SRM Institute of Science & Technology - Academic Curricula (2018 Regulations) - Control
SRM Institute of Science & Technology - Academic Curricula (2018 Regulations) - Control
Course Learning Rationale (CLR): The purpose of learning this course is to: Learning Program Learning Outcomes (PLO)
CLR-1 : Understand the components of storage infrastructure. 1 2 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLR-2 : Gain knowledge to evaluate storage architectures including storagesubsystems
Communication
PSO – 3
PSO - 1
PSO - 2
Ethics
Course Learning Outcomes (CLO): At the end of this course, learners will be able to:
CLO-1 : Acquire the knowledge on the components of storage infrastructure 3 80 70 M - - - - - - - L - - M - - -
CLO-2 : Acquire the ability to evaluate storage architectures including storagesubsystems 3 85 75 M M M M - - - - L - - H - - -
CLO-3 : Understand the business continuity, backup and recovery methods. 3 75 70 M M M M - - - - L - - H - - -
CLO-4 : Appreciate the concepts of storage security and information security applied to virtual machine 3 85 80 M M L L - - - - M - - H - - -
CLO-5 : Apply the knowledge for storage infrastructure 3 85 75 L M - - - - - - M - - H - - -
CLO-6 : Acquire the knowledge on structure of cloud computing and its techniques 3 80 70 M - - - - - - - L - - H - - -
Duration (hour) 9 9 9 9 9
Introduction to Information Storage Virtualization and Cloud Computing : Business Continuity And Back Up Recovery Cloud Computing:Cloud Enabling
SLO-1 Storage Security And Management :
S-1 Management Fiber Channel: Overview Business Continuity: Information Availability. Technologies
SLO-2 Evolution of Storage Architecture SAN and its Evolution BC Terminology, BC Planning life cycle Information Security Framework Characteristics of Cloud Computing
Components of FC SAN,
SLO-1 Data Centre Infrastructure Failure Analysis, Business Impact Analysis Risk Triad Benefits of Cloud Computing
S-2 FCConnectivity, FC Architecture
SLO-2 Virtualization and Cloud Computing IPSAN-iSCSI components BC Technology Solutions Storage Security Domains Cloud Service Models
Key challenges in managing
SLO-1 iSCSI Protocol StackiSCSI Names Backup and Archive: Backup Purpose Security Implementations in Storage Networking Cloud Deployment models
information.
S-3
NAS: General Purpose Servers versus Securing Storage Infrastructure in Virtualized Cloud Infrastructure Mechanism:
SLO-2 Data Center Environment: Application Backup Considerations
NAS Devices and Cloud Environments Logical Network Perimeter
SLO-1 Benefits of NAS- File Systems and
S 4-5 Database Management System (DBMS) Backup Granularity , Recovery considerations RSA and VMware Security Products Virtual Server , Cloud Storage Device
SLO-2 Network File Sharing
SLO-1 Host : Connectivity, Storage Components of NAS Backup Methods, Backup Architecture Monitoring the Storage Infrastructure Cloud Usage Monitor
S-6 Disk Drive Components,Disk Drive
SLO-2 NAS I/O Operation Backup and Restore Operations Monitoring Parameters, Resource Replication
Performance
SLO-1 Intelligent Storage System NAS Implementations Backup Topologies Components Monitored, Monitoring examples Ready Made environment
S-7 Components of an Intelligent Storage
SLO-2 NAS File Sharing Protocols Backup in NAS Environments Storage Infrastructure Management Activities Container
System
Backup Targets, Data Deduplication for Storage Infrastructure Management Challenges,
SLO-1 Storage Provisioning Object Based Storage Devices Cloud Challenges
S-8 Backup Storage Management Examples
SLO-2 Types of Intelligent Storage Systems Content Addressed Storage Backup in Virtualized Environments Storage Allocation to a New Server/Host, Cloud Adoption Considerations
SLO-1 Creation of an Linux Instance in Public Cloud, Usage of Cloud services with open
Creation of Virtual storage machine, Configuration and Tracing of FC scan Sharing Files between host and Virtual
S-9 Generate a private key, Access using SSH source cloud tools (like Eucalyptus,
SLO-2 Navigation of storage system . and iSCSI scan Machines, Usage of Backup techniques
client Openstack, Open Nebula and others)
SRM Institute of Science & Technology – Academic Curricula (2018 Regulations) – control copy
776
1. EMC Corporation, “Information Storage and Management”,2nd edition Wiley India, ISBN13: 978-
Learning 1118094839 3. UifTroppen Rainer Wolfgang Muller,”Storage Networks Explained”, India, Wiley, 2010, ISBN13: 978-
Resources 2. Thomas Erl, “Cloud Computing: Concepts, Technology & Architecture”, Prentice Hall , 0470741436
2013,ISBN: 9780133387568
Learning Assessment
Continuous Learning Assessment (50% weightage)
Bloom’s Final Examination (50% weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Level of Thinking
Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40% - 30% - 30% - 30% - 30% -
Understand
Apply
Level 2 40% - 40% - 40% - 40% - 40% -
Analyze
Evaluate
Level 3 20% - 30% - 30% - 30% - 30% -
Create
Total 100 % 100 % 100 % 100 % 100%
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr.V.Masillamani 1. Dr.B.Amutha SRMIST
2. Dr.A.Shanthini, SRMIST
SRM Institute of Science & Technology – Academic Curricula (2018 Regulations) – control copy
777