2 minute read

18EI3011 Distributed Embedded Computing 3:0:0 3

L T P C 3 0 0 3

18EI3012 WIRELESS AND MOBILE COMMUNICATION L 3 T 0 P 0 C 3

Course Objectives

1. To expose the students to the fundamentals of Network, communication technologies and distributed computing. 2. To teach the fundamentals of Internet 3. To study on Java based Networking and distributed computing Course Outcomes: After the completion of this course the student will be able to: 1. Understand the fundamentals of distributed system 2. Comprehend the concepts of software architecture and internet concepts 3. Recall the concepts of embedded JAVA 4. Examine the concepts of distributed computing 5. Analyze security concepts in embedded systems. 6. Apply JAVA programming for home based automation

Module 1: Distributed System (7 Hours)

Introduction- Communication in distribution system-Client/Server Model-Synchronization in distributed system

Module 2: Software Architecture & Internet concepts (8 Hours)

Internet protocol- Hardware & software of internet- Internet security- IP addressing- Interfacing internet server applications to corporate database HTML and XML. Module 3: Embedded JAVA (8 Hours) Overview of JAVA – Programs- Multithreaded programming- APPLET programming- I/O streaming RMI- Introduction to Embedded JAVA

Module 4: Distributed Computing (8 Hours)

Definition- Model of distributed computation- Distributed shared memory- Authentication in distributed system

Module 5: Security in computing (8 Hours)

Security meaning- Threads in networks- Network security control- Firewall- Authentication- E-mail security- Security in web services- Case studies

Module 6: Web based home automation (6 Hours)

Components of Distributed Embedded - Protocols & Standards - Hardware/Software selection for Distributed Embedded –case study: Web based Home Automation

References:

1. Andrew S. Tanenbaum, “Distributed operating systems”, Pearson 2013 2. E Balagurusamy,” Programming with JAVA”, Mc Graw Hill 2013 3. Ajay D Kshemkalyani,Mukesh Singhal, “Distributed Computing” – Principles, Algorithm and systems, Cambridge university press 2008 4. Charles P. Pfleeger, “Security in Computing”, Pearson 2009.

Course Objectives:

1. To introduce the fundamentals of wireless and mobile communication technologies. 2. To study the different protocols used in wireless and mobile communication 3. To address the challenges in data transmission security

Outcomes:

1. Student will be able to classify the different medium access methods and illustrate the need of different medium access methods 2. Student will be able to explain the architecture of different wireless and mobile platforms 3. Student will be able to Investigate the use of different wireless protocols in different applications 4. Student will be able to describe the concept of routing and discuss the issues in routing 5. Student will be able to express the layered structure and model of different protocols of transport layer and application layer 6. Student will be able to comprehend the challenges and issues in information security and suggest different protocols for secure data transmission

This article is from: