Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 4

JECRC University Jaipur Theory Plan

Class Subject : M.Tech. : Mobile Computing Theory : 100 marks Lectures: 3 Hrs/week

Name of the Staff : Ajay Kumar Academic Year Semester : 2013-2014 :1

Term work : 40 marks

Lec ture No 1 2 3 4 5 6

Theory (Topic to be covered)

Plan Date

Actua l Date

Reason for variation

Steps for minimizin g variation

Overview of Mobile Computing: Its applications, Radio Communication Mobile Computing Architecture Mobile System Networks Data Dissemination, Mobility Management

Revision, Discussion, Class Test


Introduction to Cellular network: components, Architecture Call set-up, Frequency Reuse and Co-channel cell Call set-up, Frequency Reuse and Co-channel cell Cell Design, Interference Channel assignment, Hand Off

7 8 9 10 11 12

Revision, Discussion, Class Test


Cellular Network Standards: Digital cellular communication Multiple Access Techniques: FDMA, TDMA, CDMA GSM: System Architecture, Mobile services & features, Protocols GSM: System Architecture, Mobile services & features, Protocols Radio interface, Handover GSM Channels, Localization and calling, User validation General Packet Radio Service Introduction to CDMA based systems; Spread spectrum in CDMA systems; Coding methods in CDMA; IS-95

13

14

15
16 17 18 19 20 21 22 23 24 25

Revision, Discussion, Class Test


Wireless LAN: Wireless LAN (Wi-Fi) Architecture and protocol layers WAP Architecture Bluetooth Architecture: Bluetooth; Bluetooth Architecture: Layers, Layers, Security Security in in

Subject In-charge: Sign:

H.O.D.: Sign:

Information System Security

AIM
The protection of the interests of those relying on information, and the information systems and Communications that deliver the information, from harm resulting from failures of availability, confidentiality, and integrity. The security objective uses three terms Availability:- information systems are available and usable when required; Confidentiality:- data and information are disclosed only to those who have a right to know it. Integrity:-The content should not be changed. By the end of this course, students will learn about: 1)Understand the importance of information systems security. 2)Understand the importance of protecting the privacy and confidentiality of data. 3)Know and understand the security- and privacy-related Federal government-wide and organization-specific laws, regulations, policies, guidelines, and standards, and how to apply them. 4)Know and understand your role and responsibilities within the AIS Security Program. 5)Be able to assist in the risk management program within your components, by identifying computer security threats and vulnerabilities, and assisting in the identification of appropriate safeguards. 6)Be able to identify management, technical, personnel, operational, and physical controls. Know the security requirements for protecting workstations and the information processed on them. 7)Be able to identify and implement preventative measures for computer viruses, identify the signs of a possible infection, identify a virus hoax, and implement virus recovery techniques. 8)Have developed an understanding of general physical and environmental security requirements.

You might also like