IF7202 CLOUD COMPUTING SYLLABUS FOR M.E COMPUTER SCIENCE REG 2013 - Anna University Internal marks 2018

IF7202 CLOUD COMPUTING SYLLABUS FOR M.E COMPUTER SCIENCE REG 2013

IF7202 CLOUD COMPUTING SYLLABUS
M.E. COMPUTER SCIENCE AND ENGINEERING
SEMESTER II
OBJECTIVES: 
 To introduce the broad perceptive of cloud architecture and model 
 To understand the concept of Virtualization 
 To be familiar with the lead players in cloud. 
 To understand the features of cloud simulator 
 To apply different cloud programming model as per need. 
 To be able to set up a private cloud. 
 To understand the design of cloud Services. 
 To learn to design the trusted cloud Computing system

UNIT I CLOUD ARCHITECTURE AND MODEL
Technologies for Network-Based System – System Models for Distributed and Cloud Computing – NIST Cloud Computing Reference Architecture. Cloud Models:- Characteristics – Cloud Services – Cloud models (IaaS, PaaS, SaaS) – Public vs Private Cloud –Cloud Solutions - Cloud ecosystem – Service management – Computing on demand. 
UNIT II VIRTUALIZATION
Basics of Virtualization - Types of Virtualization - Implementation Levels of Virtualization - Virtualization Structures - Tools and Mechanisms - Virtualization of CPU, Memory, I/O Devices - Virtual Clusters and Resource management – Virtualization for Data-center Automation. 

UNIT III CLOUD INFRASTRUCTURE 
Architectural Design of Compute and Storage Clouds – Layered Cloud Architecture Development – Design Challenges - Inter Cloud Resource Management – Resource Provisioning and Platform Deployment – Global Exchange of Cloud Resources. 

UNIT IV PROGRAMMING MODEL
Parallel and Distributed Programming Paradigms – MapReduce , Twister and Iterative MapReduce – Hadoop Library from Apache – Mapping Applications - Programming Support - Google App Engine, Amazon AWS - Cloud Software Environments -Eucalyptus, Open Nebula, OpenStack, Aneka, CloudSim 

UNIT V SECURITY IN THE CLOUD
Security Overview – Cloud Security Challenges and Risks – Software-as-a-Service Security – Security Governance – Risk Management – Security Monitoring – Security Architecture Design – Data Security – Application Security – Virtual Machine Security - Identity Management and Access Control – Autonomic Security. 

No comments:

Post a Comment