Teaching and student learning are vital because they empower individuals with knowledge, critical thinking, and problem-solving skills essential for personal and professional growth. Teaching enables innovation, adaptability, and lifelong learning, preparing students to contribute meaningfully to society and the ever-evolving technological landscape. The effective learning bridges the gap between theory and real-world application, building confidence and competence in handling complex challenges in real-world applications. Also, teaching inspires curiosity, collaboration, and ethical responsibility, shaping responsible technologists and future leaders. In view of that, I follow a blended pedagogy (as per our institute/department instructions) that includes active learning, chalk-talk, experiential learning, project-based learning, hands-on labs, and industry-relevant case studies to ensure deep understanding and practical mastery of the subject to our beloved students.
Course (Year/Semester): (B.Tech 3rd Year/ 6th Semester)
Course Code: ITDC0302
Course Name: Distributed System and Cloud Computing (Theory)
Course Timetable: Check Department Bulletin
Course Content:
Introduction: Evolution of Distributed System, characteristics, design and challenges. Processes and Threads, Physical and logical clocks, global states, mutual exclusion, election algorithms. Cloud Computing History of Cloud Computing, Architecture, Applications, deployment models, and service models. Cloud Storage, Why Cloud Computing Matters, Advantages of Cloud Computing, Disadvantages of Cloud Computing, Companies in the Cloud Today.
Virtualization: Issues with virtualization, virtualization technologies and architectures, Internals of virtual machine monitors/hypervisors, virtualization of data centres, and issues with Multi-tenancy. Implementation: Study of Cloud computing Systems like Amazon EC2 and S3, Google App Engine, and Microsoft Azure, Build Private/Hybrid Cloud using open-source tools, Deployment of Web Services from Inside and Outside a Cloud Architecture, Dynamic Scalability Architecture.
Resource Management: Server consolidation, Dynamic resource provisioning, Resource Optimization, Scheduling Techniques for Advance Reservation, SLA Requirements, and Load Balancing, SLA Management, various load balancing techniques Broad Aspects of Migration into Cloud, Migration of virtual Machines and techniques. Fault Tolerance Mechanisms.
Security: Vulnerability Issues and Security Threats, Application-level Security, Data level Security, and Virtual Machine level Security, Infrastructure Security, and Multi-tenancy Issues. IDS: host-based and network-based, Security-as-a-Service, Trust Management, Identity Management, and Access Controls Techniques.
Advance: Fog Computing, Edge Computing, Green Cloud, Cloud of Things, Mobile Cloud Computing, Serverless Computing, Web of Things.
Recommended Books:
1. Sunil Kumar Mamar, Gopal Shyam, Cloud Computing, Concepts and Technologies, CRC press 2021.
2. Haley Beard, Cloud Computing Best Practices for Managing and Measuring Processes for On-demand Computing, Applications and Data Centers in the Cloud with SLAs, Emereo Pty Limited, July 2008.
3. Thomas Erl and Ricardo Puttini, “Cloud Computing: Concepts Technology & Architecture”, PHI.
4. Kailash Jayaswal and Jagannath Kallakurchi, “Cloud Computing Black Book”, Wiley India.
5. Buyya and Vecchiola, “Mastering Cloud Computing” Morgan Kaufmann Publishers.
Final Marks: Check ERP
Attendance: Verify at ERP (Mandatory 75% Attendance is required to appear in End-Sem Exams)
Resources:
Exams:
Class Assignment:
Assignment Submission:
Course (Year/Semester): (B.Tech 3rd Year/ 6th Semester)
Course Code: ITDC0332
Course Name: Distributed System and Cloud Computing (Lab)
Course Timetable: Check Department Bulletin
Course Content:
Installation & configuration of Oracle Virtual box for windows XP & android.
Service deployment research & uses over cloud-Google app & Amazon web services.
Demonstration of Cloud Monitoring tool.
Implementation of Resource Provisioning Policy
Implementation of resource Scheduling algorithm
Implementation of Load balancing algorithm in Cloud computing
Implementation of security-based algorithm to protect the cloud platform
Performance evaluation of services over cloud-Google App & Amazon web services.
Implementation of Dynamic scalability algorithm
Managing cloud computing resources.
Using existing cloud characteristics and service models.
Performance evaluation of services over cloud.
Evaluate the case study: Google App Engine., Microsoft Azure
Lab Assignment:
Assignment Submission:
Lab Assignment: (Strictly use naming convention: GroupNumber(G3)_Rollno(last three digits)_Name_Assignment.pdf/.docx (Ex- G3_059_Gambhir_Assignment.docx))
Course (Year/Semester): (B.Tech 4th Year/ 8th Semester)
Course Code: ITPE-053
Course Name: Information Security System
Course Timetable: Check Department Bulletin
Course Content:
Introduction to information Security, Types of information security controls and purposes of Information Security Management, Allocation of information security responsibilities.
Telecommunications Security Objectives, Threats and Countermeasures, Identification of Security threats and development of countermeasures, Technologies and Security policies.
An introduction to LAN/WAN Security and internet Security , Security Management for the World Wide Web and Internet firewalls and Assessing inherent wireless network security deficiencies, Wireless LAN Problems, Wireless Equivalent Protocol Flaws, Short term solutions and Long term solutions.
Risk Management and Business Continuity Planning and Risk Analysis, Risk Analysis and Assessment, Available Standards (ISF, ISO and Commercial Sources), Risk verses standards etc.
Description of Various Security risk analysis tools, Techniques to secure networks from unauthorized activity, authentication procedures, encryption standards and implementations, ports and protocols that hackers manipulate, and how to engage in proactive detection and response/reporting methods.
Overview of IT Security, Hacking and Intrusion Attacks, Denial of Service Attacks (DoS), Viruses, how these get past the Firewall, how they work and the impact they can have on operations and business, Detection and Prevention Mechanisms, The self-Hack Audit and network security.
Current trends in breaches to IT Security, Current trends in IT Security detection and prevention, Examples of the types of IT security breaches most common and what can be expected in the future.
An overview of the ISO/IEC 17799:2000 “Information technology – Code of Practice for information security management” standards and how to apply these standards to IT environment, how is risk assessment related to ISO/IEC 17799 and BS 7799 Part 2?
Recommended Books:
1. S. Cimato and C.Galdi, “Security in Communication Networks”, Springer, 2003.
2. H. Chan and V. Gligor, “Information Security”, Springer, 2002.
3. UPTEC Computer Consultancy Limited, “Information Technology Tools and Applications”, Elsevier, 2005.
4. V. Rajaraman, “Introduction to Information technology”, Prentice Hall of India, 2/e, 2013.
5. Thomas M. Thomas, D. Stoddard, “Network Security”, Pearson Education, 2/e, 2005.
Final Marks: Check ERP
Attendance: Verify at ERP (Mandatory 75% Attendance is required to appear in End-Sem Exams)
Resources:
Exams:
Marks:
Class Assignment:
Assignment Submission: