System Analysis and Design - Syllabus

Course Overview and Structure

Embark on a profound academic exploration as you delve into the System Analysis and Design course () within the distinguished Tribhuvan university's CSIT department. Aligned with the 2065 Syllabus, this course (CSC-252) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60+20+20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.

This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.


Course Synopsis:       This course help launch the careers of successful systems analyst – or of users assuming an active role in building systems that satisfy their organization’s information needs. Also provides a solid foundation of systems.


Goal: This course will provide the concept of system representation. 


Units

Key Topics

  • Mobile IP
    OV-1

    Mobile IP is a technology that allows devices to maintain connectivity to the internet while moving between different networks. It enables IP packet delivery, agent discovery, tunneling, and encapsulation.

  • IPv6 Network Layer
    OV-2

    IPv6 is the next generation internet protocol that provides a new network layer for the internet, offering improved addressing, security, and mobility features.

  • Mobile IP Session Initiation Protocol
    OV-3

    Mobile IP session initiation protocol is a signaling protocol that enables the establishment and management of mobile IP sessions, allowing devices to initiate and maintain connections while moving.

  • Wireless Application Protocol
    OV-4

    Wireless application protocol is a set of protocols that enables wireless devices to access and use internet-based services and applications, providing a standardized interface for wireless communication.

  • Mobile Routing Protocols
    OV-5

    Mobile routing protocols, such as DSDV, AODV, and DSR, are designed to enable efficient and adaptive routing in mobile networks, allowing devices to communicate and exchange data while moving.

Key Topics

  • Introduction to E-Governance Models
    MO-1

    Overview of E-Governance models and their significance in digital governance.

  • Broadcasting / Wider Dissemination Model
    MO-2

    A model of E-Governance that focuses on disseminating information to citizens through various channels.

  • Critical Flow Model
    MO-3

    A model that emphasizes the critical flow of information and services between government and citizens.

The need for a Structured Methodology, CASE as an Enabling Technology, Advantages and Disadvantages of Modeling and Data Dictionaries, Other Specification Tools

Key Topics

  • Feistel Cipher Structure and Substitution Permutation Network (SPN)
    SY-1

    Feistel Cipher Structure is a design model for block ciphers, and Substitution Permutation Network (SPN) is a method of constructing block ciphers. Both are fundamental concepts in symmetric cryptography.

  • Data Encryption Standards (DES) and Variants
    SY-2

    Data Encryption Standards (DES) is a symmetric-key block cipher, and its variants include Double DES and Triple DES. These are important encryption algorithms in cryptography.

  • Finite Fields and Modular Arithmetic
    SY-3

    Finite Fields, including Groups, Rings, and Fields, are mathematical structures used in cryptography. Modular Arithmetic, Euclidean Algorithm, and Galois Fields are essential concepts in finite fields.

  • International Data Encryption Algorithm (IDEA)
    SY-4

    International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher used for encrypting data. It is an important encryption algorithm in cryptography.

  • Advanced Encryption Standard (AES) Cipher
    SY-5

    Advanced Encryption Standard (AES) is a symmetric-key block cipher used for encrypting data. It is a widely used and secure encryption algorithm in cryptography.

Key Topics

  • Feistel Cipher Structure and Substitution Permutation Network (SPN)
    SY-1

    Feistel Cipher Structure is a design model for block ciphers, and Substitution Permutation Network (SPN) is a method of constructing block ciphers. Both are fundamental concepts in symmetric cryptography.

  • Data Encryption Standards (DES) and Variants
    SY-2

    Data Encryption Standards (DES) is a symmetric-key block cipher, and its variants include Double DES and Triple DES. These are important encryption algorithms in cryptography.

  • Finite Fields and Modular Arithmetic
    SY-3

    Finite Fields, including Groups, Rings, and Fields, are mathematical structures used in cryptography. Modular Arithmetic, Euclidean Algorithm, and Galois Fields are essential concepts in finite fields.

  • International Data Encryption Algorithm (IDEA)
    SY-4

    International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher used for encrypting data. It is an important encryption algorithm in cryptography.

  • Advanced Encryption Standard (AES) Cipher
    SY-5

    Advanced Encryption Standard (AES) is a symmetric-key block cipher used for encrypting data. It is a widely used and secure encryption algorithm in cryptography.

System Testing and quality Assurance, Implementation and Software Maintenance, Hardware / Software Selection and the Computer Contract, Project Scheduling and Software

Object-Oriented Development Life Cycle, the Unified Modeling Language, Use-Case Modeling, Object Modeling: Class Diagrams, Dynamic Modeling: State Diagrams

Dynamic Modeling: Sequence Diagramming, Analysis Verses Design