Free Essay

Software

In: Other Topics

Submitted By pathish
Words 3183
Pages 13
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
M. TECH (REAL TIME SYSTEMS)
COURSE STRUCTURE AND SYLLABUS

I YEAR I SEMESTER
Code Group Subject L P Credits Advanced Computer Architecture 3 0 3 Advanced Micro Controllers 3 0 3 Fundamentals of Real Time Systems 3 0 3 Design & Development of Real Time Systems 3 0 3 Elective -I Digital Control Systems
Distributed Operating Systems
Cloud Computing 3 0 3 Elective -II Digital Systems Design
Fault Tolerant Systems
Advanced Computer Networks 3 0 3 Lab Micro Processors and Programming Languages Lab 0 3 2 Seminar - - 2 Total Credits (6 Theory + 1 Lab.) 22

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)
I SEMESTER
ADVANCED COMPUTER ARCHITECTURE

UNIT I
Concept of instruction format and instruction set of a computer, types of operands and operations; addressing modes; processor organization, register organization and stack organization; instruction cycle; basic details of Pentium processor and power PC processor, RISC and CISC instruction set.
UNIT II
Memory devices; Semiconductor and ferrite core memory, main memory, cache memory, associative memory organization; concept of virtual memory; memory organization and mapping; partitioning, demand paging, segmentation; magnetic disk organization, introduction to magnetic tape and CDROM.
UNIT III
IO Devices, Programmed IO, interrupt driver IO, DMA IO modules, IO addressing; IO channel, IO Processor, DOT matrix printer, ink jet printer, laser printer.
Advanced concepts; Horizontal and vertical instruction format, microprogramming, microinstruction sequencing and control; instruction pipeline; parallel processing; problems in parallel processing; data hazard, control hazard.
UNIT IV
ILP software approach-complier techniques-static branch protection-VLIW approach-H.W support for more ILP at compile time-H.W verses S.W solutions
Multiprocessors and thread level parallelism-symmetric shared memory architectures-distributed shared memory-Synchronization-multi threading.
UNIT V
Storage System-Types-Buses-RAID-errors and failures-bench marking a storage device designing a I/O system.
Inter connection networks and clusters-interconnection network media – practical issues in interconnecting networks-examples-clusters-designing a cluster

Text Books:
1. “Computer organization and architecture”, Williams Stallings, PHI of India, 1998.
2. Computer organization, Carl Hamachar, Zvonko Vranesic and Safwat Zaky, McGraw Hill International Edition.
3. Computer Architecture & Organization, John P. Hayes, TMH III Edition.
4. Computer Architecture A quantitative approach 3rd edition John L. Hannessy & David A. Patteson Morgan Kufmann (An Imprint of Elsevier)

Reference Books:
1. “Computer Architecture and parallel Processing” Kai Hwang and A. Briggs International edition McGraw-Hill.
2. Advanced Computer Architecture, Dezso Sima, Terence Fountain, Peter Kacsuk, Pearson. JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)
I SEMESTER
ADVANCED MICRO CONTROLLERS

UNIT I
INTRODUCTION TO EMBEDDED SYSTEMS
Review of Micro controllers and their Features. 8 & 16 Bit Micro Controller Families (of Intel 8051) Flash
Series, Motorola 68HC11; Micro Chip PIC 16C6X and Micro controller hardware, Embedded RISC Processor Architectures – ARM6TDMI (Advanced RISC Machines).
UNIT II
MICRO CONTROLLER INTERFACING
8051, 68HC11, PIC-16C6X and ATMEL External Memory Interfacing – Memory Management Unit, Instruction and data cache, memory controller.
On Chip Counters, Timers, Serial I/O Interrupts and their use. PWM /Watch dog, ISP, IAP features.
UNIT III
PROGRAMMING
Instruction sets and assembly language programme concepts and programming the 8051, 68HC11, PIC-
16C6X Micro Controller ARM6TDMI Core (SOC) and PIC-IDE.
UNIT IV
Interrupt synchronization – Interrupt vectors & Priority, external interrupt design. Serial I/O Devices RS232 Specifications, RS422/Apple Talk / RS423/ RS435 & other communication protocols. Serial communication controller.
Ethernet Protocol, SDMA, Channels and IDMA simulation, CPM Interrupt controller and CPM Timers.
UNIT V
Power Controls, External BUS Interface system Development and Debugging.
CASE STUDIES: Design and Embedded Systems using the Micro Controller – 8051/ARM6TDMI, for application in the area of Communications, Automotives, industrial control.

Text Books:
1. M.A.Mazadi & J.G. Mazidi, “The 8051 Micro Controller & Embedded Systems”, Pearson Education, Asia (2000).
2. John B. Peatman, Designing with PIC Micro Controllers, Pearson Education.
3. Jonathan W. Valvano, Embedded Microcomputer Systems, Real Time Interfacing. Brookes/Cole, Thomas learning 1999.
4. Cathey May and Silha
5. (Ed)., “The Power PC Architecture”, Morgan Kauffman Press (1998).

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)
I SEMESTER
FUNDAMENTALS OF REAL TIME SYSTEMS

UNIT I
Introduction, A Car-and-Driver Example, Issues in Real-Time Computing, Structure of a Real-Time Systems, Task Classes, Issues Covered in this Book, Characterizing Real-time Systems and Tasks, Performance Measures for Real-Time Systems, Estimating Program Run Times, Suggestions for Further Reading.
Task Assignment and Scheduling
Introduction, Classical Uniprocessor Scheduling Algorithms, Uniprocessor Scheduling of IRIS Tasks, Task Assignment, Mode Changes, Fault-Tolerant Scheduling, Suggestions for Further Reading.
UNIT II
Programming Languages and Tools
Introduction, Desired Language Characteristics, Data Typing, Control Structures, Facilitating Hierarchical Decomposition, Packages, Run-time Error (Exception) Handling, Overloading and Generics, Multitasking, Low-Level Programming, Task Scheduling, Timing Specifications, Some Experimental Languages, Programming Environments, Run-time support, Suggestion for Further reading.
UNIT III
Real-Time Databases
Introduction, Basic Definitions, Real-Time vs General-Purpose Databases, Main Memory Databases, Transaction Priorities, Transaction Aborts, Concurrency Control Issues, Disk Scheduling algorithms, A two-phase approach to improve predictability. Maintaining Serialization Consistency, Databases for Hard Real – Time systems. Suggestion for further reading.
Real time Communication
Introduction, Network Topologies, Protocols, suggestions for Further Reading
UNIT IV
Fault- Tolerance Techniques
Introduction, What Causes Failures? Fault Types, Fault Detection, Fault and Error Containment, Redundancy, Data Diversity, Reversal Checks, Malicious or Byzantine Failures, Integrated Failure handling, Suggestions for further reading.
UNIT V
Reliability Evaluation Techniques
Introduction, Obtaining Parameter Values, Reliability Models for Hardware Redundancy, Software-Error Models, Taking time into account, Suggestions for further reading
Clock Synchronization
Introduction, Clocks, A Nonfault-Tolerant Synchronization algorithm, Impact of faults, fault-tolerant synchronization in hardware, Synchronization in software, Suggestion for further reading

Text Books: Real Time Systmes, Krishna C.M & Kand Shin G. Mc Graw Hill, 1997, L.R. Rabiner & R. W. Schafe

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER
DESIGN & DEVELOPMENT OF REAL TIME SYSTEMS
UNIT I
Introduction to Real-Time Systems
Historical background, Elements of a computer control systems, Real-Time Systems- definition, Classification of real-time systems, Time constraints, Classification of programs, Summary.
Concepts of Computer control
Introduction, Sequence control, Loop control (direct digital control), Supervisory control, Centralized computer control, Hierarchical systems, Distributed systems, Human-Computer Interface (HCI), the control engineer, Economics and benefits of computer control systems, Summary.

UNIT II
Computer Hardware Requirements for Real-Time applications
Introduction
General purpose computer, Single-chip microcomputers and microcontrollers, Specialization Processor, Process-related Interfaces, Data Transfer techniques, Communications, Standard Interface, Summary.
DDC Algorithms and Their Implementation
Introduction, Implementation for the Basic PID algorithm, Synchronization of the control loop.

UNIT III
Bumpless transfer, Saturation and integral action wind-up, Tuning Choice of sampling interval, Plant input and output, improved forms of algorithm for integral and derivative calculation, Implementation of controller designs based on plant models, Summary
Design of Real-Time Systems – General Introduction
Introduction, Specification document, Preliminary design, Single-program Approach Foreground/Background system, Multi-tasking approach, Mutual exclusion, Monitors, Rendezvous, Summary.

UNIT IV
Real-Time System Development Methodologies – 1
Introduction, Yourdon methodology, Requirements definition for drying oven, Ward and Mellor method, Hatley and Pirbhai method, Comments and the Yourdon Methodologies summary
Real-Time System Development Methodologies -2
MASCOT, Basic features of MASCOT, General design approach, Textual representation of MASCOT designs, Other features of MASCOT, Development facilities, The MASCOT Kernel, Summary of MASCOT, Formal Methods, The PAISLey system for real-time software development method, PAISLey summary, Summary.

UNIT V
Dependability, Fault detection and fault tolerance
Introduction, USE of Redundancy, Fault tolerance in Mixed Hardware-Software systems, Fault detection measures, Fault detection mechanisms, Damage containment and assessment Provision of fault tolerance, summary

Text Books:
Real Time Computer control, Stuart Bennett, 2nd edition, Pearson Education

Reference Books
Real-Time Systems Design and Analysis by Phillip A Laplante JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER ELECTIVE - I
DIGITAL CONTROL SYSTEMS
UNIT I
SAMPLING AND RECONTRUCTION
Introduction, Examples of Data Control Systems – Digital to Analog conversion and Analog to Digital conversion, sample and hold operations.

UNIT II
THE Z - TRANSFORMS
Introduction, Linear difference equations, pulse response, Z-transforms, Theorems of Z-Transforms, the inverse Z – transforms, Modified Z –Transforms.
Z-PLANE ANALYSIS OF DISCRETE-TIME CONTROL SYSTEMS
Z-Transform method for solving difference equations, Pulse transforms function, block diagram analysis of sampled – data systems, mapping between s-plane and z-plane.

UNIT III
STATE SPACE ANALYSIS
State Space Representation of discrete time systems, Pulse Transfer Function Matrix solving discrete time state space equations, State transition matrix and it’s Properties, Methods for Computation of State Transition Matrix, Discretization of continuous time state-space equations

UNIT IV
CONTROLLABILITY AND OBSERVABILITY
Concepts of Controllability and Observability, Tests for controllability and Observability. Duality between Controllability and Observability, Controllability and Observability conditions for Pulse Transfer Function.
STABILITY ANALYSIS
Mapping between the S-Plane and the Z-Plane – Primary strips and Complementary Strips – Constant frequency loci, Constant damping ratio loci, Stability Analysis of closed loop systems in the Z-Plane. Jury stability test – Stability Analysis by use of the Bilinear Transformation and Routh Stability criterion.

UNIT V
DESIGN OF DISCRETE TIME CONTROL SYSTEM BY CONVENTIONAL METHODS
Transient and steady – State response Analysis – Design based on the frequency response method – Bilinear Transformation and Design procedure in the w-plane, Lead Lag and Lead-Lag compensators and digital PID controllers.
STATE FEEDBACK CONTROLLERS AND OBSERVERS
Design of state feedback controller through pole placement – Necessary and sufficient conditions, Ackerman’s formula State Observers – Full order and Reduced order observers.

Text Books
1. Discrete-time Control systems – K. Ogata, Pearson Education/PHI, 2nd Edition
2. Digital Control and State Variable Methods by M.Gopal, TMH
References:
1. Digital Control Systems, Kuo Oxford University Press 2nd Edition 2003
2. Digital Control Engineering, M.Gopal JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER ELECTIVE - I
DISTRIBUTED OPERATING SYSTEMS
UNIT I
Characteristics of Distributed Systems, Design Issues, User requirements, Network Technologies and Protocols, IPC, Client-server Communication, Group communications, IPC in UNIX.
Remote Procedure calling Design issue, implementation, Asynchronous RPC

UNIT II
Distributed OS, its Kernel, Processor and Threads, Naming and Protection, Communication and Invocation, Virtual memory, File service components, Design issues, Interfaces, Implementation techniques, SUN Network File System.

UNIT III
SNS – a name service model, its design issues, Synchronizing physical clocks, Logical time and logical clocks, Distributed coordination, Replication and its architectural model, Consistency and request ordering, Conversation between a client and a server, Transactions, Nested Transactions
Concurrency control, Locks, Optimistic concurrency control, Timestamp ordering, Comparison of methods for concurrency control.

UNIT IV
Distributed Transactions and Nested Transactions Atomic commit protocols, Concurrency control in distributed transactions, distributed Deadlocks, Transactions with replicated data, Transaction recovery, Fault Tolerance, Hierarchical and group masking of faults

UNIT V
Cryptography, Authentication and Key distribution, Logics and Authentication, Digital Signatures.
Distributed shared memory, Design and Implementation issues, sequential consistency and ivy, Release consistency and Munin, Overview of Distributed Operating systems Mach, Chorus.

Text Books:
1. Distributed Systems Concepts and Design, g. Coulouris, J. Dollimore and T Kindberg, Second Edition, Addison Wesley.

References:
1. Advanced Concepts in Operating Systems, M. Sighal, N.G Shivarathri, Tata McGraw-Hill Edition. JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER ELECTIVE - I

CLOUD COMPUTING
UNIT – I
Introduction to virtualization and virtual machine, Virtualization in cluster/grid context
Virtual network, Information model & data model for virtual machine, Software as a Service (SaaS), SOA, On Demand Computing.

UNIT – II Cloud computing: Introduction, What it is and What it isn’t, from Collaborations to Cloud, Cloud application architectures, Value of cloud computing, Cloud Infrastructure models, Scaling a Cloud Infrastructure, Capacity Planning, Cloud Scale.

UNIT – III
Data Center to Cloud: Move into the Cloud, Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for Cloud Applications
Security: Disaster Recovery, Web Application Design, Machine Image Design, Privacy Design,
Database Management, Data Security, Network Security, Host Security, Compromise Response UNIT – IV
Defining Clouds for the Enterprise- Storage-as-a-Service, Database-as-a-Service, Information-as-a-Service, Process-as-a-Service, Application-as-a-Service, Platform-as-a-Service, Integration-as-a-Service, Security-as-a-Service, Management/Governance-as-a-Service, Testing-as-a-Service, Infrastructure-as-a-Service

UNIT – V
Disaster Recovery, Disaster Recovery, Planning, Cloud Disaster Management
Case study: Types of Clouds, Cloudcentres in detail, Comparing approaches, Xen OpenNEbula , Eucalyptus, Amazon, Nimbus

Text Books:
1. Cloud Computing – Web Based Applications That Change the way you Work and Collaborate Online – Michael Miller, Pearson Education.
2. Cloud Application Architectures, 1st Edition by George Reese O'Reilly Media.

Reference Book:
1. Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
David S. Linthicum Addison-Wesley Professional. 2. Enterprise Web 2.0 Fundamentals by Krishna Sankar; Susan A. Bouchard, Cisco Press JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD

MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER ELECTIVE - II
DIGITAL SYSTEMS DESIGN
UNIT I
DESIGN OF DIGITAL SYSTEMS: ASM charts, Hardware description language and control sequence method, Reduction of state tables, state assignments.
SEQUENTIAL CIRCUIT DESIGN: design of Iterative circuits, design of sequential circuits using ROMs and PLAs, sequential circuit design using CPLD, FPGAs.

UNIT II
FAULT MODELING: Fault classes and models – Stuck at faults, bridging faults, transition and intermittent faults.
TEST GENERATION: Fault diagnosis of Combinational circuits by conventional methods – Path Sensitization techniques, Booleam difference method, Kohavi algorithm.

UNIT III
TEST PATTERN GENERATION: D-Algorithm, PODEM, Random testing, Transition count testing, Signature analysis and testing for bridging faults.
FAULT DIAGNOSIS IN SEQUNTIAL CIRCUITS: State identification and fault detection experiment, Machine identification, Design of fault detection experiment.

UNIT IV
PROGRAMING LOGIC ARRAYS: Design using PLA’s, PLA minimization and PLA folding.
PLA TESTING: Fault models, Test generation and Testable PLA design.

UNIT V
ASYNCHRONOUS SEQUENTIAL MACHINE: Fundamental mode model, flow table, state reduction, minimal closed covers, races, cycles and hazards.

Text Books
1. Z. Kohavi – “Switching & finite Automata Theory” (TMH)
2. N.N. Biswas – “Logic Design Theory (PHI)
3. Nolman Balabanian, Bradly Calson Logic Design Principles” – Wily student Edition 2004.

References:
1. M. Abramovici, M.A. Breues, A.D. Friedman – “Digital System Testing and Testable Design”, Jaico Publications.
2. Charles H. Roth Jr. – “Fundamentals of Logic Design”. Frederick J.Hill & Peterson –“Computer Aided Logic Design” – Wiley 4th Edition JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER ELECTIVE - II
FAULT TOLERANT SYSTEMS
UNIT I
Basic Concepts
Failure and Faults, reliability and failure rate, relation between eligibility and Mean-time between failures, maintainability and availability, reliability and series and parallel systems, Modeling of faults, stuc at, Bridging (short circuit), stuck open, transient and intermittent faults.
Fault diagnosis of digital systems, Test generation for combinational logic circuits conventional methods, Random testing, transition count testing and signature analysis

UNIT II
Basic concepts – static, dynamic, Hybrid, and self-purging redundancy, shift – over Modular Redundancy (SMR). Tripte Modular redundancy, SMR.
Reconfiguration, use of error correcting codes, Time redundancy, software redundancy, fail soft-operation examples of practical fault tolerant systems, Introduction to fault Tolerant Design of VLSI chips.

UNIT III
Design of Totally self-checking checkers, checkers using m-out of n codes, Berger codes and low cost residue code. Self-checking sequential Machines, Partially self checking circuits.

UNIT IV
Basic Concepts of test ability, controllability and observability. The read muller expansion technique, three level OR-AND-OR design, use of control logic and syndrome-testable design.

UNIT V
Design of Testable Sequential circuits the scan-path technique – leel sensitive scan design (LSSD) and Random Access scan technique, built-in-test, built-in-test of VLSI chips, design for autonomous self-test, Designing Testability into logic Boards. .

Text Books
1. Fault Tolerant and Fault testable hardware design, Parag K.Lala PHI 1985

References Books:
1. Digital systems design using PLD’s LALA, PHI 1990
2. Logic Design theory, N.N. Biswas, PHI 1990 JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)
I SEMESTER ELECTIVE - II

ADVANCED COMPUTER NETWORKS
UNIT I Review
Computer Networks and the Internet: What is the Internet, The Network edge, The Network core, Access Networks and Physical media, ISPs and Internet Backbones, Delay and Loss in Packet-Switched Networks, History of Computer Networking and the Internet - Foundation of Networking Protocols: 5-layer TCP/IP Model, 7-Layer OSI Model, Internet Protocols and Addressing, Equal-Sized Packets Model: ATM - Networking Devices: Multiplexers, Modems and Internet Access Devices, Switching and Routing Devices, Router Structure.

UNIT II
The Link Layer and Local Area Networks: Link Layer: Introduction and Services, Error-Detection and Error-Correction techniques, Multiple Access Protocols, Link Layer Addressing, Ethernet, Interconnections: Hubs and Switches, PPP: The Point-to-Point Protocol, Link Virtualization - Routing and Internetworking: Network–Layer Routing, Least-Cost-Path algorithms, Non-Least-Cost-Path algorithms, Intradomain Routing Protocols, Interdomain Routing Protocols, Congestion Control at Network Layer

UNIT III
Logical Addressing: IPv4 Addresses, IPv6 Addresses - Internet Protocol: Internetworking, IPv4, IPv6, Transition from IPv4 to IPv6 – Multicasting Techniques and Protocols: Basic Definitions and Techniques, Intradomain Multicast Protocols, Interdomain Multicast Protocols, Node-Level Multicast algorithms - Transport and End-to-End Protocols: Transport Layer, Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Mobile Transport Protocols, TCP Congestion Control – Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, Domain Name System (DNS), P2P File Sharing, Socket Programming with TCP and UDP, Building a Simple Web Server

UNIT IV
Wireless Networks and Mobile IP: Infrastructure of Wireless Networks, Wireless LAN Technologies, IEEE 802.11 Wireless Standard, Cellular Networks, Mobile IP, Wireless Mesh Networks (WMNs) - Optical Networks and WDM Systems: Overview of Optical Networks, Basic Optical Networking Devices, Large-Scale Optical Switches, Optical Routers, Wavelength Allocation in Networks, Case Study: An All-Optical Switch

UNIT V
VPNs, Tunneling and Overlay Networks: Virtual Private Networks (VPNs), Multiprotocol Label Switching (MPLS), Overlay Networks – VoIP and Multimedia Networking: Overview of IP Telephony, VoIP Signaling Protocols, Real-Time Media Transport Protocols, Distributed Multimedia Networking, Stream Control Transmission Protocol - Mobile A-Hoc Networks: Overview of Wireless Ad-Hoc Networks, Routing in Ad-Hoc Networks, Routing Protocols for Ad-Hoc Networks – Wireless Sensor Networks: Sensor Networks and Protocol Structures, Communication Energy Model, Clustering Protocols, Routing Protocols

TEXT BOOKS:
1. Computer Networking: A Top-Down Approach Featuring the Internet, James F. Kurose, Keith W.Ross, Third Edition, Pearson Education, 2007
2. Computer and Communication Networks, Nader F. Mir, Pearson Education, 2007
REFERENCES:
1. Data Communications and Networking, Behrouz A. Forouzan, Fourth Edition, Tata McGraw Hill, 2007
2. Guide to Networking Essentials, Greg Tomsho,Ed Tittel, David Johnson,Fifth Edition, Thomson.
3. An Engineering Approach to Computer Networking , S.Keshav, Pearson Education.
4. Campus Network Design Fundamentals, Diane Teare, Catherine Paquet, Pearson Education (CISCO Press)
5. Computer Networks, Andrew S. Tanenbaum, Fourth Edition, Prentice Hall.
6. The Internet and Its Protocols,A.Farrel,Elsevier. JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY HYDERABAD
MASTER OF TECHNOLOGY (REAL TIME SYSTEMS)

I SEMESTER
MICROPROCESSORS AND PROGRAMMING LANGUAGE LAB

1. 8259 – Interrupt Controller
2. 8279 – Keyboard display
3. 8255 – PPI
4. 8251 – USART
5. Reading and Writing on a parallel port
6. Timer in different modes
7. Serial communication implementation
8. Exercise on C++, prolog, lisp and similar languages

Similar Documents

Premium Essay

Software

...Principle of Software Engineering Table of Contents Abstract 3 Introduction 4 Boehm's First Law 4 Boehm's Second law 5 Conway's law 5 Parnas Law 6 Corbató Law 7 Observation 8 Theory 9 Law 9 Question 3 10 Law 11 References 12 Abstract The purpose of the study is to show the capability to understand the set of laws that are the part of principles of the software engineering. In this paper, it is discussed that there are many laws related to the software engineering but only few of them are to be addressed. Boehm first and second law, Conway’s laws, Parnas laws & Corbato law were discussed with examples. There are two relationship processes that are also discussed, related to the software Engineering. Law method and tools which are depended on each other and they are performing the task with the help of principle and process by following the rules. Same scenario is followed in other relation too, where observation, law and theory are depended on each other. Observation is repeatable to law and law is explained by theory. Theory should be confirmed by the law and it predict by the observation before further proceeding. Introduction Question No 1 Boehm's First Law Errors are more regular in the middle of fundamentals and configuration exercises and are more abundant when they are displaced. In this law, some basic configuration errors do outnumber code blunders. However, cost stays......

Words: 1641 - Pages: 7

Free Essay

Software

...Identify two periodical publications that focus on software architecture (either solely or partly). Submit the following information: publication name, URL, publisher name, & the year it was first published. IEEE Potentials, First Publication Year: 1982 URL : http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=45 Publisher Name: IEEE Xplore Msdn magazine First Publication Year: 2001 URL: https://msdn.microsoft.com/en-us/magazine/dn973005.aspx Publisher Name: The Microsoft journal for developers Write a half-page short essay comparing and contrasting software architects and software engineers. Software architect has responsibility for guaranteeing coherence of all aspects of the project as an integrated system. Architect answerable for overall technical quality, developer for lower implementation selections. The architect holds the futuristic views and proactively sees the system before it\'s designed, being the holder of the vision. Software architect focuses on money and also the disposition and drive to guide individuals. a leader who will apply/share their broad framework. Pragmatic handling of the technical solution and act with the business in addition as the techies, marketing the vision to each. A software architect has the vision to own the most effective style ideas. Architects will see each micro and macro (inwards and outward) whereas engineers see small and outwards and want to be carried by the architect to examine macro/outwards. Maintaining...

Words: 892 - Pages: 4

Premium Essay

Software

...Software Quality Assurance Software quality assurance Software quality assurance, often referred to in the industry as "software testing" or "QA testing" consists of thoroughly testing every aspect of a software project to ensure that: 1. It functions as intended and does not contain errors 2. It complies with the previously established development guidelines As the interactive software industry grows, software quality assurance has become more and more complicated. Many offshoots have arisen and considerably complicated the software testing jargon: security testing, unit testing, usability testing, load testing, scripted testing, compatibility testing, etc. In the end, what software quality assurance is all about is making sure that your software product works seamlessly for all your users. While we may expand into other areas in the future, we at the Crowdsourced Testing company specialize in one particular type of testing known as functional testing. The sad reality of software quality assurance The unfortunate reality of the software development industry is that testing is often neglected because development companies are under a tremendous amount of pressure to deliver their projects faster and faster. Furthermore, software programming is a complex endeavor and it is very difficult to know ahead of time exactly how much time will be needed to develop a particular project. What usually ends up happening is that programmers work until the very last minute......

Words: 616 - Pages: 3

Free Essay

Software

...Robert P. Ward Software Engineering in the Small Smaller-sized software companies are developing significant products that need effective, tailored software engineering practices. n 1968, the NATO Software Engineering Conference in Garmisch, Germany [6] initiated the concept of software engineering, identifying the problems with producing large, high-quality software applications. In 1975, De Remer [2] introduced the terms, “programming in the small” and “programming in the large” to differentiate the development characteristics of large-scale software development from detailed programming (for example, data structures and algorithms). The principal source of large-scale software at the time was development contracts issued by the U.S. Department of Defense. Since then, virtually all software engineering literature has concentrated explicitly and implicitly on the model of DoD contract software development. Since the late 1970s, the microcomputer revolution has dramatically increased the quantity of software produced, the average I size of programs, and the number of companies involved in software development. Much more software is produced for internal use, commercial applications, and the mass-market than for deep-pocketed government and large industry. Using the number of units sold, mass-market software dwarfs the other forms of software sales. The growth of the software industry has produced many small companies that do not do contract software, but rather......

Words: 2136 - Pages: 9

Free Essay

Software

...Ariel M. Vasquez November 24, 2014 CIS331 System Modeling Theory Professor Randy Arvay Software System Architecture For this case the question is asked which system would be best to implement for this case. There are several different types of cases to chose from. They all with their own particular benefits and negatives at the same time The one that fits this needs in particular would be the event driven system. What is an event driven architecture system? An event driven architecture, or EDA for short, is a pattern that focuses on promoting production, detection, and consumption. Most of its works occur during an event. In the medical field, which this case revolves around, have thing change a lot during the course of not only a day even within every hour this change. Whether it's from a patient's medical records, stock of inventory, medicines provided to a patient, and even when a patient enters and exits the hospital. With a system like EDA thing will only occur when things change and this pattern seems to be able to handle those changes better than the others. The following image will show basically how this type of system will work. A system that integrates EDA may also provide a higher level of service to help with the implementation of EDA. Things like security, reliable messaging, content based routing, and mapping and transformation. The security that this provides is message encryption, authentication, and access control. With the messaging this......

Words: 418 - Pages: 2

Premium Essay

Software

...Software is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware describes the physical aspects of computers and related devices.) Importance of Software Security Assurance As organizations worldwide increase their reliance on software controls to protect their computing environments and data, the topic of Software Security Assurance grows in importance. The tremendous potential costs associated with security incidents, the emergence of increasingly complex regulations, and the continued operational costs associated with staying up to date with security patches all require that organizations give careful consideration to how they address software security. For more information on Software Security Assurance, see Wikipedia on Software Security Assurance. Oracle Software Security Assurance Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance (OSSA) is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. Oracle Software Security Assurance is a set of industry-leading standards, technologies, and practices aimed at: • Fostering security innovations. Oracle has a long tradition of security innovations. Today this legacy continues with Oracle's market leading database......

Words: 484 - Pages: 2

Free Essay

Software

...Five Models Of Software Engineering Nabil Mohammed Ali Munassar1 and A. Govardhan2 1 Ph.D Student of Computer Science & Engineering Jawahrlal Nehru Technological University Kuktapally, Hyderabad- 500 085, Andhra Pradesh, India Professor of Computer Science & Engineering Principal JNTUH of Engineering College, Jagityal, Karimnagar (Dt), A.P., India 2 Abstract This research deals with a vital and important issue in computer world. It is concerned with the software management processes that examine the area of software development through the development models, which are known as software development life cycle. It represents five of the development models namely, waterfall, Iteration, V-shaped, spiral and Extreme programming. These models have advantages and disadvantages as well. Therefore, the main objective of this research is to represent different models of software development and make a comparison between them to show the features and defects of each model. Keywords: Software Management Processes, Software Development, Development Models, Software Development Life Cycle, Comparison between five models of Software Engineering. increased recently which results in the difficulty of enumerating such companies. During the previous four decades, software has been developed from a tool used for analyzing information or solving a problem to a product in itself. However, the early programming stages have created a number of problems turning software an obstacle......

Words: 3810 - Pages: 16

Free Essay

Hardware and Software

...Hardware and Software Paper CIS 205 Hardware and software play a very important role in business today and if combined together they can support personal, workgroup, and enterprise computing. In my organization we use Windows based computers for each workstation in each respective location. With the appropriate hardware networking the computers together, we are able to communicate through our network. In this case, we are a small business so we followed the steps necessary to map drives together in the various locations. The hardware needed for our network is a modem, router, Ethernet cables, external hard drives, and power supplies. The software we use to run our network is Windows. When used together this hardware and software help us operate our organization efficiently by easily sending and receiving information. We are able to navigate to any computer’s information in our company through this network. As a design, printing, and embroidery company, we use many online applications to help support and organize our information. The majority of our incoming business comes from the internet. I use an online application called Oss designer to download customer art, organize customers data, and obtain the necessary information from a customer to get the job done. We also use the Oss software to obtain payments for our services. In order to track customers we use an invoice and customer tracking program called Quickbooks. This software enables us to easily create......

Words: 572 - Pages: 3

Free Essay

Escoger Un Software

...calendario para una presentación del software * Reunir a todo el equipo para la presentación del software. * Seleccionar 2 candidatos posibles. * Elegir el proveedor adecuado. Primero debemos recolectar la información de los posibles proveedores y de entre ellos escoger los 3 o 5 proveedores que se ajusten más a nuestros requerimientos. Después debemos reunirnos con cada uno de ellos para poder conversar y evaluar si pueden ser posible candidatos a para convertirse nuestro proveedor. Una vez que nos hemos reunidos pasamos a agendar una presentación del software con todos los empleados que van a utilizar el mismo para que se vayan familiarizando con este. Una vez que hayamos realizado el análisis del posible proveedor y lo hayamos escogido, pasamos a la firma del contrato con el proveedor bajo los términos y condiciones pactadas entre las partes. * Proporcionar información para la personalización de aplicaciones de gestión. Debemos proporcionar cualquier información útil para el equipo: manual de políticas y procedimientos, informes clave, el acceso al sistema actual y para que de esta forma el proveedor sea más exacto con el software que vamos a usar para operar nuestra empresa. * Análisis y la firma del documento DERCA. Este documento es donde especificaremos los requerimientos de nuestra empresa como los procesos del sistema, las interfaces de entrada y los conectores de salida, como tomamos la decisión de usar un canned software tenemos...

Words: 1063 - Pages: 5

Free Essay

Hardware Software

...HARDWARE AND SOFTWARE PAPER Hardware and Software Paper Nathen Hill University of Phoenix Introduction Here at D & G Inc. we are a shipping and receiving company. We sell just about everything, we are a middle man company for several online stores. When you purchase a products online like a DVD the company you purchase through invoices D & G Inc. and we ship the product via UPS to you. At D & G Inc. the Hardware we use a basic Dell Computers running Windows XP. We have about thirty computers in the warehouse and offices. We use Telzall scanning devices to scan and keep track of all merchandise in the warehouse. Without the proper hardware and software tools, the job of keeping track of tens of thousands of products would be a much more time consuming, and need many more employees to accomplish correctly . Hardware and Software The software we use here at D & G Inc. is the most important part of smooth operations. The software we use was created for us at D & G Inc. The system is called SMART it connects all of our databases together. The SMART system makes easy access to any database through, one of the dell computers or through the handheld Telzall scanners. The SMART system runs the time clocks to keep track of all employee hours. First you scan in your ID badge in to the time clock provided on the wall next to all exits. Once you are scanned in to the SMART system you are allowed to log in to the......

Words: 708 - Pages: 3

Free Essay

Hardware and Software

...Hardware and Software Name Professor Name Name of Class Hardware and Software Here at Enterprises we are a shipping and receiving company. We sell just about everything; we are a middleman company for several online stores. When you purchase products online like a DVD the company you purchase through invoices Enterprises and we ship the product via UPS to you. At Enterprises the Hardware we use a basic Dell Computers running Windows XP. We have about thirty computers in the warehouse and offices. We use Telzall scanning devices to scan and keep track of all merchandise in the warehouse. Without the proper hardware and software tools, the job of keeping track of tens of thousands of products would be a much more time consuming, and need many more employees to accomplish correctly. Hardware and Software The software we use here at D & G Enterprises is the most important part of smooth operations. The software we use was created for us at Enterprises. The system is called SMART it connects all of our databases together. The SMART system makes easy access to any database through, one of the dell computers or through the handheld Telzall scanners. The SMART system runs the time clocks to keep track of all employee hours. First you scan in your ID badge in to the time clock provided on the wall next to all exits. Once you are scanned in to the SMART system you are allowed to log in to the database and access information you need to perform......

Words: 698 - Pages: 3

Free Essay

Hardware and Software

...Hardware and Software Your Name Date Class Name Teacher’s name The system that best resembles the hardware and software used at the nursing home located in PA that I used to work for is the Power Macintosh 9500. According to Wikipedia.org, the system was sold between 1995 through 1997 and has the following hardware installed, “It was powered by a PowerPC 604processor, a second-generation PowerPC chip which was faster than the earlier PowerPC 601 chip. The 180MP and 200 used the enhanced PowerPC 604e processor. The CPU was connected via a daughterboard, and so could be swapped easily. Available were single-processor cards ranging from 120 to 200 MHz, and a dual processor card with two 180 MHz CPUs. It was the first Macintosh to use the PCI standard, with six PCI slots available, with one always needed for the graphics card.” The exact breakdown of system hardware can be seen at the Apple website at the following link, http://support.apple.com/kb/SP492. The overall operations of the system are great for its age and can even be enhanced with a new program entitled “Leopard” (also available from Apple) that could help the overall performance of the system and was actually the oldest model that is compatible with that program. As for the software, we all know that there are significant differences between workgroup, personal, and enterprise uses such differences can be seen with the different programs each use has to offer, some examples of the differences are......

Words: 847 - Pages: 4

Premium Essay

Software

... Chinyere repper. Software for Business. MS PROJECT (PROJECT PLANNING) Microsoft Project is a project management software program, developed and sold by Microsoft, which is designed to assist a project manager in developing a plan, assigning resources to tasks, tracking progress, managing the budget, and analyzing workloads. Microsoft Project was the company's third Microsoft Windows-based application, and within a couple of years of its introduction it became the dominant PC-based project management software. While part of the Microsoft Office family, it has never been included in any of the Office suites. It is available currently in two editions, Standard and Professional. Microsoft Project's proprietary file format is mpp. Microsoft Project and Microsoft Project Server are the cornerstones of the Microsoft Office Enterprise Project Management (EPM) product. Microsoft Project 2010 features the Ribbon user interface. Microsoft Project management software is closely integrated with Microsoft Office suite and also includes a Client Access License (CAL) that allows easy connection with Office Project Server. It is a project management software that is mainly used to create plans, monitor progress, analyze workloads, designate resources to tasks and manage budgets. The software also helps in establishing critical path schedules and may also be......

Words: 841 - Pages: 4

Premium Essay

Software Licence

...Autodesk SOFTWARE LICENSE AGREEMENT Worldwide READ CAREFULLY: AUTODESK, INC. (“AUTODESK”) LICENSES THIS SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS SOFTWARE LICENSE AGREEMENT (“AGREEMENT”). BY SELECTING THE “I ACCEPT” BUTTON BELOW THIS AGREEMENT OR BY INSTALLING, UPLOADING, ACCESSING, OR OTHERWISE COPYING OR USING ALL OR ANY PORTION OF THE SOFTWARE YOU AGREE TO BE LEGALLY BOUND BY THIS AGREEMENT. A CONTRACT IS THEN FORMED BETWEEN AUTODESK AND EITHER YOU PERSONALLY, IF YOU ACQUIRE THE SOFTWARE FOR YOURSELF, OR THE COMPANY OR OTHER LEGAL ENTITY FOR WHICH YOU ARE ACQUIRING THE SOFTWARE. IF YOU DO NOT AGREE OR DO NOT WISH TO BIND YOURSELF OR THE ENTITY YOU REPRESENT: (A) DO NOT INSTALL, UPLOAD, ACCESS, OR OTHERWISE COPY OR USE THE SOFTWARE; (B) SELECT THE “I REJECT” BUTTON BELOW THIS AGREEMENT (WHICH WILL CANCEL THE LOADING OF THE SOFTWARE); AND (C) WITHIN THIRTY (30) DAYS FROM THE DATE OF ACQUISITION, RETURN THE SOFTWARE AND ANY ACCOMPANYING DOCUMENTATION AND MATERIALS TO THE COMPANY FROM WHICH YOU ACQUIRED THE SOFTWARE FOR A REFUND. INSTALLATION, UPLOADING, ACCESS, OR OTHER COPYING OR USE OF THIS SOFTWARE OR ANY ACCOMPANYING DOCUMENTATION OR MATERIALS EXCEPT AS PERMITTED BY THIS AGREEMENT IS UNAUTHORIZED AND CONSTITUTES A MATERIAL BREACH OF THIS AGREEMENT AND AN INFRINGEMENT OF THE COPYRIGHT AND OTHER INTELLECTUAL PROPERTY RIGHTS IN SUCH SOFTWARE, DOCUMENTATION AND MATERIALS. IF YOU INSTALL, UPLOAD, ACCESS, OR OTHERWISE......

Words: 6081 - Pages: 25

Premium Essay

Software Testing

...ISSN 0974-2174, Volume 7, Number 5 (2014), pp. 463-474 © International Research Publication House http://www.irphouse.com A Review of Software Testing Techniques Manpreet Kaur1 and Rupinder Singh2 1 Department of CSE CGC, Gharuan Mohali, India 2 CSE CGC, Gharuan Mohali, India Abstract Software testing is important to reduce errors, maintenance and overall software costs. One of the major problems in software testing area is how to get a suitable set of test cases to test a software system. We identify a number of concepts that every software engineering student and faculty should have learned. There are now many testing techniques available for generating test cases. This set should ensure maximum effectiveness with the least possible number of test cases. The main goal of this paper is to analysed and compare the testing technique to find out the best one to find out the error from the software. Keywords: Software testing; process model; testing techniques; 1. Introduction Software testing is a process or a series of processes designed to verify computer code does what it was designed to do. According to ANSI/IEEE 1059 standard [1, 2], Testing can be defined as ―A process of analyzing a software item to detect the differences between existing and required conditions (that is defects/errors/bugs) and to evaluate the features of the software item. Another more appropriate definition is this: [3] Testing is the process of executing a program with the intent of finding......

Words: 4928 - Pages: 20