0% found this document useful (0 votes)
43 views13 pages

Syllabus IV Semester

This document describes the course PSIT404c: Storage as a Service. It is a 4 credit, 4 period per week course offered in the 4th semester of M.Sc in Information Technology. The course objectives are to understand storage area networks, storage technologies, SAN architecture and protocols, and storage management techniques. The course is divided into 5 units covering topics such as data storage, storage architectures, intelligent storage systems, fiber channel SANs, IP SANs and NAS. Evaluation includes a theory examination worth 60 marks and internal assessment worth 40 marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views13 pages

Syllabus IV Semester

This document describes the course PSIT404c: Storage as a Service. It is a 4 credit, 4 period per week course offered in the 4th semester of M.Sc in Information Technology. The course objectives are to understand storage area networks, storage technologies, SAN architecture and protocols, and storage management techniques. The course is divided into 5 units covering topics such as data storage, storage architectures, intelligent storage systems, fiber channel SANs, IP SANs and NAS. Evaluation includes a theory examination worth 60 marks and internal assessment worth 40 marks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

PSIT403a: Deep Learning

M. Sc (Information Technology) Semester – IV


Course Name: Deep Learning Course Code: PSIT403a
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:
To present the mathematical, statistical and computational challenges of building
neural networks
To study the concepts of deep learning
To enable the students to know deep learning techniques to support real-time
applications

Unit Details Lectures Outcome


I Applied Math and Machine Learning Basics: Linear
Algebra: Scalars, Vectors, Matrices and Tensors ,
Multiplying Matrices and Vectors , Identity and Inverse
Matrices, Linear Dependence and Span , norms, special
12 CO1
matrices and vectors, eigen decompositions.
Numerical Computation: Overflow and under flow,
poor conditioning, Gradient Based Optimization,
Constraint optimization.
II Deep Networks: Deep feedforward network ,
regularization for deep learning , Optimization for 12 CO2
Training deep models
III Convolutional Networks, Sequence Modelling,
12 CO3
Applications
IV Deep Learning Research: Linear Factor Models,
12 CO4
Autoencoders, representation learning
V Approximate Inference, Deep Generative Models 12 CO5

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Deep Learning Ian Goodfellow, An MIT 1st 2016
Yoshua Bengio, Press
Aaron Courvile book
2. Fundamentals of Deep Nikhil Buduma O’Reilly 1st 2017
Learning
3. Deep Learning: Methods Deng & Yu Now 1st 2013
and Applications Publishers
4. Deep Learning CookBook Douwe Osinga O’Reilly 1st 2017

M. Sc (Information Technology) Semester – IV


Course Name: Deep Learning Practical Course Code: PSIT4P3a
Periods per week (1 Period is 60 minutes) 4
Credits 2
Hours Marks
Evaluation System Practical Examination 2 50
Internal -- -

List of Practical:
10 practicals covering the entire syllabus must be performed. The detailed list of
practical will be circulated later in the official workshop.

Course Outcomes:
After completion of the course, a student should be able to:
CO1: Describes basics of mathematical foundation that will help the learner
to understandthe concepts of Deep Learning.
CO2: Understand and describe model of deep learning
CO3: Design and implement various deep supervised learning architectures for
text & imagedata.
CO4: Design and implement various deep learning models and architectures.
CO5: Apply various deep learning techniques to design efficient algorithms
for real-worldapplications.
PSIT404c: Storage as a Service
M. Sc (Information Technology) Semester – IV
Course Name: Storage as a Service Course Code: PSIT404c
Periods per week (1 Period is 60 minutes) 4
Credits 4
Hours Marks
Evaluation System Theory Examination 2½ 60
Internal -- 40

Course Objectives:

Understand the need for Storage Area Network and Data protection to satisfy the
information explosion requirements.
Study storage technologies: SAN, NAS, IP storage etc., which will bridge the gap
between the emerging trends in industry and academics.
To get an insight of Storage area network architecture, protocols and its infrastructure.
To study and discuss the applications of SAN to fulfill the needs of the storage
management in the heterogeneous environment.
Study and understand the management of Storage Networks
To understand different techniques of managing store.

Unit Details Lectures Outcome


Introduction to Information Storage
Information Storage Data Types of Data Big Data
Information Storage Evolution of Storage Architecture
Data Center Infrastructure Core Elements of a Data
I Center Key Characteristics of a Data Center Managing 12 CO1
a Data Center Virtualization and Cloud Computing
Data Center Environment
Application Database Management System (DBMS)
Host (Compute) Operating System
Memory Virtualization Device Driver 20
Volume Manager File System Compute Virtualization
Connectivity Physical Components of Connectivity
Interface Protocols IDE/ATA and Serial ATA 28
SCSI and Serial SCSI Fiber Channel
Internet Protocol (IP) Storage
Disk Drive Components Platter Spindle Read/Write
Head Actuator Arm Assembly Drive Controller Board
Physical Disk Structure Zoned Bit Recording Logical
Block Addressing Disk Drive Performance Disk Service
Time Seek Time Rotational Latency Data Transfer Rate
Disk I/O Controller Utilization Host Access to Data
Direct-Attached Storage DAS Benefit and Limitations
Storage Design Based on Application Requirements and
Disk Performance Disk NativeCommand Queuing
Introduction to Flash Drives Components and
Architecture of Flash Drives Features of Enterprise Flash
Drives Concept in Practice: VMware ESXi
Data Protection: RAID
RAID Implementation Methods Software RAID
Hardware RAID Array Components RAID Techniques
Striping
Mirroring Parity RAID Levels RAID 0
RAID 1 Nested RAID RAID 3 RAID 4
RAID 5 RAID 6 RAID Impact on Disk Performance
Application IOPS and RAID Configurations RAID
Comparison Hot Spares

Intelligent Storage Systems Components of an


Intelligent Storage System Front End Cache Structure
of Cache Read Operation with Cache Write Operation
with Cache Implementation Cache Management
Cache Data Protection Back End Physical Disk Storage
Provisioning Traditional Storage Provisioning LUN
Expansion: MetaLUN Virtual Storage Provisioning 82
Comparison between Virtual and Traditional
Storage Provisioning Use Cases for Thin and
Traditional LUNs LUN Masking
Types of Intelligent Storage Systems High-End Storage
II 12 CO2
Systems Midrange Storage Systems
Fiber Channel Storage Area Networks Fiber Channel:
Overview The SAN and Its Evolution Components of FC
SAN Node Ports Cables and Connectors Contents
Interconnect Devices SAN Management Software FC
Connectivity Point-to-Point
Fiber Channel Arbitrated Loop Fiber Channel Switched
Fabric FC-SW Transmission
Switched Fabric Ports Fiber Channel Architecture Fiber
Channel Protocol Stack
FC-4 Layer FC-2 Layer FC-1 Layer FC-0 Layer Fiber
Channel Addressing World Wide Names FC Frame
110. Structure and Organization of FC Data Flow
Control
BB_Credit EE_Credit Classes of Service
Fabric Services Switched Fabric Login Types Zoning
Types of Zoning FC SAN Topologies Mesh Topology
Core-Edge Fabric Benefits and Limitations of Core-
Edge Fabric Virtualization in SAN Block-level Storage
Virtualization Virtual SAN (VSAN)
IP SAN and FCoE iSCSI Components of iSCSI iSCSI
Host Connectivity iSCSI Topologies Native iSCSI
Connectivity
Bridged iSCSI Connectivity Combining FC and Native
iSCSI Connectivity iSCSI Protocol Stack iSCSI PDU 6
iSCSI Discovery iSCSI Names iSCSI Session iSCSI
Command Sequencing FCIP FCIP Protocol Stack FCIP
Topology FCIP Performance and Security FCoE I/O
Consolidation Using FCoE Components of an FCoE
Network
Converged Network Adapter Cables
FCoE Switches FCoE Frame Structure
FCoE Frame Mapping FCoE Enabling Technologies
Priority-Based Flow Control (PFC) Enhanced
Transmission Selection (ETS
Congestion Notification (CN)
Data Center Bridging Exchange Protocol (DCBX) 1
Network-Attached Storage General-Purpose Servers
versus NAS Devices
Benefits of NAS File Systems and Network File
Sharing Accessing a File System
Network File Sharing Components of NAS
NAS I/O Operation NAS Implementations
Unifi ed NAS Unifi ed NAS Connectivity 164
Gateway NAS Gateway NAS Connectivity
Scale-Out NAS Scale-Out NAS Connectivity
NAS File-Sharing Protocols NFS CIFS
Factors Affecting NAS Performance File-Level
III Virtualization 12 CO3
Object-Based and Unified Storage
Object-Based Storage Devices Object-Based Storage
Architecture Components of OSD Object Storage and
Retrieval in OSD
Benefits of Object-Based Storage
Common Use Cases for Object-Based Storage Content-
Addressed Storage CAS Use Cases
Healthcare Solution: Storing Patient Studies
Finance Solution: Storing Financial Records Unified
Storage Components of Unifi ed Storage Data Access
from Unified Storage
Introduction to Business Continuity
Information Availability
Causes of Information Unavailability
Consequences of Downtime
Measuring Information Availability
BC Terminology BC Planning Life Cycle
Failure Analysis Single Point of Failure
Resolving Single Points of Failure Multipathing
Software Business Impact Analysis BC Technology
Solutions
I/O Operation without PowerPath I/O Operation with
PowerPath Automatic Path Failover Path Failure without
PowerPath
Path Failover with PowerPath: Active-Active Array
Path Failover with PowerPath: Active-Passive Array
Backup and Archive
Backup Purpose Disaster Recovery Operational
Recovery Archival Backup Considerations Backup
Granularity Recovery Considerations Backup Methods
6 Backup Architecture Backup and Restore Operations
Backup Topologies Backup in NAS Environments
Server-Based and Serverless Backup NDMP-Based
Backup
Backup Targets Backup to Tape Physical Tape Library
Limitations of Tape 2 Backup to Disk Backup to Virtual
Tape Virtual Tape Library Data Deduplication for
Backup Data Deduplication Methods DataDeduplication
Implementation Source-Based Data Deduplication
Target-Based Data DeduplicationBackup in Virtualized
Environments Data Archive Archiving Solution
Architecture Use Case: E-mail Archiving Use Case: File
Archiving
Local Replication Replication Terminology Uses of
Local Replicas Replica Consistency Consistency of a
Replicated File System
Consistency of a Replicated Database
Local Replication Technologies
Host-Based Local Replication
LVM-Based Replication Advantages of LVM-Based
Replication Limitations of LVM-Based Replication File
System Snapshot
IV 12 CO4
Storage Array-Based Local Replication
Full-Volume Mirroring Pointer-Based, Full-Volume
Replication Pointer-Based Virtual Replication Network-
Based Local Replication
Continuous Data Protection CDP Local Replication
Operation Tracking Changes to Source and Replica
Restore and Restart Considerations Creating Multiple
Replicas
Local Replication in a Virtualized Environment Remote
Replication Modes of Remote Replication Remote
Replication Technologies Host-Based Remote
Replication LVM-Based Remote Replication Host-
Based Log Shipping Storage Array-Based Remote
Replication Synchronous Replication Mode
Asynchronous Replication Mode Disk-Buffered
Replication Mode Network-Based Remote Replication
CDP Remote Replication
Three-Site Replication Three-Site Replication —
Cascade/Multihop Synchronous + Asynchronous
Synchronous + Disk Buffered
Three-Site Replication — Triangle/Multitarget Data
Migration Solutions Remote Replication and Migration
in aVirtualized Environment
Cloud Computing Cloud Enabling Technologies
Characteristics of Cloud Computing Benefits of Cloud
Computing
Cloud Service Models Infrastructure-as-a-Service
Platform-as-a-Service Software-as-a-Service Cloud
Deployment Models
Public Cloud Private Cloud Community Cloud Hybrid
Cloud Cloud Computing Infrastructure Physical
Infrastructure Virtual Infrastructure Applications and
Platform Software Cloud Management and Service
Creation Tools Cloud Challenges
Challenges for Consumers Challenges for Providers
Cloud Adoption Considerations
Securing the Storage Infrastructure
Information Security Framework Risk Triad
Assets Threats Vulnerability Storage Security Domains
Securing the Application Access Domain Controlling
User Access to Data Protecting the Storage
Infrastructure 341
Data Encryption Securing the Management Access
Domain Controlling Administrative Access Protecting
the Management Infrastructure Securing Backup,
Replication, and Archive Security Implementations in
Storage Networking FC SAN FC SAN Security
V Architecture Basic SAN Security Mechanisms LUN 12 CO5
Masking and Zoning
Securing Switch Ports Switch-Wide and Fabric-Wide
Access Control
Logical Partitioning of a Fabric: Virtual SAN
NAS NAS File Sharing: Windows ACLs
NAS File Sharing: UNIX Permissions
NAS File Sharing: Authentication and Authorization
Kerberos Network-Layer Firewalls IP SAN Securing
Storage Infrastructure in Virtualized and Cloud
Environments Security Concerns
Security Measures Security at the Compute Level
Security at the Network Level Security at the Storage
Level Concepts in Practice: RSA and VMware Security
Products RSA Secure ID RSA Identity and Access
Management
RSA Data Protection Manager VMware vShield
Managing the Storage Infrastructure
Monitoring the Storage Infrastructure
Monitoring Parameters Components Monitored Hosts
Storage Network Storage
Monitoring Examples Accessibility Monitoring
Capacity Monitoring Performance Monitoring Security
Monitoring Alerts
Storage Infrastructure Management Activities
Availability Management Capacity Management
Performance Management Security Management
Reporting Storage Infrastructure Management in a
Virtualized Environment Storage Management
Examples
Storage Allocation to a New Server/Host
File System Space Management Chargeback Report
Storage Infrastructure Management Challenges
Developing an Ideal Solution 384Storage Management
Initiative Enterprise Management Platform Information
Lifecycle Management Storage Tiering Intra-Array
Storage Tiering Inter-Array Storage Tiering

Books and References:


Sr. No. Title Author/s Publisher Edition Year
1. Information Storage and EMC John 2nd 2012
Management: Storing, Wiley &
Managing, and Protecting Sons
Digital Information in
Classic, Virtualized, and
Cloud Environments

Course Outcomes:

After completion of the course, a student should be able to:

CO1: Understand different techniques of storage and RAID Technologies


CO2: Understand different intelligent storage technologies. Also, understand the
benefits of Fibre Channel Storage Networks along with iSCSI.
CO3: Understand the architecture of NAS and deployment along with Object based
and unified storage technologies. Also, the learner will be able to configure the
storage devices to maintain highest level of availability
CO4: Understand Replication and Migration techniques and implement them.
CO5: Understand Different techniques for managing and securing storage infrastructure

You might also like