Page 63 - B.E CSE Curriculum and Syllabus R2017 - REC
P. 63

Department of CSE, REC



               2.  M. Tim Jones, Artificial Intelligence: A Systems Approach (Computer Science), Jones and Bartlett
                   Publishers, Inc.; First Edition, 2008.

            REFERENCES:
               1.  I.  Bratko,  Prolog:  Programming  for  Artificial  Intelligence,  Fourth  edition,  Addison-Wesley
                   Educational Publishers Inc., 2011.
               2.  Nils J. Nilsson, The Quest for Artificial Intelligence, Cambridge University Press, 2009.
               3.  William F. Clocksin and Christopher S. Mellish, Programming in Prolog: Using the ISO Standard‖,
                   Fifth Edition, Springer, 2003.
               4.  Gerhard Weiss, Multi Agent Systems, Second Edition, MIT Press, 2013.
               5.  David  L.  Poole  and  Alan  K.  Mackworth,  Artificial  Intelligence:  Foundations  of  Computational
                   Agents‖, Cambridge University Press, 2010.


            CS 17603                                         MOBILE COMPUTING                                      L T P C
                                                                                                                                         3 0 0 3

            OBJECTIVES:
               ●  To learn about the principles, characteristics, trends, latest development, systems issues and different
                   technologies in mobile computing Technology.
               ●  To illustrate different architecture technologies involved in mobile computing.
               ●  To illustrate different Transmission, Transaction technologies involved in mobile computing.
               ●  To design successful mobile and pervasive computing applications and services.
               ●  To explore Mobile security issues.

            UNIT I        INTRODUCTION                                                                                            9
            Wired, Wireless and Mobile Computing, Mobile Computing Device, Issues, Characteristics and Applications,
            Technology  1G  to  5G,  Characteristics  of  wireless  channel,  Antennas,  Signal  Propagation,  Multiplexing,
            Modulation, Spread Spectrum, Satellite Networks, Reference Models.

            UNIT II       MEDIUM ACCESS CONTROL                                                                      9
            Motivation  for  MAC,  Frequency  Allocation,  FDMA,  TDMA,  CDMA,  Capacity  Allocation,  GSM  –
            Architecture  –  Protocols  –  Localization  and  calling,  Handover,  Connection  Establishment  –Routing,  data
            services, DECT 130, TETRA, UMTS and IMT-2000

            UNIT III      WIRELESS LAN                                                                                              9
            IEEE  802.11  Standard-Architecture  –  Services  –  Ad-Hoc  Network–  Blue  Tooth,  Mobile  IP  –  DHCP  –
            Proactive  and  Reactive  Routing  Protocols,  Multicast  Routing,  Mobile  TCP-  Traditional  TCP,  Congestion
            control,  Slow  start,  Fast  retransmit/fast  recovery,  Implications  of  mobility,  Classical  TCP  improvements-
            Indirect  TCP,  Snooping  TCP,  Mobile  TCP,  Transmission/time-out  freezing,  Selective  retransmission,
            Transaction-oriented TCP, TCP over Adhoc Networks, MQTT protocol

            UNIT IV       WIRELESS APPLICATION PROTOCOL                                                    9
            WAP  –  Architecture  –  WWW  Programming  Model  –WDP  –  WTLS  –  WTP  –  WSP  –  WAE  –  WTA
            Architecture  –  WML  –  WML  scripts.  Mobile  Adaptive  Computing,  Data  Dissemination  Management,
            Context  Aware Computing, Mobile Middleware, Application Development-  Adaptation and  Agents, MQM
            Scripts, Introduction to Circle CI, AWDB.

            UNIT V        SECURITY                                                                                                         9
            Approaches of Security, Security in Wireless- Personal, Local, Metropolitan, Wide Area network, Security
            requirements, Issues and challenges in security, provisioning, Network security attacks, Security routing.
                                                                                           TOTAL: 45 PERIODS

            OUTCOMES:
            On successful completion of this course, the student will be able to:


            Curriculum and Syllabus | B.E. Computer Science and Engineering | R2017                    Page 63
   58   59   60   61   62   63   64   65   66   67   68