0% found this document useful (0 votes)
19 views2 pages

CCS335 CC

Uploaded by

abiramicse09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

CCS335 CC

Uploaded by

abiramicse09
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

‭‬ T

L ‭ ‬ P
‭‬ C‭ ‬
‭CCS335‬ ‭CLOUD COMPUTING‬
‭2‬ ‭0‬ ‭2‬ ‭3‬

‭COURSE OBJECTIVES:‬
‭●‬ ‭To understand the principles of cloud architecture, models and infrastructure.‬
‭●‬ ‭To understand the concepts of virtualization and virtual machines.‬
‭●‬ ‭To gain knowledge about virtualization Infrastructure.‬
‭●‬ ‭To explore and experiment with various Cloud deployment environments.‬
‭●‬ ‭To learn about the security issues in the cloud environment.‬

‭UNIT 1 : CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE‬ ‭6‬


‭Introduction‬‭to‬‭big‬‭data‬‭–‬‭convergence‬‭of‬‭key‬‭trends‬‭–‬‭unstructured‬‭data‬‭–‬‭industry‬‭examples‬‭of‬
‭big‬ ‭data‬ ‭–‬ ‭web‬ ‭analytics‬ ‭–‬ ‭big‬ ‭data‬ ‭applications–‬ ‭big‬ ‭data‬ ‭technologies‬ ‭–‬ ‭introduction‬ ‭to‬
‭Hadoop‬ ‭–open‬ ‭source‬ ‭technologies‬ ‭–‬ ‭cloud‬ ‭and‬ ‭big‬ ‭data‬ ‭–‬ ‭mobile‬ ‭business‬ ‭intelligence‬ ‭–‬
‭Crowd sourcing analytics – inter and trans firewall analytics.‬

‭UNIT 2 : VIRTUALIZATION BASICS‬ ‭6‬


‭Virtual Machine Basics – Taxonomy of Virtual Machines – Hypervisor – Key Concepts –‬
‭Virtualization‬ ‭structure‬ ‭–‬ ‭Implementation‬ ‭levels‬ ‭of‬ ‭virtualization‬ ‭–‬ ‭Virtualization‬ ‭Types:‬ ‭Full‬
‭Virtualization‬ ‭–‬‭Para‬‭Virtualization‬‭–‬‭Hardware‬‭Virtualization‬‭–‬‭Virtualization‬‭of‬‭CPU,‬‭Memory‬
‭and I/O devices.‬

‭UNIT 3 : VIRTUALIZATION INFRASTRUCTURE AND DOCKER 7‬


‭Desktop‬ ‭Virtualization‬ ‭–‬ ‭Network‬ ‭Virtualization‬ ‭–‬ ‭Storage‬ ‭Virtualization‬ ‭–‬ ‭System-level‬ ‭of‬
‭Operating‬ ‭Virtualization‬ ‭–‬ ‭Application‬ ‭Virtualization‬ ‭–‬ ‭Virtual‬ ‭clusters‬ ‭and‬ ‭Resource‬
‭Management‬ ‭–Containers‬ ‭vs.‬ ‭Virtual‬ ‭Machines‬ ‭–‬ ‭Introduction‬ ‭to‬ ‭Docker‬ ‭–‬ ‭Docker‬
‭Components – Docker Container – Docker Images and Repositories.‬

‭UNIT 4: CLOUD DEPLOYMENT ENVIRONMENT 6‬


‭Google‬ ‭App‬ ‭Engine‬ ‭–‬ ‭Amazon‬ ‭AWS‬ ‭–‬ ‭Microsoft‬ ‭Azure;‬ ‭Cloud‬ ‭Software‬ ‭Environments‬ ‭–‬
‭Eucalyptus – OpenStack.‬

‭UNIT 5: CLOUD SECURITY‬ ‭5‬


‭ irtualization System-Specific Attacks: Guest hopping – VM migration attack – hyperjacking.‬
V
‭Data Security and Storage; Identity and Access Management (IAM) - IAM Challenges - IAM‬
‭Architecture and Practice.‬

‭Total Hours - 30‬


‭ OURSE OUTCOMES:‬
C
‭After the completion of this course, students will be able to:‬
‭CO1:‬‭Understand the design challenges in the cloud.‬
‭CO2:‬‭Apply the concept of virtualization and its types.‬
‭CO3:‬‭Experiment with virtualization of hardware resources‬‭and Docker.‬
‭CO4:‬‭Develop and deploy services on the cloud and‬‭set up a cloud environment.‬
‭CO5:‬‭Explain security challenges in the cloud environment.‬

‭ RACTICAL EXERCISES:
P 30 PERIODS‬
‭1. Install Virtualbox/VMware/ Equivalent open source cloud Workstation with different‬
‭flavours of Linux or Windows OS on top of windows 8 and above.‬
‭2. Install a C compiler in the virtual machine created using a virtual box and execute Simple‬
‭P rograms‬
‭3. Install Google App Engine. Create a hello world app and other simple web applications‬
‭using python/java.‬
‭4. Use the GAE launcher to launch the web applications.‬
‭5. Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not‬
‭present in CloudSim.‬
‭6. Find a procedure to transfer the files from one virtual machine to another virtual machine.‬
‭7. Install Hadoop single node cluster and run simple applications like wordcount.‬
‭8. Creating and Executing Your First Container Using Docker.‬
‭9. Run a Container from Docker Hub‬

‭TOTAL: 60PERIODS‬
‭ EXT BOOKS‬
T
‭1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From‬
‭Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.‬
‭2. James Turnbull, “The Docker Book”, O’Reilly Publishers, 2014.‬
‭3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud‬
‭Computing”, Wiley Publishing, 2010.‬

‭REFERENCES‬

1‭ . James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and‬
‭Processes”, Elsevier/Morgan Kaufmann, 2005.‬
‭2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an‬
‭enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.‬

‭CO’s-PO’s & PSO’s MAPPING‬

‭PO‬ ‭PSO‬
‭CO‬
‭1 ‬ ‭‬
2 ‭‬
3 ‭‬
4 ‭‬
5 ‭6 ‬ ‭‬
7 ‭‬
8 ‭‬
9 ‭1 0‬ ‭11‬ ‭1 2‬ ‭1 ‬ ‭2 ‬ ‭3‬
‭‬
1 ‭3‬ ‭2‬ ‭1‬ ‭1‬ ‭1‬ ‭-‬ ‭-‬ ‭-‬ ‭2‬ ‭3‬ ‭1‬ ‭3‬ ‭2‬ ‭1‬ ‭3‬
‭2‬ ‭3‬ ‭1‬ ‭2‬ ‭2‬ ‭1‬ ‭-‬ ‭-‬ ‭-‬ ‭1‬ ‭2‬ ‭1‬ ‭3‬ ‭2‬ ‭2‬ ‭1‬
‭3‬ ‭‬
2 ‭3‬ ‭2‬ ‭3‬ ‭1‬ ‭-‬ ‭-‬ ‭-‬ ‭3‬ ‭1‬ ‭1‬ ‭3‬ ‭1‬ ‭1‬ ‭1‬
‭4‬ ‭‬
1 ‭2‬ ‭3‬ ‭3‬ ‭3‬ ‭-‬ ‭-‬ ‭-‬ ‭3‬ ‭3‬ ‭1‬ ‭2‬ ‭1‬ ‭3‬ ‭3‬
‭5‬ ‭2‬ ‭3‬ ‭3‬ ‭1‬ ‭3‬ ‭-‬ ‭-‬ ‭-‬ ‭2‬ ‭2‬ ‭1‬ ‭2‬ ‭2‬ ‭2‬ ‭3‬
‭ Vg.‬ ‭2.2‬
A ‭2.2‬ ‭2.2‬ ‭2‬ ‭1.8‬ ‭-‬ ‭-‬ ‭-‬ ‭2.2‬ ‭2.2‬ ‭1‬ ‭ .6‬ ‭1.6‬ ‭1.8‬ 2‭ .2‬
2

‭1 - low, 2 - me dium, 3 - high, ‘-' - no corre lation‬

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy