PTCCS335 Syllabus - Cloud Computing - 2023 Regulation Anna University
PTCCS335 Syllabus - Cloud Computing - 2023 Regulation Anna University
PTCCS335 |
CLOUD COMPUTING |
L T P C |
---|
2023
COURSE OBJECTIVES:
• To understand the principles of cloud architecture, models and infrastructure.
• To understand the concepts of virtualization and virtual machines.
• To gain knowledge about virtualization Infrastructure.
• To explore and experiment with various Cloud deployment environments.
• To learn about the security issues in the cloud environment.
• To understand the concepts of virtualization and virtual machines.
• To gain knowledge about virtualization Infrastructure.
• To explore and experiment with various Cloud deployment environments.
• To learn about the security issues in the cloud environment.
UNIT I |
CLOUD ARCHITECTURE MODELS AND INFRASTRUCTURE |
6 |
---|
Cloud Architecture: System Models for Distributed and Cloud Computing – NIST Cloud Computing Reference Architecture – Cloud deployment models – Cloud service models; Cloud Infrastructure: Architectural Design of Compute and Storage Clouds – Design Challenges
UNIT II |
VIRTUALIZATION BASICS |
6 |
---|
Virtual Machine Basics – Taxonomy of Virtual Machines – Hypervisor – Key Concepts – Virtualization structure – Implementation levels of virtualization – Virtualization Types: Full Virtualization – Para Virtualization – Hardware Virtualization – Virtualization of CPU, Memory and I/O devices.
UNIT III |
VIRTUALIZATION INFRASTRUCTURE AND DOCKER |
7 |
---|
Desktop Virtualization – Network Virtualization – Storage Virtualization – System-level of Operating Virtualization – Application Virtualization – Virtual clusters and Resource Management – Containers vs. Virtual Machines – Introduction to Docker – Docker Components – Docker Container – Docker Images and Repositories.
UNIT IV |
CLOUD DEPLOYMENT ENVIRONMENT |
6 |
---|
Google App Engine – Amazon AWS – Microsoft Azure; Cloud Software Environments – Eucalyptus – OpenStack.
UNIT V |
CLOUD SECURITY |
5 |
---|
Virtualization System-Specific Attacks: Guest hopping – VM migration attack – hyperjacking. Data Security and Storage; Identity and Access Management (IAM) - IAM Challenges - IAM Architecture and Practice.
30 PERIODS
PRACTICAL EXERCISES: | 30 PERIODS |
---|
1. Install Virtualbox/VMware/ Equivalent open source cloud Workstation with different flavours of Linux or Windows OS on top of windows 8 and above.
2. Install a C compiler in the virtual machine created using a virtual box and execute Simple Programs.
3. Install Google App Engine. Create a hello world app and other simple web applications using python/java.
4. Use the GAE launcher to launch the web applications.
5. Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not present in CloudSim.
6. Find a procedure to transfer the files from one virtual machine to another virtual machine.
7. Install Hadoop single node cluster and run simple applications like wordcount.
8. Creating and Executing Your First Container Using Docker.
9. Run a Container from Docker Hub
2. Install a C compiler in the virtual machine created using a virtual box and execute Simple Programs.
3. Install Google App Engine. Create a hello world app and other simple web applications using python/java.
4. Use the GAE launcher to launch the web applications.
5. Simulate a cloud scenario using CloudSim and run a scheduling algorithm that is not present in CloudSim.
6. Find a procedure to transfer the files from one virtual machine to another virtual machine.
7. Install Hadoop single node cluster and run simple applications like wordcount.
8. Creating and Executing Your First Container Using Docker.
9. Run a Container from Docker Hub
COURSE OUTCOMES:
CO1: Understand the design challenges in the cloud.
CO2: Apply the concept of virtualization and its types.
CO3: Experiment with virtualization of hardware resources and Docker.
CO4: Develop and deploy services on the cloud and set up a cloud environment.
CO5: Explain security challenges in the cloud environment.
CO2: Apply the concept of virtualization and its types.
CO3: Experiment with virtualization of hardware resources and Docker.
CO4: Develop and deploy services on the cloud and set up a cloud environment.
CO5: Explain security challenges in the cloud environment.
TOTAL: 60 PERIODS
TEXT BOOKS:
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, “Distributed and Cloud Computing, From Parallel Processing to the Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. James Turnbull, “The Docker Book”, O’Reilly Publishers, 2014.
3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud Computing”, Wiley Publishing, 2010.
2. James Turnbull, “The Docker Book”, O’Reilly Publishers, 2014.
3. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud Computing”, Wiley Publishing, 2010.
REFERENCES:
1. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and Processes”, Elsevier/Morgan Kaufmann, 2005.
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.
2. Tim Mather, Subra Kumaraswamy, and Shahed Latif, “Cloud Security and Privacy: an enterprise perspective on risks and compliance”, O’Reilly Media, Inc., 2009.
Comments
Post a Comment