routing and Traffic
Engineering
Traffic Engineering of IP/MPLS Networks, VPN
Traffic Engineering, Problem Illustration: Layer 3
VPN, LSP Path Determination: Constrained Shortest
Path Approach, LSP Path Determination: Network
Flow Modeling Approach, Layer 2 VPN Traffic
Engineering, 6

Page 42

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC202 Mobile
Wireless
Security 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract Oral Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- --

Course Objectives:
1. Gain in -depth knowledge on wireless and mobile network security and its relation to
the new security based protocols.
2. Design secured wireless and mobile networks that optimize accessibility with
minimizing vulnerability to security risks.
3. Apply proactive and defensive measures to counter potential threats, attacks and
intrusions.
4. Gain a broad knowledge regarding real -world security architectures of WLANs,
GSM, UMTS, WSNs, RFIDs etc.
Course Outcomes: Learner will able to -
 Diagnose distributed denial -of-service attacks and specify mitigation techniques.
 Explain the vulnerabilities introduced into an infrastructure by wireless and cellular
technologies .
 Knowledge of cloud security and fundamental of architecture
Sr. No. Module Detailed Content Hours

1

Introduction
Security and Privacy for Mobile and Wireless
Networks: Introduction - State of the Art - Areas
for Future Re search - general recommendation
for r esearch. pervasive Systems: Enhancing
Trust Negotiation With Privacy Support: Trust
Negotiation - Weakness of Trust Negotiation -
Extending Trust Negotiation to Support
Privacy 8

2
Mobile Security
Mobile system architectures, Overview of
mobile cellular systems, GSM and UMTS
Security & Attacks, Vulnerabilities in Cellular
Services, Cellular Jamming Attacks &
Mitigation, Security in Cellular VoIP Services,
Mobile application security. 8

Page 43

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
3
Securing Wireless
Networks
Overview of Wireless security, Scanning and
Enumerating 802.11 Networks, Attacking
802.11 Networks, Attacking WPA protected
802.11 Networks, Bluetooth Scanning and
Reconnaissance, Bluetooth Eavesdropping,
Attacking and Exploiting Bluetooth, Zigbee
Security, Zigbee Attacks 8
4 Cloud Security
Fundamental and
Architecture
Cloud information security objectives, cloud
security services, Relevant cloud security
design principl e, secure cloud software
requirement, cloud security policy
implementation, Architecture consideration,
Identity management and access control 8
5 RFID Security Introduction, RFID Security And Privacy,
RFID Chips, Techniques and Protocols, Man
in the Middle Attacks On RFID Systems, User
Centric Security f or RFID b ased Distributed
System, Optimizing RFID Protocols f or Low
Information Leakage. 8
6 Security in Mobile
Ad-hoc Networks Introduction, Background and Related work:
Detection, identification, and isolation of
malicious nodes, Secure and QOS -aware
routing, Comprehensive Software/Hardware
Schemes for Security in Ad -hoc Networks:
Detecting misbehavior, identifying and
isolating malicious nodes: Software
Monitoring, Hardware Monitor ing 8


Text Books:
1. Ronald L. Krutz, Russell Dean Vines, “Cloud Security: A Comprehensive guide to
secure cloud computing”, Wiley.
2. Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy”,
Springer, 2007.

Reference Books:

1. C.Siva Ram Murthy, B.S. Manoj, “Adhoc Wireless Networks Architectures
and Protocols”, Prentice Hall, 2004.
2. Kitsos, Paris; Zhang, Yan , “RFID Security Techniques, Protocols and System -
On-Chip Design ”, 2008.
3. Johny Cache, Joshua Wright and Vincent Liu , “Hacking Wireless Exposed:
Wireless Security Secrets & Solutions”, second edition, McGraw Hill, 2010.


Internal Assessment: Assessment consists of two tests out of which; one should be
compulsory class test (on minimum 02 Modules) and the other is either a class test or
assignment on live problems or course project.


Page 44

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016


Theory Examination:
1. Question paper will comprise of total six question
2. All question carry equal marks
3. Questions will be mixed in nature (for example supposed Q.2 has part (a) from
module 3 then part (b) will be from any module other than module 3)
4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of
respective lecture hours as mention in the syllabus.




























Page 45

University of Mumbai M . E. (Computer Network & Information Security) , Rev. 2016
Subject Code Subject Name Teaching Scheme
(Contact Hours) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
CISC203 Web
Application
Security 04 -- -- 04 -- -- 04
Examination Scheme
Theory Examination
Term
Work Pract Oral Internal Assessment End
Sem
Exam Test 1 Test 2 Avg
20 20 20 80 -- -- --

Course Objectives :
1. Understand the need for security in web application development
2. Learn the various security threats and countermeasures to web applications
3. Design and Develop secured web applications
Course Outcomes: Learner will able to -
 Demonstrate knowledge about the principles of web security, browser security,
database security and secure software engineering.
 Build up same origin policy and cross origin resource sharing
 Develop the technical competence necessary for web application security

Sr. No. Module Detailed content Hours
1 Introduction Network security versus Application security,
open web application security projects, Security
fundamentals: Input validation, Attack surface
reduction, classifying and prioritizing threats.
8

2 Web application
security
principles Authentication: Access Control overview,
authentication fundamentals, two factor and three
factor authentication, web application
authentication, securing password based
authentication, secure authentication best
practices. Authorization: Access control ,
Authorization, session management, authorization
fundamentals, authorization goals, types of
permissions, Authorization layers, controls by
layer, client site attack
8
3 Browser
Security
Principles Defining the same origin policy, Exceptions to the
same origin policy: HTML