18EI3011
DISTRIBUTED EMBEDDED COMPUTING
L 3
T 0
P 0
C 3
Course Objectives 1. To expose the students to the fundamentals of Network, communication technologies and distributed computing. 2. To teach the fundamentals of Internet 3. To study on Java based Networking and distributed computing Course Outcomes: After the completion of this course the student will be able to: 1. Understand the fundamentals of distributed system 2. Comprehend the concepts of software architecture and internet concepts 3. Recall the concepts of embedded JAVA 4. Examine the concepts of distributed computing 5. Analyze security concepts in embedded systems. 6. Apply JAVA programming for home based automation Module 1: Distributed System (7 Hours) Introduction- Communication in distribution system-Client/Server Model-Synchronization in distributed system Module 2: Software Architecture & Internet concepts (8 Hours) Internet protocol- Hardware & software of internet- Internet security- IP addressing- Interfacing internet server applications to corporate database HTML and XML. Module 3: Embedded JAVA (8 Hours) Overview of JAVA – Programs- Multithreaded programming- APPLET programming- I/O streaming RMI- Introduction to Embedded JAVA Module 4: Distributed Computing (8 Hours) Definition- Model of distributed computation- Distributed shared memory- Authentication in distributed system Module 5: Security in computing (8 Hours) Security meaning- Threads in networks- Network security control- Firewall- Authentication- E-mail security- Security in web services- Case studies Module 6: Web based home automation (6 Hours) Components of Distributed Embedded - Protocols & Standards - Hardware/Software selection for Distributed Embedded –case study: Web based Home Automation References: 1. Andrew S. Tanenbaum, “Distributed operating systems”, Pearson 2013 2. E Balagurusamy,” Programming with JAVA”, Mc Graw Hill 2013 3. Ajay D Kshemkalyani,Mukesh Singhal, “Distributed Computing” – Principles, Algorithm and systems, Cambridge university press 2008 4. Charles P. Pfleeger, “Security in Computing”, Pearson 2009. 18EI3012
WIRELESS AND MOBILE COMMUNICATION
L 3
T 0
P 0
C 3
Course Objectives: 1. To introduce the fundamentals of wireless and mobile communication technologies. 2. To study the different protocols used in wireless and mobile communication 3. To address the challenges in data transmission security Outcomes: 1. Student will be able to classify the different medium access methods and illustrate the need of different medium access methods 2. Student will be able to explain the architecture of different wireless and mobile platforms 3. Student will be able to Investigate the use of different wireless protocols in different applications 4. Student will be able to describe the concept of routing and discuss the issues in routing 5. Student will be able to express the layered structure and model of different protocols of transport layer and application layer 6. Student will be able to comprehend the challenges and issues in information security and suggest different protocols for secure data transmission
Instrumentation Engineering