0% found this document useful (0 votes)
294 views31 pages

Cloud

The document outlines the proposed course structure and syllabus for an M.Tech program in Cloud Computing for the academic year 2014-2015. The first year consists of two semesters, with the first semester covering topics such as enterprise devices and networks, enterprise storage systems, cloud computing, web application development, and elective courses. The second semester covers parallel algorithms, cloud security, mobile cloud, datacenter virtualization, and more elective courses. The second year involves a thesis/project worth 36 credits. The document also provides details on some individual courses covering topics such as cloud networking, enterprise storage systems, cloud computing fundamentals, and virtualization.

Uploaded by

Ram Metkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
294 views31 pages

Cloud

The document outlines the proposed course structure and syllabus for an M.Tech program in Cloud Computing for the academic year 2014-2015. The first year consists of two semesters, with the first semester covering topics such as enterprise devices and networks, enterprise storage systems, cloud computing, web application development, and elective courses. The second semester covers parallel algorithms, cloud security, mobile cloud, datacenter virtualization, and more elective courses. The second year involves a thesis/project worth 36 credits. The document also provides details on some individual courses covering topics such as cloud networking, enterprise storage systems, cloud computing fundamentals, and virtualization.

Uploaded by

Ram Metkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

M.

Tech (Cloud Computing)


Proposed Course Structure
&
Syllabus
W.E.F
A.Y 2014 - 2015

27
M.Tech (Cloud Computing)
FIRST YEAR
FIRST SEMESTER
Hours
Code Theory Subject Credits
L T P
14-CC-501 Enterprise Devices and Networks 3 1 0 4
14-CC-502 Enterprise Storage Systems 3 1 0 4
14-CC-503 Cloud Computing 3 0 2 4
14-CC-504 Web Application Development 3 0 2 4
Elective-1 3 0 0 3
Elective-2 3 0 0 3
14-CC-505 Seminar 1 0 0 4 2
Total 24

SECOND SEMESTER
Hours
Code Theory Subject Credits
L T P
14-CC-506 Parallel Algorithms 3 0 2 4
14-CC-507 Cloud Security 3 1 0 4
14-CC-508 Mobile Cloud 3 0 2 4
14-CC-509 Datacenter Virtualization 3 1 0 4
Elective-3 3 0 0 3
Elective-4 3 0 0 3
14-CC-510 Term Paper 0 0 4 2
Total 24

SECOND YEAR
Code Theory Subject Credits

28
14-CC-511 Thesis/Project 36

ELECTIVE COURSES:
ELECTI COURSE COURSE NAME L-T-P CREDITS
VE NO. CODE
14-CC-531 Data Analysis

14-CC-532 Data Mining


1
14-CC-533 Distributed Systems

14-CC-534 Big Data Analytics

14-CC-535 Service Oriented Architecture

14-CC-536 Application Development Frameworks 3-0-0 3


2
14-CC-537 Web Semantics

14-CC-538 Network Security

14-CC-539 Natural Language Processing

14-CC-540 Cloud Application Architectures


3 14-CC-541 Cloud Strategy Planning &
Management
14-CC-542 Scripting for System Administrators

14-CC-543 Object oriented Software Engineering

14-CC-544 MapReduce Design Patterns


4 14-CC-545 Open Source Cloud Computing and
Testing
14-CC-546 Advances in Computing

29
Course Code 14-CC-501
Course Title Enterprise Devices & Networks
L-T-P 3-1-0
Credits 4

Syllabus:
Introduction to Cloud Networking: Networking Basics, The network stack, Packets and
frames, Network equipment, Interconnect, Cloud Data Center, Cloud Networking,
Characteristics of Cloud Networking, Ethernet usage, Virtualization, Convergence, Scalability,
Software. Data Center Evolution: Mainframes to the Cloud: The Data Center Evolution,
Computer Networks, Ethernet, Enterprise versus Cloud Data Centers, Movement to the Cloud.
Switch Fabric Technology: Switch Fabric Architecture Overview, Switch Fabric Topologies,
Congestion Management, Flow Control, Traffic Management, Switch Chip Architecture
Examples. Cloud Data Center Networking Topologies: Traditional Multitiered Enterprise
Networks, Data Center Network Switch Types, Flat Data Center Networks, Rack Scale
Architectures, Network Function Virtualization. Data Center Networking Standards: Ethernet
Data Rate Standards, Virtual Local Area Networks, Data Center Bridging, Improving Network
Bandwidth, Remote Direct Memory Access. Server Virtualization and Networking: VM
Overview, Virtual Switching, PCI Express, Edge Virtual Bridging, VM Migration. Network
Virtualization: Multi-tenant Environments, Traditional Network Tunneling Protocols, VXLAN,
NVGRE, Tunnel Locations, Load Balancing Storage Networks: Storage Background, Advanced
Storage Technologies, Storage Communication Protocols, Network Convergence, Software-Defined
Storage, Storage in Cloud Data Centers. Software-Defined Networking: Data Center Software
Background, OpenStack, OpenFlow, Network Function Virtualization, SDN Deployment.
\
Text Books:
1. Gary Lee, “Cloud Networking - Understanding Cloud-based Data Center Networks”,
Elsevier, 2014

References:
1. Computer networks, Andrew Tanenbaum, 3/e, PHI, 1996.
2. Computer Networks – a system approach – Larry L. Peterson, Bruce S. Davie,
2/e,2007,Harcourt Asia PTE LTD.

30
Course Code 14-CC-502
Course Title Enterprise Storage Systems
L-T-P 3-1-0
Credits 4

Syllabus:
Storage Systems: Data Classification, Storage Evolution and Data Center infrastructure. Host
components, Connectivity, Storage, and Protocols. Components of a disk drive, physical disk
and factors affecting disk drive performance. RAID level performance and availability
considerations. Components and benefits of an intelligent storage system. Storage Networking
Technologies: Direct-Attached Storage (DAS)architecture, Storage Area Network (SAN)
attributes, components, topologies, connectivity options and zoning. FC protocol stack,
addressing, flow control, and classes of service. Networked Attached Storage (NAS)components,
protocols, IP Storage Area Network (IP SAN) iSCSI, FCIP and FCoE architecture. Content
Addressed Storage (CAS) elements, storage, and retrieval processes. Virtualization: Block-level
and file-level storage virtualization technology, virtual provisioning and cloud computing.
Business Continuity: Business Continuity measurement, terminologies, and planning. Backup
designs, architecture, topologies, and technologies in SAN and NAS environments. Local and
Remote replication using host and array-based replication technologies such as Synchronous and
Asynchronous methods. Storage Security and Management: Storage security framework and
various security domains. Security implementation in SAN, NAS, and IP-SAN networking.
Monitoring and Storage management activities and challenges

Text Book:
1.Somasundaram Gnanasundaram, Alok Shrivastava Information Storage and Management,
Wiley Publishing Inc, 2009

Reference:
1. Richard Barker, Paul Massiglia 2002, Storage area network essentials, Wiley New York
2. Ulf Troppens, Rainer Erkens, Wolfgang Mueller-Friedt, Rainer Wolafka, Nils Haustein,
Storage Networks Explained, July 2009
3. W. Curtis Preston 2002, Using SANs and NAS, O'Reilly & Associates Sebastopol, Calif.
4. Himanshu Dwivedi 2006, Securing storage, Addison-Wesley Upper Saddle River, NJ

31
Course Code 14-CC-503
Course Title Cloud Computing
L-T-P 3-0-2
Credits 4

Syllabus:
Cloud Computing Basics-Overview, Applications, Intranets and the Cloud. Your Organization
and Cloud Computing- Benefits, Limitations, Security Concerns. Hardware and
Infrastructure- Clients, Security, Network, Services. Software as a Service (Saas)-
Understanding the Multitenant Nature of SaaS Solutions, Understanding SOA. Platform as a
Service (PaaS)-IT Evolution Leading to the Cloud, Benefits of Paas Solutions, Disadvantages of
Paas Solutions. Infrastructure as a Service (Iaas)-Understanding IaaS, Improving Performance
through Load Balancing, System and Storage Redundancy, Utilizing Cloud-Based NAS Devices,
Advantages, Server Types. Identity as a Service (IDaaS)- Understanding Single Sign-On
(SSO), OpenID, Mobile ID Management. Cloud Storage-Overview, Cloud Storage Providers.
Virtualization-Understanding Virtualization, History, Leveraging Blade Servers, Server
Virtualization, Data Storage Virtualization. Securing the Cloud- General Security Advantages
of Cloud-Based Solutions, Introducing Business Continuity and Disaster Recovery. Disaster
Recovery- Understanding the Threats. Service Oriented Architecture-Understanding SOA,
Web Services Are Not Web Pages, Understanding Web Service Performance, Reuse and
Interoperability. Developing Applications-Google, Microsoft, Cast Iron Cloud, Bungee
Connect, Development. Migrating to the Cloud-Cloud Services for Individuals, Cloud Services
Aimed at the Mid-Market, Enterprise-Class Cloud Offerings, and Migration. Designing Cloud
Based Solutions-System Requirements, Design Is a Give-and-Take Process. Coding Cloud
Based Applications-Creating a Simple Yahoo Pipe, Using Google App Engine and creating a
Windows Azure Application. Application Scalability-Load-Balancing Process, Designing for
Scalability, Capacity Planning Versus Scalability, Scalability and Diminishing Returns and
Performance Tuning.

Text Books:
1. Cloud Computing : A Practical Approach by Anthony T. Velte Toby J. Velte, Robert
Elsenpeter, 2010 by The McGraw-Hill.
2. Cloud Computing: SaaS, PaaS, IaaS, Virtualization and more. by Dr. Kris Jamsa.
References:
1. Cloud Computing Bible by Barrie Sosinsky, Published by Wiley Publishing, 2011.
2. Cloud Computing for Dummies by Judith Hurwitz, Robin Bloor, Marcia Kaufman, and Dr.
Fern Halper, Wiley Publishing, 2010.
3. Moving to The Cloud, Dinakar Sitaram, Elsevier, 2014.
4. Cloud Computing Theory And Practice Danc.Marinercus, Elsevier, 2013.

32
Course Code 14-CC-504
Course Title Web Application Development
L-T-P 3-0-2
Credits 4
Syllabus:
Introduction to HTML5:Introduction, Editing HTML5,First HTML5 example,W3C html5
validation service, Heading, linking, Images, Special Characters and Horizontal rules, Lists,
Tables, Forms, Internal linking, Meta elements, New HTML5 Form input types, input and
datalist elements and autocomplete attribute, Page structure elements, Introduction to
Cascading Style Sheets: Inline styles, embedded style sheets, Positioning elements,
Backgrounds, Elements Dimensions, Box model and text flows, Media types and media queries,
Drop down menus, Text Shadows, Rounded corners, Color, Box shadows, Linear Gradients,
Radial gradients, Multiple background images, Image Borders, Animation selectors, Transitions
and Transformations, Java Script: Introduction to Scripting, Control Statements, Functions,
Arrays, Objects, Javascript Event handling: Reviewing the load Event, Event mousemove and
the event Object, Rollovers with mouseover and mouseout, Form Processing with focus and blur,
More Form Processing with submit and reset, Event Bubbling, More Events Introduction to
canvas : Canvas coordinate system, Rectangles, Using paths to draw lines, Drawing arcs and
circles, Shadows, Quadratic curve, Bezier curves, Linear gradients, Radial Gradients, Images,
image Manipulation, Patterns, Transformations, resizing the canvas to fill the browser, Alpha
transparency, Compositing, Save and restore methods, Note on canvas SVG and Canvas 3D,
Ajax-Enabled Rich Internet Applications with XML and JSON: Introduction, Rich Internet
Applications (RIAs) with Ajax,history of Ajax, “Raw” Ajax Example Using the
XMLHttpRequest Object,using XML and the DOM, Creating a Full-Scale Ajax-Enabled
Application, Web Servers: Introduction, HTTP transactions, Multitier Application Architecture,
Client-Side Scripting versus Server-Side Scripting, Accessing Web Servers, Apache, MySQL
and PHP Installation, Microsoft IIS Express and Web Matrix, PHP: Introduction, simple PHP
program, converting between data types, arithmetic operators, initializing and manipulating
Arrays, String comparision, String Processing with Regular Expressions, Form Processing and
Business Logic, Reading from a Database, Using Cookies, Dynamic Content .

Text Book
1. Paul Deitel, Harvey Deitel, Abbey Deitel, Internet and World Wide Web How to
Program, Edition 5, 2011.
References:
1. Chris Bates, Web Programming – Building Intranet applications, Wiley Publications, 3rd
Edition, 2009.
2. Jeffrey C. Jackson, Web Technologies A computer Science Perspective, Pearson, 2011
3. Eilliote, Rusty Harold, Java Network Programming, 3/e, O'Reilly Media, Inc.
4. Java server programming java JavaEE5 Black Book,2010, Kogent Solutions Inc, Dreamtech
Press
5. AJAX black book, new edition, Kogent Solutions Inc, Dreamtech Press

33
Course Code 14-CC-506
Course Title Parallel Algorithms
L-T-P 3-0-2
Credits 4
Syllabus:
Principles of Parallel Algorithm Design: Decomposition Techniques, Characteristics of Tasks
and Interactions, Mapping Techniques for Load Balancing, Methods for Containing Interaction
Overheads, Parallel Algorithm Models. Dense Matrix Algorithms:, Matrix-Matrix
Multiplication, Solving a System of Linear Equations. Sorting algorithms: Issues in Sorting on
Parallel Computers Sorting Networks, Quicksort, Bucket and Sample Sort, Other Sorting
Algorithms. Graph Algorithms: Definitions and Representation, Minimum Spanning Tree:
Prim's Algorithm, Single-Source Shortest Paths: Dijkstra's Algorithm, All-Pairs Shortest Paths,
Transitive Closure, Connected Components, Algorithms for Sparse Graphs. Search Algorithms
for Discrete Optimization Problems: Definitions and Examples, Sequential Search Algorithms,
Search Overhead Factor, Parallel Depth-First Search, Parallel Best-First Search, Speedup
Anomalies in Parallel Search Algorithms. Parallel hardware and parallel software:
modifications of the von Neumann model, parallel hardware, and parallel software parallel
program design, writing and running parallel programs. Distributed memory programming
with MPI-getting started, the trapezoidal rule in MPI, dealing with I/O, collective
communication, MPI derived data types, performance evaluation of MPI programs, A parallel
sorting algorithm . Shared memory programming with Pthreads: processes, threads and
pthreads , hello, world, matrix vector multiplication, critical sections, busy waiting, mutexes,
producer consumer synchronization and semaphores , barriers and condition variables, read write
locks, caches, cache coherence and false sharing, thread safety. Shared memory programming
with openMP: The trapezoidal rule, scope of variables, the reduction clause, the parallel for
directive, more about loops in openMP: sorting, scheduling loops, producers and consumers,
caches, cache coherence and false sharing, thread safety.

Text Books:

1. Peter S. Pacheco, An Introduction to Parallel Programming, 1 st Edition, Elsevier, 2011.


2. Ananth Grama, Anshul Guptha, Vipin Kumar, Introduction to Parallel Computing, 2 nd
Edition. Addison Wesley, 2003.

References:

1. Parallel Programming in C with MPI and OpenMP, Michael Jay Quinn, McGraw-Hill
Higher Education, 2004
2. Parallel computing theory and practice, MICHAEL J.QUINN, 2nd Edition, McGraw-Hill,
2008
3. Thomas Ruber, Parallel Programming for Multicore and Cluster Systems, 1st Edition,
Springer, 2010.

34
4. Henri Casanova, Arnaud Legrand, and Yves Robert, Parallel Algorithms, 1 st Edition,
CRC Press, 2010.
5. Algorithms for Parallel processing, Michael T Heath, Abhiram Ranade, Schreiber,
Springer. 1996,
6. Handbook of Parallel Computing Models, algorithms and applications, Samgithevar
Rajasekharan, John Reif, Taylor and Franics group. 2008
7. Parallel Processing and Parallel Algorithms: Theory and Computation, Seyed H. Roosta,
Springer, 2000

35
Course Code 14-CC-507
Course Title Cloud Security
L-T-P 3-1-0
Credits 4
Syllabus:
Security Concepts: Confidentiality, privacy, integrity, authentication, non-repudiation,
availability, access control, defence in depth, least privilege, importance of security in the cloud,
Importance in PaaS, IaaS and SaaS; Cryptographic Systems: Symmetric cryptography, stream
ciphers, block ciphers, modes of operation, public-key cryptography, hashing, digital signatures,
public-key infrastructures, key management, X.509 certificates, OpenSSL. Multi-tenancy
Issues: Isolation of users/VMs from each other. Virtualization System Security Issues: e.g.
ESX and ESXi Security, ESX file system security, storage considerations, backup and recovery;
Virtualization System Vulnerabilities: Management console vulnerabilities, management
server vulnerabilities, administrative VM vulnerabilities, guest VM vulnerabilities, hypervisor
vulnerabilities, hypervisor escape vulnerabilities, configuration issues, malware (botnets etc).
Virtualization System-Specific Attacks: Guest hopping, attacks on the VM (delete the VM,
attack on the control of the VM, code or file injection into the virtualized file structure), VM
migration attack, hyperjacking. Technologies for Virtualization-Based Security
Enhancement: IBM security virtual server protection, virtualization-based sandboxing; Storage
Security: HIDPS, log management, Data Loss Prevention. Location of the Perimeter, Legal and
Compliance Issues: Responsibility, ownership of data, right to penetration test. Local laws,
examination of modern Security Standards (eg PCIDSS), Standards to deal with cloud services
and virtualization, compliance for the cloud provider vs. compliance for the customer.

Text Book:
1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An Enterprise
Perspective on Risks and Compliance, O’ReillyMedia Inc, 2009

References:

2. Ronald L. Krutz, Russell Dean Vines, Cloud Security,2010.


3. John Rittinghouse, James Ransome, Cloud Computing,2009.
4. J.R. ("Vic") Winkler, Securing the Cloud,2011.

36
Course Code 14-CC-508
Course Title Mobile Cloud
L-T-P 3-0-2
Credits 4
Syllabus:
Introduction: Mobile Clouds Introduction and Background, Sharing Device Resources in
Mobile Clouds; Enabling Technologies For Mobile Clouds: Wireless Communication
Technologies, Network Coding for Mobile Clouds, Mobile Cloud Formation and Maintenance;
Social Aspects Of Mobile Clouds: Social Mobile Clouds; Green Aspects Of Mobile Clouds:
Green Mobile Clouds: Making Mobile Devices More Energy Efficient; Application Of Mobile
Clouds: Mobile Clouds Applications; Some Insights on the Future Developments of Mobile
Clouds

Text Book:

1. Frank H. P. Fitzek, Marcos D. Katz, Mobile Clouds: Exploiting Distributed Resources in


Wireless, Mobile and Social Networks, Wiley Publications, ISBN: 978-0-470-97389-9, Jan
2014.

References:
1. Paul J. Deitel, Harvey M. Deitel, Abbey Deitel, and Michael Morgano, Android for
Programmers: An App-Driven Approach, Prentice Hall, November 3, 2011.

37
Course Code 14-CC-508
Course Title Data Center Virtualization
L-T-P 3-1-0
Credits 4

Syllabus:
Data Center Challenges: reducing data centre footprint through server, desktop, network
Virtualization and cloud computing, environmental impact and power requirements by driving
server consolidation; Evolution of Data Centres: The evolution of computing infrastructures
and architectures from stand alone servers to rack optimized blade servers and unified computing
systems (UCS). Enterprise-level Virtualization: Provision, monitoring and management of a
virtual datacenter and multiple enterprise-level virtual servers and virtual machines through
software management interfaces; Networking and Storage in Enterprise Virtualized
Environments: Connectivity to storage area and IP networks from within virtualized
environments using industry standard protocols. Virtual Machines & Access Control: Virtual
machine deployment, modification, management. monitoring and migration methodologies.
Resource Monitoring: Physical and virtual machine memory, CPU management and abstraction
techniques using a hypervisor. Virtual Machine Data Protection: Backup and recovery of
virtual machines using data recovery techniques; Scalability: Scalability features within
Enterprise virtualized environments using advanced management applications that enable
clustering, distributed network switches for clustering, network and storage expansion; High
Availability : Virtualization high availability and redundancy techniques.

Text Book:
1. Mickey Iqbal 2010, IT Virtualization Best Practices: A Lean, Green Virtualized Data
Center Approach, MC Press

References:
2. Mike Laverick, VMware vSphere 4 Implementation,2010
3. Jason W. McCarty, Scott Lowe, Matthew K. Johnson, VMware vSphere 4 Administration
Instant Reference,2009.
4. Brian Perry, Chris Huss, Jeantet Fields, VCP VMware Certified Professional on vSphere 4
Study Guide,2010
5. Brian Perry, Chris Huss, Jeantet Fields, VCP VMware Certified Professional on vSphere 4
Study Guide,2010.
6. Jason Kappel, Anthony Velte, Toby Velte, Microsoft Virtualization with Hyper-V: Manage
Your Datacenter with Hyper-V, Virtual PC, Virtual Server, and Application Virtualization,2009.

38
ELECTIVE COURSES

39
Course Code 14-CC-531
Course Title Data Analysis
L-T-P 3-0-0
Credits 3
Syllabus:
Meaning of Multivariate Analysis, Measurements Scales: Metric measurement scales and
Non-metric measurement scales, Classification of multivariate techniques (Dependence
Techniques and Inter-dependence Techniques), Applications of Multivariate Techniques in
different disciplines. Factor Analysis: Meanings, Objectives and Assumptions, Designing a
factor analysis, Deriving factors and assessing overall factors, Interpreting the factors and
validation of factor analysis. Cluster Analysis: Objectives and Assumptions, Research design in
cluster analysis, Deriving clusters and assessing overall fit (Hierarchical methods, Non
Hierarchical Methods and Combinations), Interpretation of clusters and validation of profiling of
the clusters. Basics of forecasting: Basic steps in forecasting task. The forecasting scenario:
Averaging methods, Exponential smoothing methods, Holt’s linear method, Holt-Winters trend
and Seasonality method. Box-Jenkins Methodology for ARIMA models: Examining correlation
and stationarity of time series data, ARIMA models for time series data (An Auto-regressive
model of order one and a Moving Average Model of order one).

Text Books:
1. Joseph F.Hair, William C.Black, Barry J.Babin, Rolph E.Anderson and Ronald L.Tatham
Multivariate Data Analysis, 6th Edition, Pearson Education, Inc.,, 2006
2. Spyros Makridakis, Steven C.Wheelwright and Rob J. Hyndman. Forecasting methods and
Applications, Third Edition, John Wiley & Sons Inc., New York ,2005
References:
1. Bendat, J. S. and A. G. Piersol, 1986: Random Data: Analysis and Measurement Procedures.
John Wiley & Sons, 566 pp.
2. Daley, R., 1991: Atmospheric Data Analysis. Cambridge University Press, 457 pp.
3. Emery, W. J. and R. E. Thomson, 2001: Data Analysis Methods in Physical Oceanography,
2nd edition. Elsevier, 638 pp.
4. Lawson, C. L. and R. J. Hanson, 1974: Solving Least Squares Problems. Prentice-Hall, 340
pp. (reprinted 1997)
5. Menke, W., 1989: Geophysical Data Analysis: Discrete Inverse Theory. Academic Press, 289
pp.

40
6. Noble, B., and J. W. Daniel, 1988: Applied Linear Algebra, 3rd edition. Prentice-Hall, 521
pp

41
Course Code 14-CC-532
Course Title Data Mining
L-T-P 3-0-0
Credits 3

Syllabus:
Introduction: Basic Data Mining Tasks, Data Mining Issues, Data Mining Metrics, Data Mining
from a Database Perspective. Data Mining Techniques: A Statistical Perspective on Data
Mining, Similarity Measures, Decision Trees, Neural Networks, Genetic Algorithms.
Classification: Statistical-Based Algorithms, Distance-Based Algorithms, Decision Tree-Based
Algorithms, Neural Network-Based Algorithms, Rule-Based Algorithms, Combining
Techniques. Clustering: Similarity and Distance Measures, Hierarchical Algorithms, Partitional,
Algorithms, Clustering Large Databases, Clustering with Categorical Attributes. Association
Rules: Basic Algorithms, Parallel and Distributed Algorithms, Incremental Rules, Advanced
Association Rule Techniques, Measuring the Quality of Rules. Advanced Techniques: Web
Mining, Spatial Mining, Temporal Mining.

Text Books:
1. J. Han and M. Kamber. Data Mining: Concepts and Techniques, 3rd Ed. Morgan Kaufman.
2011.
References:
1. M. H. Dunham. Data Mining: Introductory and Advanced Topics. Pearson Education. 2001.
2. I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques.
Morgan Kaufmann. 2000.
3. D. Hand, H. Mannila and P. Smyth. Principles of Data Mining. Prentice-Hall. 2001.

42
Course Code 14-CC-533
Course Title Distributed Systems
L-T-P 3-0-0
Credits 3

Syllabus:
Characterization of DS, System Models, Interprocess Communication, Indirect
Communication, Operating System Support, Dist. Objects and Components, Distributed File
Systems, Time and Global States, Coordination and Agreement, Transactions and Concurrency
Control, Distributed Transactions

Text Book:
1. George Coulouris, Jean Dollimore, Tim Kindberg, Gordon Blair, “Distributed Systems:
Concepts and Design”, 5th Addison-Wesley Publishing Company , ISBN:0132143011
9780132143011
References:
1. Kenneth Birman Reliable Distributed Systems: Technologies, Web Services, and
Applications Springer; 2005 edition
2. Paulo Vera-Ssimo, Luís Rodrigues Distributed Systems for System Architects Springer;
2001 edition
3. Ajay D. Kshemkalyani , Mukesh Singhal Distributed Computing: Principles, Algorithms,
and Systems Cambridge University Press; Reissue edition (3 March 2011)
4. Zoltan Juhasz, Peter Kacsuk, Dieter Kranzlmuller, ”Distributed and Parallel Systems:
Cluster and Grid Computing”, Springer; 2004 edition (October 28, 2004)
5. Andrew S. Tanenbaum, “Distributed Operating Systems”, Prentice Hall, 1995

43
Course Code 14-CC-534
Course Title Big Data Analytics
L-T-P 3-0-0
Credits 3

Syllabus:
Big Data Processing Architectures, Big Data Technologies, Data Driven Architecture,
Information Management and Lifecycle, Big Data Analytics, Visualization and Data Scientist,
Implementing The "Big Data" Data. Writing Hadoop Map Reduce Programs, Integrating R and
Hadoop, Learning Data Analytics with R and Hadoop, Understanding Big Data Analysis with
Machine Learning, The Evolution of Analytic Scalability, The Evolution of Analytic Processes,
Creating a Culture of Innovation and Discovery, Think Bigger. Choices in Setting up R for
Business Analytics, R Interfaces, Manipulating Data, Exploring Data, Building Regression
Models, Forecasting and Time Series Models.

Text Books:
1. Data Warehousing in the Age of Big Data by Krish Krishnan, Morgan Kaufmann,2013.
2. Ohri, “R for Business Analytics”, Springer, 2012.
3. Big Data Analytics with R and Hadoop by Vignesh Prajapati,2013.

References:
1. Principles of Big Data Preparing, Sharing, and Analyzing Complex Information, 1st
Edition, by J Berman, published by Morgan Kaufmann,2013
2. “Big Data Analytics - From Strategic Planning to Enterprise Integration with Tools,
Techniques, NoSQL, and Graph” By David Loshin, Morgan Kaufmann,2013.
3. Franks, Bill, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data
Streams with Advanced Analytics”, Wiley, 1st Edition, 2012.
4. Big Data Application Architecture Q&A: a Problem - Solution Approach Nitin Sawant,
Himanshu Shah,2013.
5. Big Data Now: Current Perspectives from O'Reilly Radar By O'Reilly Radar Team, 2011.

44
Course Code 14-CC-535
Course Title Service Oriented Architecture
L-T-P 3-0-0
Credits 3

Syllabus:
Introducing SOA: Fundamental SOA- Common Misperceptions about SOA- Common tangible
benefits of SOA- Common pitfalls of adopting SOA. The Evolution of SOA:-from XML to
Web services to SOA, The continuing evolution of SOA, The roots of SOA. Web Services and
Primitive SOA: The Web services framework- Services, Service descriptions, messaging with
SOAP. Web Services and Contemporary SOA: Message exchange patterns- Service activity-
coordination-Atomic transactions- Business activities-Orchestration-Choreography- Web
Services and Contemporary SOA: Addressing- Reliable messaging- Correlation- Policies-
Metadata exchange- Security- Notification and eventing. SOA and Service-Orientation:
Principles of Service-Orientation-Service-orientation. - Anatomy of a service-oriented
architecture- Common principle of service-orientation-Service Layers –Service orientation.
Building SOA: SOA Delivery Strategies- SOA delivery lifecycle phases. Service-Oriented
Analysis: Introduction to service-oriented analysis- Benefits of a business-centric SOA-
Deriving business services- Service-Oriented Analysis: Service modeling, Service modeling
guidelines- Classifying service model logic- Contrasting service modeling approaches.Service-
Oriented Design Introduction to service-oriented design- WSDL-related XML Schema language
basics- WSDL language basics- SOAP language basics- Service interface, design tools. SOA
Composition Guidelines: Steps to composing SO Considerations for choosing service layers
and SOA standards, positioning of cores and SOA extensions. SOA Service Design: -Overview-
Service design of business service, application service, task centric service and guidelines. SOA
Business Process Design: WS-BPEL language basics-WS Coordination.

Text Book:
1. Thomas Erl ,” Service-Oriented Architecture: Concepts, Technology & Design”, Pearson
Education Pte Ltd 2008.

References:
1. Thomas Erl,”SOA Principles Of Service Design”Pearson Exclusives 2007.
2. Tomas Erl and Grady Booch,”SOA Design Patterns”Printice Hall 2008.111
3. Michael Rosen, Boris Lublinsky, Kevin T. Smith, Marc J. Balcer, “Applied SOA: Service-
Oriented Architecture and Design Strategies”, Wiley, 2010.
4. Douglas K. Barry, “Web Services, Service-Oriented Architectures, and Cloud Computing”,
Elsevier, 2003.

45
5. James Bean, “SOA and Web Services Interface Design: Principles, Techniques, and
Standards”, Elsevier, 2010
Course Code 14-CC-536
Course Title Application Development Frameworks
L-T-P 3-0-0
Credits 3

Syllabus:
Spring Framework Fundamentals: Inversion of Control and Containers, Using Spring to
configure an application: Bean Configuration in spring, Understanding the bean life-cycle,
Simplifying application configuration, Annotation-based dependency injection. Effective
Middle-Tier Architecture: Adding behavior to an application using aspects, Introducing data
access with spring, Simplifying JDBC-based data access, Driving database transactions in a
Spring environment. Implementing Enterprise Information Connectivity: Introducing object-
to-relational mapping (ORM), Getting started with Hibernate in a spring environment, Effective
web application architecture, Getting started with Spring MVC. Integration with Enterprise
Services: Securing web applications with Spring Security, Understanding Spring's remoting
framework, Simplifying message applications with Spring JMS, Adding manageability to an
application with Spring JMX.

Text Book:

1. Rod Johnson [et al.] 2005, Professional Java development with the Spring Framework,
Wiley Pub. Indianapolis

References:
1. Mark Fisher 2011, Spring Integration in Action, 1st Ed., Manning Publications
2. Craig Walls, Ryan Breidenbach, Spring in Action, 2011.
3. Paul Fisher, Solomon Duskis, Spring Persistence with Hibernate, 2010.
4. Gary Mak, Spring Recipes: A Problem-Solution Approach, Apress Publication, 2008.

46
Course Code 14-CC-537
Course Title Web Semantics
L-T-P 3-0-0
Credits 3

Syllabus:
The Future of the Internet.- Concepts.- Ontology in Computer Science.- Knowledge
Representation in Description Logic.- RDF and RDF Schema.- OWL.- Rule Languages.-
Semantic Web Services.- Technologies.- Methods for Ontology Development.- Ontology
Sources.- Semantic Web Software Tools.- Applications.- Software Agents.- Semantic Desktop.-
Ontology Applications in Art.- Geospatial Semantic Web.

Text Book:
1. Breitman, Karin, Casanova, Marco Antonio, Truszkowski, Walt, “Semantic Web:
Concepts, Technologies and Applications” NASA Monographs in Systems and Software
Engineering 2007, XIV, 327 p.
References:
1. Vipul Kashyap, Christoph Bussler, Matthew Moran, “The Semantic Web: Semantics for
Data and Services on the Web (Data-Centric Systems and Applications)”, Springer; 2008
edition (August 15, 2008)
2. Grigoris Antoniou, Paul Groth, Frank van Harmelen and Rinke Hoekstra, “A Semantic
Web Primer, third edition”, MIT Press, 2012
3. Toby Segaran Colin Evans Jamie Taylor, “Programming the Semantic Web" O'Reilly
Media, Inc. Publisher, July 9, 2009
4. Dean Allemang James Hendler “Semantic Web for the Working Ontologist: Effective
Modeling in RDFS and OWL, Edition 2” Elsevier Publisher, 2011
5. Pascal Hitzler Markus Krotzsch Sebastian Rudolph, “Foundations of Semantic Web
Technologies”, CRC Press, March 23, 2011

47
Course Code 14-CC-538
Course Title Network Security
L-T-P 3-0-0
Credits 3

Syllabus:
Introduction to Network Security: Attacks, services, Security. A model of Inter network
Security, Steganography, One time PADS. Basic and ESOTERIC Cryptographic Protocols:
Key Exchange, Authentication, Formal Analysis of Authentication and key Exchange Protocols,
Multiple & Public Key Cryptography, Secret Splitting & Sharing Secure elections, Secure
multiparty, Communication, Digital Cash. Crypto Graphic Algorithms (Block Cipher): RC2,
GOST, CAST, BLOW FISH, SAFEER, RC5, NEWDES, CRAB, Theory of Block Cipher
design. Key Management: Key lengths, Generating Keys, Transferring, Verification, Updating,
Storing, Backup, Compromised, Lifetime of, Destroying Keys, Public key Management. Digital
Signature Algorithms: Digital Signature, DSA, DSA variants, Gost, Discrete Lagorithm, One –
Schnorr – Shamir digital Signatures, Esign, Cellular Automata. Mails: Electronic Mail & IO
Security good Privacy, SIMIME, IP Security Architecture, Authentication Header, Encapsulating
Security, Pay load Key Management Issues. Security: Web Security Web Security requirements,
Secure Sockets Layer and Transport Layer Security, Secure Electronic Transaction. Viruses and
Threats: Intruders, Viruses, Worms and Firewalls Intruders, Viruses and Related Threats,
Firewall Design Principles, Trusted Systems.

Text Book
1. Eric Cole, Ronald L. Krutz, James Conley 2005, Network Security Bible, Wiley.
References:
1. Applied Cryptography, 7/e, Bruce SCHNEIER John Wiley & Sons Inc,1996.
2. Cryptography and Network Security, William Stallings, PHI,2013.
3. Introduction to cryptography with coding Theory, 7/e, Wade Trappe, C. Washington,
PEA,2005.
4. Cryptography and Information Security, V.K. Pachghare, PHI,2008.
5. Cryptography and Network Security, Forouzan, TMH, 2007.
6. Cryptography and Network Security, 2/e, Kahate , TMH,2009.

48
7. Modern Cryptography, Wenbo Mao, PEA,2003.
Course Code 14-CC-539
Course Title Natural Language Processing
L-T-P 3-0-0
Credits 3

Syllabus:
Introduction: Regular Expressions and Finite State Automata – Morphology and Finite State
Transducers – Computational Phonology and Text to speech - N-grams: Counting words in
Corpora –Simple N- grams – Smoothing – Entropy – HMMS. Speech Recognition: Speech
Recognition Architecture – Overview of HMM – Advanced Methods for decoding – Training a
speech Recognizer – Human Speech Recognition – Part of Speech Tagging – Rule Based,
Stochastic Part-of-Speech Tagging – Transformation Based Tagging. Context Free Grammars
for English: Context Free Rules and Trees, Sentence Level Constructions, Coordination,
Agreement, Grammars and Human Processing, Parsing with Context Free Grammars, Top down
Parser – Problems with Basic Top Down Parser – Finite State Parsing Methods – Representing
Meaning: Computational Desiderata for Representations – Meaning Structure of Language –
First Order Predicate Calculus - Semantic Analysis: Syntax driven Semantic Analysis – Attached
for a Fragment of English- Integrating Semantic Analysis into the Early Parser, Robust Semantic
Analysis - Dialogue and Machine. Translation: Dialogue Acts – Automatic, Plan inferential,
Cue based Interpretation of Dialogue Acts – Dialogue Structure and coherences – Dialogue
Managers - Language Similarities and Differences – The Transfer Metaphor – The Interlingua
Idea- Direct Translation – Using Statistical Techniques – Usability and System Development

Text Books:
1. D. Jurafsky and J. Martin, Speech and Language Processing: An Introduction to Natural
Language Processing, Computational Linguistics, and Speech Recognition. Pearson Education,
2004.

References:
1. C. Manning and H. Schutze, Foundations of Statistical Natural Language Processing.
Massachusetts Institute of Technology, 2003

49
2. James Allen, Natural Language Understanding. The Benajmins/Cummings Publishing
Company Inc. 1994
Course Code 14-CC-540
Course Title Cloud Application Architectures
L-T-P 3-0-0
Credits 3

Syllabus:
Cloud Computing : The Cloud, Cloud Application Architectures, The Value of Cloud
Computing, Cloud Infrastructure Models, An Overview of Amazon Web Services, Amazon
Cloud Computing: Amazon S3,Amazon EC2, Before The Move Into The Cloud: Know Your
Software Licenses , The Shift to a Cloud Cost Model, Service Levels for Cloud Applications,
Security, Disaster Recovery, Ready For The Cloud: Web Application Design, Machine Image
Design, Privacy Design, Database Management Security: Data Security, Network Security, Host
Security, Compromise Response, Disaster Recovery: Disaster Recovery Planning, Disasters in
the Cloud, Disaster Management, Scaling A Cloud Infrastructure: Capacity Planning, Cloud
Scale

Text Book:
1. George Reese, Cloud Application Architectures, O’Rielly Media Inc, 2009
References:
1. GautamShroff, Enterprise Cloud Computing Technology Architecture Applications,2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A Practical
Approach,2009.
3. Dimitris N. Chorafas, Cloud Computing Strategies,2009.

50
Course Code 14-CC-541
Course Title Cloud Strategy Planning & Management
L-T-P 3-0-0
Credits 3

Syllabus:
Achieving Business Value from IT Transformation: Moving to a cloud architecture and
strategy to achieve business value. BPM, IS, Porter’s Value chain model and BPR as a means of
delivering business value; Developing Business Strategy: Investigate business strategy models
to gain competitive advantage for organizations, SWOT/PEST, Economies of scale, Porter’s 3
Strategies and 5 Competitive Forces, D’Aveni’s hypercompetition models. Strategic IT
Leadership in the Organization: Emphasize the roles of the strategic IS/IT leaders such as
Chief Information Officer (CIO) and the Chief Technology Officer (CTO) in planning and
managing IT Strategic development in the organization. Planning a Cloud Computing Based
IT Strategy: Develop an IT strategy to deliver on strategic business objectives in the business
strategy. IT Project planning in the areas of ITaaS, SaaS, PaaS and IaaS are essential in
delivering a successful strategic IT Plan. SOA and Business Agility: Shared services delivered
by a Service Oriented Architecture (SOA) in a Private or Public Cloud. Services, Databases and
Applications on demand. The effect on Enterprise Architecture and its traditional frameworks
such as Zachman and The Open Group Architecture Framework (TOGAF). Benefit Realization
and IT Governance: Managing resources (people, process, technology), to realize benefit from
Private/Public Cloud IT services (IaaS, PaaS, PraaS, SaaS),Gartner's 5 pillars of benefit
realization. IT governance as a service in measuring the delivery of IT Strategy from Cloud IT
Services using Sarbannes Oxley (CobiT) and other commonly-used approaches.

Text Book:
1. Andy Mulholland, Jon Pyke, Peter Finger, Enterprise Cloud Computing - A Strategy
Guide for Business and Technology Leaders, Meghan Kiffer,2010.
References:
1. Arnold J Cummins, Easiest Ever Guide to Strategic IT Planning
2. David S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise,
Addison Wesley,2009.
3. Charles Babcock, Management Strategies for the Cloud Revolution, 1st Ed.,
McGraw/Hill,2010.
4. Mark I. Williams, A Quick Start Guide to Cloud Computing: Moving Your Business into
the Cloud,2010.

51
Course Code 14-CC-542
Course Title Scripting for System Administrators
L-T-P 3-0-0
Credits 3

Syllabus:
Power shell: Shell and Powershell Scripting: Shell syntax, sed, awk, grep, diff, join, etc.
Cmdlets: Unix and Windows CLI. cmdlets, wmic. Trouble shooting: Managing processes,
services, events and network connections; Troubleshooting. Applications Of Scripting:
Scripting in a high-level Language: Language syntax, Applications of scripting e.g. querying
SNMP devices, running external processes, managing user accounts, monitoring file systems &
processes, Using Ldap And Ad : Working with LDAP and AD.

Text Book:
1. Hal Rottenberg, “Managing VMware Infrastructure with Windows PowerShell TFM”,
Sapien Press, 2009.
References:
1. Justin Seitz, “Gray Hat Python”, NO STARCH PRESS, 2009.
2. RytisSileika, “Pro Python System Administration” A press; 1 edition, 2010.
3. Noah Gift and Jeremy Jones, “Python for Unix and Linux system administration”,
O'Reilly Farnham, 2008.
4. Marty Alchin, “Pro Python” A press, 2010.
5. Mark Lutz, “Learning Python” O'Reilly Media; 5 edition, 2013.
6. Mark Summerfield, “Programming in Python 3: A Complete Introduction to the Python
Language” Addison-Wesley Professional; 2 edition, 2009.
7. David N. Blank-Edelman, “Automating system administration with Perl”, O'Reilly Media
Sebastopol, CA, 2009.

52
Course Code 14-CC-543
Course Title Object oriented Software Engineering
L-T-P 3-0-0
Credits 3

Syllabus:
Introduction: Software Engineering Paradigms - Software Development process models -
Project & Process -Project management – Process & Project metrics – Object Oriented concepts
& Principles. Planning & Scheduling: Software prototyping - Software project planning –
Scope – Resources - Software Estimation -Empirical Estimation Models-Planning-Risk
Management - Software Project Scheduling – Object oriented Estimation & Scheduling.
Analysis & Design: Analysis Modeling - Data Modeling - Functional Modeling & Information
Flow- Behavioral Modeling-Structured Analysis - Object Oriented Analysis - Domain Analysis-
Object oriented Analysis process - Object Relationship Model – Object Behaviour Model;
Design Concepts & Principles - Design Process - Design Concepts - Modular Design –Design
Effective Modularity - Introduction to Software Architecture – Data Design – Transform
Mapping – Transaction Mapping – OOD - Design System design process- Object design process
-Design Patterns. Implementation & Testing: Top-Down , Bottom-Up , object oriented product
Implemention & Integration. Software Testing methods-White Box, Basis Path-Control Structure
–Black Box-Unit Testing- Integration testing-Validation & System testing. Testing OOA &
OOD models-Object oriented testing strategies.
Maintenance: Maintenance process-System documentation-program evolution dynamics-
Maintenance costs-Maintainability measurement – Case Studies

Text Book
1. Roger S. Pressman, “Software Engineering A Practitioner’s Approach”, Fifth Edition,Tata
McGraw Hill,2001.

References:

1. Grady Booch,James Rumbaugh,Ivar Jacobson –“the Unified Modeling Language User


Guide” – Addison Wesley,1999. (Unit III)
2. Ian Sommerville, “Software Engineering”, V Edition Addison- Wesley 1996
3. Pankaj Jalote “An Integrated Approach to Software Engineering” Narosa Publishing House
1991
4. Carlo Ghezzi Mehdi Jazayer, Dino Mandrioli “Fudamentals of Software Engineering”
Prentice Hall of India 2002.

53
54
Course Code 14-CC-544
Course Title MapReduce Design Patterns
L-T-P 3-0-0
Credits 3
Syllabus:
Design Patterns and MapReduce: Design Patterns, MapReduce History ,MapReduce and
Hadoop,Refresher, Hadoop Example: Word Count ,Pig and Hive. Summarization Patterns:
Numerical Summarizations, Pattern Description,Numerical Summarization, Examples, Inverted
Index Summarizations, Pattern Description, Inverted Index Example, Counting with Counters,
Pattern Description, Counting with Counters Example. Filtering Patterns: Filtering,Pattern
Description, Filtering Examples, Bloom Filtering, Pattern Description, Bloom Filtering
Examples, Top Ten, Pattern Description, Top Ten Examples, Distinct , Pattern Description ,
Distinct Examples. Data Organization Patterns.: Structured to Hierarchical, Pattern
Description , Structured to Hierarchical Examples, Partitioning, Pattern Description, Partitioning
Examples, Binning, Pattern Description, Binning Examples , Total Order Sorting , Pattern
Description , Total Order Sorting Examples, Shuffling, Pattern Description, Shuffle Examples,
Join Patterns: A Refresher on Joins, Reduce Side Join , Pattern Description, Reduce Side Join
Example, Reduce Side Join with Bloom Filter, Replicated Join , Pattern Description, Replicated
Join Examples , Composite Join ,Pattern Description , Composite Join Examples ,Cartesian
Product , Pattern Description, Cartesian Product Examples, Metapatterns Job Chaining, With
the Driver, Job Chaining Examples, With Shell Scripting, With JobControl, Chain Folding, The
ChainMapper and ChainReducer Approach, Chain Folding Example , Job Merging, Job Merging
Examples, Input and Output Patterns: Customizing Input and Output in Hadoop, InputFormat,
RecordReader, OutputFormat, RecordWriter , Generating Data, Pattern Description, Generating
Data Examples, External Source Output, Pattern Description, External Source Output Example,
External Source Input , Pattern Description, External Source Input Example , Partition Pruning ,
Pattern Description, Partition Pruning Examples , Final Thoughts and the Future of Design
Patterns: Trends in the Nature of Data, Images, Audio, and Video, Streaming Data, The Effects
of YARN, Patterns as a Library or Component.

Text Book:
1. Donald Miner and Adam Shook, MapReduce Design Patterns, O’reilly Media Inc, 2013
References:
1. Thomas Erl, Cloud Computing Design Patterns, Pearson Education, 2014
2. Christoph Fehling, Frank Leymann, Ralph Retter, Walter Schupeck, Peter Arbitter, Cloud
Computing Patterns: Fundamentals to Design, Build, and Manage Cloud Applications,
Springer, 2014
3. Bill Wilder, Cloud Architecture Patterns, Oreilly, 2012
4. Srinanth Perera, Thilina Gunarathne, Hadoop MapReduce Cook Book, PACKT
publishning, 2013

55
Course Code 14-CC-545
Course Title Open Source Cloud Computing and Testing

L-T-P 3-0-0
Credits 3

Syllabus:

OpenStack Cloud Computing: Keystone OpenStack Identity Service, Starting OpenStack


Image Service, Starting OpenStack Compute, Installing OpenStack Object Storage, Using
OpenStack Object Storage, Administering OpenStack Object Storage, Starting OpenStack Block
Storage, OpenStack Networking, Using OpenStack Dashboard. High Avaliability Open Stack.
Monitoring OpenStack services, OpenNebula Cloud Computing: OpenNebula,and its
underlying technologies. basic networking and OpenNebula frontend, hypervisors supported by
OpenNebula: KVM, Xen, and VMWare ESXi, OpenNebula resource management process.
OpenNebula management tasks and monitoring using Sunstone, the OpenNebula cloud
operations center Health and Monitoring, Ganglia, Hybrid Cloud Computing: Extending
OpenNebula, Public Cloud Computing and High Availability with OpenNebula. Software
Testing in the Cloud - SMART-T: Migrating Testing to the Cloud, HadoopUnit: Test
Execution in the Cloud

Text Book:

1. Kevin Jackson, Cody Bunch OpenStack Cloud computing Cookbook, Second Edition,
Packt Publishing, 2013

2. Scott Tilley, Tauhida Parveen Software Testing in the Cloud Migration and Execution,
Springer, 2012
3. Giovanni Toraldo, OpenNebula 3 Cloud Computing, Packt Publishing, 2012
References:

1. Tom Fifield etal, OpenStack Operations Guide, O’Rielly Publishers, 2014

2. John Rhoton, OpenStack Cloud Computing: Architecture Guide, Recursive Press, 2014

56
Course Code 14-CC-546
Course Title Advances in Computing
L-T-P 3-0-0
Credits 3

Syllabus:
Grid Computing, Autonomic Computing, Cluster Computing 1: Cluster setup & its
Administration, Performance Models & Simulations; Networking, Protocols & I/O, Lightweight
Messaging systems, Active Messages. Cluster Computing 2: Distributed shared memory,
parallel I/O Clusters, Jib and Resource management system, scheduling parallel jobs on clusters.
Cluster Computing 3: Load sharing and Fault tolerance manager, parallel programming
scheduling techniques, Dynamic load balancing. Example Cluster System – Beowlf, COMPaS
and NanOS. Pervasive Computing, Quantum Computing.

Text Book
1. Raj Kumar Buyya, High performance cluster computing, PEA,1999.

References:
1. J. Joseph & C. Fellenstein, Grid Computing, PEA,1999.
2. J.Burkhardt et .al, Pervasive computing, PEA, 2002.
3. Vishal Sahni, Quantum computing, TMH, 2006.
4. Marivesar, Approaching quantum computing, PEA.
5. Neilsen & Chung L, Quantum computing and Quantum Information, Cambridge
University Press,2000.
6. A networking approach to Grid Computing , Minoli, Wiley, 2005.

57

You might also like