Professional Documents
Culture Documents
Reference Book
1. Jeffrey L. Whitten and Lonnie D. Bentley, "System Analysis and Design Methods", 7th Edition or
Latest One, McGraw Hill Publications.
2. Gary B, Shelly and Harry J. Rosenblatt, "System Analysis and Design", Ninth Edition
3. Dennis, A., Wixom, B, H, and Roth, R, M., "systems Analysis and Design", Latest edition, John
Wiley & Sons.
4. Roger Pressman, “Software Engineering: A Practitioner's Approach”, Current Edition
5. Ian Sommerville, “Software Engineering”, Ninth Edition
Part A
204
13. Course Learning Outcomes (CLOs) and Mapping of CLOs with Program Learning
Outcomes (PLOs):
PLO-10
PLO-11
PLO-12
PLO-1
PLO-2
PLO-3
PLO-4
PLO-5
PLO-6
PLO-7
PLO-8
PLO-9
CLO-1
CLO-2
CLO-3
CLO-4
Part B
14. Course plan specifying contents, CLOs, co-curricular activities (if any), teaching-learning, and
assessment strategy mapped with CLOs.
205
emerging XaaS), type of
clouds ((Public clouds,
Private clouds, Hybrid or
heterogeneous clouds,
Community clouds)
5,6 Cloud Resource ● Lecture, ● Quiz Test CLO-2, CLO-3
Virtualization ● Rapport ● Test (S|B)
Resource virtualization and building ● Demonstration
virtual Machine, File ● Multimedia ● Assignment
virtualization, type of Projector
virtualization and ● Cooperative
Hardware/software support learning
for virtualization, type of
network virtualization,
Performance of virtual
machines, VM software
and platforms,
Hypervisors, Operating
system level virtualization,
Dockers.
7,8 Cloud Resource ● Lecture ● Quiz Test CLO-2, CLO-3
Management and ● Case Study ● Test (S|B)
Scheduling ● Group work ● Demonstration
Cloud Computing
Reference Architecture,
Policies and mechanisms,
Resource utilization and
energy efficiency,
Application resource
management, Models for
cloud-based web services,
scheduling algorithms for
the cloud
9 Cloud Storage ● Lecture ● Q/A CLO-2, CLO-3
Overview of storage ● Case Study ● Test (S|B)
systems and models, ● Group work ● Demonstration
Distributed File Systems,
Cloud Databases, Data ● Assignment
storage for online
transaction processing
systems
10 Cloud Security ● Lecture ● Quiz Test CLO-4
Cloud-security risks, ● Group work ● Test (S|B)
Privacy and trust on the ● Hand Note ● Demonstration
cloud, Cloud data
encryption, Security of
cloud infrastructure
206
Hadoop, Eucalyptus,
Nimbus, OpenStack etc
12 Mobile Cloud Computing ● Lecture ● Class Test CLO-1, CLO-2,
Architecture and ● Group work ● Test (S|B) CLO-3, CLO-4
applications of MCC, Code ● Hand Note ● Demonstration
partitioning, Code
offloading and VM
migration techniques.
References:
1. Distributed and Cloud Computing: Clusters, Grids, Clouds, and the Future Internet - Kai Hwang,
Jack Dongarra & Geoffrey C. Fox
2. Cloud computing for dummies- Judith Hurwitz , Robin Bloor , Marcia Kaufman ,Fern Halper,
Wiley Publishing, Inc, 2010
3. Cloud Computing (Principles and Paradigms), Edited by Rajkumar Buyya, James Broberg, Andrzej
Goscinski, John Wiley & Sons, Inc. 2011
4. Cloud Computing Solution Architecture – A Hands-On Approach" by Arshdeep Bahga & Vijay
Madisetti. VPT Publisher; 1 edition (July 4, 2019). ISBN-13: 978- 0996025591
5. Cloud Computing: Concepts, Technology & Architecture" by Thomas Erl, Ricardo Puttini,
Zaigham Mahmood. Prentice Hall; 1 edition (May 20, 2013). ISBN-13: 978- 0133387520
Part A
207
11. Rationale of the Course: This course gives students an insight into the basics of cloud computing
along with virtualization, cloud computing is one of the fastest-growing domains from a while now.
It will provide the students’ basic understanding about cloud and virtualization along with how one
can migrate over it.
12. Course Outcomes (CLOs): After learning this course students will be able to-
a. CLO1- Understand the architecture and concept of different cloud models: IaaS, PaaS, and
SaaS.
b. CLO2- Evaluate cloud computing technologies and platforms in the context of the needs
of a specific application.
c. CLO3- Design, implement, and deploy cloud applications for current cloud platforms.
d. CLO4- Evaluate privacy and security issues for cloud infrastructure and cloud applications
13. Course Learning Outcomes (CLOs) and Mapping of CLOs with Program Learning
Outcomes (PLOs):
CLOs Program Outcomes (PLOs)
PLO-10
PLO-11
PLO-12
PLO-1
PLO-2
PLO-3
PLO-4
PLO-5
PLO-6
PLO-7
PLO-8
PLO-9
CLO-1
CLO-2
CLO-3
CLO-4
Part B
14. Course plan specifying contents, CLOs, co-curricular activities (if any), teaching-learning, and
assessment strategy mapped with CLOs.
208
Machines, Networking
with virtual machines.
5,6,7 Working with
Containers
Docker Containers,
Container management,
Deploying applications
on containers,
Kubernetes.
8,9,10 Working with ● Lecture ● Q/A
Cloudsim ● Case Study ● Test (S|B)
Architecture design, ● Group work ● Demonstration
cloudlets, scheduling
algorithms, simulations,
and interpretations
11,12, Working with Public ● Lecture ● Q/A
13 Cloud Platforms ● Case Study ● Test (S|B)
Amazon AWS, ● Group work ● Demonstration
Microsoft Azure, Google ● Assignment
App Engine, Google
MapReduce, Yahoo
Hadoop, Eucalyptus,
Nimbus, OpenStack, etc
14 Mobile Cloud ● Lecture ● Q/A
Computing ● Group work ● Test (S|B)
Designing Cloud-based ● Hand Note ● Demonstration
mobile applications.
● Project
Part A
1. Course No./ Course Code: CSE-4235
2. Course Title: Blockchain Technology and Application
3. Course Type (GEd/Core Course/ Elective/…..): Core Course
4. Year/ Level/ Semester/ Term: 4th Year 2nd Semester
5. Academic Session: 2021-22
6. Course Teacher/ Instructor:
7. Prerequisite (If any): Structure Programming, Object Oriented Programming, Cryptography and
Network Security
8. Credit Value: 3.00
9. Contact Hours: 3 Hours per week
10. Total Marks: 100
11. Rationale: The course “Blockchain Technology and application” teaches an emerging technology
platform for developing decentralized applications and data storage, and beyond its role as the
technology that is underlying the cryptocurrencies. This technology enables one to build a
distributed and replicated ledger of events, transactions, and data generated via various IT processes
with strong cryptographic guarantees of tamper resistance, immutability, and verifiability without
the need of trusted third parties.
209