Preview

tcp/ip

Satisfactory Essays
Open Document
Open Document
5243 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
tcp/ip
ANNA UNIVERSITY, CHENNAI
AFFILIATED INSTITUTIONS

R - 2009
M.E.COMPUTER SCIENCE AND ENGINEERING
I SEMESTER (FULL TIME) CURRICULUM AND SYLLABI
SEMESTER I
SL. COURSE
NO
CODE
THEORY
1
MA9219
2
CS9211
3
CS9212
4
SE9213
5
CS9213
PRACTICAL
6
CS 9215
7
CS9216

COURSE TITLE

L

T

P

C

Operations Research
Computer Architecture
Data Structures and Algorithms
Object Oriented Software Engineering
Computer Networks and Management

3
3
3
3
3

1
0
0
0
0

0
0
0
0
0

4
3
3
3
3

Data Structures Lab
Networking Lab

0
0
15

0
0
1

3
3
6

2
2
20

TOTAL

LIST OF ELECTIVES FOR M.E.COMPUTER SCIENCE AND ENGINEERING*
SL.
NO
1
2
3
4
5
6
7

COURSE
CODE
CS9251
CS9252
CS9253
CS9254
CP9264
CS9256
CS9257

8
9
10
11
12
13
14
15

CS9258
CS9259
CS9260
CS9261
CS9262
CS9263
CS9264
CS9265

16
17
18
19
20

CS9266
CS9267
CS9268
CS9269
CS9270

COURSE TITLE
Mobile Computing
Grid Computing
Theory of Computation
Soft Computing
Distributed Computing
Multimedia Systems
XML and Web Services

L
3
3
3
3
3
3
3

T
0
0
0
0
0
0
0

P
0
0
0
0
0
0
0

C
3
3
3
3
3
3
3

Bio Informatics
Network Security
Embedded Systems
Digital Imaging
Software Quality Assurance
Ad-hoc Networks
Data Warehousing and Data Mining
Performance Evaluation of Computer Systems and Networks
Agent Based Intelligent Systems
Visualization Techniques
Advanced Databases
Software Project Management
Component Based Technology

3
3
3
3
3
3
3
3

0
0
0
0
0
0
0
0

0
0
0
0
0
0
0
0

3
3
3
3
3
3
3
3

3
3
3
3
3

0
0
0
0
0

0
0
0
0
0

3
3
3
3
3

1

MA9219

OPERATIONS RESEARCH

LTPC
3104

UNIT I
QUEUEING MODELS
9
Poisson Process – Markovian Queues – Single and Multi-server Models – Little’s formula –
Machine Interference Model – Steady State analysis – Self Service Queue.
UNIT II
ADVANCED



References: 1. Ramesh, Gopalaswamy, "Managing Global Projects", Tata McGraw Hill, 2001. 1. “Component Software: publishers, 2003. 1. Ed Roman, “Enterprise Java Beans”, Third Edition , Wiley , 2004.

You May Also Find These Documents Helpful

  • Powerful Essays

    The total number of network and subnet bits equal an address’s prefix. If a Class A address of 10.10.33.46 has a mask of 255.255.224.0, then all of the 1s in the binary form of that mask, which totals 19, would be the prefix. In CIDR notation, the address would be seen as 10.10.33.46/19.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Chapter 11 Chapter 12 Chapter 13 Chapter 14 Chapter 15 Chapter 16 Chapter 17 Chapter 18 Chapter 19 Chapter 20 Chapter 21 Chapter 22 Chapter 23 Chapter 24 Chapter 25 Chapter 26 Chapter 27 An Introduction to Hardware, Software, and the Internet An Introduction to Software Development Objects and Classes Algorithms Java Syntax and Style Data Types, Variables, and Arithmetic Boolean Expressions and if-else Statements Iterative Statements: while, for, do–while Implementing Classes and Using Objects Strings Class Hierarchies and Interfaces Arrays…

    • 3908 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet Protocol (IP) sits in the middle of the five-layer TCP/IP model. IT provides service to the layers above it and receives services from the layers below it. Almost every computing device on the planet communicates in some way, and most of those use IP. IP exists as an Internet standard protocol, also called ipv4, although it is mostly just referred to as IP. IP was created in the 1970s, but did not reach standard status as the IPv4 RFC until the 1980s.…

    • 360 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The “Internal Use Only” data classification includes the User Domain, the Work Station Domain, and the LAN domain. These domains are the most simple IT Infrastructure domains, and they will cover all the users and workstations in the company. The “Internal Use Only” classification will cover information like the company telephone directory, new employee training materials, and internal policy manuals.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It210 Syllabus

    • 2333 Words
    • 10 Pages

    College of Information Systems & Technology IT/210 Version 5 Fundamentals of Programming With Algorithms and Logic…

    • 2333 Words
    • 10 Pages
    Good Essays
  • Powerful Essays

    Behavior of TCP

    • 1860 Words
    • 8 Pages

    In this lab, we’ll investigate the behavior of TCP in detail. We’ll do so by analyzing a trace of the TCP segments sent and received in transferring a 150KB file (containing the text of Lewis Carrol’ s Alice’s Adventures in Wonderland) from your computer to a remote server. We’ll study TCP’s use of sequence and acknowledgement numbers for providing reliable data transfer; we’ll see TCP’s congestion control algorithm – slow start and congestion avoidance – in action; and we’ll look at TCP’s receiver-advertised flow control mechanism. We’ll also briefly consider TCP connection setup and we’ll investigate the performance (throughput and round-trip time) of the TCP connection between your computer and the server.…

    • 1860 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    CS 220 – Programming w/ Data Structures: You have missed one assignment and one quiz. Your instructor has extended your assignment due date to this Sunday, April 10. Your instructor has also let you to take your Quiz # 2 during his office hours during this week. Let me know if you need additional support to study for this quiz. Your grade to date in this class is 30.2/37 81.62% B.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A standardized test is an examination that is given by a regular or standard method. Standardized tests are intended to have constant questions, control systems, and scoring systems. When a standardized test is administered, is it done according to specific rules and terms so that testing requirements are the same for all test takers. Standardized tests come in various forms, such as standardized conversations, questionnaires, or directly given intelligence tests. The main advantage of standardized tests is that they are typically more stable and efficient than non-standardized measures.…

    • 1409 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    - It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.…

    • 10013 Words
    • 41 Pages
    Powerful Essays
  • Good Essays

    Transmission Control Protocol (TCP) is the utmost universally protocol that is used on the Internet. The cause on behalf of this is that TCP gives fault rectification. An assurance of conveyance is tantamount with TCP. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data, “called packets” that a message is divided into four efficient routing through the Internet. This is accredited fundamentally in reference to a process termed “flow control.”…

    • 967 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Networking

    • 1332 Words
    • 6 Pages

    Computer networking is the engineering discipline concerned with the communication between computer systems or devices. A computer network is any set of computers or devices connected to each other with the ability to exchange data. It is sometimes considered a sub-discipline of telecommunications, computer science, information technology and computer engineering since it relies heavily upon the theoretical and practical application of these scientific and engineering disciplines. There are three types of networks namely: Internet, intranet, and extranet.…

    • 1332 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ic Number Display

    • 13097 Words
    • 53 Pages

    9 => 0 => A => 6 => B => 1 => C => D => 5 => 7 => 4 => E…

    • 13097 Words
    • 53 Pages
    Satisfactory Essays
  • Powerful Essays

    Steinbrook, R. (2009). Health care and the american recovery and reinvestment act. The New England Journal of Medicine, 360(11), 1057-1060. doi:10.1056/NEJMp0900665…

    • 4993 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Networking

    • 5715 Words
    • 23 Pages

    Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy.…

    • 5715 Words
    • 23 Pages
    Good Essays
  • Satisfactory Essays

    There may arise some issues when setting up a computer on a network. One of the most common is the inability to see items on the network. There are a few things that can be done. The first thing is to insure that the workstation is indeed connected to the network. Start with the workstation and check the hardware on the computer. Check and make sure that the IP address is the same range as the rest of the network. Check the domain name or workgroup name to make sure that it is correct. Then check the wire. This is a common issue that can be fixed by simply replacing the Ethernet cable. If it is not the cable, then it may be time to check…

    • 457 Words
    • 2 Pages
    Satisfactory Essays