Topics for Ph.D. Comprehensive Examination

Area 1: Computer Networks

 

Application Layer: Principles of Network Applications, The Web and HTTP, File Transfer: FTP, Electronic Mail in the Internet, DNS—The Internet's Directory Service, Peer-to-Peer Applications

Transport Layer: Connectionless Transport: UDP, Principles of Reliable Data Transfer, Connection-Oriented Transport: TCP, Principles of Congestion Control, TCP Congestion Control

Network Layer: Virtual Circuit and Datagram Networks, The Internet Protocol (IP), Addressing and Subnetting, Routing Algorithms, Internet Routing Protocols, Spanning Tree Algorithms, Principles of Mobility Management and Mobile IP

Link Layer and Local Area Networks: Services and Multiple Access Protocols, ARQ strategies, analysis of ARQ strategies, Ethernet: 802.3, Wi-Fi: 802.11 Wireless LANs

Delay Models in Data Networks {ref 2: chapter 12]

Little's theorem, Single and multiple servers queuing models, Network of queues (Jackson's theorem)

 

References: 

  1. Computer Networks by Andrew Tanenbaum, Prentice Hall; 5 edition, 2010.
  2. Probability, Statistics, and Random Processes for Electrical Engineering by L. Garcia, Prentice Hall; 3rd edition, 2008.

 Area 2: Computer Networks Security

 

Network Security: Cryptography: Principles, Ciphers, Diffie-Hellman Key Exchange, DES, AES, Cipher Modes; Public Key Infrastructures: RSA, Public Key Certificates, X.509; Digital Signatures: Message Digests, Symmetric Key Signatures, Public Key Signatures, Attacks; Security Protocols: Kerberos, SSL/TLS, IPSEC.

Cryptography: Principles, Ciphers, DES, AES {ref [2]}, Cipher Modes, Integrity

Public Key Infrastructures: RSA, Public Key Certificates, X.509, Digital Signatures: Message Digests, Diffie-Hellman Key Exchange, Public Key Signatures, Elliptic Curve Cryptography {ref [2]}

Security Protocols: Hash Functions, Access Control, Authentication, Authorization, and Other Topics, Simple Authentication, Real-World Security Protocols (SSH, SSL/TLS, IPsec, Kerberos), Attacks


References:

  1. Information Security: Principles and Practice, Mark Stamp, Wiley, 2nd Edition, 2011.
  2. Understanding Cryptography: A Textbook for Students and Practitioners, Christof Paar and Jan Pelzl, Springer, 1st Edition, 2010.

 Area 3: Digital Systems Design

Fundamentals of Digital System Design: Combinational & Sequential logic. Moore and Mealy Machines, Data Path and control unit design. Understanding of ASIC design flow (Design entry, logic synthesis, technology mapping, placement, and routing). Design merits; complexity, area, speed, and power dissipation.

Hardware modeling and hardware description language: Design Hierarchy, partitioning, and top-down Design. Modeling constructs. Structural, behavioral, and RTL Models, Modeling Iterative/Regular Structures, and Test Benches. Design Organization & Parameterization.  HDL coding for synthesis.

High-Level Synthesis: data flow and control sequencing graphs, data-flow-based transformations, Architectural Synthesis, resources and constraints, scheduling, time-constrained scheduling, resource-constrained scheduling, heuristic scheduling algorithms: List scheduling, Allocation, and Binding: resource sharing, register sharing. Data path and control unit synthesis.

References:

  1. M. D. Ciletti, "Advanced Digital Design with the Verilog HDL," (Prentice Hall), 2/e 2010.
  2. Synthesis and Optimization of Digital Circuits – Giovanni De Micheli, McGraw Hill International Edition, ISBN –0-07-113271-6, 1994. (Chapters 4-6).

 Area 4: Computer Architecture

Fundamentals: technology trends, cost, power, dependability, performance.

Instruction Level Parallelism: dynamic scheduling, speculation, hazards, dynamic branch prediction, multiple issues, static scheduling and VLIW, compiler techniques for exposing ILP, loop unrolling, and software pipelining.

Memory Hierarchy: cache memory, hardware/software techniques to improve cache performance, virtual memory, performance, and design tradeoffs.

Multiprocessor and Thread-Level Parallelism: symmetric multiprocessors, snooping coherence protocols, distributed shared memory, directory-based coherence, synchronization.

Basic parallel programming techniques, decomposition, assignment, orchestration, and mapping. Performance: evaluation, scalability, and workload selection.

References:

  1. Hennessey & Patterson, Computer Architecture: A Quantitative Approach, latest edition.
  2. Culler and Singh, Parallel Computer Architecture: A Hardware/Software Approach, Morgan Kaufmann, latest edition.