0% found this document useful (0 votes)
303 views45 pages

M Tech Cloud Computing 2013

This document outlines the curriculum and syllabus for the M.Tech program in Cloud Computing offered by SRM University. The program consists of 70 credits over 4 semesters. The first two semesters focus on core cloud computing courses, the third semester includes a seminar and project phase 1, and the fourth semester involves the project phase 2. The core courses cover topics such as cloud architectures, storage infrastructures, security, and virtual environments. Students also take program electives and a supportive data analysis course. The syllabus for the Web Application Development core course is provided as an example, outlining its objectives, topics, and references.

Uploaded by

Kabul Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
303 views45 pages

M Tech Cloud Computing 2013

This document outlines the curriculum and syllabus for the M.Tech program in Cloud Computing offered by SRM University. The program consists of 70 credits over 4 semesters. The first two semesters focus on core cloud computing courses, the third semester includes a seminar and project phase 1, and the fourth semester involves the project phase 2. The core courses cover topics such as cloud architectures, storage infrastructures, security, and virtual environments. Students also take program electives and a supportive data analysis course. The syllabus for the Web Application Development core course is provided as an example, outlining its objectives, topics, and references.

Uploaded by

Kabul Kurniawan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

M.Tech.

(CloudComputing)

FullTime

Curriculum&Syllabus

2013

FACULTYOFENGINEERINGANDTECHNOLOGY

SRMUNIVERSITY

SRMNAGAR,KATTANKULATHUR603203
SRM University
Department of Information Technology

M.Tech in Cloud Computing


Course code Course Name L T P C

Core Courses: I and II Semester

CC2001 Web Application Development 3 0 2 4

CC2002 Cloud Architectures 3 0 2 4

CC2003 Cloud Storage Infrastructures 3 0 2 4

CC2004 Data Center Networking 3 0 2 4

CC2005 Cloud Security 3 0 2 4

CC2006 Managing Virtual Environments 3 0 2 4

Core Courses: III Semester

CC2047 Seminar (Pass/Fail Course) 0

CC2049 Project Phase-I 0 0 12 6

Core Courses: IV Semester

CC2050 Project Phase-II 0 0 32 16

Supportive Course:

CC2011 Data Analysis using Multivariate 3 0 0 3


Techniques and Forecasting
Methods

Program Electives

CC2101 Design & Development of Cloud 2 0 2 3


Applications
CC2102 Application Development 2 0 2 3
Frameworks
CC2103 Scripting for System 2 0 2 3
Administrators
CC2104 Data Warehousing and Mining 3 0 0 3

CC2105 Converged Networks 3 0 0 3

CC2106 Network Security 3 0 0 3

CC2107 Enterprise Storage Systems 3 0 0 3

CC2108 Object Oriented Software 2 0 2 3


Engineering
CC2109 Data Center Virtualization 3 0 0 3

CC2110 Cloud Application Development 2 0 2 3

CC2111 Cloud Strategy Planning & 3 0 0 3


Management
CC2112 Data Science & Big Data Analytics 2 0 2 3

Total Number of credits to be earned for M.Tech degree : 70

NOTE:

Students have to register for the courses as per the following guidelines:

Credits
Sl.
Category Category
No. ISemester IISemester IIISemester IVSemester
total

1 Corecourses 12 12 24

(3courses) (3courses)

2 Program Elective 18(inItoIIIsemesters) 18


courses

Interdisciplinary 3(inItoIIIsemesters) 3
electivecourses

(any one program


elective from
otherprograms)

3 Supportive courses 3(inItoIIIsemesters) 3


mandatory

4 Seminar 0 0
6 Projectwork 06 16 22

Total 70

CourseCode CourseTitle L T P C
CC2001 Web Application Development 3 0 2 4
TotalContactHours75
Prerequisite
Knowledge in JAVA programming is preferred
PURPOSE
Internet is part and parcel of everybodys life today. Programming in web is every essential
for any IT professional .The subject provides knowledge to learn and implement the various
web programming technologies of current trend today.
INSTRUCTIONALOBJECTIVES
1. Understand the current technologies in Internet world
2. Implement client side programming using java script ,CSS
3. Learn and implement advanced and current technologies like AJAX,JQuery
4. Understand the socket programming in Java
5. Learn and implement java server side programming
6. Learn and implement web services
7. Learn various web development frame works

Unit I (12 hours)

Introduction to Internet web technologies: Internet technology and Internet standards-


evolution of web technology-web2.0 an overview HTML tags new tags in HTML 5 XML
technologies-DTD-Schema-parsers-XHTML-CSS-javascript-data types-control structures-
functions objects -mobile web.

Unit II (9 hours)

Advanced Dynamic web client side programming: -AJAX-xmlHttpRequest object-AJAX


applications-AJAX frame work -java script libraries -JQuery-basics animation-overview on
Yahoo UI, Google web toolkit libraries-Applets-overview on javaFX applets.

Unit III (6 hours)


Java network programming: Java I/O streaming-files-lookup Internet address-socket
programming-UDP sockets-Multicast sockets-client/server programs-secure sockets-javaMail
API

Unit IV (9 hours)

Dynamic web server side programming: web servers and java web containers-servlets -
lifecycle-content handling-cookies-session tracking-filters-Java server pages-expressions-and
declarations-directives-JSP and java beans-include and forward directives-custom tag
libraries-JSTL-new features in servlet3.1 and JSP2.5

Unit V (9 hours)

Advanced server side programming: Web services-SOAP protocol-UDDI-WSDL-creating


publishing and describing web services-JDBC database connectivity-drivers-connections-
rowset interface-prepared statements-three tier applications; Web application frameworks-
MVC (model view controller) frame work-struts- JSF(Java server faces)-Java EE design
pattern an overview.

Practical : (30 hours)

References:

1. Paul J. Deitel, Harvey Deitel, Abbey Deitel,Internet and World Wide Web How to
Program , Edition 5, 2011 ,ISBN0132151006, 9780132151009
2. Chris Bates, Web Programming Building Intranet applications, Wiley Publications,
3rd Edition,2009.
3. Jeffrey C. Jackson, Web Technologies A computer Science Perspective, Pearson, 2011
4. Eilliote, Rusty Harold,Java Network Programming ,3/e,O'Reilly Media, Inc.
5. Java server programming java JavaEE5 Black Book, Kogent Solutions Inc,Dreamtech
Press
6. AJAX black book,new edition, Kogent Solutions Inc,Dreamtech Press

CourseCode CourseTitle L T P C
CC2002 Cloud Architectures 3 0 2 4
TotalContactHours75
Pre-requisites
Nil
PURPOSE
This module gives students the skills and knowledge to understand how Cloud
Computing Architecture can enable transformation, business development and agility in an
organization.

INSTRUCTIONALOBJECTIVES
1. Analyze the components of cloud computing showing how business agility in an
organization can be created
2. Evaluate the deployment of web services from cloud architecture
3. Critique the consistency of services deployed from a cloud architecture
4. Compare and contrast the economic benefits delivered by various cloud models based
on application requirements, economic constraints and business requirements.
5. Critically analyze case studies to derive the best practice model to apply when
developing and deploying cloud based applications

Unit I (8 hours)

Cloud Computing Fundamental: Cloud Computing definition, private, public and


hybrid cloud. Cloud types; IaaS, PaaS, SaaS. Benefits and challenges of cloud
computing, public vs private clouds, role of virtualization in enabling the cloud;
Business Agility: Benefits and challenges to Cloud architecture. Application
availability, performance, security and disaster recovery; next generation Cloud
Applications.

Unit II (6 hours)

Cloud Applications: Technologies and the processes required when deploying web
services; Deploying a web service from inside and outside a cloud architecture,
advantages and disadvantages

Unit III (12 hours)

Cloud Services Management: Reliability, availability and security of services


deployed from the cloud. Performance and scalability of services, tools and
technologies used to manage cloud services deployment; Cloud Economics : Cloud
Computing infrastructures available for implementing cloud based services.
Economics of choosing a Cloud platform for an organization, based on application
requirements, economic constraints and business needs (e.g Amazon, Microsoft and
Google, Salesforce.com, Ubuntu and Redhat)

Unit IV (10 hours)

Application Development: Service creation environments to develop cloud based


applications. Development environments for service development; Amazon, Azure,
Google App.

Unit V (9 hours)
Best Practice Cloud IT Model : Analysis of Case Studies when deciding to adopt
cloud computing architecture. How to decide if the cloud is right for your
requirements. Cloud based service, applications and development platform
deployment so as to improve the total cost of ownership (TCO)

Practical : (30 hours)

References

1. Gautam Shroff, Enterprise Cloud Computing Technology Architecture Applications


[ISBN: 978-0521137355]
2. Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A Practical
Approach [ISBN: 0071626948]
3. Dimitris N. Chorafas, Cloud Computing Strategies [ISBN: 1439834539]

CourseCode CourseTitle L T P C

CC2003 Cloud Storage Infrastructures 3 0 2 4
TotalContactHours75
Pre-requisites
Nil
PURPOSE
This course provides a comprehensive view of storage and networking infrastructures for
highly virtualized cloud ready deployments. The course discusses the concepts and features
related to Virtualized datacenter and cloud, Information storage security and design, storage
network design and cloud optimized storage.
INSTRUCTIONALOBJECTIVES
1. Critically appraise the opportunities and challenges of information management in
complex business environments
2. Evaluate information storage management design in a cloud environment and how it
relates to the business objectives of an organization
3. Analyze the role technology plays in the design of a storage solution in a cloud
architecture
4. Investigate how a global storage solution can be optimized so that it can be delivered
successfully from the cloud
5. Analyze how best to provide reliable access to information both locally and remotely
using storage technologies
Unit I 9 hours

Virtualized Data Center Architecture : Cloud infrastructures; public, private, hybrid.


Service provider interfaces; Saas, Paas, Iaas. VDC environments; concept, planning
and design, business continuity and disaster recovery principles. Managing VDC and
cloud environments and infrastructures.

Unit II 9 hours

Information Storage Security & Design : Storage strategy and governance; security
and regulations. Designing secure solutions; the considerations and implementations
involved. Securing storage in virtualized and cloud environments. Monitoring and
management; security auditing and SIEM.

Unit III 12 hours

Storage Network Design: Architecture of storage, analysis and planning. Storage


network design considerations; NAS and FC SANs, hybrid storage networking
technologies (iSCSI, FCIP, FCoE), design for storage virtualization in cloud
computing, host system design considerations.

Unit IV 6 hours

Cloud Optimized Storage: Global storage management locations, scalability,


operational efficiency. Global storage distribution; terabytes to petabytes and greater.
Policy based information management; metadata attitudes; file systems or object
storage.

Unit V 9 hours

Information Availability Design : Designing backup/recovery solutions to guarantee


data availability in a virtualized environment. Design a replication solution, local
remote and advanced. Investigate Replication in NAS and SAN environments. Data
archiving solutions; analyzing compliance and archiving design considerations.

Practical : 30 hours

Reference Books:
1. Greg Schulz 2011, Cloud and Virtual Data Storage Networking, Auerbach
Publications [ISBN: 978-1439851739]
2. Marty Poniatowski, Foundations of Green IT [ISBN: 978-0137043750]
3. EMC, Information Storage and Management [ISBN: 978-0470294215]
4. Volker Herminghaus, Albrecht Scriba,, Storage Management in Data Centers [ISBN:
978-3540850229]
5. Klaus Schmidt, High Availability and Disaster Recovery [ISBN: 978-3540244608]

L T P C
CourseCode CourseTitle L T P C

CC2004 Data Center Networking 3 0 2 4
TotalContactHours75
Pre-requisites
Nil
PURPOSE
This course provides an insight to the students on design guidance, configuration examples
and best practices with respect to data center networking. This course also deals with current
data center architectures, new technologies adopted to create modern data center architecture,
and merits and demerits of the same. This course examines these new technologies and
demonstrates how consolidation can be realized using a unified network approach
INSTRUCTIONALOBJECTIVES
1. Critically discuss data centre networking technologies and protocols
2. Evaluate key concepts in modern Layer 2 & Layer 3 data centre networks
3. Research a topic related to networking technologies in modern data centers
4. Design, build and configure complex routed and switched networks
5. Justify the implementation of networking solutions in a virtualized environment

UNIT I- EVOLUTION OF DATA CENTRE DESIGN (6 hours)

Design for flexibility, scalability, environmental control, electrical power, flooring, fire
protection, security, network infrastructure. Energy use and greenhouse gas emissions.
Requirements for modern data centers, high availability and Service Orientated
Infrastructures (SOI). Modern data centre use case studies.

UNIT II -DATA CENTRE ARCHITECTURES (7 hours)

Network connectivity optimization evolution: Top of rack (TOR), end of rack (EOR), scale
up vs scale up, solutions that reduce power and cabling. Data Centre standards; TIA/EIA-942.
Structured cabling standards, fibre and copper cabling characteristics, cable management,
bandwidth requirements, I/O connectivity.

UNIT III - SERVER ARCHITECTURES (8 hours)

Stand-alone, blades, stateless, clustering, scaling, optimization, virtualization. Limitation of


traditional server deployments; modern solutions. Applications; database, finance etc.
Redundant Layer 2 and Layer 3 designs. Case studies.

UNIT IV-LAYER 2 NETWORKS (12 hours)

Ethernet; IEEE 802.3ba; 40 Gbps and 100 Gbps Ethernet. IEEE 802.1D Spanning Tree
Protocol (STP), RSTP, PVST, MSTP. TRILL (Transparent Interconnection of Lots of Links),
RBridges, IEEE 802.1Qbg Edge Virtual Bridging, 802.1Qbh Bridge Port Extension. Fibre
Channel over Ethernet (FCoE) vs Internet Small Computer System Interface (iSCSI). Data
Center Bridging (DCB); priority-based flow control, congestion notification, enhanced
transmission selection, Data Center Bridging Exchange (DCBX). Layer 2 Multicasting; Case
studies.

UNITV-LAYER3&BEYOND (12 hours)

Layer 3 Data Centre technologies, network virtualization. Protocols; IPv4, IPv6, MPLS,
OSPF, IS-IS, BGP. OTV, VPLS layer 2 extension protocols. Locator Identifier Separation
Protocol (LISP). Layer 3 Multicasting. Data centre application services. Data centre
networking use case studies and the enabling technologies and protocols in the modern data
centre.

Practical : 30 hours

References :

1. SilvanoGai, Claudio DeSanti, I/O Consolidation in the Data Center [ISBN:


9781587058882]

2. Kevin Corbin, Ron Fuller, David Jansen,, NX-OS and Cisco Nexus Switching: Next-
Generation Data Center Architectures [ISBN: 9781587058929]

3. SilvanoGai, TommiSalli, Roger Andersson, Cisco Unified Computing System [ISBN:


9781587141935]

4. Nash Darukhanawalla, Patrice Bellagamba, Interconnecting Data Centers Using


VPLS [ISBN: 9781587059926]

5. Robert W. Kembel, Roger Cummings (Introduction), The Fibre Channel


Consultant [ISBN: 0931836840]

6. Fiber Channel Switched Fabric [ISBN: 0931836719]

7. John L. Hufferd 2003, ISCSI, Addison-Wesley Boston [ISBN: 978-0201784190]

CourseCode CourseTitle L T P C

CC2005 Cloud Security 3 0 2 4
TotalContactHours75
Pre-requisites
Nil
PURPOSE
The course on cloud security introduces the basic concepts of security systems and
cryptographic protocols, which are widely used in the design of cloud security. The issues
related multi tenancy operation, virtualized infrastructure security and methods to improve
virtualization security are also dealt with in this course
INSTRUCTIONALOBJECTIVES
1. Compare modern security concepts as they are applied to cloud computing
2. Assess the security of virtual systems
3. Evaluate the security issues related to multi-tenancy
4. Appraise compliance issues that arise from cloud computing

Unit I (10 hours

Security Concepts: Confidentiality, privacy, integrity, authentication, non-repudiation,


availability, access control, defence in depth, least privilege, how these concepts apply in the
cloud, what these concepts mean and their importance in PaaS, IaaS and SaaS. e.g. User
authentication in the cloud; Cryptographic Systems: Symmetric cryptography, stream
ciphers, block ciphers, modes of operation, public-key cryptography, hashing, digital
signatures, public-key infrastructures, key management, X.509 certificates, OpenSSL.

Unit II 9 hours

Multi-tenancy Issues: Isolation of users/VMs from each other. How the cloud provider can
provide this; Virtualization System Security Issues: e.g. ESX and ESXi Security, ESX file
system security, storage considerations, backup and recovery; Virtualization System
Vulnerabilities: Management console vulnerabilities, management server vulnerabilities,
administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor vulnerabilities,
hypervisor escape vulnerabilities, configuration issues, malware (botnets etc).

Unit III 7 hours

Virtualization System-Specific Attacks: Guest hopping, attacks on the VM (delete the VM,
attack on the control of the VM, code or file injection into the virtualized file structure), VM
migration attack, hyperjacking.

Unit IV 9 hours

Technologies for Virtualization-Based Security Enhancement: IBM security virtual server


protection, virtualization-based sandboxing; Storage Security: HIDPS, log management,
Data Loss Prevention. Location of the Perimeter.

Unit V 10 hours

Legal and Compliance Issues: Responsibility, ownership of data, right to penetration test,
local law where data is held, examination of modern Security Standards (eg PCIDSS), how
standards deal with cloud services and virtualization, compliance for the cloud provider vs.
compliance for the customer.

Practical : 30 hours

References:
1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance [ISBN: 0596802765]
2. Ronald L. Krutz, Russell Dean Vines, Cloud Security [ISBN: 0470589876]
3. John Rittinghouse, James Ransome, Cloud Computing [ISBN: 1439806802]
4. J.R. ("Vic") Winkler, Securing the Cloud [ISBN: 1597495921]

5. Cloud Security Alliance 2009, Security Guidance for Critical Areas of Focus in
Cloud Computing
6. vmwareVMware Security Hardening Guide
7. Cloud Security Alliance 2010, Top Threats to Cloud Computing
8. NIST Guidelines on Security and Privacy in Public Cloud Computing
9. NIST Guide to Security for Full Virtualization Technologies
10. NIST The NIST Definition of Cloud Computing

11. William Hau, Rudolph Araujo et al How Virtualization Affects PCI DSS

www.mcafee.com/us/resources/.../wp-how-virt-affect-pci-dss-part-1.pdf

12. Chenxi Wang Compliance with Clouds: Caveat Emptor

L T P C
CC2006 Managing Virtual Environments 3 0 2 4
Pre-requisites
Nil

Purpose:

This course deals with management of complex virtual environments, analysis of key
performance factors of virtualized systems, prinicipal issues in troubleshooting virtual
environments, evaluation of small scale virtual environment developed in the lab.This course
will equip students with the in-depth knowledge and techniques used to efficiently optimize
and effectively trouble-shoot virtual infrastructures

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Discuss and evaluate the management of complex virtual environments.


2. Critically analyze key performance factors in virtualized systems.
3. Identify and formulate judgements for management requirements relating to the
configuration and performance of virtual environments.
4. Identify and analyze the principal issues in troubleshooting virtual environments.
5. Performance evaluations and critical evaluations of a small scale virtual environment
developed in the lab.
Course Contents:

Unit I 9 hours

Performance Management in a Virtual Environment: Management techniques,


methodology and key performance metrics used to identifying CPU, memory, network,
virtual machine and application performance bottlenecks in a virtualized environment.

Unit II 7 hours

Configuration and Change Management: Configuration and change management goals


and guidelines, tools and technologies in virtualized environments.

Unit III 9 hours

Secure Virtual Networking: Configuration and change management goals and guidelines,
tools and technologies in virtualized environments; Virtual network security architecture,
network segmentation and traffic isolation to secure a virtual network configuration.

Unit IV 10 hours

Protecting the Management Environment:Server authentication, authorization, and


accounting, SSL certificates, server hardening; Protecting the host system: security
architecture, controlling access to storage, hardening hosts, Hardening virtual machines;
Virtual machine security architecture, security parameters; Protecting the host and virtual
machine systems using server authentication, authorization, and accounting techniques.

Unit V 10 hours

Troubleshooting Virtual Environments: Interpreting host, network, storage, cluster and


virtual machine log files. Network troubleshooting, traffic sniffing, storage access problems,
iSCSI authentication and digests. Virtual machine migration, cluster errors with shares, pools,
and limits; Command line interfaces and syntax, interpreting host, network, storage, cluster,
virtual machine log files and network traces.

Practical : 30 hours

Reference Books:
1. Massimo Cafaro (Editor), Giovanni Aloisio (Editor), Grids, Clouds and Virtualization

[ISBN: 978-0857290489]
2. Chris Wolf and Erick M. Halter, Virtualization [ISBN: 978-1590594957]
3. Gaurav Somani, Scheduling and Isolation in Virtualization, VDM Verlag Dr. Mller
[ISBN: 978-3639295139]
4. LatifaBoursas (Editor), Mark Carlson (Editor), Wolfgang Hommel (Editor), Michelle
Sibilla (Editor), KesWold (Editor), Systems and Virtualization Management:
Standards and New Technologies [ISBN: 978-3540887072]
5. Edward L. Haletky, VMware ESX Server in the enterprise [ISBN: 978-0132302074]
6. Edward Haletky, VMware ESX and ESXi in the Enterprise: Planning Deployment of
Virtualization Servers [ISBN: 978-0137058976]

L T P C
CC2047 SEMINAR

PURPOSE
Seminar is one of the important components for the engineering graduates to exhibit and
expose their knowledge in their field of interest. It also gives a platform for the students to
innovate and express their ideas in front of future engineering graduates and professionals.

INSTRUCTIONAL OBJECTIVES

1. To make a student study and present a seminar on a topic of current relevance in


Information Technology or related fields.
2. Enhancing the debating capability of the student while presenting a seminar on a
technical topic.
3. Training a student to face the audience and freely express and present his ideas
without any fear and nervousness, thus creating self-confidence and courage which
are essentially needed for anEngineer.

GUIDELINES:

1. Each student is expected to give a seminar on a topic of current relevance in


IT/Related field with in a semester.
2. Students have to refer published papers from standard journals.
3. The seminar report must not be the reproduction of the original papers but it can be
used as reference.

ASSESMENT:

Assessment will be done according to university regulation.


L T P C
CC2049 PROJECT PHASE-I 0 0 12 6
Total Contact Hours 16

PURPOSE:
The purpose of a project report is to convey adequate information to the reader about how the
tasks were implemented, the results, and what knowledge was gained by a student.MTech
projects are expected to be innovative, socially relevant and product oriented ones.

INSTRUCTIONAL OBJECTIVES:

1. To make the students understand and analyze the current technical advancements.
2. To enhance their innovative skills while producing engineering products.
3. To test their individuality of their technical work.
4. To enhance their technical reading and writing skills.

ASSESSMENT (Phase I) :

Assessment will be done according to university regulation.

L T P C
CC2050 Project Phase-II 0 0 32 16
Total Contact Hours 32

INSTRUCTIONAL OBJECTIVES:

To make the student learn, understand and analyze their engineering field of study and
to produce products which helps them to improve the life style of humanity.

ASSESSMENT (Phase II):

Assessment will be done according to university regulation.


L T P C
CC2011 Data Analysis using Multivariate 3 0 0 3
Techniques and Forecasting Methods
Prerequisite
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

The purpose of this course is to introduce the students into the field of Multivariate
Techniques and Forecasting Methods for analyzing large volumes of data and to take
decisions based on inference drawn.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Data characteristics and form of Distribution of the Data Structures


2. Understanding the usage of multivariate techniques and forecasting methods for the
problem under the consideration
3. For drawing valid inferences and to plan for future investigations

Unit-I 5 hours
Meaning of Multivariate Analysis, Measurements Scales: Metric measurement scales and
Non-metric measurement scales, Classification of multivariate techniques (Dependence
Techniques and Inter-dependence Techniques), Applications of Multivariate Techniques in
different disciplines.

Unit-II 10 hours

Factor Analysis: Meanings, Objectives and Assumptions, Designing a factor analysis,


Deriving factors and assessing overall factors, Interpreting the factors and validation of factor
analysis.

Unit-III 10 hours

Cluster Analysis: Objectives and Assumptions, Research design in cluster analysis, Deriving
clusters and assessing overall fit (Hierarchical methods, Non Hierarchical Methods and
Combinations), Interpretation of clusters and validation of profiling of the clusters.

Unit-IV 10 hours

Basics of forecasting: Basic steps in forecasting task. The forecasting scenario: Averaging
methods, Exponential smoothing methods, Holts linear method, Holt-Winters trend and
Seasonality method.

Unit-V 10 hours

Box-Jenkins Methodology for ARIMA models: Examining correlation and stationarity of


time series data, ARIMA models for time series data (An Auto-regressive model of order one
and a Moving Average Model of order one).

References:

1. Joseph F.Hair, William C.Black, Barry J.Babin, Rolph E.Anderson and Ronald
L.Tatham (2006). Multivariate Data Analysis, 6th Edition, Pearson Education, Inc.,
(Chapters 1, 3 and 8 ).
2. Spyros Makridakis, Steven C.Wheelwright and Rob J. Hyndman (2005).
Forecasting methods and Applications, Third Edition, John Wiley & Sons Inc., New
York (Chapters 1, 4 and 7 ).

L T P C
CC2101 Design & Development of Cloud Applications 2 0 2 3
Pre-requisites
Web Application Development

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:
This module is focused on developing web and mobile applications in the cloud. By the end
of this module the student will have a detailed overview of the design and development
process involved in creating a cloud based application.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Design and develop elegant and flexible cloud software solutions.


2. Evaluate the security issues related to the development of cloud applications.
3. Manage and deploy a cloud based application.
4. Research and critique a topic related to Software development in the cloud.
5. Analyze a real world problem and develop a cloud based software solution.

Unit I 5 hours

Designing Cloud Based Applications: Role of business analyst, requirements gathering,


UML, use of state diagrams, wire frame prototypes, use of design tools such as Balsamiq.
Selecting front end technologies and standards, Impact of growth in mobile computing on
functional design and technology decisions.

Unit II 12 hours

Cloud Application Development: Technical architecture considerations concurrency,


speed and unpredictable loads. Agile development, team composition (including
roles/responsibilities), working with changing requirements and aggressive schedules.
Understanding Model View Controller (MVC); Advanced understanding of views,
location, and the presentation layer: Advanced Ajax and JQuery. Presenting to different
browsers and devices. Localization and internationalization; Understanding client location
and device type. Mobile application development Android, iOS, WP, RIM, Symbian.

Unit III 10 hours

Storing Objects in the Cloud: Session management. Advanced database techniques using
MySQL and SQL Server, blob storage, table storage; Working with Third Party APIs:
Overview of interconnectivity in cloud ecosystems. Working with Twitter API, Flickr API,
Google Maps API. Advanced use of JSON and REST.

Unit IV 6 hours

Cloud Applications and Security Issues: Understanding cloud based security issues and
threats (SQL query injections, common hacking efforts), SSL, encrypted query strings, using
encryption in the database. Authentication and identity. Use of oAuth. OpenID;
Understanding QA and Support: Common support issues with cloud apps: user names and
passwords, automated emails and spam, browser variants and configurations. Role of
developers in QA cycle. QA techniques and technologies. Use of support forums, trouble
ticketing.

Unit V 12 hours

Use Cases: Design, develop and deploy an advanced cloud app using framework and
platform of choice to demonstrate an understanding of database, presentation and logic.
Application should demonstrate integration with third party API, sensitivity to geography of
user (language, currency, time and date format), authentication of user, security, and
awareness of client device/browser; Case Studies: Salesforce, Basecamp, Xero.com,
Dropbox.

Practical : 30 hours

References:
1. Jim Webber, SavasParastatidis, Ian Robinson, REST in Practice [ISBN: 978-
0596805821]
2. Eugenio Pace, Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto,
MatiasWoloski, Developing Applications for the Cloud on the Microsoft Windows
Azure Platform [ISBN: 9780735656062]
3. Dan Wellman, jQuery UI 1.6 [ISBN: 9781847195128]
4. Peter Lubbers, Brian Albers, Frank Salem, Ric Smith, Pro HTML5 Programming
[ISBN: 9781430227908]
5. Lee Babin, Beginning Ajax with PHP [ISBN: 9781590596678]
6. Richard York 2009, Beginning JavaScript and CSS development with jQuery, Wiley
Pub. Indianapolis, IN [ISBN: 9780470227794]
7. Edward Benson 2008, The art of Rails, Wiley Pub. Indianapolis, IN [ISBN:
9780470189481]
L T P C
CC2102 Application Development Frameworks 2 0 2 3
Pre-requisites
Web Application Development
Cloud Storage Infrastructures

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:
This module has two distinct sections. In the first section students will learn about building
applications using a popular application development framework. After the first section is
completed the module will focus on one of the following areas: Enterprise Integration or Rich
Web Applications.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Identify the key aspects of developing applications using a framework.


2. Write code to integrate frameworks to access relational databases.
3. Evaluate framework technologies for remote communication.
4. Option 1 - Enterprise Integration: Design and build concurrent applications and
schedule tasks using an application framework. Assess the integration of serialization
and remoting to call remote applications.
5. Option 2 - Rich Web Applications: Integrate an application framework to implement
stateful interactions. Compare rapid productivity tools such as Grails and Roo, etc.

Unit I 6 hours

Spring Framework: Overview of Java frameworks, introduction to Spring. Using Spring to


configure an application, the bean life-cycle, simplifying application configuration,
annotation-based dependency injection, testing a Spring-based application.

Unit II 6 hours

Effective Middle-Tier Architecture: Adding behavior to an application using aspects, data


access with Spring, simplifying JDBC-based data access, driving database transactions in a
Spring environment.

Unit III 6 hours

Implementing Enterprise Information Connectivity: Object-to-relational mapping


(ORM), Hibernate in a Spring environment, effective web application architecture, Spring
MVC, RESTful web services with Spring MVC.

Unit IV 4 hours

Integration with Enterprise Services: Securing web applications, emoting framework,


simplifying message applications with Spring JMS, adding manageability to an application
with Spring JMX.

Unit V 8 hours

Enterprise Integration: Integration Foundations Essential concurrency, tasks and


scheduling, serialisation and remoting. Working with Web Services Advanced XML, SOAP
web services, RESTful web services, web service security. Messaging and Transactions
Messaging, working with JMS, transactional JMS, distributed transaction management.
Spring Batch and Integration Spring batch, advanced Spring integration, Service-Oriented
Architecture (SOA)
(OR)

Rich Web Applications: Spring Web MVC Spring MVC annotation-based programming
model, Page composition with layout technologies such as Tiles, Rendering multiple content
types, Handling exceptions, Processing form pages, Internationalization and personalization.
Spring Web Flow Spring web flow, authoring flow definitions, view states, events and
transitions, adding flow behaviour. Working with scoped data, using the web flow integration
with JSF. Spring Security Securing a web application with Spring security. Integration With
Client Technologies Modern Web UI, progressive enhancement, accessibility, web design.
Working with HTML, CSS and JavaScript, Using a JavaScript framework (Dojo) for DOM
scripting and UI widgets, integrating Flex clients with Spring applications. Rapid Application
Development Using Grails & Spring Roo

Practical : 30 hours
References :
1. Rod Johnson... [et al.] 2005, Professional Java development with the Spring
Framework, Wiley Pub. Indianapolis, IN [ISBN: 978-0764574832]
2. Mark Fisher 2011, Spring Integration in Action, 1st Ed., Manning Publications
[ISBN: 978-1935182436]
3. Craig Walls, Ryan Breidenbach, Spring in Action [ISBN: 978-1933988139]
4. Paul Fisher, Solomon Duskis, Spring Persistence with Hibernate [ISBN: 978-
1430226321]
5. Website: SpringSource
http://www.springsource.com/
6. Website: Sun - Oracle
http://www.oracle.com/us/technologies/java/index.html
7. Website: IBM
http://www.ibm.com/developerworks/java/

L T P C
CC2103 Scripting for System Administrators 2 0 2 3
Pre-requisites
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.
Purpose:

This module will address the scripting skills that System administrators need to help them
with their daily tasks.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Assess system administration tasks and design scripts to automate these tasks.

2. Solve system administration problems using a shell interface.

3. Design complex scripts in a scripting language such as Perl, Python or Ruby.

4. Develop scripts to a high level in Powershell

Unit I 6 hours

Shell and Powershell Scripting: Shell syntax, sed, awk, grep, diff, join, etc.

Unit II 6 hours

Unix and Windows CLI. cmdlets, wmic.

Unit III 6 hours

Managing processes, services, events and network connections; Troubleshooting.

Unit IV 6 hours

Scripting in a high-level Language: Language syntax, Applications of scripting e.g. querying


SNMP devices, running external processes, managing user accounts, monitoring filesystems
& processes,

Unit V 6 hours

Working with LDAP and AD, analyze log files, administer network names and configuration
services, maintain, monitor and map network services, processes, package management,
statistics gathering and reporting. Using scripting to automate tedious and repetitive tasks.

Practical : 30 hours

References:
1. Hal Rottenberg, Managing VMware Infrastructure with Windows PowerShell
TFM, Sapien Press [ISBN: 0-9821314-0-2]
2. Justin Seitz 2009, Gray Hat Python, NO STARCH PRESS [ISBN:
1593271921]
3. RytisSileika, Pro Python System Administration [ISBN: 978-1-4302-2605-5]
4. Noah Gift and Jeremy Jones 2008, Python for Unix and Linux system
administration, O'Reilly Farnham [ISBN: 978-0596515829]
5. Marty Alchin, Pro Python [ISBN: 978-1-4302-2757-1]
6. Mark Lutz, Learning Python [ISBN: 978-0596158064]
7. Mark Summerfield, Programming in Python 3: A Complete Introduction to
the Python Language [ISBN: 978-0-321-68056-3]
8. David N. Blank-Edelman 2009, Automating system administration with Perl,
O'Reilly Media Sebastopol, CA [ISBN: # 978-0596006396]
9. Website: Command Line Kung Fuhttp://blog.commandlinekungfu.com/

L T P C
CC2104 Data Warehousing and Mining 3 0 0 3
Pre-requisites
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:
This course focuses on the fundamentals of data warehousing and their associated
problem areas. Data pre-processing and preparation, outlier detection, data warehouse design,
On-line analytical processing are the major areas of coverage of this course. This course also
deals with the fundamentals of data mining and algorithms associated with the same.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Describe the fundamental concepts, benefits and problem areas associated with data
warehousing
2. Describe the various architectures and main components of a data warehouse.
3. Design a data warehouse, and be able to address issues that arise when implementing
a data warehouse.
4. Compare and contrast OLAP and data mining as techniques for extracting knowledge
from a data warehouse.

Course Contents:

Unit I 6 hours

Data Warehousing: OLTP systems versus data warehousing. Data warehousing concepts;
benefits and problem areas; Architecture and main components of a data warehouse;
Managing metadata.

Unit II 11 hours

Data Preparation and pre-processing: need to pre-process data; Data Cleaning; Handling
Missing Data; Identifying Misclassifications; Graphical methods for identifying Outliers;
Data Transformation; Numerical Methods for Identifying Outliers.

Unit III 8 hours

Data Warehouse Design: Corporate Information Factory (CIF) versus Business


Dimensional Lifecycle Methodologies. Dimensionality modeling: Star, Snowflake and
Starflake schemas.

Unit IV 8 hours

On-line analytical processing (OLAP): OLAP applications. OLAP operations: roll-up,


drill-down, slice and dice, and pivot. OLAP Tools: Multidimensional OLAP (MOLAP),
Relational OLAP (ROLAP), Hybrid OLAP (HOLAP) and Desktop OLAP (DOLAP).

Unit V 12 hours

Data Mining: Algorithms: Predictive modeling, database segmentation, link analysis and
deviation detection. Cross Industry Standard Process for Data Mining (CRISP-DM)
specification.
References :

1. Thomas M. Connolly, Carolyn E. Begg, 2010, Database Systems: A Practical


Approach to Design, Implementation and Management, 5th Ed., Addison Wesley
[ISBN: 0321523067]
2. JiaweiHanandMichelineKamber,JianPei,Data MiningConceptsandTechniques,Third
Edition,Elsevier,2012
3. Anthony David Giordano,, Data Integration Blueprint and Modeling, 1 Ed. [ISBN:
0137084935]
4. Ralph Kimball, Margy Ross, Warren Thornthwaite (Contributor), Joy Mundy
(Contributor), Bob Becker (Contributor) 2010, The Kimball Group Reader, Wiley
[ISBN: 9780470563106]
5. Daniel T. Larose 2005, Discovering knowledge in data, Wiley-Interscience Hoboken,
N.J. [ISBN: 978-0-471-66657-8]
6. Richard Roiger, Michael Geatz 2002, Data mining, Addison Wesley Boston [ISBN:
0201741288]

L T P C
CC2105 Converged Networks 3 0 0 3
Prerequisites
Knowledge of basic networking concepts, routing
protocols and IP addressing mechanisms.

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.
2.

3.

4.

5.

Purpose:

This course focuses on the design, development, selection, deployment and support of
advanced IP based audio, video and data transmission in a converged network. The course
aims at providing an in depth knowledge to the learners in the field of Multi protocol label
switching and IP Multicasting. QoS details of converged network shall be dealt in a detailed
manner in this course.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Implement applications enabled by a multi-service convergent network


2. Explain how real-time traffic is prioritized and carried within a data network.
3. Design Multicast Networks
4. Engineer networks suitable for voice, multicast traffic and high-speed switched
Internet based networks

Unit I 8 hours

Teleworker Solutions: Cable and DSL Technology, cable system components and benefits,
DOCSIS ,HFC Cable Network Architecture; DSL Variants, DSL performance and distance
limitations

Unit II 10 hours

Real-time Applications in a Converged Network: Review of Traditional Voice Networks;


Codec / Vocoder Technologies; VoIP Transport; Real-Time Concerns; RTP/RTCP; H.323
and SIP as signaling protocols; Cloud-based VoIP & Video services

Unit III 10 hours

QoS for a Converged Network: IP QOS review of QoS; 802.1p/q; Queuing mechanisms
WFQ,CBWFQ,Low-Latency, Random Early Detection; Integrated Services; Reservation
Protocol (RSVP); Differentiated Services (Diffserv); QoS issues in WANs; implementation
of Diffserv QoS model
Unit IV 10 hours

Multiprotocol Label Switching: MPLS Header; MPLS forwarding basics; Quality of


service with MPLS TE; MPLS VPN applications; implementation of MPLS and MPLS VPN

Unit V 7 hours

IP Multicast: Multicast addressing; IGMP, IGMP snooping; Multicast routing protocols


(PIM-DM, -SM, SDM); Configuration

Reference Books:

1. Scott Firestone, ThiyaRamalingam, Steve Fry 2007, Voice and Video Conferencing
Fundamentals, 1st Ed. Ed., Cisco Press [ISBN: 978-1-58705-268-7]
2. Luc De Ghein 2006, MPLS Fundamentals, 1st Ed. Ed., Cisco Press [ISBN: 978-1-
58705-197-5]
3. Christina Hattingh, Darryl Sladden, ATM ZakariaSwapan 2010, SIP Trunking, Cisco
Press [ISBN: 978-1-58705-944-4]
4. Eric Osborne, Ajay Simha 2003, Traffic engineering with MPLS, Cisco Press [ISBN:
978-1587050312]
5. Amir Ranjbar 2007, CCNP ONT Official Exam Certification Guide, Cisco Press
[ISBN: 978-1-58720-176-3]
6. Website: Cisco Systems Inc. 2006, Voice/Data Integration Technologies
7. http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/voicdata.htm

L T P C
CC2106 Network Security 3 0 0 3
Prerequisites
Networking Fundamentals

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

This course will explore the aspects of IPSec, Virtual Private Networks and SSH tunneling in
addition to the cloud security issues. The course covers the details of wireless security
including WEP and WPA. Different types of firewalls including packet filters, application
level gateway and NAT are also the topics of discussion in this course. This course provides
the learners with the details on IDS/IPS, sniffers and, packet capturing tools and mechanisms.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Identify and evaluate threats to network security and data loss.


2. Install, configure, and evaluate firewalls.
3. Configure and appraise Intrusion Detection and Response Systems.
4. Install, configure, and evaluate VPN (Virtual Private Network) Technology.
5. Evaluate the security of a wireless network system.
6. Create and evaluate packet captures.

Unit I 10 hours

Internet Security & Encryption: Encryption of static data, IPSec, AH, ESP, IKE,
ISAKMP/Oakley, Tunnel mode, Transport mode, Virtual Private Networks (VPNs), SSH
Tunneling, IP6 issues, Cloud Security Issues.

Unit II 10 hours

Firewalls: Packet Filters, Stateful, Stateless, Bastion Host, Circuit Level, Application
Gateway, SOCKS, DMZ, Host-Based Firewall, Egress Filtering, Network Address
Translation (NAT), Multi-homing, IPTables/NetFilter, implementing NAT.

Unit III 10 hours

Sniffers and Packet Crafting: Libpcap, dSniff, Wireshark, tcpdump, Mitigation of Sniffer
Attacks, ARP Cache Poisoning, Port Stealing, Switch flooding, DNS and IP Spoofing,
Session Hijacking, Sequence Numbers, Ettercap, idle host scanning, Default TTLs,
Countermeasures, Packet Crafting using eghping, scapy.

Unit IV 6 hours

Wireless Security: 802.11, wardriving, netstumbler, kismet, wellenreiter, WEP, WPA,


cowpatty.

Unit V 9 hours

Intrusion Detection & Prevention: Focus on NIDS, snort, Types of IDSs, Network IDSs,
Anomaly based Detection, Signature based Detection, Evasion Techniques, False Positives,
NIDS implementation using eg snort, Data Loss Prevention.

References :

1. Eric Cole, Ronald L. Krutz, James Conley 2005, Network Security Bible, Wiley
[ISBN: 0764573977]
2. John R. Vacca 2006, Guide to Wireless Network Security, Springer [ISBN:
0387954252]
3. Johnny Long, Chris Hurley, SensePost, Mark Wolfgang, Mike Petruzzi 2005,
Penetration Tester's Open Source Toolkit, Syngress [ISBN: 1597490210]
4. Barrie Dempster, James Eaton-Lee 2006, Configuring IPCop Firewalls: Closing
Borders with Open Source, Packet Publishing [ISBN: 1-904811-36-1]
5. Lucian Gheorghe 2006, Designing and Implementing Linux Firewalls and QoS using
netfilter, iproute2, NAT, and L7-filter, Packt Publishing [ISBN: 1-904811-65-5]
6. Mark Rhodes-Ousley, Roberta Bragg, Keith Strassberg 2003, Network Security: The
Complete Reference, McGraw-Hill [ISBN: 0072226978]
7. Chuck Easttom 2005, Network Defense and Countermeasures: Principles and
Practices [ISBN: 978-0131711266]
8. Juniper Networks 2007, VPN Decision Guide: IPSec vs. SSL VPN Decision Criteria
9. http://www.juniper.net/solutions/literature/white_papers/200232.pdf

L T P C
CC2107 Enterprise Storage Systems 3 0 0 3
Pre-requisites
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

This course provides a comprehensive introduction to storage technology in an


increasingly complex IT environment. It builds a strong understanding of underlying storage
technologies and prepares you to learn advanced concepts and technologies. The course also
deals with architectures, features and benefits of Intelligent Storage Systems; networked
storage technologies such as FC-SAN, NAS and IP-SAN; long-term archiving solutions, the
increasingly critical area of information security and the emerging field of storage
virtualization technologies.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Evaluate various storage classifications and technologies.


2. Analyze storage architectures, processes, components and how they relate to
virtualization.
3. Justify the implementation of aa range of storage solutions to enable business
continuity.
4. Analyze storage security design, implementation, monitoring and management.

Course Contents:

Unit I 10 hours

Storage Systems: Data Classification, Storage Evolution and Data Center infrastructure.
Host components, Connectivity, Storage, and Protocols. Components of a disk drive, physical
disk and factors affecting disk drive performance. RAID level performance and availability
considerations. Components and benefits of an intelligent storage system.

Unit II 12 hours

Storage Networking Technologies: Direct-Attached Storage (DAS)architecture, Storage


Area Network (SAN) attributes, components, topologies, connectivity options and zoning. FC
protocol stack, addressing, flow control, and classes of service. Networked Attached Storage
(NAS)components, protocols, IP Storage Area Network (IP SAN) iSCSI, FCIP and FCoE
architecture. Content Addressed Storage (CAS) elements, storage, and retrieval processes.

Unit III 6 hours

Virtualization: Block-level and file-level storage virtualization technology, virtual


provisioning and cloud computing.

Unit IV 10 hours

Business Continuity: Business Continuity measurement, terminologies, and planning.


Backup designs, architecture, topologies, and technologies in SAN and NAS environments.
Local and Remote replication using host and array-based replication technologies such as
Synchronous and Asynchronous methods.

Unit V 7 hours

Storage Security and Management: Storage security framework and various security
domains. Security implementation in SAN,NAS and IP-SAN networking. Monitoring and
Storage management activities and challenges

References:

1. EMC, Information Storage and Management [ISBN: 978-0470294215]


2. Richard Barker, Paul Massiglia 2002, Storage area network essentials, Wiley New
York [ISBN: 978-0471034452]
3. Ulf Troppens, Rainer Erkens, Wolfgang Mueller-Friedt, Rainer Wolafka, Nils
Haustein, Storage Networks Explained [ISBN: 978-0470741436]
4. W. Curtis Preston 2002, Using SANs and NAS, O'Reilly & Associates Sebastopol,
Calif. [ISBN: 978-0596001537]
5. Himanshu Dwivedi 2006, Securing storage, Addison-Wesley Upper Saddle River, NJ
[ISBN: 978-0321349958]

L T P C
CC2108 Object Oriented Software Engineering 2 0 2 3
Pre-requisites
Nil
CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

To learn the advanced software engineering principles and methodologies for effective

software development

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. To learn about software prototyping, analysis and design


2. To learn UML and its usage

3. Case studies to apply the principles

UNIT I 5 hours

INTRODUCTION Software Engineering Paradigms - Software Development process


models - Project & Process -Project management Process & Project metrics - Object
Oriented concepts & Principles.

UNIT II 6 hours

PLANNING & SCHEDULING Software prototyping - Software project planning


Scope Resources - Software Estimation -Empirical Estimation Models-Planning-Risk
Management - Software Project Scheduling Object oriented Estimation & Scheduling.

UNIT III 10 hours

ANALYSIS & DESIGN : Analysis Modeling - Data Modeling - Functional Modeling


& Information Flow- Behavioral Modeling-Structured Analysis - Object Oriented Analysis -
Domain Analysis-Object oriented Analysis process - Object Relationship Model - Object
Behaviour Model; Design Concepts & Principles - Design Process - Design Concepts -
Modular Design Design Effective Modularity - Introduction to Software Architecture - Data
Design Transform Mapping Transaction Mapping OOD - Design System design
process- Object design process -Design Patterns.

UNIT IV 5 hours

IMPLEMENTATION & TESTING: Top-Down, Bottom-Up, object oriented product


Implemention & Integration. Software Testing methods-White Box, Basis Path-Control
Structure Black Box-Unit Testing- Integration testing-Validation & System testing.Testing
OOA & OOD models-Object oriented testing strategies.

UNIT V 4 hours

MAINTENANCE: Maintenance process-System documentation-program evolution


dynamics-Maintenance costs-Maintainability measurement Case Studies

Practical : 30 hours

References:

1. Roger S. Pressman, Software Engineering A Practitioners Approach , Fifth


Edition,Tata McGraw Hill,2010
2. Grady Booch, James Rumbaugh, Ivar Jacobson the Unified Modeling Language User

Guide Addison Wesley,1999. (Unit III)

3. Ian Sommerville, Software Engineering, 9th Edition, Pearson Education,2011

4. Carlo Ghezzi Mehdi Jazayer, Dino Mandrioli, Fudamentals of Software

Engineering, Prentice Hall of India 2002.

5.Fairley, Software Engineering Concepts, Tata McGraw Hill, 2001

L T P C
CC2109 Data Center Virtualization 3 0 0 3
Pre-requisites
Managing Virtual Environments

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

This course focuses on the challenges in setting up a data center. Resource monitoring using
hypervisors and access control to virtual machines will be covered in depth in this course.
Setting up of a virtual data center and how to manage them with software interfaces will be
discussed in detail.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Identify various constraints and challenges in setting up a data center


2. Demonstrate Enterprise level virtualization and access control in virtual machines
3. Perform Resource monitoring and execute backup and recovery of virtual machines.

Course Contents:

Unit I 9 hours

Data Center Challenges: How server, desktop, network Virtualization and cloud computing
reduce data center footprint, environmental impact and power requirements by driving server
consolidation; Evolution of Data Centers: The evolution of computing infrastructures and
architectures from standalone servers to rack optimized blade servers and unified computing
systems (UCS).

Unit II 12 hours

Enterprise-level Virtualization: Provision, monitoring and management of a virtual


datacenter and multiple enterprise-level virtual servers and virtual machines through software
management interfaces; Networking and Storage in Enterprise Virtualized
Environments: Connectivity to storage area and IP networks from within virtualized
environments using industry standard protocols.

Unit III 6 hours

Virtual Machines & Access Control: Virtual machine deployment, modification,


management; monitoring and migration methodologies.

Unit IV 6 hours

Resource Monitoring: Physical and virtual machine memory, CPU management and
abstraction techniques using a hypervisor.

Unit V 12 hours

Virtual Machine Data Protection: Backup and recovery of virtual machines using data
recovery techniques; Scalability: Scalability features within Enterprise virtualized
environments using advanced management applications that enable clustering, distributed
network switches for clustering, network and storage expansion; High Availability :
Virtualization high availability and redundancy techniques.

References:
1. Mickey Iqbal 2010, IT Virtualization Best Practices: A Lean, Green Virtualized Data
Center Approach, MC Press [ISBN: 978-1583473542]
2. Mike Laverick, VMware vSphere 4 Implementation [ISBN: 978-0071664523]
3. Jason W. McCarty, Scott Lowe, Matthew K. Johnson, VMware vSphere 4
Administration Instant Reference [ISBN: 978-0470520727]
4. Brian Perry, Chris Huss, Jeantet Fields, VCP VMware Certified Professional on
vSphere 4 Study Guide [ISBN: 978-0470569610]
5. Brian Perry, Chris Huss, Jeantet Fields, VCP VMware Certified Professional on
vSphere 4 Study Guide [ISBN: 978-0470569610]
6. Jason Kappel, Anthony Velte, Toby Velte, Microsoft Virtualization with Hyper-V:
Manage Your Datacenter with Hyper-V, Virtual PC, Virtual Server, and Application
Virtualization [ISBN: 978-0071614030]

L T P C
CC2110 Cloud Application Development 2 0 2 3
Pre-requisites
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:
This module introduces students to developing web and cloud applications. By the end of the
module the student will be able to build and deploy web and cloud-based application.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Use best practices in the design and development of elegant and flexible cloud
software solutions.
2. Create, implement and deploy a cloud/LAMP based application.
3. Analyze a real world problem and develop a cloud/LAMP based software solution.
4. Contrast software development in the web, cloud and others.

Course Contents:

Unit I 4 hours

Cloud Based Applications: Introduction, Contrast traditional software development and


development for the cloud. Public v private cloud apps. Understanding Cloud ecosystems
what is SaaS/PaaS, popular APIs, mobile;

Unit II 8 hours

Designing code for the Cloud: Class and Method design to make best use of the Cloud
infrastructure; Web Browsers and the Presentation Layer: Understanding Web browsers
attributes and differences. Building blocks of the presentation layer: HTML, HTML5, CSS,
Silverlight, and Flash.

Unit III 8 hours

Web Development Techniques and Frameworks : Building Ajax controls, introduction to


Javascript using JQuery, working with JSON, XML, REST. Application developement
Frameworks e.g. Ruby on Rails , .Net, Java API's or JSF; Deployment Environments
Platform As A Service (PAAS) ,Amazon, vmForce, Google App Engine, Azure, Heroku,
AppForce

Unit IV 4 hours

Use Case 1: Building an Application using the LAMP stack: Setting up a LAMP
development environment. Building a simple Web app demonstrating an understanding of the
presentation layer and connectivity with persistance.

Unit V 6 hours

Use Case 2: Developing and Deploying an Application in the Cloud : Building on the
experience of the first project students will study the design, development, testing and
deployment of an application in the cloud using a development framework and deployment
platform.

Practical : 30 hours

References:
1. Chris Hay, Brian Prince, Azure in Action [ISBN: 978-1935182481]
2. Henry Li, Introducing Windows Azure [ISBN: 978-1-4302-2469-3]
3. Eugenio Pace, Dominic Betts, Scott Densmore, Ryan Dunn, Masashi Narumoto,
MatiasWoloski, Developing Applications for the Cloud on the Microsoft Windows
Azure Platform [ISBN: 9780735656062]
4. Eugene Ciurana, Developing with Google App Engine [ISBN: 978-1430218319]
5. Charles Severance, Using Google App Engine [ISBN: 978-0596800697]
6. George Reese 2009, Cloud application architectures, O'Reilly Sebastopol, CA [ISBN:
978-0596156367]
7. Dan Sanderson, Programming Google App Engine [ISBN: 978-0596522728]
8. Paul J. Deitel, Harvey M. Deitel 2008, Ajax, rich Internet applications, and web
development for programmers, Prentice Hall Upper Saddle River, NJ [ISBN: 978-0-
13-158738-0]

L T P C
CC2111 Cloud Strategy Planning & Management 3 0 0 3
Pre-requisites
Nil

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.
3.

4.

5.

Purpose:

This course deals with the concepts and technological advances fueling the rapid adoption of
cloud computing today. This course provides the students with the skills and knowledge
required to plan and manage a Cloud Computing strategy within an organization. This course
will enable students to evaluate the strategic value of Cloud Computing using IT Governance
and Compliance.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Strategically assess how cloud computing enables IT Transformation and business


value in an organization.

2. Analyze the role that cloud computing can play in the business process.

3. Critically appraise how the incorporation of cloud computing in an IT strategy can


deliver on strategic business objectives.

4. Evaluate how cloud computing and Service Oriented Architecture (SOA) can deliver
business agility.

5. Implement IT governance to manage business realisation from cloud IT services.

Course Contents:

Unit I 9 hours

Achieving Business Value from IT Transformation: Moving to a cloud architecture and


strategy to achieve business value. BPM, IS, Porters Value chain model and BPR as a means
of delivering business value; Developing Business Strategy: Investigate business strategy
models to gain competitive advantage for organizations, SWOT/PEST, Economies of scale,
Porters 3 Strategies and 5 Competitive Forces, DAvenis hypercompetition models.

Unit II 9 hours
Strategic IT Leadership in the Organization: Emphasize the roles of the strategic IS/IT
leaders such as Chief Information Officer (CIO) and the Chief Technology Officer (CTO) in
planning and managing IT Strategic development in the organization.

Unit III 9 hours

Planning a Cloud Computing Based IT Strategy: Develop an IT strategy to deliver on


strategic business objectives in the business strategy. IT Project planning in the areas of
ITaaS, SaaS, PaaS and IaaS are essential in delivering a successful strategic IT Plan.

Unit IV 9 hours

SOA and Business Agility: Shared services delivered by a Service Oriented Architecture
(SOA) in a Private or Public Cloud. Services, Databases and Applications on demand. The
effect on Enterprise Architecture and its traditional frameworks such as Zachman and The
Open Group Architecture Framework (TOGAF).

Unit V 9 hours

Benefit Realization and IT Governance: Managing resources (people, process,


technology), to realize benefit from Private/Public Cloud IT services (IaaS, PaaS, PraaS,
SaaS),Gartner's 5 pillars of benefit realization. IT governance as a service in measuring the
delivery of IT Strategy from Cloud IT Services using Sarbannes Oxley (CobiT) and other
commonly-used approaches.

References :

1. Arnold J Cummins, Easiest Ever Guide to Strategic IT Planning


2. Andy Mulholland, Jon Pyke, Peter Finger, Enterprise Cloud Computing - A Strategy
Guide for Business and Technology Leaders, Meghan Kiffer [ISBN: 0929652290]

3. David S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise,


Addison Wesley [ISBN: 0136009220]

4. Charles Babcock, Management Strategies for the Cloud Revolution, 1st Ed.,
McGraw/Hill [ISBN: 0071740759]

5. Mark I. Williams, A Quick Start Guide to Cloud Computing: Moving Your Business
into the Cloud [ISBN: 0749461306]

6. Website: Whitepapers and news for the CIO


www.cio.com
7. Website: Gartner Research Website
www.gartner.com
L T P C
CC2112 Data Science and Big Data Analytics 2 0 2 3
Pre-requisites
Knowledge of statistical techniques

CourseCode CourseTitle L T P C

XX2001 3 0 2 4

TotalContactHours75

PURPOSE

INSTRUCTIONALOBJECTIVES

1.

2.

3.

4.

5.

Purpose:

This course provides practical foundation level training that enables immediate
and effective participation in big data and other analytics projects. It includes
an introduction to big data and the Data Analytics Lifecycle to address business
challenges that leverage big data. The course provides grounding in basic and
advanced analytic methods and an introduction to big data analytics
technology and tools, including MapReduce and Hadoop.

Instructional Objectives:

On successful completion of this course, the learner will be able to

1. Deploy the Data Analytics Lifecycle to address big data analytics


projects
2. Apply appropriate analytic techniques and tools to analyze big
data, create statistical models, and identify insights that can lead to
actionable results
3. Select appropriate data visualizations to clearly communicate
analytic insights to business sponsors and analytic audiences
4. Use tools such as: R and RStudio, MapReduce/Hadoop, in-database
analytics, Window and MADlib functions
5. Explain how advanced analytics can be leveraged to create competitive
advantage and how the data scientist role and skills differ from those of a
traditional business intelligence analyst

Course Contents:

Unit I 5 hours

Introduction to Big Data Analytics: Big Data overview, State of the practice in
analytics role of data scientists, Big Data Analytics in industry verticals

Unit II 4 hours

End-to-end Data Analytics Life Cycle: key roles for successful analytic project, main
phases of life cycle, Developing core deliverables for stakeholders

Unit III 12 hours

Basic Analytic Methods: introduction to R, analyzing and exploring data with R,


statistics for model building and evaluation

Unit IV 12 hours

Advanced Analytics and Statistical Modeling for Big Data: Nave Bayseian Classifier, K-
means Clustering, Association Rules, Decision Trees, Linear and Logistic Regression, Time
Series Analysis, Text Analytics;

Unit V 12 hours

Technology and Tools MapReduce/Hadoop , In- database Analytics, MADlib and advanced
SQL Tools

Practical : 30 hours

References:

1. Noreen Burlingame ,The little book on Big Data, New Street publisher(eBook)

http://www.prlog.org/11800911-just-published-the-little-book-of-big-data-2012-edition.html

2. Norman Matloff ,The Art of R Programming: A Tour of Statistical Software Design ,


ISBN-13: 978-1-59327-384-2; ISBN-10: 1-59327-384-3
3. http://www.johndcook.com/R_language_for_programmers.html
4. http://bigdatauniversity.com/
5. http://home.ubalt.edu/ntsbarsh/stat-data/topics.htm#rintroduction

AMENDMENTS

S.No. DetailsofAmendment Effectivefrom Approvalwithdate

You might also like