0% found this document useful (0 votes)
68 views

SRM Institute of Science & Technology - Academic Curricula (2018 Regulations) - Control

This document provides information about the course "Information Storage and Management". The course is a 3 credit professional elective offered by the Computer Science and Engineering department. The purpose of the course is to: 1) Understand the components of storage infrastructure, 2) Gain knowledge to evaluate storage architectures including storage subsystems, and 3) Understand business continuity, backup, and recovery methods.

Uploaded by

suchi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
68 views

SRM Institute of Science & Technology - Academic Curricula (2018 Regulations) - Control

This document provides information about the course "Information Storage and Management". The course is a 3 credit professional elective offered by the Computer Science and Engineering department. The purpose of the course is to: 1) Understand the components of storage infrastructure, 2) Gain knowledge to evaluate storage architectures including storage subsystems, and 3) Understand business continuity, backup, and recovery methods.

Uploaded by

suchi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Course Course L T P C

18CSE360T INFORMATION STORAGE AND MANAGEMENT E Professional Elective


Code Name Category 3 0 0 3

Pre-requisite Co-requisite Progressive


Nil Nil Nil
Courses Courses Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil

Course Learning Rationale (CLR): The purpose of learning this course is to: Learning Program Learning Outcomes (PLO)
CLR-1 : Understand the components of storage infrastructure. 1 2 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLR-2 : Gain knowledge to evaluate storage architectures including storagesubsystems

Environment & Sustainability


Analysis, Design, Research
CLR-3 : Understand the business continuity, backup and recovery methods.

Level of Thinking (Bloom)

Expected Proficiency (%)

Expected Attainment (%)

Individual & Team Work


Engineering Knowledge
CLR-4 : Acquire knowledge on information security framework

Design & Development

Project Mgt. & Finance


CLR-5 : Introduce the working principle of storage infrastructure with monitoring principles

Modern Tool Usage

Life Long Learning


Problem Analysis

Society & Culture


CLR-6 : Understand the structure of cloud computing and its techniques

Communication

PSO – 3
PSO - 1

PSO - 2
Ethics
Course Learning Outcomes (CLO): At the end of this course, learners will be able to:
CLO-1 : Acquire the knowledge on the components of storage infrastructure 3 80 70 M - - - - - - - L - - M - - -
CLO-2 : Acquire the ability to evaluate storage architectures including storagesubsystems 3 85 75 M M M M - - - - L - - H - - -
CLO-3 : Understand the business continuity, backup and recovery methods. 3 75 70 M M M M - - - - L - - H - - -
CLO-4 : Appreciate the concepts of storage security and information security applied to virtual machine 3 85 80 M M L L - - - - M - - H - - -
CLO-5 : Apply the knowledge for storage infrastructure 3 85 75 L M - - - - - - M - - H - - -
CLO-6 : Acquire the knowledge on structure of cloud computing and its techniques 3 80 70 M - - - - - - - L - - H - - -

Duration (hour) 9 9 9 9 9
Introduction to Information Storage Virtualization and Cloud Computing : Business Continuity And Back Up Recovery Cloud Computing:Cloud Enabling
SLO-1 Storage Security And Management :
S-1 Management Fiber Channel: Overview Business Continuity: Information Availability. Technologies
SLO-2 Evolution of Storage Architecture SAN and its Evolution BC Terminology, BC Planning life cycle Information Security Framework Characteristics of Cloud Computing
Components of FC SAN,
SLO-1 Data Centre Infrastructure Failure Analysis, Business Impact Analysis Risk Triad Benefits of Cloud Computing
S-2 FCConnectivity, FC Architecture
SLO-2 Virtualization and Cloud Computing IPSAN-iSCSI components BC Technology Solutions Storage Security Domains Cloud Service Models
Key challenges in managing
SLO-1 iSCSI Protocol StackiSCSI Names Backup and Archive: Backup Purpose Security Implementations in Storage Networking Cloud Deployment models
information.
S-3
NAS: General Purpose Servers versus Securing Storage Infrastructure in Virtualized Cloud Infrastructure Mechanism:
SLO-2 Data Center Environment: Application Backup Considerations
NAS Devices and Cloud Environments Logical Network Perimeter
SLO-1 Benefits of NAS- File Systems and
S 4-5 Database Management System (DBMS) Backup Granularity , Recovery considerations RSA and VMware Security Products Virtual Server , Cloud Storage Device
SLO-2 Network File Sharing
SLO-1 Host : Connectivity, Storage Components of NAS Backup Methods, Backup Architecture Monitoring the Storage Infrastructure Cloud Usage Monitor
S-6 Disk Drive Components,Disk Drive
SLO-2 NAS I/O Operation Backup and Restore Operations Monitoring Parameters, Resource Replication
Performance
SLO-1 Intelligent Storage System NAS Implementations Backup Topologies Components Monitored, Monitoring examples Ready Made environment
S-7 Components of an Intelligent Storage
SLO-2 NAS File Sharing Protocols Backup in NAS Environments Storage Infrastructure Management Activities Container
System
Backup Targets, Data Deduplication for Storage Infrastructure Management Challenges,
SLO-1 Storage Provisioning Object Based Storage Devices Cloud Challenges
S-8 Backup Storage Management Examples
SLO-2 Types of Intelligent Storage Systems Content Addressed Storage Backup in Virtualized Environments Storage Allocation to a New Server/Host, Cloud Adoption Considerations
SLO-1 Creation of an Linux Instance in Public Cloud, Usage of Cloud services with open
Creation of Virtual storage machine, Configuration and Tracing of FC scan Sharing Files between host and Virtual
S-9 Generate a private key, Access using SSH source cloud tools (like Eucalyptus,
SLO-2 Navigation of storage system . and iSCSI scan Machines, Usage of Backup techniques
client Openstack, Open Nebula and others)

SRM Institute of Science & Technology – Academic Curricula (2018 Regulations) – control copy
776
1. EMC Corporation, “Information Storage and Management”,2nd edition Wiley India, ISBN13: 978-
Learning 1118094839 3. UifTroppen Rainer Wolfgang Muller,”Storage Networks Explained”, India, Wiley, 2010, ISBN13: 978-
Resources 2. Thomas Erl, “Cloud Computing: Concepts, Technology & Architecture”, Prentice Hall , 0470741436
2013,ISBN: 9780133387568

Learning Assessment
Continuous Learning Assessment (50% weightage)
Bloom’s Final Examination (50% weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Level of Thinking
Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40% - 30% - 30% - 30% - 30% -
Understand
Apply
Level 2 40% - 40% - 40% - 40% - 40% -
Analyze
Evaluate
Level 3 20% - 30% - 30% - 30% - 30% -
Create
Total 100 % 100 % 100 % 100 % 100%
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,

Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr.V.Masillamani 1. Dr.B.Amutha SRMIST
2. Dr.A.Shanthini, SRMIST

SRM Institute of Science & Technology – Academic Curricula (2018 Regulations) – control copy
777

You might also like