System Analysis and Design - Syllabus
Embark on a profound academic exploration as you delve into the System Analysis and Design course () within the distinguished Tribhuvan university's CSIT department. Aligned with the 2065 Syllabus, this course (CSC-252) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60+20+20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Units
Key Topics
-
Mobile IP
OV-1Mobile IP is a technology that allows devices to maintain connectivity to the internet while moving between different networks. It enables IP packet delivery, agent discovery, tunneling, and encapsulation.
-
IPv6 Network Layer
OV-2IPv6 is the next generation internet protocol that provides a new network layer for the internet, offering improved addressing, security, and mobility features.
-
Mobile IP Session Initiation Protocol
OV-3Mobile IP session initiation protocol is a signaling protocol that enables the establishment and management of mobile IP sessions, allowing devices to initiate and maintain connections while moving.
-
Wireless Application Protocol
OV-4Wireless application protocol is a set of protocols that enables wireless devices to access and use internet-based services and applications, providing a standardized interface for wireless communication.
-
Mobile Routing Protocols
OV-5Mobile routing protocols, such as DSDV, AODV, and DSR, are designed to enable efficient and adaptive routing in mobile networks, allowing devices to communicate and exchange data while moving.
Key Topics
-
Introduction to E-Governance Models
MO-1Overview of E-Governance models and their significance in digital governance.
-
Broadcasting / Wider Dissemination Model
MO-2A model of E-Governance that focuses on disseminating information to citizens through various channels.
-
Critical Flow Model
MO-3A model that emphasizes the critical flow of information and services between government and citizens.
The need for a Structured Methodology, CASE as an Enabling Technology, Advantages and Disadvantages of Modeling and Data Dictionaries, Other Specification Tools
Key Topics
-
Feistel Cipher Structure and Substitution Permutation Network (SPN)
SY-1Feistel Cipher Structure is a design model for block ciphers, and Substitution Permutation Network (SPN) is a method of constructing block ciphers. Both are fundamental concepts in symmetric cryptography.
-
Data Encryption Standards (DES) and Variants
SY-2Data Encryption Standards (DES) is a symmetric-key block cipher, and its variants include Double DES and Triple DES. These are important encryption algorithms in cryptography.
-
Finite Fields and Modular Arithmetic
SY-3Finite Fields, including Groups, Rings, and Fields, are mathematical structures used in cryptography. Modular Arithmetic, Euclidean Algorithm, and Galois Fields are essential concepts in finite fields.
-
International Data Encryption Algorithm (IDEA)
SY-4International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher used for encrypting data. It is an important encryption algorithm in cryptography.
-
Advanced Encryption Standard (AES) Cipher
SY-5Advanced Encryption Standard (AES) is a symmetric-key block cipher used for encrypting data. It is a widely used and secure encryption algorithm in cryptography.
Key Topics
-
Feistel Cipher Structure and Substitution Permutation Network (SPN)
SY-1Feistel Cipher Structure is a design model for block ciphers, and Substitution Permutation Network (SPN) is a method of constructing block ciphers. Both are fundamental concepts in symmetric cryptography.
-
Data Encryption Standards (DES) and Variants
SY-2Data Encryption Standards (DES) is a symmetric-key block cipher, and its variants include Double DES and Triple DES. These are important encryption algorithms in cryptography.
-
Finite Fields and Modular Arithmetic
SY-3Finite Fields, including Groups, Rings, and Fields, are mathematical structures used in cryptography. Modular Arithmetic, Euclidean Algorithm, and Galois Fields are essential concepts in finite fields.
-
International Data Encryption Algorithm (IDEA)
SY-4International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher used for encrypting data. It is an important encryption algorithm in cryptography.
-
Advanced Encryption Standard (AES) Cipher
SY-5Advanced Encryption Standard (AES) is a symmetric-key block cipher used for encrypting data. It is a widely used and secure encryption algorithm in cryptography.
System Testing and quality Assurance, Implementation and Software Maintenance, Hardware / Software Selection and the Computer Contract, Project Scheduling and Software
Object-Oriented Development Life Cycle, the Unified Modeling Language, Use-Case Modeling, Object Modeling: Class Diagrams, Dynamic Modeling: State Diagrams
Dynamic Modeling: Sequence Diagramming, Analysis Verses Design