Name of the Assistant Professor- Mrs. Shikha Subject- Computer Science & Applications Lesson Plan– 18 Weeks (Jan-April 2019)
Week Date  BC(Voc) (IVth Sem) BVSD-43 Java Programming
1 1-Jan-19 JAVA and the Internet
2-Jan-19
3-Jan-19 The Java Programming Language and its Characteristics,
4-Jan-19 The Java Programming Language and its Characteristics,
5-Jan-19 Java Runtime Environment,
6-Jan-19 Sunday
2 7-Jan-19 Java Compiler
8-Jan-19 Java Developers Kit
9-Jan-19 Java Developers Kit
10-Jan-19 Programs
11-Jan-19 Running Java Applications
12-Jan-19 Running Java Applications
13-Jan-19 Sunday
3 14-Jan-19 Java Applets
15-Jan-19 Life Cycle of Applets
16-Jan-19 Life Cycle of Applets
17-Jan-19 Programs
18-Jan-19
19-Jan-19
20-Jan-19 Sunday
4 21-Jan-19 Java Programming
22-Jan-19 Elements of Java Data Types,
23-Jan-19 Elements of Java Data Types,
24-Jan-19 Scalar Data Types,
25-Jan-19 Scalar Data Types,
26-Jan-19 Republic Day
27-Jan-19 Sunday
5 28-Jan-19 First Class Objects
29-Jan-19 Control Structures
30-Jan-19 Examples
31-Jan-19 Classes and Objects: Introduction
1-Feb-19 Classes and Objects: Introduction
2-Feb-19 Classes and Objects: Introduction
3-Feb-19 Sunday
6 4-Feb-19 Introduction
5-Feb-19 Creating Objects and References
6-Feb-19 Programs
7-Feb-19 Programs
8-Feb-19 Creating Objects and References
9-Feb-19 Programs
10-Feb-19 Sunday
7 11-Feb-19 Defining Classes
12-Feb-19 Programs
13-Feb-19 Class Inheritance
14-Feb-19 Constructor
15-Feb-19 Programs
16-Feb-19 Access Mechanism
17-Feb-19 Sunday
8 18-Feb-19 Creating an Array
19-Feb-19 Programs
20-Feb-19 One dimensional array
21-Feb-19 Programs
22-Feb-19 Revision
23-Feb-19 Two dimensional Array
24-Feb-19 Sunday
9 25-Feb-19  Strings
26-Feb-19 String Functions
27-Feb-19 Programs
28-Feb-19 String Buffer Classes
1-Mar-19 String Buffer Classes Functions
2-Mar-19 Difference string Buffer and String Buffer Class
3-Mar-19 Sunday
10 4-Mar-19 Inheritance: Member Access
5-Mar-19 Inheritance Types
6-Mar-19  Member Access
7-Mar-19 Super Class,
8-Mar-19 Super Class,
9-Mar-19 Creating Multi Level Hierarchy
10-Mar-19 Sunday
11 11-Mar-19 Method Overloading
12-Mar-19 Method Overriding
13-Mar-19 Abstract Class,
14-Mar-19 Method
15-Mar-19 Using Final to Prevent Overriding and Overloading
16-Mar-19 The Object Class
17-Mar-19 Sunday
12 18-Mar-19 Holi Holiday
19-Mar-19 Holi Holiday
20-Mar-19 Holi Holiday
21-Mar-19 Holi Holiday
22-Mar-19 Holi Holiday
23-Mar-19 Holi Holiday
24-Mar-19 Sunday
13 25-Mar-19 Packages and Interfaces
26-Mar-19 Defining Packages
27-Mar-19 Access Protection
28-Mar-19 Importing Packages
29-Mar-19 Defining Interfaces.
30-Mar-19 Programs
31-Mar-19 Sunday
14 1-Apr-19 Exception Handling
2-Apr-19 Exception Types
3-Apr-19 Uncaught Exceptions
4-Apr-19 Multiple catch Clauses
5-Apr-19 Programs
6-Apr-19 Nested try Statements
7-Apr-19 Sunday
15 8-Apr-19 Throw
9-Apr-19 throws Finally
10-Apr-19 Programs
11-Apr-19 Java built-in Exceptions
12-Apr-19 Creating your own Exception Subclasses.
13-Apr-19 Ram Navmi
14-Apr-19 Sunday
16 15-Apr-19 Multithreading Programming
16-Apr-19 Creating threads
17-Apr-19 run() Method
18-Apr-19 new thread
19-Apr-19 thread Class
20-Apr-19 Stopping and Blocking threads
21-Apr-19 Sunday
17 22-Apr-19 Life Cycle of thread – New Born, Runnable, Running
23-Apr-19  Blocked, Dead, Waiting
24-Apr-19  Sleeping, Suspended, Blocked
25-Apr-19 using thread Methods
26-Apr-19 thread Exceptions
27-Apr-19 thread Priority
28-Apr-19 Sunday
18 29-Apr-19 Synchronization
30-Apr-19 Implementing the Runnable Interface.  
Name of the Assistant Professor- Mrs. Shikha Subject- Computer Science & Applications Lesson Plan- 18 Weeks (Jan-April 2019)
Week Date  BC(Voc) (VIth Sem) BVSD-62 Information Security
1 1-Jan-19 Security Basics
2-Jan-19 Security Basics
3-Jan-19 Introduction: What is Information Security,
4-Jan-19 Introduction: What is Information Security,
5-Jan-19 Security Goals
6-Jan-19 Sunday
2 7-Jan-19 Cryptography – Crypto Basic
8-Jan-19  Classic Cryptography
9-Jan-19 Symmetric Key Cryptography: Stream Ciphers
10-Jan-19  A5/1
11-Jan-19  RC4
12-Jan-19 Revision
13-Jan-19 Sunday
3 14-Jan-19 Revision
15-Jan-19 Block Ciphers
16-Jan-19 Block Ciphers
17-Jan-19  Feistel Cipher
18-Jan-19  Feistel Cipher
19-Jan-19 Revision
20-Jan-19 Sunday
4 21-Jan-19  DES,
22-Jan-19 Triple DES
23-Jan-19 Comparison
24-Jan-19  AES
25-Jan-19 Revision
26-Jan-19 Public Key Crypto-signature and Non-repudiation
27-Jan-19 Sunday
5 28-Jan-19 Public Key Crypto-signature and Non-repudiation
29-Jan-19  Confidentiality and Non-repudiation
30-Jan-19  Confidentiality and Non-repudiation
31-Jan-19 Revision
1-Feb-19 Public Key Infrastructure
2-Feb-19  Hash Function: The Birthday Problem
3-Feb-19 Sunday
6 4-Feb-19  Hash Function: The Birthday Problem
5-Feb-19 Revision
6-Feb-19  MD5
7-Feb-19 SHA-1
8-Feb-19 Tiger Hash, Use of Hash Function
9-Feb-19 Revision
10-Feb-19 Sunday
7 11-Feb-19 Access Control, Authentication and Authorization
12-Feb-19  Authentication Methods
13-Feb-19  Passwords, Biometric
14-Feb-19  Single – Sign on, Authentication Protocol
15-Feb-19  Kerberos,
16-Feb-19 Revision
17-Feb-19 Sunday
8 18-Feb-19 Access Control Matrix
19-Feb-19  ACLs
20-Feb-19 Revision
21-Feb-19 Multiple Level Security Model
22-Feb-19 Multilateral Security
23-Feb-19 Convert Channel, CAPTCHA
24-Feb-19 Sunday
9 25-Feb-19 Software Security – Software Flaws
26-Feb-19  Buffer Overflow
27-Feb-19  Incomplete Mediation
28-Feb-19 Revision
1-Mar-19  Race Conditions
2-Mar-19 Race Conditions
3-Mar-19 Sunday
10 4-Mar-19  Malware
5-Mar-19  Malware
6-Mar-19  Salami Attack
7-Mar-19  Salami Attack
8-Mar-19  Linearization Attacks
9-Mar-19  Linearization Attacks
10-Mar-19 Sunday
11 11-Mar-19 Revision
12-Mar-19  Trusting Software
13-Mar-19  Software Reverse Engineering
14-Mar-19  Digital Rights Management
15-Mar-19 Digital Rights Management
16-Mar-19  Operating System and Security.
17-Mar-19 Sunday
12 18-Mar-19 Holi Holiday
19-Mar-19 Holi Holiday
20-Mar-19 Holi Holiday
21-Mar-19 Holi Holiday
22-Mar-19 Holi Holiday
23-Mar-19 Holi Holiday
24-Mar-19 Sunday
13 25-Mar-19 Revision
26-Mar-19 Network Security – Network Security Basics,
27-Mar-19 TCP/IP Model and Port No.
28-Mar-19  Protocol Flaws
29-Mar-19  Enterprise Wide Network Design and Vulnerabilities
30-Mar-19 Revision
31-Mar-19 Sunday
14 1-Apr-19 Reconnaissance of Network,
2-Apr-19 Packet Sniffing,
3-Apr-19 Packet Sniffing,
4-Apr-19 Revision
5-Apr-19 Session Hijacking
6-Apr-19  ARP
7-Apr-19 Sunday
15 8-Apr-19 Spoofing
9-Apr-19  Web Site and Web Server Vulnerabilities
10-Apr-19  Web Site and Web Server Vulnerabilities
11-Apr-19  Denial of Service
12-Apr-19  SSL and IPSec Protocol, Firewall
13-Apr-19 Ram Navmi
14-Apr-19 Sunday
16 15-Apr-19  SSL and IPSec Protocol,
16-Apr-19 Firewall
17-Apr-19 Firewall
18-Apr-19 Intrusion Detection System
19-Apr-19 Intrusion Detection System
20-Apr-19 Revision
21-Apr-19 Sunday
17 22-Apr-19  Honey Pots, Email Security
23-Apr-19  Honey Pots, Email Security
24-Apr-19 Revision
25-Apr-19 Honey Pots, Email Security
26-Apr-19 Email Security
27-Apr-19 Administered Security – Planning, Risk Analysis,
28-Apr-19 Sunday
18 29-Apr-19 Organizational Policies,.  
30-Apr-19 Physical Security
Name of the Assistant Professor- Ms. Monika Subject- BVSD-23 (Networking and Internet) Lesson Plan– 18 Weeks (Jan-April 2019)
Week Date B.Voc (IInd Sem) Networking and Internet
1 1-Jan-19 Unit 1: Introduction to Computer Communications and Networking Technologies
2-Jan-19 Uses of Computer Networks
3-Jan-19 Network Devices
4-Jan-19 Nodes and Hosts
5-Jan-19 Types of Computer Networks
6-Jan-19 Sunday
2 7-Jan-19 Topologies
8-Jan-19 Network Software: Network Design Issues
9-Jan-19 Protocols
10-Jan-19 Connection-Oriented and Connectionless Services
11-Jan-19 Network Applications
12-Jan-19 Application Protocols
13-Jan-19 Sunday
3 14-Jan-19 Computer Communications
15-Jan-19 Networking Models:
16-Jan-19 Decentralized and Centralized Systems
17-Jan-19 Distributed Systems
18-Jan-19 Client/Server Model
19-Jan-19 Peer-to-Peer Model
20-Jan-19 Sunday
4 21-Jan-19 Web-Based Model
22-Jan-19 Network Architecture
23-Jan-19 OSI reference Model
24-Jan-19 Example Networks: The Internet
25-Jan-19 X.25
26-Jan-19 Republic Day
27-Jan-19 Sunday
5 28-Jan-19 Frame Relay
29-Jan-19 ATM
30-Jan-19 Revision of unit-1
31-Jan-19 Unit 2: Representing Data as Analog Signals
1-Feb-19 Representing Data as Digital Signals
2-Feb-19 Data Rate
3-Feb-19 Sunday
6 4-Feb-19 Bandwidth
5-Feb-19 Capacity
6-Feb-19 Baud Rate
7-Feb-19 Digital Carrier Systems
8-Feb-19 Guided Transmission Media
9-Feb-19 Wireless Transmission Media
10-Feb-19 Sunday
7 11-Feb-19 Assignment-1
12-Feb-19 Communication Satellites
13-Feb-19 Switching
14-Feb-19 Multiplexing
15-Feb-19 Dialup Networking
16-Feb-19 Analog Modem Concepts
17-Feb-19 Sunday
8 18-Feb-19 DSL Service
19-Feb-19 Holiday
20-Feb-19 Revision of unit-2
21-Feb-19 Unit 3: Data Link Layer: Framing, Flow Control
22-Feb-19 Error Control
23-Feb-19 Error Detection and Correction
24-Feb-19 Sunday
9 25-Feb-19 Sliding Window Protocols
26-Feb-19 Media Access Control
27-Feb-19 Random Access Protocols
28-Feb-19 Token Passing Protocols
1-Mar-19 Token Ring
2-Mar-19 Introduction to LAN Technologies: Ethernet
3-Mar-19 Sunday
10 4-Mar-19 Holiday
5-Mar-19 Sessional test
6-Mar-19 Switched Ethernet
7-Mar-19 VLAN
8-Mar-19 Fast Ethernet
9-Mar-19 Gigabit Ethernet
10-Mar-19 Sunday
11 11-Mar-19 Assignment-2
12-Mar-19 Token ring
13-Mar-19 FDDI
14-Mar-19 Wireless LANs
15-Mar-19 Bluetooth
16-Mar-19 Network Hardware Components: Connectors
17-Mar-19 Sunday
12 18-Mar-19 Holi Holiday
19-Mar-19 Holi Holiday
20-Mar-19 Holi Holiday
21-Mar-19 Holi Holiday
22-Mar-19 Holi Holiday
23-Mar-19 Holi Holiday
24-Mar-19 Sunday
13 25-Mar-19 Transceivers
26-Mar-19 Repeaters
27-Mar-19 Hubs
28-Mar-19 Network Interface Cards and PC Cards
29-Mar-19 Bridges
30-Mar-19 Switches
31-Mar-19 Sunday
14 1-Apr-19 Routers
2-Apr-19 Gateways
3-Apr-19 Network Security Issues: Security Threats
4-Apr-19 Encryption Methods
5-Apr-19 Authentication
6-Apr-19 Symmetric – Key Algorithms
7-Apr-19 Sunday
15 8-Apr-19 Public-Key Algorithms
9-Apr-19 Revision of unit-3
10-Apr-19 Unit-4: Internet
11-Apr-19 Growth of Internet
12-Apr-19 Owner of the Internet
13-Apr-19 Ram Navmi
14-Apr-19 Sunday
16 15-Apr-19 Internet Services Provider
16-Apr-19 Anatomy of Internet
17-Apr-19 Arpanet and Internet
18-Apr-19 History of the World Wide Web
19-Apr-19 Services Available on Internet Wais
20-Apr-19 Basic Internet Terminologies
21-Apr-19 Sunday
17 22-Apr-19 Net Etiquette
23-Apr-19 Applications
24-Apr-19 Commerce on the Internet
25-Apr-19 Governance on/through the Internet
26-Apr-19 Impact of Internet on Society
27-Apr-19 Revision of unit-4
28-Apr-19 Sunday
18 29-Apr-19 Revision of unit-4
30-Apr-19 Test of unit-4
 
Name of the Assistant Professor– Ms. Monika Subject- BVSD-61 (Mobile Computing) Lesson Plan- 18 Weeks (Jan-April 2019)
Week Date B.Voc (VIthSem) Mobile Computing
1 1-Jan-19 Unit 1: Introduction to Mobile Communications
2-Jan-19 Novel Applications
3-Jan-19 Limitations
4-Jan-19 Architecture
5-Jan-19 GSM: Mobile Services
6-Jan-19 Sunday
2 7-Jan-19 System Architecture
8-Jan-19 Radio Interface
9-Jan-19 Protocols
10-Jan-19 Localization and Calling
11-Jan-19 Handover
12-Jan-19 Security and New Data Services
13-Jan-19 Sunday
3 14-Jan-19 Wireless Medium Access Control: Motivation for a Specialized MAC
15-Jan-19 Hidden and Exposed Terminals
16-Jan-19 Near and far Terminals
17-Jan-19 SDMA
18-Jan-19 FDMA
19-Jan-19 TDMA
20-Jan-19 Sunday
4 21-Jan-19 CDMA
22-Jan-19 Revision of unit-1
23-Jan-19 Doubts of unit-1
24-Jan-19 Test of unit-1
25-Jan-19 Unit 2: Mobile Network Layer: Mobile IP
26-Jan-19 Republic Day
27-Jan-19 Sunday
5 28-Jan-19 Goals
29-Jan-19 Assumptions
30-Jan-19 Entities and Terminology
31-Jan-19 IP Packet Delivery
1-Feb-19 Agent Advertisement and Discovery
2-Feb-19 Registration
3-Feb-19 Sunday
6 4-Feb-19 Tunneling
5-Feb-19 Encapsulation
6-Feb-19 Optimizations
7-Feb-19 Dynamic Host Configuration Protocol (DHCP)
8-Feb-19  Mobile Transport Layer: Traditional TCP
9-Feb-19 Indirect TCP
10-Feb-19 Sunday
7 11-Feb-19 Assignment-1
12-Feb-19 Snooping TCP
13-Feb-19 Mobile TCP
14-Feb-19 Fast Retransmit/Fast Recovery
15-Feb-19 Transmission/Time-out Freezing
16-Feb-19 Selective Retransmission
17-Feb-19 Sunday
8 18-Feb-19 Transaction Oriented TCP
19-Feb-19 Holiday
20-Feb-19 Revision of unit-2
21-Feb-19 Doubts of unit-2
22-Feb-19 Test of unit-2
23-Feb-19 Unit 3: Database Issues: Hoarding Techniques
24-Feb-19 Sunday
9 25-Feb-19 Catching Invalidation Mechanisms
26-Feb-19 Client Server Computing with Adaption
27-Feb-19 Power-aware Computing
28-Feb-19 Context-aware Computing
1-Mar-19 Transactional Models
2-Mar-19 Query Processing
3-Mar-19 Sunday
10 4-Mar-19 Holiday
5-Mar-19 Sessional test
6-Mar-19 Recovery Issues
7-Mar-19 Quality of Service Issues
8-Mar-19 Data Dissemination: Communications Asymmetry
9-Mar-19 Classification of new Data Delivery Mechanisms
10-Mar-19 Sunday
11 11-Mar-19 Assignment-2
12-Mar-19 Push Based Mechanisms
13-Mar-19 Pull-based Mechanisms
14-Mar-19 Hybrid Mechanisms
15-Mar-19 Selective Tuning (indexing) Techniques
16-Mar-19 Revision of unit-3
17-Mar-19 Sunday
12 18-Mar-19 Holi Holiday
19-Mar-19 Holi Holiday
20-Mar-19 Holi Holiday
21-Mar-19 Holi Holiday
22-Mar-19 Holi Holiday
23-Mar-19 Holi Holiday
24-Mar-19 Sunday
13 25-Mar-19 Test of unit-3
26-Mar-19 Unit-4: Mobile Ad hoc Networks (MANETs): Overview
27-Mar-19 Properties of a MANET
28-Mar-19 Spectrum of MANET Applications
29-Mar-19 Routing
30-Mar-19 Various Routing Algorithms
31-Mar-19 Sunday
14 1-Apr-19 Various Routing Algorithms
2-Apr-19 DSR
3-Apr-19 AODV
4-Apr-19 CGSR
5-Apr-19 OLSR
6-Apr-19 TORA
7-Apr-19 Sunday
15 8-Apr-19 Revision of protocols
9-Apr-19 Security in MANETs
10-Apr-19 Security in MANETs
11-Apr-19 Protocols and Tools: Wireless Application Protocol-WAP
12-Apr-19 WAP Introduction
13-Apr-19 Ram Navmi
14-Apr-19 Sunday
16 15-Apr-19 Protocol Architecture
16-Apr-19 Protocol Architecture
17-Apr-19 Treatment of Protocols of all Layers
18-Apr-19 Bluetooth
19-Apr-19 User Scenarios
20-Apr-19 Physical Layer
21-Apr-19 Sunday
17 22-Apr-19 MAC Layer
23-Apr-19 Networking
24-Apr-19  Security
25-Apr-19 Link Management
26-Apr-19 J2ME
27-Apr-19 Revision of unit-4
28-Apr-19 Sunday
18 29-Apr-19 Revision of unit-4
30-Apr-19 Test of unit-4