Page 65 - B.Tech IT Curriculum and Syllabus R2017 - REC
P. 65
Department of IT, REC
OUTCOMES:
At the end of the course, the student should be able to:
1. The methods of conventional encryption and Number Theory.
2. The concepts of Public Key Encryption.
3. Methodology for Authentication and Hashing.
4. Comprehending System Level Securities.
5. Perceiving Wireless Security.
TEXT BOOKS:
1. William Stallings , Cryptography and Network Security-Principles and Practices, Seventh
Edition, Pearson Education, 2017
2. Christo Paar and Jan Pelzl ,Understanding Cryptography: A Textbook for Students and
Practioners, First Edition, Springer, 2010
3. Joxean Koret and Elias Bachaalany, The Antivirus Hackers Handbook, First Edition, Wiley,
2015
REFERENCES:
1. Yehuda Lindell and Jonathan Katz, Introduction to Modern Cryptography, Second Edition,
CRC Press, 2015
2. Bruce Schneier , Applied Cryptography: Protocols, Algorithms and Source Code in C, Special
Edition, Wiley, 2015
3. Atul Kahaet, Cryptography and Network Security, Third Edition, Tata McGraw-Hill, 2013
4. Imran Bashir, Mastering Blockchain: Deeper insights into decentralization, cryptography,
bitcoin and popular Blockchain frameworks, First Edition, Packt, 2017
IT17602 MOBILE COMMUNICATION L T P C
3 0 0 3
OBJECTIVES:
Understand the basic concepts of mobile computing
Be familiar with the network protocol stack
Learn the basics of mobile telecommunication
Be exposed to Ad-Hoc networks
Gain knowledge about different mobile platforms and application development
UNIT I WIRELESS COMMUNICATION 7
Cellular systems- Frequency Management and Channel Assignment- types of handoffand their
characteristics, dropped call rates & their evaluation -MAC – SDMA – FDMA –TDMA – CDMA –
Cellular Wireless Networks
UNIT II WIRELESS NETWORKS 9
Wireless LAN – IEEE 802.11 Standards – Architecture – Services – Mobile Ad hoc Networks- WiFi
and WiMAX - Wireless Local Loop
UNIT III MOBILE COMMUNICATION SYSTEMS 11
GSM-architecture-Location tracking and call setup- Mobility management- Handover-Security-GSM
SMS –International roaming for GSM- call recording functions-subscriberand service data mgt –-
Mobile Number portability -VoIP service for Mobile Networks –GPRS –Architecture-GPRS
procedures-attach and detach procedures-PDP contextprocedure-combined RA/LA update
procedures-Billing
Curriculum and Syllabus | B.Tech. Information Technology | R2017 Page 65

