Foothill CollegeApproved Course Outlines

Physical Sciences, Mathematics & Engineering Division
C S 54DCLOUD INFRASTRUCTURE & SERVICESSummer 2014
4 hours lecture, 3 hours laboratory.5 Units

Total Quarter Learning Hours: 84 (Total of All Lecture, Lecture/Lab, and Lab hours X 12)
 
 Lecture Hours: 4 Lab Hours: 3 Lecture/Lab:
 Note: If Lab hours are specified, see item 10. Lab Content below.

Repeatability -
Statement: Not Repeatable.

Status -
 Course Status: ActiveGrading: Letter Grade with P/NP option
 Degree Status: ApplicableCredit Status: Credit
 Degree or Certificate Requirement: AS Degree
 GE Status: Non-GE

Articulation Office Information -
 Transferability: CSUValidation: 11/14/11;11/16/13

1. Description -
Presents the transition from a Classic Data Center environment to a Virtual Data Center. The student will understand Cloud virtualization at each layer – compute, storage, network, desktop, and application – along with business continuity in a Virtual Data Center (VDC) environment. Explanation and discussion of Cloud computing basics, infrastructure components, service management activities, security concerns, and considerations for Cloud adoption.
Prerequisite: None
Co-requisite: None
Advisory: C S 50A.

2. Course Objectives -
The student will be able to:
  1. Explain the phases of transition from classic data center to virtual data center and then to the Cloud
  2. Describe virtualization technology at compute, storage, network, desktop, and application layers of IT infrastructure
  3. Describe business continuity solutions in a VDC environment
  4. Explain the key characteristics, services, and deployment models of Cloud
  5. Describe the Cloud infrastructure components and service management processes
  6. Describe the Cloud security concerns and solutions
  7. List the key considerations for migration to the Cloud
3. Special Facilities and/or Equipment -
  1. Access to a network laboratory with current Cisco network equipment host computers required to support the class.
  2. Website or course management system with an assignment posting component (through which all lab assignments are to be submitted) and a forum component (where students can discuss course material and receive help from the instructor). This applies to all sections, including on-campus (i.e., face-to-face) offerings.
  3. When taught via Foothill Global Access on the Internet, the college will provide a fully functional and maintained course management system through which the instructor and students can interact.
  4. When taught via Foothill Global Access on the Internet, students must have currently existing e-mail accounts and ongoing access to computers with internet capabilities.

4. Course Content (Body of knowledge) -
  1. Transitioning from a classic data center to a virtual data center and then to a cloud
    1. The business drivers, definition, essential characteristics, and phases of the journey to the cloud
      1. Business drivers
        1. Globalization
        2. Aging Data Centers
        3. Application Explosion
        4. Cost of Ownership
        5. Acquisitions of the companies
      2. Cloud Computing
        1. The NIST Definition
      3. Essential Cloud Characteristics
        1. On demand self-service
        2. Broad network access
        3. Resource Pooling
        4. Rapid Elasticity
        5. Measured Service
      4. Building a cloud infrastructure requires a phased approach
        1. Understand the current infrastructure
        2. Virtualize the current infrastructure
          1. Allows resource pooling and rapid elasticity
        3. Deploy service management tools to deliver the Cloud services
          1. Automate service provisioning to enable of-demand self-service of computing resources over the network
          2. Enable monitoring , control and optimization of resource usage
        4. Facilitate measured services
          1. Chargeback for resources used
          2. Budgeting programs
          3. Enable consumption based metering
  2. Virtualization technology at compute, storage, network, desktop, and application layers of IT infrastructure
    1. Compute virtualization
      1. Compute is the resource that runs applications with the help of underlying computing components.
    2. Storage virtualization
      1. Storage is a resource that stores data persistently for subsequent use.
    3. Network Virtualization
      1. Network is a data path that facilitates communication between compute systems or between compute systems and storage.
    4. Desktop virtualization
      1. Deployment of desktop infrastructure in a virtualized environment.
    5. Applications and DBMS in a virtualized environment.
      1. Basic characteristics
        1. An application is a computer program that provides the logic for computing operations.
        2. Applications may use a DBMS, which uses operating system services, to perform store/retrieve operations on storage devices.
          1. DBMS provides a structured way to store data in logically organized tables that are interrelated. A DBMS optimizes the storage and retrieval of data.
      2. Business applications
        1. E-Mail
        2. Enterprise resource planning (ERP)
        3. Decision support systems
        4. Data warehouse
        5. E-Mail
      3. Management applications
        1. Resource management
        2. Performance tuning
      4. Data protection applications
        1. Backup
        2. Replication
      5. Security applications
        1. Authentication
        2. Antivirus
        3. Firewalls
  3. Business Continuity
    1. Processes and procedures for ensuring continued business operations in the presence of compute, storage, network, or application failure.
      1. Business continuity solutions address unavailability and degraded application performance
      2. Business continuity is an integrated enterprise wide process and a set of activities to ensure “information availability”.
      3. Business Continuity Terminology
        1. Disaster recovery
        2. Hot site
        3. Cold site
        4. Cluster
        5. RPO and RTO
          1. Recovery Point Objective (RPO) is the point in time to which systems and data must be recovered after an outage and the amount of data loss that a business can endure.
          2. Recovery Time Option (RTO) is the amount of time that can be tolerated within which applications must be recovered and operational after an outage, it is the amount of downtime a business can endure and still survive.
      4. Eliminating single points of failure
        1. Single point of failure refers to the failure of a single component, which can terminate the availability of the entire system or an IT service.
        2. There are several single points of failure in a CDC.
          1. the single HBA on the compute
          2. the compute itself
          3. the IP network,
          4. the Fibre Channel switch,
          5. the storage array ports, or
          6. the storage array could become potential single points of failure.
      5. Multi-pathing software
        1. Configuration of multiple paths increases the data availability through path failover.
        2. Multiple paths to access data also improves I/O performance through load sharing and maximizes server, storage, and data path utilization.
        3. Multipathing software also manages load balancing by distributing I/Os to all available, active paths.
      6. Backup and recovery
        1. Backup is a copy of the production data, created and retained for the sole purpose of recovering deleted or corrupted data.
        2. Evaluating backup technologies, recovery, and retention requirements for data and applications is an essential step to ensure successful implementation of the backup and recovery solution.
        3. Disaster recovery addresses the requirement to be able to restore all, or a large part, of an IT infrastructure in the event of a major disaster.
      7. Replication
        1. Replication is the process of creating an identical/exact copy of data.
        2. The exact copy of data which is created is called a replica.
        3. Replicas can be used to address a number of Business Continuity functions
          1. Providing an alternate source for backup to alleviate the impact on production
          2. Providing a source for fast recovery to facilitate faster RPO and RTO
          3. Enabling decision support activities
  4. Key characteristics, services, and deployment models of Cloud
    1. Essential characteristics of Cloud Computing
      1. Technological foundations
        1. Grid Computing
        2. Utility Computing
        3. Virtualization
        4. Service Oriented Architcture
      2. Essential Characteristics
      3. Benefits of Cloud Computing
    2. Cloud services
      1. Infrastructure as a Service (Iaas)
        1. The base layer of the cloud model
        2. The Cloud infrastructure such as servers, routers, storage, and other networking components are provided by the IaaS provider.
        3. The consumer is able to deploy and run any software, which may include Operating Systems (OSs) and applications.
        4. The consumer does not manage or control the underlying Cloud infrastructure, but has control over the Oss and deployed applications.
        5. The consumer does not manage or control the underlying Cloud infrastructure.
      2. Platform as a Service (PaaS)
        1. The capability provided to the consumer to deploy consumer-created or acquired applications on the Cloud infrastructure.
        2. An application development environments offered as a ‘service' by the Cloud provider.
        3. The consumer uses these platforms to develop their applications.
        4. They then deploy the applications on the infrastructure offered by the Cloud provider.
      3. Software as a Service (SaaS)
        1. the capability, provided to the consumer, to use the service provider's applications running on a Cloud infrastructure.
        2. It is accessible from various client devices through a thin client interface such as a Web browser.
    3. Deployment models
      1. Three deployment models: private, public, and hybrid
        1. Private cloud - the Cloud infrastructure is operated solely for one organization and is not shared with other organizations
        2. Public cloud - IT resources are made available to the general public or organizations and are owned by the Cloud service provider.
        3. Hybrid cloud - the organization consumes resources from both private and public Clouds, the ability to augment a private Cloud with the resources of a public Cloud can be utilized to maintain service levels in the face of rapid workload fluctuations.
        4. Economics of Cloud Computing.
          1. Infrastructure Costs.
          2. Management Costs.
          3. Power and Energy Costs
    4. Benefits and challenges of the Cloud Computing.
      1. The Consumer Prospective
        1. Safety and Regulation
        2. Network Latency
        3. Supportability
        4. Interoperability
      2. The Provider Prospective
        1. Service Cost
        2. Service Warranty
        3. Huge variety of Software to Support
        4. No Standard Cloud Access Standards
  5. Describe the Cloud infrastructure components and service management processes
    1. Cloud infrastructure framework consists of the following components
      1. Physical infrastructure
        1. physical servers
        2. storage systems
        3. physical network components
          1. physical adapters
          2. switches
          3. routers
        4. Physical servers are connected
          1. to each other
          2. to the storage systems
          3. to the clients via physical networks such as IP network, FC SAN, IP SAN, or FCoE network.
      2. Virtual infrastructure
        1. Resource pools such as CPU pools, memory pools, network bandwidth pools, and storage pools
        2. Identity pools such as VLAN ID pools, VSAN ID pools, and MAC address pools
        3. Virtual IT resources consist of
          1. VMs, virtual volumes, and virtual networks
          2. VM network components such as virtual switches and virtual NICs
      3. Applications and platform software
        1. Applications and platform software layers include a suite of software such as:
          1. Business applications
          2. Operating systems
          3. Database management systems
          4. These softwares are required to build environments for running applications.
        2. Migration tools
          1. enabling deployment of consumer's applications and platform software to Cloud.
      4. Cloud infrastructure management and service creation tools
        1. Management and service creation tools are responsible for managing physical and virtual infrastructures.
        2. Tools to enable consumers to request for Cloud services
        3. Cloud infrastructure management and service creation tools automate consumer request processing and creation of Cloud services.
  6. Cloud security concerns and solutions
    1. Security concerns and counter measures in a VDC and Cloud environment.
      1. Basic security Concepts
        1. CIA triad - A security framework for an information system has three primary goals
          1. Confidentiality
          2. Integrity
          3. Availability of physical and logical resources
        2. AAA - The security framework for an information system should provide
          1. authentication
          2. authorization
          3. auditing (assesses the effectiveness of security)
        3. Defense-in-Depth - It is a risk management strategy which provides multiple layers of defense against attacks.
        4. Encryption - the conversion of data into a form that cannot be easily understood by unauthorized users.
      2. Security concerns and threats in a Cloud environment
        1. Multitenancy and ‘velocity-of-attack'
        2. Data Privacy
        3. VM vulnerable
        4. VM theft
        5. Hyperjacking, a rootkit level vulnerability
        6. Data leakage
  7. Migration to a cloud infrastructure
    1. Migration Considerations
      1. Application suitability for the cloud
      2. Criteria for vendor selection
      3. Service level agreements
      4. Cloud-Vendor Lock-in
      5. Cloud open standards
    2. Using a phased approach for migration
      1. Assessment
      2. Proof of Concept
      3. Migration
      4. Optimization
5. Repeatability - Moved to header area.
 
6. Methods of Evaluation -
  1. Tests and quizzes
  2. Written laboratory assignments.
  3. Final examination
7. Representative Text(s) -
EMC Education Services, Cloud Computing, Indianapolis, Wiley, 2014.

8. Disciplines -
Computer Science
 
9. Method of Instruction -
  1. Lectures which include motivation for the architecture of the specific topics being discussed.
  2. In-person or On-line labs (for all sections, including those meeting face-to-face/on campus) consisting of
    1. An assignment web-page located on a college-hosted course management system or other department-approved Internet environment. Here, the students will review the specification of each assignment and submit their completed lab work.
    2. A discussion web-page located on a college hosted course management system or other department-approved Internet environment. Here, students can request assistance from the instructor and interact publicly with other class members.
  3. Detailed review of laboratory assignments which includes model solutions and specific comments on the student submissions.
  4. In person or on-line discussion which engages students and instructor in an ongoing dialog pertaining to all aspects of designing, implementing and analyzing programs.
  5. When course is taught fully on-line:
    1. Instructor-authored lecture materials, handouts, syllabus, assignments, tests, and other relevant course material will be delivered through a college hosted course management system or other department-approved Internet environment.
    2. Additional instructional guidelines for this course are listed in the attached addendum of CS department on-line practices.
 
10. Lab Content -
  1. Understanding RAID
    1. RAID 0
      1. Create RAID 0 volume, identify properties
    2. RAID 1
      1. Create RAID 1 volume, identify properties
    3. RAID 5
      1. Create RAID 5 volume, identify properties
  2. Block-level and File-level Storage
    1. Block level storage with iSCSI
      1. Create volume for iSCSI
      2. Configure iSCSI target
      3. Configure iSCSI initiator on client and mount.
    2. File level storage with NFS
      1. Create a volume for NFS
      2. Create a NFS share
      3. Mount NFS share from Client
  3. Backup and Recovery Concepts
    1. Setup and configure deplication on NAS01
      1. Setup dedup volume and NFS share
      2. Copy the CentOS virtual machines from NAS01 to dedup
    2. Setup and configure replication of NAS01 to NAS01
      1. Setup periodic snapshots
      2. Setup SSH on both NAS systems
      3. Setup a replication task
  4. Replication and Deduplication
    1. Setup and configure deplication on NAS01
      1. Setup dedup volume and NFS share
      2. Copy the CentOS virtual machines from NAS01 to dedup
    2. aetup and configure replication of NAS01 to NAS01
      1. Setup periodic snapshots
      2. Setup SSH on both NAS systems
    3. Setup a replication task
  5. vSphere and vCenter
    1. Learning the ESXi hypervisor and virtual machines
      1. Create a virtual machine
      2. Adjusting virtual machine configurations
      3. Monitor virtual machine performance
    2. Learning the vCenter environment
      1. Identify datacenter, cluster, pool and vApp
  6. vSphere Datastore Implementation
    1. Storage vMotion
      1. Configure ESXi for Storage vMotion
      2. Storage DRS
      3. Storage I/O Control
  7. vSwitches – Networking in the VDC
    1. vSwitch
      1. vSwitch explained
      2. Configure a vSwitch
    2. Distributed vSwitch
      1. Configure a Distributed vSwitch
  8. Benefits of vMotion and Storage vMotion
    1. vMotion
      1. Migrate a virtual machine from ESXi01 to ESXi02
    2. Storage vMotion
      1. Migrate a virtual machine from NAS01 to NAS02
  9. VMware HA and VMware FT
    1. VMware HA
      1. Configure VMware HA
      2. Test VMware HA
    2. VMware FT
      1. Configure VMware FT
      2. Test VMware FT
 
11. Honors Description - No longer used. Integrated into main description section.
 
12. Types and/or Examples of Required Reading, Writing and Outside of Class Assignments -
  1. Reading
    1. Textbook assigned reading averaging 50 pages per week.
    2. On-line resources as directed by instructor though links pertinent to networking.
    3. Library and reference material directed by instructor through course handouts.
  2. Writing
    1. Technical prose documentation that supports and describes the laboratory exercises that are submitted for a grade.
13. Need/Justification -
This course is a restricted elective course for the AS degree in Enterprise Networking.


Course status: Active
Last updated: 2014-06-19 12:36:11


Foothill CollegeApproved Course Outlines