Personal Information
Organization / Workplace
Jamshedpur, Jharkhand India
Occupation
Assistant Professor in Arka Jain University
Industry
Education
Website
Swetaprakash.blogspot.in
About
Assistant Professor
Tags
introduction
hybrid cloud
private cloud
public cloud
service engineering
grid computing
backdoors.
types of hackers
hackers and crackers
cyber-attacks and vulnerabilities malware threats
sniffing
gaining access
escalating privileges executing applications
hiding files
covering tracks
worms
trojans
social engineering targets and defence strategies
preventing insider threats
insider attack
packet switching
software development with services.
monitors
number system
central processing unit (cpu) memory
information assurance
threats and attack vectors
ethical hacking concepts and scopes
memory
dedicated private cloud
shared private cloud
community cloud
viruses
evolution of cloud computing
applications cloud computing
business models around cloud
cloud services: benefits and challenges of cloud c
types of cloud
cloud computing definition
restful services
classifications of cloud
major players in cloud computing
issues in cloud - eucalyptus - nimbus - open nebul
cloudsim.
(topics: cluster computing
grid computing versus cloud computing
key characteristics of cloud computing. cloud mode
and dynamic private cloud.)
checksum is an error detection code
hamming code is an error detection & correction co
multiple access: random access- aloha-csma-csma/cd
differential manchester coding. perspectives on co
encoding (nrz
nrzi
manchester
4b/5b)
framing
error detection
data link layer
error detection and correction techniques multiple
lan addresses and arp & rarp ppp: the point-to-poi
unicast routing protocols rip
ospf
bgp multicast routing protocols : mospf
dvmrp.
verification and validation: planning verification
software inspections
automated static analysis
verification and formal methods. software testing:
component testing
test case design
test automation. software measurement: size-orient
function-oriented metrics
cocomo model software cost estimation: software pr
estimation techniques
project duration and staffing
service oriented software engineering: services as
service-oriented architectures
custom coding
go-live
erp and related technologies business processing r
data warehousing
data mining
on-line analytical processing(olap)
supply chain management (scm)
customer relationship management(crm)
electronic data interchange (edi)
wireless networks & cellular wireless networks wir
wireless network architecture classification of wi
wpan
wlan
wman
wwan. ieee 802.11
ieee 802.16
bluetooth – standards
architecture and services principles of cellular n
generation of cellular networks – 1g
2g
2.5g
3g and 4g.
threat modelling
enterprise information security architecture
vulnerability
assessment and penetration testing
types of social engineering
introduction to cyber forensics
computer equipment and associated storage
polling
token passing. wired &wireless lans media access c
controlled access
channelization: fdma
tdma
cdma. wired lans – ethernet protocol
standard ethernet
fast ethernet
gigabit ethernet
10 gigabit ethernet wireless lans: introduction
ieee 802.11 architecture
mac sublayer addressing mechanism
physical layer bluetooth: architecture-bluetooth l
cellular telephony
satellite networks.
introduction to enterprise resource planning (erp
value chain framework
organizational functional units
evolution of erp systems
role of erp in organization
three-tier architecture of erp system
erp implementation lifecycle project preparation
initial costing
requirement engineering
erp solution selection
technical planning
change management and training plan
implementation and deployment planning
configuration
processor speed
instruction set
the instruction format
communication between various units of a computer
classification of computer
generation of computer
introduction to computer system
full adder
half adder
4. multiplexer & demultiplexer
1.combinational circuit 2. sequential circuit
batcher banyan switch
banyan switch
multistage switch
cross bar switch
time space time division switch
scanners
digital camera
speech recognition
pointing devices
keyboard
magneto optical disk.
optical disk
magnetic disk
magnetic tape
classification of secondary storage devices
types of rom. introduction
read only memory (rom)
types of ram
random access memory (ram)
memory hierarchy
multiprocessor systems
time division switch
topology & it's various classifications
transmission media & its classification
comparison between osi & tcp/ip
tcp/ip model
description of layers of osl model
osi model
transmission modes
types of communication
maximum data rate
signal classification
types of servers
signal parameters
transmission impairments
network classification by their component role
network benefits
components of computer network
space division switch
nic
gateway
brouter
bridge
repeater
router
hub
hybrid topology
tree topology
ring topology
star topology
bus topology
mesh topology
un-guided media or wireless
guided media 0r wired media
context models
requirements validations. system models: models an
requirements elicitation and analysis
safety and security of software systems. requireme
availability and reliability
a simple safety critical system
people and computers. critical system: types of cr
components of system such 9 as organization
systems engineering
emergent system properties
socio-technical system: essential characteristics
component software processes. software development
documentation of the software requirements. softwa
system requirements
user requirements
maintenance etc. software requirements: functional
manchester encoding
ethernet cabling
message switching
switching: circuit switching
time division multiplexing
wavelength division multiplexing
brief introduction about bluetooth and wimax. mult
performance. the physical layer: wireless transmis
implementing network software
network architecture
requirements
applications
structured methods.
object models
data models
behavioural models
testing
classification of programming languages
evolution of programming languages
and pseudo code (p code). introduction
flowchart
algorithm
developing a program
terminals.
projectors
audio output
soft copy output devices
computer output microfilm (com)
plotters
printers
hard copy output devices
classification of output
optical scanners. introduction
coding
software design
requirements analysis
introduction: what is software engineering? softwa
functions of an operating system
types of operating system
evolution of operating system
operating system
software terminology. introduction
application software
system software
software categories
relationship between software and hardware
selection of a programming language. introduction
features of a good programming language
generations of programming languages
definition & applications of computer network comp
multiprocessor systems.
multicomputer system
universal gates (nand
nor) ex-or
ex-nor
basic gates (and
or
not)
sensors
signals and systems
sensor classification
units of measurements
sensor characteristics
electric charges
fields and potentials capacitance
magnetism induction
resistance
piezoelectric effect
hall effect
temperature and thermal properties of material
heat transfer
light
dynamic models of sensor elements
topics: interface electronic circuits
input characteristics of interface circuits
amplifiers
excitation circuits
analog to digital converters
direct digitization and processing
bridge circuits
data transmission
batteries for low power sensors
icmpv6 protocol
transition from ipv4 to ipv6. introduction to the
transport layer protocols (simple protocol
stop-and-wait protocol
go-back-n protocol
selective repeat protocol
bidirectional protocols)
transport layer services
user datagram protocol
standard client / server protocols: worldwide- web
ftp
electronic mail
telnet
secured shell
domain name system. application layer: dns: name s
topics: introduction
characteristics of computers
block diagram of computer types of computers an
types of memory (primary and secondary)
i/o dev
operating system and services topics 1 dos – hist
files and directories 2 internal and external com
viz. input
storage
processing
output and control
features of windows
features of ms office
communication between various units of a computer
the instruction format
instruction set
building cloud computing envir
infrastructure and system deve
computing platform
parallel and distributed compu
hardware architecture of paral
conversion
bcd
binary addition
decimal to binary
decimal to octal
cluster computing
grid computing v/s cloud compu
key characteristics of cloud c
cloud models:
benefits of cloud models
dynamic private cloud
r program
r data types
basic of r programming languag
r constant
concatenation
rounding off
practice questions
complex numbers
integers
reserved words
how to run r
data frames
lists
matrices
arrays
classes
processor speed
occupancy and motion detectors
strain
and tactile sensors
pressure
temperature sensors
position
displacement sensor
level sensor
force sensor
velocity
acceleration sensor
data link layer design issues
error detection and correction
elementary data link protocols
unrestricted simplex protocol
simplex stop-and-wait protocol
simplex protocol for a noisy c
data link protocol: hdlc
higher level data link control
internetworking and advanced i
switching and bridging
routing
routing among mobile devices
basic internetworking (ip)
the vision of cloud computing
the cloud computing reference
cloud reference models
characteristics of cloud compu
advantages of cloud computing
disadvantages of cloud computi
deadlock
deadlock prevention
avoidance
detection and recovery
system modeling
memory management strategies
swapping
memory allocation
segmentation
virtual memory management
demand paging
page replacement
file management
file attributes
access methods
directory and disk structure
file system mounting
automatic vs. manual mounting
file sharing
directory implementation
file allocation methods
i/o systems
i/o hardware
application i/o lnterface
direct memory access (dma)
polling v/s interrupts i/o
spooling and device reservation
transforming l/o requests to hardware operations
what is computer
functionalities of a computer
computer components
hardware
media role of forensics investigator
forensics investigation process
collecting network based evidence writing
computer forensics reports
auditing
plan an audit against a set of audit criteria
information security management
system management. introduction to iso 27001:2013
architectural design: architectural design decisio
system organization
modular decomposition styles
control styles
reference architectures. uml model. user interface
design issues
the ui design process
user analysis
user interface prototyping
interface evaluation. project management software
management activities
project planning
risk management. quality management: process and p
quality assurance and standards
quality planning
quality control
software measurement and metrics.
process synchronization
critical section problem
semaphores
types of semaphores
classical problems of synchronization
synchronization
framework.)
types of cloud services: software as a service
platform as a service – infrastructure as a servic
database as a service
monitoring as a service
communication as services. service providers- goog
amazon ec2
microsoft azure
sales force
threat modelling enterprise information security a
vulnerability assessment and penetration testing t
security in the cloud
security overview
cloud security challenges and risks. software-as-a
security monitoring
security architecture design
data security
application security
virtual machine security
identity management and access control
autonomic security.
introduction to the network layer: network layer s
network layer performance
ipv4 addressing
forwarding of ip packets
internet protocol
icmpv4
mobile ip unicast routing: introduction
routing algorithms
unicast routing protocols. next generation ip: ipv
ipv6 protocol
virtualization in cloud comput
atomic transaction
software
input devices
output devices
cpu (central processing unit)
unit of measurements
classification of computers
computer languages
generation of computers
data
information and knowledge
characteristics of computer
computer viruses
process improvement: process and product quality
process classification
process measurement
process analysis and modeling
process change
the cmmi process improvement framework. service or
virtualization: basics of virtualization
types of virtualizations
implementation levels of virtualization
virtualization structures
tools and mechanisms
virtualization of cpu
i/o devices
virtual clusters and resource management
virtualization for data-center automation
introduction to mapreduce
gfs
hdfs
hadoop
See more
Presentations
(11)Documents
(43)Likes
(12)Computer Memory
Sweta Kumari Barnwal
•
4 years ago
Service oriented software engineering
Sweta Kumari Barnwal
•
4 years ago
Validation & verification software engineering
Sweta Kumari Barnwal
•
4 years ago
Computer network physical layer
Sweta Kumari Barnwal
•
4 years ago
Computer program, computer languages, computer software
Sweta Kumari Barnwal
•
4 years ago
Computer Architecture
Sweta Kumari Barnwal
•
4 years ago
Introduction to computer system
Sweta Kumari Barnwal
•
4 years ago
Digital electronics Multiplexers & Demultiplexers
Sweta Kumari Barnwal
•
4 years ago
Computer network switches & their structures
Sweta Kumari Barnwal
•
5 years ago
Computer network transmission channel & topology
Sweta Kumari Barnwal
•
5 years ago
COMPUTER NETWORK_OSI & TCP/IP
Sweta Kumari Barnwal
•
5 years ago
Computer network introduction
Sweta Kumari Barnwal
•
5 years ago
Personal Information
Organization / Workplace
Jamshedpur, Jharkhand India
Occupation
Assistant Professor in Arka Jain University
Industry
Education
Website
Swetaprakash.blogspot.in
About
Assistant Professor
Tags
introduction
hybrid cloud
private cloud
public cloud
service engineering
grid computing
backdoors.
types of hackers
hackers and crackers
cyber-attacks and vulnerabilities malware threats
sniffing
gaining access
escalating privileges executing applications
hiding files
covering tracks
worms
trojans
social engineering targets and defence strategies
preventing insider threats
insider attack
packet switching
software development with services.
monitors
number system
central processing unit (cpu) memory
information assurance
threats and attack vectors
ethical hacking concepts and scopes
memory
dedicated private cloud
shared private cloud
community cloud
viruses
evolution of cloud computing
applications cloud computing
business models around cloud
cloud services: benefits and challenges of cloud c
types of cloud
cloud computing definition
restful services
classifications of cloud
major players in cloud computing
issues in cloud - eucalyptus - nimbus - open nebul
cloudsim.
(topics: cluster computing
grid computing versus cloud computing
key characteristics of cloud computing. cloud mode
and dynamic private cloud.)
checksum is an error detection code
hamming code is an error detection & correction co
multiple access: random access- aloha-csma-csma/cd
differential manchester coding. perspectives on co
encoding (nrz
nrzi
manchester
4b/5b)
framing
error detection
data link layer
error detection and correction techniques multiple
lan addresses and arp & rarp ppp: the point-to-poi
unicast routing protocols rip
ospf
bgp multicast routing protocols : mospf
dvmrp.
verification and validation: planning verification
software inspections
automated static analysis
verification and formal methods. software testing:
component testing
test case design
test automation. software measurement: size-orient
function-oriented metrics
cocomo model software cost estimation: software pr
estimation techniques
project duration and staffing
service oriented software engineering: services as
service-oriented architectures
custom coding
go-live
erp and related technologies business processing r
data warehousing
data mining
on-line analytical processing(olap)
supply chain management (scm)
customer relationship management(crm)
electronic data interchange (edi)
wireless networks & cellular wireless networks wir
wireless network architecture classification of wi
wpan
wlan
wman
wwan. ieee 802.11
ieee 802.16
bluetooth – standards
architecture and services principles of cellular n
generation of cellular networks – 1g
2g
2.5g
3g and 4g.
threat modelling
enterprise information security architecture
vulnerability
assessment and penetration testing
types of social engineering
introduction to cyber forensics
computer equipment and associated storage
polling
token passing. wired &wireless lans media access c
controlled access
channelization: fdma
tdma
cdma. wired lans – ethernet protocol
standard ethernet
fast ethernet
gigabit ethernet
10 gigabit ethernet wireless lans: introduction
ieee 802.11 architecture
mac sublayer addressing mechanism
physical layer bluetooth: architecture-bluetooth l
cellular telephony
satellite networks.
introduction to enterprise resource planning (erp
value chain framework
organizational functional units
evolution of erp systems
role of erp in organization
three-tier architecture of erp system
erp implementation lifecycle project preparation
initial costing
requirement engineering
erp solution selection
technical planning
change management and training plan
implementation and deployment planning
configuration
processor speed
instruction set
the instruction format
communication between various units of a computer
classification of computer
generation of computer
introduction to computer system
full adder
half adder
4. multiplexer & demultiplexer
1.combinational circuit 2. sequential circuit
batcher banyan switch
banyan switch
multistage switch
cross bar switch
time space time division switch
scanners
digital camera
speech recognition
pointing devices
keyboard
magneto optical disk.
optical disk
magnetic disk
magnetic tape
classification of secondary storage devices
types of rom. introduction
read only memory (rom)
types of ram
random access memory (ram)
memory hierarchy
multiprocessor systems
time division switch
topology & it's various classifications
transmission media & its classification
comparison between osi & tcp/ip
tcp/ip model
description of layers of osl model
osi model
transmission modes
types of communication
maximum data rate
signal classification
types of servers
signal parameters
transmission impairments
network classification by their component role
network benefits
components of computer network
space division switch
nic
gateway
brouter
bridge
repeater
router
hub
hybrid topology
tree topology
ring topology
star topology
bus topology
mesh topology
un-guided media or wireless
guided media 0r wired media
context models
requirements validations. system models: models an
requirements elicitation and analysis
safety and security of software systems. requireme
availability and reliability
a simple safety critical system
people and computers. critical system: types of cr
components of system such 9 as organization
systems engineering
emergent system properties
socio-technical system: essential characteristics
component software processes. software development
documentation of the software requirements. softwa
system requirements
user requirements
maintenance etc. software requirements: functional
manchester encoding
ethernet cabling
message switching
switching: circuit switching
time division multiplexing
wavelength division multiplexing
brief introduction about bluetooth and wimax. mult
performance. the physical layer: wireless transmis
implementing network software
network architecture
requirements
applications
structured methods.
object models
data models
behavioural models
testing
classification of programming languages
evolution of programming languages
and pseudo code (p code). introduction
flowchart
algorithm
developing a program
terminals.
projectors
audio output
soft copy output devices
computer output microfilm (com)
plotters
printers
hard copy output devices
classification of output
optical scanners. introduction
coding
software design
requirements analysis
introduction: what is software engineering? softwa
functions of an operating system
types of operating system
evolution of operating system
operating system
software terminology. introduction
application software
system software
software categories
relationship between software and hardware
selection of a programming language. introduction
features of a good programming language
generations of programming languages
definition & applications of computer network comp
multiprocessor systems.
multicomputer system
universal gates (nand
nor) ex-or
ex-nor
basic gates (and
or
not)
sensors
signals and systems
sensor classification
units of measurements
sensor characteristics
electric charges
fields and potentials capacitance
magnetism induction
resistance
piezoelectric effect
hall effect
temperature and thermal properties of material
heat transfer
light
dynamic models of sensor elements
topics: interface electronic circuits
input characteristics of interface circuits
amplifiers
excitation circuits
analog to digital converters
direct digitization and processing
bridge circuits
data transmission
batteries for low power sensors
icmpv6 protocol
transition from ipv4 to ipv6. introduction to the
transport layer protocols (simple protocol
stop-and-wait protocol
go-back-n protocol
selective repeat protocol
bidirectional protocols)
transport layer services
user datagram protocol
standard client / server protocols: worldwide- web
ftp
electronic mail
telnet
secured shell
domain name system. application layer: dns: name s
topics: introduction
characteristics of computers
block diagram of computer types of computers an
types of memory (primary and secondary)
i/o dev
operating system and services topics 1 dos – hist
files and directories 2 internal and external com
viz. input
storage
processing
output and control
features of windows
features of ms office
communication between various units of a computer
the instruction format
instruction set
building cloud computing envir
infrastructure and system deve
computing platform
parallel and distributed compu
hardware architecture of paral
conversion
bcd
binary addition
decimal to binary
decimal to octal
cluster computing
grid computing v/s cloud compu
key characteristics of cloud c
cloud models:
benefits of cloud models
dynamic private cloud
r program
r data types
basic of r programming languag
r constant
concatenation
rounding off
practice questions
complex numbers
integers
reserved words
how to run r
data frames
lists
matrices
arrays
classes
processor speed
occupancy and motion detectors
strain
and tactile sensors
pressure
temperature sensors
position
displacement sensor
level sensor
force sensor
velocity
acceleration sensor
data link layer design issues
error detection and correction
elementary data link protocols
unrestricted simplex protocol
simplex stop-and-wait protocol
simplex protocol for a noisy c
data link protocol: hdlc
higher level data link control
internetworking and advanced i
switching and bridging
routing
routing among mobile devices
basic internetworking (ip)
the vision of cloud computing
the cloud computing reference
cloud reference models
characteristics of cloud compu
advantages of cloud computing
disadvantages of cloud computi
deadlock
deadlock prevention
avoidance
detection and recovery
system modeling
memory management strategies
swapping
memory allocation
segmentation
virtual memory management
demand paging
page replacement
file management
file attributes
access methods
directory and disk structure
file system mounting
automatic vs. manual mounting
file sharing
directory implementation
file allocation methods
i/o systems
i/o hardware
application i/o lnterface
direct memory access (dma)
polling v/s interrupts i/o
spooling and device reservation
transforming l/o requests to hardware operations
what is computer
functionalities of a computer
computer components
hardware
media role of forensics investigator
forensics investigation process
collecting network based evidence writing
computer forensics reports
auditing
plan an audit against a set of audit criteria
information security management
system management. introduction to iso 27001:2013
architectural design: architectural design decisio
system organization
modular decomposition styles
control styles
reference architectures. uml model. user interface
design issues
the ui design process
user analysis
user interface prototyping
interface evaluation. project management software
management activities
project planning
risk management. quality management: process and p
quality assurance and standards
quality planning
quality control
software measurement and metrics.
process synchronization
critical section problem
semaphores
types of semaphores
classical problems of synchronization
synchronization
framework.)
types of cloud services: software as a service
platform as a service – infrastructure as a servic
database as a service
monitoring as a service
communication as services. service providers- goog
amazon ec2
microsoft azure
sales force
threat modelling enterprise information security a
vulnerability assessment and penetration testing t
security in the cloud
security overview
cloud security challenges and risks. software-as-a
security monitoring
security architecture design
data security
application security
virtual machine security
identity management and access control
autonomic security.
introduction to the network layer: network layer s
network layer performance
ipv4 addressing
forwarding of ip packets
internet protocol
icmpv4
mobile ip unicast routing: introduction
routing algorithms
unicast routing protocols. next generation ip: ipv
ipv6 protocol
virtualization in cloud comput
atomic transaction
software
input devices
output devices
cpu (central processing unit)
unit of measurements
classification of computers
computer languages
generation of computers
data
information and knowledge
characteristics of computer
computer viruses
process improvement: process and product quality
process classification
process measurement
process analysis and modeling
process change
the cmmi process improvement framework. service or
virtualization: basics of virtualization
types of virtualizations
implementation levels of virtualization
virtualization structures
tools and mechanisms
virtualization of cpu
i/o devices
virtual clusters and resource management
virtualization for data-center automation
introduction to mapreduce
gfs
hdfs
hadoop
See more