0% found this document useful (0 votes)
49 views6 pages

Web and Network It

web

Uploaded by

ssmdevishree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views6 pages

Web and Network It

web

Uploaded by

ssmdevishree
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

1221536 WEB TECHNOLOGIES L T P C

2 0 2 3
COURSE OBJECTIVES:
 To understand different Internet Technologies
 To learn java-specific web services architecture
 To Develop web applications using frameworks
UNIT I WEBSITE BASICS, HTML 5, CSS 3, WEB 2.0 7
Web Essentials: Clients, Servers and Communication – The Internet – World wide web – HTTP
Request Message – HTTP Response Message – Web Clients – Web Servers – HTML5 – Tables –
Lists – Image – HTML5 control elements – Drag and Drop – Audio – Video controls - CSS3 – Inline,
embedded and external style sheets – Rule cascading – Inheritance – Backgrounds – Border
Images – Colors – Shadows – Text – Transformations – Transitions – Animations. Bootstrap
Framework
UNIT II CLIENT SIDE PROGRAMMING 6
Java Script: An introduction to JavaScript–JavaScript DOM Model-Exception Handling-
ValidationBuilt-in objects-Event Handling- DHTML with JavaScript- JSON introduction –
Syntax – Function Files.
UNIT III SERVER SIDE PROGRAMMING 5
Servlets: Java Servlet Architecture- Servlet Life Cycle- Form GET and POST actions- Session
Handling- Understanding Cookies- DATABASE CONNECTIVITY: JDBC.
UNIT IV PHP and XML 6
An introduction to PHP: PHP- Using PHP- Variables- Program control- Built-in functions- Form
Validation. XML: Basic XML- Document Type Definition- XML Schema, XML Parsers and Validation,
XSL ,
UNIT V INTRODUCTION TO ANGULAR and WEB APPLICATIONS FRAMEWORKS 6

Introduction to AngularJS, MVC Architecture, Understanding ng attributes, Expressions and data


binding, Conditional Directives, Style Directives, Controllers, Filters, Forms, Routers, Modules,
Services; Web Applications Frameworks and Tools – Firebase- Docker- Node JS- React- DjangoUI & UX.
COURSE OUTCOMES:
CO1: Construct a basic website using HTML and Cascading Style Sheets
CO2: Build dynamic web page with validation using Java Script objects and by applying different
event handling mechanisms.
CO3: Develop server side programs using Servlets and JSP.
CO4: Construct simple web pages in PHP and to represent data in XML format.
CO5: Develop interactive web applications.
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
List of Experiments:
1. Create a web page with the following using HTML.
• To embed an image map in a web page.
• To fix the hot spots.
• Show all the related information when the hot spots are clicked.
2. Create a web page with all types of Cascading style sheets.
3. Client Side Scripts for Validating Web Form Controls using DHTML.
4. Installation of Apache Tomcat web server.
5. Write programs in Java using Servlets:
● To invoke servlets from HTML forms.
● Session Tracking.
6. Write programs in Java to create three-tier applications using JSP and Databases
● For conducting on-line examination.
● For displaying student mark list. Assume that student information is available in a database
which has been stored in a database server.
7. Programs using XML – Schema – XSLT/XSL.
TOTAL:60 PERIODS
TEXTBOOKS
1. Deitel and Deitel and Nieto, Internet and World Wide Web - How to Program, Prentice Hall, 5th
Edition, 2011.
2. Jeffrey C and Jackson, Web Technologies A Computer Science Perspective, Pearson
Education, 2011.
3. Angular 6 for Enterprise-Ready Web Applications, Doguhan Uluca, 1st edition, Packt
Publishing
REFERENCES:
1. Stephen Wynkoop and John Burke “Running a Perfect Website”, QUE, 2nd Edition,1999.
2. Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley Publications, 2009.
3. Gopalan N.P. and Akilandeswari J., “Web Technology”, Prentice Hall of India, 2011.
4. UttamK.Roy, “Web Technologies”, Oxford University Press, 2011.
5. Angular: Up and Running: Learning Angular, Step by Step, Shyam Seshadri, 1st edition,
O′Reilly
CO’s-PO’s & PSO’s MAPPING
CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 3 3 - - - 1 3 3 1 3 2 3
2 2 2 2 1 2 - - - 2 2 1 3 2 2 2
3 1 1 3 2 3 - - - 1 2 1 1 1 2 1
4 2 3 3 1 2 - - - 3 1 2 2 2 2 2
5 1 2 3 2 2 - - - 2 1 3 1 1 1 2
AVg. 1.8 2 2.8 1. 2.4 - - - 1.8 1.8 2 1.6 1.8 1.8 2
8
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

1221641 NETWORK SECURITY ESSENTIALS L T P C


2 0 2 3

COURSE OBJECTIVES:
 To learn the fundamentals of cryptography.
 To learn the key management techniques and authentication approaches.
 To explore the network and transport layer security techniques.
 To understand the application layer security standards.
 To learn the real time security practices.

UNIT I INTRODUCTION 8
Basics of cryptography, conventional and public-key cryptography, hash functions,
authentication, and digital signatures.

UNIT II KEY MANAGEMENT AND AUTHENTICATION 7


Key Management and Distribution: Symmetric Key Distribution, Distribution of Public
Keys, X.509 Certificates, Public-Key Infrastructure. User Authentication: Remote User-
Authentication Principles, Remote User-Authentication Using Symmetric Encryption,
Kerberos Systems, Remote User Authentication Using Asymmetric Encryption.

UNIT III ACCESS CONTROL AND SECURITY 4


Network Access Control: Network Access Control, Extensible Authentication Protocol,
IEEE 802.1X Port-Based Network Access Control - IP Security - Internet Key Exchange
(IKE). Transport-Level Security: Web Security Considerations, Secure Sockets Layer,
Transport Layer Security, HTTPS standard, Secure Shell (SSH) application.

UNIT IV APPLICATION LAYER SECURITY 5


Electronic Mail Security: Pretty Good Privacy, S/MIME, DomainKeys Identified Mail.
Wireless Network Security: Mobile Device Security

UNIT V SECURITY PRACTICES 6


Firewalls and Intrusion Detection Systems: Intrusion Detection Password Management,
Firewall Characteristics Types of Firewalls, Firewall Basing, Firewall Location and
Configurations. Blockchains, Cloud Security and IoT security
30 PERIODS
PRACTICALEXERCISES: 30 PERIODS

1. Implement symmetric key algorithms


2. Implement asymmetric key algorithms and key exchange algorithms
3. Implement digital signature schemes
4. Installation of Wire shark, tcpdump and observe data transferred in client-server
communication using UDP/TCP and identify the UDP/TCP datagram.
5. Check message integrity and confidentiality using SSL
6. Experiment Eavesdropping, Dictionary attacks, MITM attacks

7. Experiment with Sniff Traffic using ARP Poisoning


8. Demonstrate intrusion detection system using any tool.
9. Explore network monitoring tools
10. Study to configure Firewall, VPN

COURSE OUTCOMES:
At the end of this course, the students will be able:
CO1: Classify the encryption techniques
CO2: Illustrate the key management technique and authentication.
CO3 Evaluate the security techniques applied to network and transport layer
CO4: Discuss the application layer security standards.
CO5: Apply security practices for real time applications.

TOTAL:60 PERIODS
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice, 6th Edition, William
Stallings, 2014, Pearson, ISBN 13:9780133354690.

REFERENCES:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman, C. Kaufman,
Prentice Hall, 2002.
2. Linux iptables Pocket Reference, Gregor N. Purdy, O'Reilly, 2004, ISBN-13: 978-
0596005696.
3. Linux Firewalls, by Michael Rash, No Starch Press, October 2007, ISBN: 978-1-59327-141- 1.
4. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning, 2013, ISBN-10:
1284031675, ISBN-13: 978-1284031676.
5. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech Press, 2015,
ISBN-10:8126558148, ISBN-13: 978-8126558148.

CO’s-PO’s & PSO’s MAPPING


CO’s PO’s PSO’s
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 3 2 2 2 - - - 2 1 2 1 2 3 1
2 1 1 3 2 2 - - - 2 2 1 1 3 1 2
3 1 2 1 1 2 - - - 3 3 1 3 2 1 3
4 2 2 3 2 3 - - - 3 3 2 1 2 1 3
5 2 1 3 2 2 - - - 2 1 1 3 2 1 1
AVg. 1.8 1.8 2.4 1. 2.2 - - - 2.4 2 1.4 1.8 2.2 1.4 2
8
1 - low, 2 - medium, 3 - high, ‘-' - no correlation

You might also like