0% found this document useful (0 votes)
67 views71 pages

CLOUD and DATA CENTER TECHNOLOGIES Lab Manual

The document is a laboratory manual for the Cloud and Data Center Technologies course, aimed at enhancing students' practical skills in cloud computing and data center management. It outlines the vision and mission of the Directorate of Technical Education, provides a framework for practical outcomes, and details various experiments designed to develop industry-relevant competencies. The manual emphasizes a hands-on approach to learning, encouraging student engagement and continuous assessment throughout the course.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views71 pages

CLOUD and DATA CENTER TECHNOLOGIES Lab Manual

The document is a laboratory manual for the Cloud and Data Center Technologies course, aimed at enhancing students' practical skills in cloud computing and data center management. It outlines the vision and mission of the Directorate of Technical Education, provides a framework for practical outcomes, and details various experiments designed to develop industry-relevant competencies. The manual emphasizes a hands-on approach to learning, encouraging student engagement and continuous assessment throughout the course.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

Diploma Engineering

Laboratory Manual
(Cloud and Data Center Technologies)
(4361602)

[Information Technology, Semester-VI]


Enrolment No
Name
Branch
Academic Term
Institute

Directorate Of Technical Education


Gandhinagar - Gujarat
Cloud and Data Center Technologies (4361602)

DTE’s Vision:
● To facilitate quality technical and professional education having relevance for
both industry and society, with moral and ethical values, giving equal
opportunity and access, aiming to prepare globally competent technocrats.
DTE’s Mission:
 Quality technical and professional education with continuous improvement of
all the resources and personnel
 To promote conducive ecosystem for Academic, Industry, Research,
Innovations and Startups
 To provide affordable quality professional education with moral values, equal
opportunities, accessibility and accountability
 To allocate competent and dedicated human resources and infrastructure to
the institutions for providing world-class professional education to become a
Global Leader (―Vishwa Guru‖)
Institute’s Vision:

Institute’s Mission:

Department’s Vision:

Department’s Mission:
Cloud and Data Center Technologies (4361602)

Certificate

This is to certify that Mr./Ms ………………………………………………………………….


Enrolment No. ………….……………. of …….………. Semester of Diploma in Information
Technology of …………………. (GTU Code) has satisfactorily completed the term work in
course Cloud and Data Center Technologies(4361602)for the academic year:
…………………… Term: Odd/Even prescribed in the GTU curriculum.

Place:…………..

Date: …………………..

Signature of Course Faculty Head of the Department


Cloud and Data Center Technologies (4361602)

Preface
The primary aim of any laboratory/Practical/field work is enhancement of required skills as
well as creative ability amongst students to solve real time problems by developing relevant
competencies in psychomotor domain. Keeping in view, GTU has designed competency focused
outcome-based curriculum -2021 (COGC-2021) for Diploma engineering programmes. In this more
time is allotted to practical work than theory. It shows importance of enhancement of skills amongst
students and it pays attention to utilize every second of time allotted for practical amongst Students,
Instructors and Lecturers to achieve relevant outcomes by performing rather than writing practice in
study type. It is essential for effective implementation of competency focused outcome- based Green
curriculum-2021. Every practical has been keenly designed to serve as a tool to develop & enhance
relevant industry needed competency in each and every student. These psychomotor skills are very
difficult to develop through traditional chalk and board content delivery method in the classroom.
Accordingly, this lab manual has been designed to focus on the industry defined relevant outcomes,
rather than old practice of conducting practical to prove concept and theory.

By using this lab manual, students can read procedure one day in advance to actual
performance day of practical experiment which generates interest and also, they can have idea of
judgement of magnitude prior to performance. This in turn enhances predetermined outcomes amongst
students. Each and every Experiment /Practical in this manual begins by competency, industry relevant
skills, course outcomes as well as practical outcomes which serve as a key role for doing the practical.
The students will also have a clear idea of safety and necessary precautions to be taken while
performing experiment.

This manual also provides guidelines to lecturers to facilitate student-centred lab activities for
each practical/experiment by arranging and managing necessary resources in order that the students
follow the procedures with required safety and necessary precautions to achieve outcomes. It also
gives an idea that how students will be assessed by providing Rubrics.

Cloud and Data Center Technologies course will help students to build up core competencies
in develop and deploy cloud network with data center Technologies. The lab work of the course is
designed to develop crisp understanding of the underpinning theory.

Although we try our level best to design this lab manual, but always there are chances of
improvement. We welcome any suggestions for improvement.

3 | Page
Cloud and Data Center Technologies (4361602)

Programme Outcomes (POs):


1. Basic and Discipline specific knowledge: Apply knowledge of basic mathematics, science
and engineering fundamentals and engineering specialization to solve the engineering
problems.

2. Problem analysis: Identify and analyse well-defined engineering problems using codified
standard methods.

3. Design/ development of solutions: Design solutions for engineering well-defined technical


problems and assist with the design of systems components or processes to meet specified
needs.

4. Engineering Tools, Experimentation and Testing: Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.

5. Engineering practices for society, sustainability and environment: Apply appropriate


technology in context of society, sustainability, environment and ethical practices.

6. Project Management: Use engineering management principles individually, as a team


member or a leader to manage projects and effectively communicate about well-defined
engineering activities.

7. Life-long learning: Ability to analyze individual needs and engage in updating in the
context of technological changes in field of engineering.

4 | Page
Cloud and Data Center Technologies (4361602)

Practical Outcome - Course Outcome matrix


Course Outcomes (COs):

a) Understand the concept of Cloud architecture and its model.


b) Apply the virtualization concept with its types.
c) Understand Data Center Architecture.
d) Learn and use Cloud Storage and Database Services.
e) Explain Cloud Security and Compliance.
f) Understand and implement emerging technologies with Cloud Computing.
CO1 CO2 CO3 CO4 CO5 CO6
S. No. Practical Outcome/Title of experiment

1. Sketch out and analyze the architecture of


Openstack/ Eucalyptus/ OpenNebula/ KVM

and identify different entities to understand the
structure of it.

2. Create a Cloud Organization in AWS/Google


Cloud/or any equivalent Open Source cloud

softwares like Openstack/ Eucalyptus/
OpenNebula with Role-based access control.

3. Install Virtualbox/VMware/ Equivalent open


source cloud Workstation with different
platforms of Linux or Windows OS on top of ✔
windows 8 and above.

4.
Install Python in the virtual machine created ✔
using VirtualBox/VMware and execute Simple
Programs.

Create type 2 virtualization in VMWARE or


5. ✔
any equivalent Open Source Tool.

a. Starting and Stopping a virtual machine.


b. Allocate memory and storage space as
per requirement.
c. Take snapshots of virtual machines
d. Clone a virtual machine to create
identical copies.
e. Transfer the files from one virtual
machine to another virtual machine
Create desktop Virtualization using Chrome
6.
Remote Desktop. ✔

7. Setup your own virtual SDN lab using any of ✔

5 | Page
Cloud and Data Center Technologies (4361602)

below given platform

i) Virtualbox/Mininet Environment for SDN -


http://mininet.org

A study and comparison on various cloud


8.
databases like Amazon RDS ,Google ✔
Cloud SQL,Microsoft Azure SQL
Database, IBM Db2 on Cloud, Firebase
Realtime Database (NoSQL), MongoDB
Atlas (NoSQL),Oracle Cloud
Autonomous Database

A study and comparison on various cloud


9.
storage like Amazon S3,Google Cloud Storage, ✔
Microsoft Azure Blob Storage, IBM Cloud
Object Storage for its performance and
scalability

Simulate resource management using cloudsim


10.
open source framework. ✔

Simulate a secure file sharing using a


11.
cloudsim open source framework. ✔

12.
Creating and Executing Your First Container ✔
Using Docker platform.

Industry Relevant Skills


The following industry relevant skills are expected to be developed in the students by
performance of experiments of this course.

a) Student will learn to understand the concept of cloud architecture and its model.
b) Student will learn to apply the virtualization concept.
c) Student will learn to understand and implement data center architecture, cloud storage/
database services, cloud security and emerging technologies with cloud computing

Guidelines to Course Faculty


1. Course faculty should demonstrate experiment with all necessary implementation strategies
described in curriculum.
2. Course faculty should explain industrial relevance before starting of each experiment.
3. Course faculty should involve& give opportunity to all students for hands on experience.
4. Course faculty should ensure mentioned skills are developed in the students by
asking.
5. Utilise 2 hours of lab hours effectively and ensure completion of write up with quiz also.

6 | Page
Cloud and Data Center Technologies (4361602)

6. Encourage peer to peer learning by doing same experiment through fast learners.

Instructions for Students


1. Organize the work in the group and make record of all observations.
2. Students shall develop maintenance skill as expected by industries.
3. Student shall attempt to develop related hand-on skills and build confidence.
4. Student shall develop the habits of evolving more ideas, innovations, skills etc.
5. Student shall refer technical magazines and data books.
6. Student should develop habit to submit the practical on date and time.
7. Student should well prepare while submitting write-up of exercise.

7 | Page
Cloud and Data Center Technologies (4361602)

Continuous Assessment Sheet


Enrolment No: Name:
Term:
Sr Practical Outcome/Title of experiment Page Date Marks Sign
no
(25)

1 Sketch out and analyze the architecture of Openstack/


Eucalyptus/ OpenNebula/ KVM and identify
different entities to understand the structure of it.

2 Create a Cloud Organization in AWS/Google


Cloud/or any equivalent Open Source cloud softwares
like Openstack/ Eucalyptus/ OpenNebula with Role-
based access control.

Install Virtualbox/VMware/ Equivalent open source


3 cloud Workstation with different platforms of Linux
or Windows OS on top of windows 8 and above.

Install Python in the virtual machine created using


4
VirtualBox/VMware and execute Simple Programs.

Create type 2 virtualization in VMWARE or any


5
equivalent Open Source Tool.

a. Starting and Stopping a virtual machine.


b. Allocate memory and storage space as per
requirement.
c. Take snapshots of virtual machines
d. Clone a virtual machine to create identical
copies.
e. Transfer the files from one virtual machine to
another virtual machine
Create desktop Virtualization using Chrome Remote
6
Desktop.

Setup your own virtual SDN lab using any of below


7
given platform

i) Virtualbox/Mininet Environment for SDN -


http://mininet.org

A study and comparison on various cloud


8
databases like Amazon RDS ,Google Cloud
SQL,Microsoft Azure SQL Database, IBM
Db2 on Cloud, Firebase Realtime Database
(NoSQL), MongoDB Atlas (NoSQL),Oracle
8 | Page
Cloud and Data Center Technologies (4361602)

Cloud Autonomous Database

A study and comparison on various cloud storage like


9
Amazon S3,Google Cloud Storage, Microsoft Azure
Blob Storage, IBM Cloud Object Storage for its
performance and scalability

Simulate resource management using cloudsim open


10
source framework.

Simulate a secure file sharing using a


11
cloudsim open source framework.

Creating and Executing Your First Container


12
Using Docker platform.

9 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………
Practical No.1: Sketch out and analyze the architecture of Openstack/ Eucalyptus/
OpenNebula/ KVM and identify different entities to understand the
structure of it.
A. Objective: To analyze the architecture of Openstack/ Eucalyptus/ OpenNebula/
KVM and to understand its structure.
B. Expected Program Outcomes (POs):-PO1, PO2, PO3, PO4, PO6, PO7

C. Expected Skills to be developed based on competency:


 To analyze the architecture of cloud based system.
D. Expected Course Outcomes(Cos)–CO1
E. Practical Outcome(PRo)
After the completion of this practical student will be able to understand the
architecture of Openstack/ Eucalyptus/ OpenNebula/ KVM and its structure.
F. Expected Affective domain Outcome(ADos)
To encourage further learning and foster exploration of various platforms.
G. Prerequisite Theory:
 OpenStack is an open-standard and free platform for cloud computing. Mostly, it is
deployed as IaaS (Infrastructure-as-a-Service) in both private and public clouds
where various virtual servers and other types of resources are available for users.
 Eucalyptus is a Linux-based open-source software architecture for cloud
computing and also a storage platform that implements Infrastructure a Service
(IaaS). It provides quick and efficient computing services. Eucalyptus was
designed to provide services compatible with Amazon’s EC2 cloud and Simple
Storage Service (S3).
 Aneka is a cloud computing PaaS software platform for developing applications.
Aneka comes with a set of extensible APIs for programming models like
MapReduce. TheseAPIs support different cloud models like a private, public, or
hybrid Cloud.
 OpenNebula is an open source cloud computing platform for managing
heterogeneous data center, public cloud and edge computing infrastructure
resources.

10 | Page
Cloud and Data Center Technologies (4361602)

H. Resources/Equipment Required
Sr. No. Instrument/Equipment
Specification
/Components/Trainer kit
1 Computer system with operating system Windows 7 or higher Ver., macOS,
and Linux, with 4GB or higher RAM,
Python versions: 2.7.X, 3.6.X
I. Safety and necessary Precautions followed
 Read the experiment thoroughly before starting and ensure that you
understand all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Studentmust use the space for writing theory.

Output:

11 | Page
Cloud and Data Center Technologies (4361602)

12 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz


1. An open-source cloud operating system called OpenStack controls a data center's large
pool of ____.
a) Computing b) Storage
c) Networking resources d) All of the above

2. How many types of cloud computing are there?

a) 2 b) 3
c) 4 d) 5

13 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. https://www.openstack.org/
2. https://www.eucalyptus.cloud/
3. https://nebulacloud.ai/
4. https://aws.amazon.com/what-is/kvm/

M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students
attentively
d practical with performing
participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& the cannot explain the understood and
/5
Explanation cannot give
performance performance
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

14 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………
Practical No.2: Create a Cloud Organization in AWS/Google Cloud/or any equivalent
Open Source cloud softwares like Openstack/ Eucalyptus/ OpenNebula
with Role-based access control.
A. Objective: To understand and developa cloud organization.
B. Expected Program Outcomes (POs):- PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


 To understand Cloud structure.
 To implement an organization in different platforms.
D. Expected Course Outcomes(Cos) –CO1
E. Practical Outcome(PRo)
Develop a cloud organization and assign its role.
F. Expected Affective domain Outcome(ADos)
To encourage further learning and foster exploration of various functionalities in
access control.
G. Prerequisite Theory:

Make a user an admin in GOOGLE CLOUD

Let another user perform management tasks—such as adding and removing


users—by giving them an administrator role. When a user with an admin role signs
in to their Google Account, they'll have access to additional management controls.

Basic steps are as follows:


Assign an admin role

1. Sign in to your Google Admin console.

Sign in using an administrator account, not your current accountIn the Admin
console, go to Menu Directory Users.

2. Select the user you want to assign an admin role to.


3. Click Admin roles and privileges.
4. Next to the Super Admin role, click the slider so it's marked Assigned.

If other admin roles are available, you can click the slider to assign another role,
instead.

15 | Page
Cloud and Data Center Technologies (4361602)

5. Click Save.

Important: Have the new administrator add recovery options to their account.

Create an admin role for an organizational unit

As your organization’s administrator, you can assign a user to a custom


administrator role so they can perform management tasks for an organizational
unit. For example, you might want to grant the Chrome Management privilege to a
user so they can assign devices to users only in the Sales organizational unit.
Before you begin
You can only assign certain privileges to a custom role for an organizational unit.
If you grant any other privileges to the custom role, you can’t limit the role for use
with an organizational unit.
You can assign the following privileges:
 Users
 User Security Management
 Organizational Units
 Chrome Management
 Shared device settings

For details on each of the privileges, go to Administrator privilege definitions.


If you use the Google Vault archiving and eDiscovery service, your custom role
can also grant any of these privileges:
 Manage Matters
 Manage Holds
 Manage Searches
 Manage Exports

For details on each of the privileges, go to Understand and grant Vault privileges.
Important: If you want to include any other privileges later, you first need to
remove all users. If you add any other privileges, the custom role can be used for
anyone in your organization, not just an organizational unit.
Create and assign the role
1. Go to Create a custom role and follow the steps. Make sure the role only includes
privileges that apply to organizational units (details above).
2. Click Assign role.
3. Add a user that you want to assign to the role.
4. Next to the user, click the organizational unit.
5. Select the organizational unit and click Done.
6. Click Assign Role.

Create a custom role


Before you begin: Check if the role already exists. Go to pre-built administrator
roles.
1. Sign in to your Google Admin console.

16 | Page
Cloud and Data Center Technologies (4361602)

Sign in using an account with super administrator privileges (not your current
account).In the Admin console, go to Menu Account Admin roles.
2. Click Create new role.
3. Enter a name and, optionally, a description for the role and click Continue.
4. From the Privilege Name list, check boxes to select each privilege that you want
users with this role to have.Learn about each privilege
5. Click Continue.
6. Review the privileges and click Create Role.
7. Follow the steps to assign the custom role.

Delete a custom role


Requirements: To delete a custom role, you can't be assigned to the role or
remove yourself. Contact another super administrator to remove you from the role.
Then, follow the steps below to delete the role.
1. Sign in to your Google Admin console.
Sign in using an account with super administrator privileges (not your current
account).
2. In the Admin console, go to Menu Account Admin roles.
3. Click the custom role that you want to delete.
4. Click Admins assigned.
5. Check the Admin box to select all admins who are assigned the role.
6. Click Unassign role Unassign Role.
7. Click Delete Role Delete Role.

H. Resources/Equipment Required
Sr.No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with operating system Windows 7 or higher Ver., macOS,
and Linux, with 4GB or higher RAM,
Python versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you
understand all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Student must use the space for writing.

17 | Page
Cloud and Data Center Technologies (4361602)

Output:

K. Practical related Quiz


1. True or false: Google manages every aspect of Google Cloud Platform customers’
security?
a) True. b) False
18 | Page
Cloud and Data Center Technologies (4361602)

2. Choose the correct completion: Services and APIs are enabled on a per_____ basis .

a) Billing account b) Organization


c) Folder d) Projects
L. References / Suggestions
1. https://www.openstack.org/
2. https://www.eucalyptus.cloud/
3. https://aws.amazon.com/
M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students attentively
d practical with performing
participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& the cannot explain the understood and
/5
Explanation performance performance cannot give
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

19 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………
Practical No.3: Install Virtualbox/VMware/ Equivalent open source cloud Workstation
with different platforms of Linux or Windows OS on top of windows 8
and above.
A. Objective: To understand and install virtualbox/ vmware.
B. Expected Program Outcomes (POs):-PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


 To install vmware/virtualbox.
D. Expected Course Outcomes(Cos) –CO2
E. Practical Outcome(PRo)
After the completion of this practical student will be able to understand the
vmware/virtualbox.
F. Expected Affective domain Outcome(ADos)
To encourage further learning and foster exploration of various platforms.
G. Prerequisite Theory:
Oracle VM VirtualBox (formerly Sun VirtualBox, Sun
xVMVirtualBox and InnoTekVirtualBox) is a type-2 hypervisor for x86
virtualization developed by Oracle Corporation. VirtualBox was originally created
by InnoTekSystemberatung GmbH, which was acquired by Sun Microsystems in
2008, which was in turn acquired by Oracle in 2010.VirtualBox is a general-
purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded
use.Steps of installation are as follows:
 Download virtual box - https://www.virtualbox.org/wiki/Downloads
 Run the setup and click on ―Next‖ button.
 Again click on ―Next‖ button for virtual box applications.
 Again click on ―Next‖ button for creating a short cut on desktop.
 Click on ―Yes‖ button for networking interface.
 Click on ―Install‖ button to start installing.
 Now your setup is installed.
H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit

20 | Page
Cloud and Data Center Technologies (4361602)

1 Computer system with operating Windows 7 or higher Ver., macOS,


system and Linux, with 4GB or higher RAM,
Python versions: 2.7.X, 3.6.X
I. Safety and necessary Precautions followed
 Read the experiment thoroughly before starting and ensure that you
understand all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Student must use the space for writing.

Output:

K. Practical related Quiz


1. What is a virtual machine (VM)?

a) A physical computer b) A software-based emulation of a


physicalcomputer
c)A mobile device d) A server Operating System

21 | Page
Cloud and Data Center Technologies (4361602)

2. In virtualization, what is the guest operating system?

a) A physical computer b) A software-based emulation of a physical


computer
c)A mobile device d) A server Operating System
L. References / Suggestions
1. https://www.vmware.com/in.html
M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students
attentively
d practical with performing participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& understood and
/5 the cannot explain the
Explanation performance performance cannot give
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

22 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………
Practical No.4:Install Python in the virtual machine created using VirtualBox/VMware
and execute Simple Programs.
A. Objective: To install Pyhton on virtual machine.
B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7
C. Expected Skills to be developed based on competency:
 Able to apply operate virtual box / vmware.

D. Expected Course Outcomes(Cos)CO2


E. Practical Outcome(PRo)
After the completion of this practical student will be able to install any software in
vmware/virtualbox.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
1. Visit http://www.virtualbox.org/wiki/downloads.
2. Download VirtualBox platform packages for your OS.
3. Open the Installation Package by double clicking.
4. Click continue and finish installing VirtualBox.
5. When finished installation, close the window.
Download Linux
1. Visit the page
http://www.ubuntu.com/download/ubuntu/download.
2. Choose the Latest version of Ubuntu and 32-bit and click ―Start
Download‖CLICK.

Install Linux using Virtual Box


1. Run VirtualBox by double-clicking the icon.
2. Click ―New‖ button on the top left corne.
3. Click ―Continue‖ on the pop-up window.
4. Type VM name, select ―Linux‖ for the OS and choose ―Ubuntu‖ for the
version.
5. Choose the amount of memory to allocate (I suggestchoosing between 512
MB to 1024 MB).
6. Click Continue or Next.
7. Choose create a new virtual hard disk.
8. Click Continue or Next.

23 | Page
Cloud and Data Center Technologies (4361602)

9. Choose VDI (VirtualBox Disk Image).


10.Click Continue or Next.
11.Choose ―Dynamically Allocated‖ click continue. This way, the size of your
Virtual Hard Disk will grow as you use.
12. Click the folder icon and choose the ubuntuiso file you downloaded.
13. Select the size of the Virtual Disk (I recommend choosing 8 GB) and click
continue
14. Click Create.

Running Linux

1. Choose Ubuntu from left column and click Start.


2. Click continue on pop-up window.
3. Click the folder icon and choose the ubuntuisofile you downloaded and
click continue and start.
4. Click Install Ubuntu.
4. Check ―Download updates‖ and click Forward.
5. Choose ―Erase disk and install Ubuntu‖ and clickForward (Don’t worry, it
won’t wipe your computer).
6. Click ―Install Now‖ and wait.
7. When finished, click Restart and press Enter.

C Programming on Linux
1. Open Terminal (Applications-Accessories-Terminal)
2. Open gedit by typing ―gedit&‖ on terminal (You can also use any other Text
Editor application)
3. Type the following on gedit
(or any other text editor)
#include<stdio.h>
main()
{
printf("Hello World\n");
}
4. Save this file as
―helloworld.c‖
5. Type ―ls‖ on Terminal to see all files under current folder
6. Confirm that ―helloworld.c‖ is in the current directory. If not, type cd
DIRECTORY_PATH to go to the directory that has ―helloworld.c‖
7. Type ―gcchelloworld.c‖ to compile, and type ―ls‖ to confirm that a new
executable file ―a.out‖ is created
8. Type ―./a.out‖ on Terminal to run the program
9. If you see ―Hello World‖ on the next line, you just successfully ran your first
C program.

24 | Page
Cloud and Data Center Technologies (4361602)

Note: Similarly Python can be installed and execute your program.


H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with operating Windows 7 or higher Ver., macOS, and
system Linux, with 4GB or higher RAM,
Python versions: 2.7.X, 3.6.X
I. Safety and necessary Precautions followed
 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
 Never eat or drink in the lab, as it can cause contamination and create safety
hazards.
 If any accidents or injuries occur, immediately notify the instructor and seek
medical attention if necessary.
J. Procedure to be followed/Source code
Student must use the space for output.

Output:

25 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. In the following options which are python libraries which are used for data analysis
and scientific computations?
a) Numpy b) Pandas

c) Scipy d) All of the above


2. Which of the following function checks in a string that all characters are decimal?
a) Upper() b) Isdecimal()
c) Swapcase() d) Title()

26 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. http://www.ubuntu.com/download/ubuntu/download
2. https://www.python.org/downloads/windows/

M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students
attentively
d practical with performing
participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
content
Properly. presentation is
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& understood and
/5 the cannot explain the
Explanation cannot give
performance performance
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

27 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.5: Create type 2 virtualization in VMWARE or any equivalent Open


Source Tool.
a. Starting and Stopping a virtual machine.
b. Allocate memory and storage space as per requirement.
c. Take snapshots of virtual machines
d. Clone a virtual machine to create identical copies.
e. Transfer the files from one virtual machine to another virtual machine

A. Objective: Learn to create Type 2 Virtualization in VMware or Equivalent Open


Source Tool.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Demonstrate installation of Virtual Machine in VMware or in any Open Source
tool.

D. Expected Course Outcomes(Cos)


CO2
E. Practical Outcome(PRo)
The Practical demonstrates the installation steps of the virtual machine, starting
/stopping of a VM, memory allocation, Transfer the files from one virtual machine
to another virtual machine.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Introduction to Type 2 Virtualization:
Virtualization is a technology that enables the creation and management of virtual
instances of computer hardware and software, allowing multiple operating systems
to run on a single physical machine. There are two primary types of virtualization:
Type 1 (bare-metal) and Type 2 (hosted).
1. Overview of Virtualization: Virtualization plays a pivotal role in modern
computing by abstracting physical resources, such as processors, memory, storage,
and networking, to create virtual environments. This abstraction allows for better

28 | Page
Cloud and Data Center Technologies (4361602)

resource utilization, enhanced flexibility, and improved scalability in various


computing scenarios.
2. Types of Virtualization:
 Type 1 (Bare-Metal): Involves installing a hypervisor directly on the physical
hardware, enabling it to manage and allocate resources to multiple virtual
machines. This type is commonly used in enterprise environments for server
consolidation and cloud infrastructure.
 Type 2 (Hosted): Operates on top of a host operating system and requires the
presence of a hypervisor application. Type 2 virtualization is well-suited for
desktop and development environments, providing users with the ability to run
multiple operating systems on a single machine without modifying the host OS.
3. Understanding Type 2 Virtualization:
 Hypervisor Layer: In Type 2 virtualization, a hypervisor acts as an
intermediary layer between the host operating system and the virtual machines.
This hypervisor runs as a software application on the host OS.
 Advantages:
 Ease of Use: Type 2 hypervisors are user-friendly and often suitable for
non-technical users, making them popular in desktop and testing
environments.
 Compatibility: These virtualization solutions are compatible with a wide
range of host operating systems, allowing users to choose from various
platforms.
 Use Cases:
 Development and Testing: Type 2 virtualization is commonly employed
for software development and testing purposes. It enables developers to test
applications on different operating systems without the need for dedicated
hardware.
 Desktop Virtualization: Individuals can run multiple operating systems
concurrently on a single desktop or laptop, facilitating tasks like running
legacy applications or exploring different software environments.
4. Popular Type 2 Virtualization Platforms:
 VMware Workstation: A widely used commercial virtualization solution
known for its robust features and performance in desktop virtualization
scenarios.

29 | Page
Cloud and Data Center Technologies (4361602)

 VirtualBox: An open-source virtualization platform that supports various guest


operating systems, providing a cost-effective solution for developers and
enthusiasts.
 Parallels Desktop: Primarily used on macOS, Parallels Desktop offers seamless
integration between macOS and virtualized Windows or Linux environments.
H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Python
versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Students must use the space for writing theory.
Output:

30 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. What is VMware?
a. A programming language
b. A virtualization software company
c. An open-source operating system
d. A hardware manufacturer
2. Which type of virtualization is VMware Workstation an example of?
a. Type 1
b. Type 2
c. Type 3
d. Type 4
3. Where does a Type 2 hypervisor run?
a. Directly on physical hardware
b. On top of a host operating system
c. In the cloud
d. On a network server
31 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. https://www.vmware.com/in.html
2. https://www.vmug.com/
M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students
attentively
d practical with performing participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& cannot explain understood and
/5 the the
Explanation performance performance cannot give
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

32 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.6:Create desktop Virtualization using Chrome Remote Desktop.


A. Objective: Learn to create desktop Virtualization using Chrome Remote Desktop.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Understanding and installation of desktop Virtualization using Chrome Remote
Desktop
D. Expected Course Outcomes(Cos)
CO2
E. Practical Outcome(PRo)
Develop a desktop Virtualization using Chrome Remote Desktop.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Creating Desktop Virtualization using Chrome Remote Desktop:
Desktop virtualization using Chrome Remote Desktop involves accessing and
controlling a remote desktop environment from a local machine through the
Chrome browser. Here's a theoretical overview of the process:
1. Introduction to Chrome Remote Desktop:
 Overview: Chrome Remote Desktop is a free remote access tool provided
by Google that allows users to remotely control another computer through
the Chrome browser.
2. Setting Up Chrome Remote Desktop:
 Installation:
 Install the Chrome browser on both the host (remote) and client
(local) machines.
 Extension Installation:
 Add the Chrome Remote Desktop extension to the Chrome browser
on both machines.
 Authorization:
 Authorize the extension, granting necessary permissions for remote
access.
3. Configuring Host Machine:
 Access Settings:
 Open Chrome Remote Desktop on the host machine.

33 | Page
Cloud and Data Center Technologies (4361602)

 Set up the host computer for remote access by enabling the service
and providing a PIN for authentication.
4. Accessing Remote Desktop:
 Connecting from the Client Machine:
 Open Chrome Remote Desktop on the client machine.
 Enter the PIN set up on the host machine to establish a secure
connection.
5. Desktop Virtualization Features:
 Multi-Monitor Support:
 Chrome Remote Desktop supports multiple monitors, providing a
seamless virtualization experience.
 File Transfer:
 Users can transfer files between the local and remote machines
directly through the Chrome Remote Desktop interface.
 Clipboard Sharing:
 The clipboard can be shared between the local and remote
environments, allowing for easy copy-paste functionality.
 Quality and Performance Settings:
 Adjust settings such as display quality and bandwidth to optimize
the virtualization experience based on network conditions.

H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Python
versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Students must use the space for writing theory.

Output:

34 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. What is Chrome Remote Desktop used for?
a. Web browsing
b. Desktop virtualization
c. Game streaming
d. Social media management
2. Which browser is required for using Chrome Remote Desktop?
a. Firefox
b. Safari
c. Internet Explorer
d. Chrome
3. What is the first step to enable remote connections on the host machine?
a. Set up a VPN
b. Install remote desktop software
c. Enable remote connections in Chrome Remote Desktop
d. Update the operating system
35 | Page
Cloud and Data Center Technologies (4361602)

4. What is essential for maintaining security in Chrome Remote Desktop?


a. Using a weak PIN
b. Avoiding software updates
c. Regularly updating Chrome and the Chrome Remote Desktop extension
d. Disabling PIN authentication
L. References / Suggestions
1. https://remotedesktop.google.com/

M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other
session but not
Engagement Performe Performed students
attentively
d practical with performing participated in
/5 practical others help practical but not
performance
him/herse tried him/herself
lf

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
content
Properly. presentation is
poor

Fully Understood the Partially


understood performance but understood Partially
Understanding& understood and
/5 the cannot explain the
Explanation performance performance cannot give
&can explain &can give explanation
perfectly little
explanation

Work is
Work done after
submitted later
Completed 2nd week but Work submitted after
Time /5 than1weekbut
the work before the end 3 week time
by the end of of 3rd week
within
2ndweek
1week

Total Marks: /25 Signature with Date:

36 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.7: Setup your own virtual SDN lab using any of below given platform
i) Virtualbox/Mininet Environment for SDN - http://mininet.org

A. Objective: Learn to Setup virtual Software Defined Networking lab

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Understand and setup of virtual Software Defined Networking lab.

D. Expected Course Outcomes(Cos)


CO3
E. Practical Outcome(PRo)
Develop a virtual Software Defined Networking lab
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Setting up your own virtual SDN (Software-Defined Networking) lab using Mininet
in a VirtualBox environment involves several steps. Mininet is a popular tool for
creating SDN environments for educational and testing purposes. Here are the steps
to set up a virtual SDN lab using VirtualBox and Mininet:
Prerequisites:
1. VirtualBox Installation:
 Download and install VirtualBox from VirtualBox website.
2. Mininet Installation:
 Follow the Mininet installation instructions on the official Mininet
website: Mininet Installation Guide.
Steps:
1. Create a Virtual Machine (VM) in VirtualBox:
 Open VirtualBox and click on "New" to create a new virtual
machine.
 Name your VM, select the type as Linux, and version as "Other
Linux (64-bit)."
 Allocate RAM (at least 2GB) and create a virtual hard disk.
 Download a Linux distribution ISO file (e.g., Ubuntu) and
mount it to the VM.
2. Install Linux on the VM:

37 | Page
Cloud and Data Center Technologies (4361602)

 Start the VM and install the Linux distribution on it.


3. Update and Upgrade:
 Once the Linux installation is complete, update and upgrade the
system:
 sudo apt-get update
 sudo apt-get upgrade
4. Install VirtualBox Guest Additions:
 In the VirtualBox menu, go to Devices > Insert Guest Additions
CD image.
 Mount the CD and run the installation script:
 sudo mount /dev/cdrom /media/cdrom
 cd /media/cdrom
 sudo ./VBoxLinuxAdditions.run
5. Install Mininet:
 Follow the Mininet installation instructions provided on the
Mininet website.
6. Test Mininet:
 Start Mininet with a simple topology to verify the installation:
 Sudo
This command will start a simple network topology with hosts and
switches.
7. Explore and Experiment:
 Use Mininet commands to create different network topologies and
experiment with SDN concepts:
 sudomn --topo single,3

H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Python
versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.

38 | Page
Cloud and Data Center Technologies (4361602)

J. Procedure to be followed/Source code:


Students must use the space for writing theory.

Output:

39 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. What is the purpose of a virtual SDN lab?
a. Gaming
b. Educational and testing
c. Social networking
d. Video streaming
2. Which tool is commonly used to create virtual SDN labs for educational
purposes?
a. Wireshark
b. GNS3
c. Mininet
d. Docker
3. Which command is used to start Mininet with a specific network topology in a
virtual SDN lab?
a. mininet start
b. mn --create
c. sudomn --topo
d. start lab --topology

40 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. http://mininet.org

M. Assessment-Rubrics

Total Exceptional Satisfactory Developing( Limited(1-


Criteria Marks (5- Marks) (4 to 3 - 2-Marks) Mark)
Marks)

Present in practical
Watched other session but not
Engagement Performed Performed students
attentively
practical practical with performing participated in
/5 him/herself others help practical but not
performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentati /5 Executed and output tables missing with Poor write-up and
on Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood the performance but understood Partially
Understandi cannot explain understood and
/5 performance the
ng& cannot give
&can explain performance
Explanation perfectly &can give explanation
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of of 3rd week
1week 2ndweek

Total Marks: /25 Signature with Date:

41 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.8: A study and comparison on various cloud databases like Amazon RDS
,Google Cloud SQL,Microsoft Azure SQL Database, IBM Db2 on Cloud, Firebase
Realtime Database (NoSQL), MongoDB Atlas (NoSQL),Oracle Cloud Autonomous
Database
A. Objective: Learn various Cloud databases for deployment of cloud with database.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Understand and study of various cloud databases like Amazon RDS ,Google Cloud
SQL,Microsoft Azure SQL Database, IBM Db2 on Cloud, Firebase Realtime
Database (NoSQL), MongoDB Atlas (NoSQL),Oracle Cloud Autonomous
Database
D. Expected Course Outcomes(Cos)
CO4
E. Practical Outcome(PRo)
Study and comparison of various Cloud databases for deployment of cloud with
database.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Cloud computing is a technology that allows users to access and use computing
resources (e.g., servers, storage, databases, and networking) over the internet, often
referred to as "the cloud."
Database Models:
 Relational Databases:
o Structured Query Language (SQL) is used to define and manipulate the
data.
o Data organized into tables with predefined schema.
o Examples: MySQL, PostgreSQL, SQL Server, Oracle.
 NoSQL Databases:
o Schema-less or schema-flexible data models.
o Types: Document-oriented (MongoDB), Key-Value (Redis), Column-
family (Cassandra), Graph (Neo4j).
o Suited for unstructured or semi-structured data.
42 | Page
Cloud and Data Center Technologies (4361602)

Examples:
1. Amazon RDS:
 Description: Amazon Relational Database Service (RDS) is a managed
relational database service offered by Amazon Web Services (AWS).
 Key Features:
 Multi-Engine Support (MySQL, PostgreSQL, MariaDB, Oracle,
SQL Server, Aurora).
 Automated backups, scaling options, and high availability.
2. Google Cloud SQL:
 Description: Google Cloud SQL is a fully managed relational database
service provided by Google Cloud.
 Key Features:
 Support for MySQL, PostgreSQL, and SQL Server.
 Integration with other Google Cloud services.
 Automatic backups and regional availability.
3. Microsoft Azure SQL Database:
 Description: A fully managed relational database service in Microsoft
Azure, offering compatibility with SQL Server.
 Key Features:
 Horizontal and vertical scaling options.
 Integration with other Azure services.
 Advanced security features.
4. IBM Db2 on Cloud:
 Description: IBM Db2 on Cloud is a fully managed Db2 database
service with enterprise-grade features.
 Key Features:
 Scalable architecture suitable for various workloads.
 Integration with other IBM Cloud services.
5. Firebase Realtime Database (NoSQL):
 Description: Firebase Realtime Database is a NoSQL database offered
by Google for real-time applications.
 Key Features:
 Real-time data synchronization.
 JSON-based data model.
6. MongoDB Atlas (NoSQL):
 Description: MongoDB Atlas is a fully managed MongoDB service
provided by MongoDB, Inc.
 Key Features:
 Flexible data models with BSON documents.
 Horizontal scaling through sharding.
7. Oracle Cloud Autonomous Database:

43 | Page
Cloud and Data Center Technologies (4361602)


Description: Oracle Cloud Autonomous Database is a fully managed
Oracle database service with autonomous capabilities.
 Key Features:
 High-performance architecture.
 Autonomous features for self-driving, self-securing, and self-
repairing databases.
H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Python
versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Comparing various cloud databases involves considering factors such as features,
performance, scalability, ease of use, pricing, and specific use cases.
Based on these above criteria, prepare comparison on various cloud databases like
Amazon RDS ,Google Cloud SQL,Microsoft Azure SQL Database, IBM Db2 on
Cloud, Firebase Realtime Database (NoSQL), MongoDB Atlas (NoSQL),Oracle
Cloud Autonomous Database.
Students must use the space for writing theory.

Output:

44 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. What is the primary purpose of Amazon RDS?
a. Real-time data synchronization
b. Managed relational database service
c. NoSQL document storage
d. In-memory caching service

2. What type of databases are supported by Microsoft Azure SQL Database?


a. Only MySQL
b. Only PostgreSQL
c. Relational databases with compatibility across versionsd.
d. Only NoSQL databases

3. What is a key feature of MongoDB Atlas?


a. Automatic vertical scaling
b. Fully managed relational databases
c. Support for SQL Server
d. Horizontal scaling with sharding
45 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. https://docs.aws.amazon.com/rds/
2. https://learn.microsoft.com/en-us/azure/azure-sql/?view=azuresql
3. https://cloud.google.com/sql/docs
4. https://cloud.ibm.com/docs/Db2onCloud?topic=Db2onCloud-getting-started
5. https://firebase.google.com/docs/database
6. https://www.mongodb.com/docs/
7. https://docs.oracle.com/en/database/autonomous-database-cloud-
services.html

M. Assessment-Rubrics
Tot Exceptional Satisfactory Developing( Limited(1-
Criteria al (5- Marks) (4 to 3 - 2-Marks) Mark)
Mar Marks)
ks

Present in practical
Watched other
session but not
Engagement Performed Performed students
attentively
practical practical with performing
participated in
/5 him/herself others help practical but not performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
content
Properly. presentation is
poor

Fully Understood the Partially


understood the performance but understood Partially
Understanding& understood and
/5 performance cannot explain the
Explanation &can explain performance cannot give
perfectly &can give explanation
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of of 3rd week
1week 2ndweek

Total Marks: /25 Signature with Date:

46 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.9:A study and comparison on various cloud storage like Amazon
S3,Google Cloud Storage, Microsoft Azure Blob Storage, IBM Cloud Object Storage for
its performance and scalability
A. Objective:To study and understand various cloud storage.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


To understand various cloud storage and its performance and scalability.

D. Expected Course Outcomes(Cos)


CO4
E. Practical Outcome(PRo)
Study and comparison of various Cloud storage.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Amazon S3 - Amazon Simple Storage Service (Amazon S3) is an object storage
service that offers industry-leading scalability, data availability, security, and
performance. Customers of all sizes and industries can use Amazon S3 to store and
protect any amount of data for a range of use cases, such as data lakes, websites,
mobile applications, backup and restore, archive, enterprise applications, IoT
devices, and big data analytics. Amazon S3 provides management features so that
you can optimize, organize, and configure access to your data to meet your specific
business, organizational, and compliance requirements. Amazon S3 (Simple
Storage Service) is one of the most popular and widely used object storage services
provided by Amazon Web Services (AWS).
Google Cloud Storage - Google Cloud Storage is Google Cloud Platform's (GCP)
object storage service, providing scalable and durable storage for your data. Cloud
Storage is a service for storing your objects in Google Cloud. An object is an
immutable piece of data consisting of a file of any format. You store objects in
containers called buckets. Buckets can also contain managed folders, which you use
to provide expanded access to groups of objects with a shared name prefix.
Microsoft Azure Blob Storage - Microsoft Azure Blob Storage is a scalable and
secure object storage solution provided by Microsoft Azure. Blob storage is
optimized for storing a massive amount of unstructured data, such as text or binary
47 | Page
Cloud and Data Center Technologies (4361602)

data. Azure Blob Storage helps you create data lakes for your analytics needs, and
provides storage to build powerful cloud-native and mobile apps. Optimize costs
with tiered storage for your long-term data, and flexibly scale up for high-
performance computing and machine learning workloads.
IBM Cloud Object Storage - IBM Cloud Object Storage is a highly scalable and
resilient managed data service on IBM Cloud, offering an alternative to block and
file storage.
H. Resources/Equipment Required
Sr. No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Python
versions: 2.7.X, 3.6.X

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Comparing various cloud storage involves considering factors such as features,
performance, scalability, ease of use, pricing, and specific use cases.
Based on these above criteria, prepare comparison on various cloud storage like
Amazon S3,Google Cloud Storage, Microsoft Azure Blob Storage, IBM Cloud
Object Storage.
Students must use the space for writing theory.
Output:

48 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.

1. What is object storage, and how does it differ from traditional file storage?

2. What does S3 stand for?

a. Simple SQL Service


b. Straight Storage Service
c. Simple Storage Service
d. Simplified Serial Sequence

L. References / Suggestions

49 | Page
Cloud and Data Center Technologies (4361602)

1. https://k21academy.com/amazon-web-services/amazon-s3-bucket-and-
storage-classes/
2. https://www.simplilearn.com/tutorials/aws-tutorial/aws-s3/
3. https://www.geeksforgeeks.org/cloud-storage-in-google-cloud-platform-
gcp/
4. https://k21academy.com/google-cloud/google-cloud-storage/
5. https://k21academy.com/microsoft-azure/admin/azure-blob-storage/
6. https://www.ibm.com/products/cloud-object-storage

M. Assessment-Rubrics
Tot Exceptional Satisfactory Developing( Limited(1-
Criteria al (5- Marks) (4 to 3 - 2-Marks) Mark)
Mar Marks)
ks

Present in practical
Watched other
session but not
Engagement Performed Performed students attentively
practical practical with performing
participated in
/5 him/herself others help practical but not
performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood the performance but understood Partially
Understanding& performance cannot explain the understood and
/5
Explanation cannot give
&can explain performance
perfectly &can give explanation
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of of 3rd week
1week 2ndweek

Total Marks: /25 Signature with Date:

50 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.10:Simulate resource management using cloudsim open source


framework.
A. Objective:To study and simulate the cloud computing infrastructures and services
using cloudsim.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Simulate the cloud computing infrastructures and services using cloudsim.

D. Expected Course Outcomes(Cos)


CO5
E. Practical Outcome(PRo)
Study and simulate the cloud computing infrastructures and services using
cloudsim.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
CloudSim is an open-source framework for modeling and simulating cloud
computing infrastructures and services. It provides a set of classes and APIs that
allow researchers and developers to create simulations of cloud environments and
experiment with various scenarios. It is developed by the CLOUDS Lab
organization and is written entirely in Java. It is used for modelling and simulating
a cloud computing environment as a means for evaluating a hypothesis prior to
software development in order to reproduce tests and results.
Here are some key points about CloudSim:
 Simulation of Cloud Environments
o CloudSim enables the modeling of cloud data centers, virtual
machines (VMs), hosts, and other cloud entities.
o Users can simulate the allocation of resources, scheduling of tasks,
and the overall behavior of cloud infrastructures.
 Features and Components
o CloudSim includes components such as Datacenter,
DatacenterBroker, Host, VM, Cloudlet, etc.
o Users can define data center characteristics, VM specifications, and
cloudlet (workload) characteristics.
51 | Page
Cloud and Data Center Technologies (4361602)

 Resource Management:
o CloudSim supports various resource management policies and
scheduling algorithms, allowing users to evaluate the performance of
different approaches.
o Users can explore dynamic allocation of resources, load balancing,
and energy-aware resource management strategies.
 Workload Modeling:
o CloudSim allows the modeling of workloads (tasks or cloudlets) that
are submitted to the cloud for processing.
o Workload characteristics, such as length, input/output sizes, and
priority, can be specified.
Some of the most common classes used during simulation are:
 Datacenter: used for modelling the foundational hardware equipment of
any cloud environment, that is the Datacenter. This class provides methods
to specify the functional requirements of the Datacenter as well as methods
to set the allocation policies of the VMs etc.
 Host: this class executes actions related to management of virtual machines.
It also defines policies for provisioning memory and bandwidth to the
virtual machines, as well as allocating CPU cores to the virtual machines.
 VM: this class represents a virtual machine by providing data members
defining a VM’s bandwidth, RAM, mips (million instructions per second),
size while also providing setter and getter methods for these parameters.
 Cloudlet: a cloudlet class represents any task that is run on a VM, like a
processing task, or a memory access task, or a file updating task etc. It
stores parameters defining the characteristics of a task such as its length,
size, mi (million instructions) and provides methods similarly to VM class
while also providing methods that define a task’s execution time, status,
cost and history.
 DatacenterBroker: is an entity acting on behalf of the user/customer. It is
responsible for functioning of VMs, including VM creation, management,
destruction and submission of cloudlets to the VM.
 CloudSim: this is the class responsible for initializing and starting the
simulation environment after all the necessary cloud entities have been
defined and later stopping after all the entities have been destroyed.
Prerequisites:
 Java installed on your system.
 Integrated Development Environment (IDE) like Eclipse or IntelliJ.

52 | Page
Cloud and Data Center Technologies (4361602)

Steps:
 Download CloudSim:Visit the CloudSim website and download the latest
version of CloudSim.
 Setup Your Java Project: Create a new Java project in your IDE.
 Add CloudSim Library
 Create a Simple CloudSim Simulation: Create a new Java class for your
simulation. Or Use CloudSimExample1 java program from
org.cloudbus.cloudsim.examples package from CloudSim library
o Run the Simulation: Run the Java Program.
H. Resources/Equipment Required
Sr.No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Java

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Students must use the space for writing code.

53 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.

1. What is CloudSim?
a. A cloud storage service
b. An open-source framework for simulating cloud computing environments
c. A virtual machine management platform
d. A cloud infrastructure deployment tool

2. What kind of entities can you model using CloudSim?


a. Only virtual machines
b. Only cloud data centers
c. Both cloud data centers and virtual machines
d. Only cloud workloads

L. References / Suggestions
1. https://www.geeksforgeeks.org/what-is-cloudsim/
2. https://cloudsimtutorials.online/cloudsim-setup-using-eclipse/
3. https://cloudsimtutorials.online/guide-to-cloudsimexample1-java-
simulation-workflow/
54 | Page
Cloud and Data Center Technologies (4361602)

4. https://www.youtube.com/watch?v=jfjvOmTQxz8&ab_channel=SHOBINAK
5. http://www.cloudbus.org/cloudsim/
6. https://www.youtube.com/playlist?list=PL9IfziJ50JY5z2ppTLAFJ2yxyVtBbhp
gD
7. https://github.com/Cloudslab/cloudsim/blob/master/modules/cloudsim-
examples/src/main/java/org/cloudbus/cloudsim/examples/CloudSimExam
ple1.java

M. Assessment-Rubrics
Tot Exceptional Satisfactory Developing( Limited(1-
Criteria al (4 to 3 -
(5- Marks) 2-Marks) Mark)
Mar Marks)
ks

Present in practical
Watched other
session but not
Engagement Performed Performed students
attentively
practical practical with performing participated in
/5 him/herself others help practical but not
performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood the performance but understood Partially
Understanding& understood and
/5 performance cannot explain the
Explanation &can explain performance cannot give
&can give explanation
perfectly
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of of 3rd week
1week 2ndweek

Total Marks: /25 Signature with Date:

55 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.11:Simulate a secure file sharing using a cloudsim open source


framework.
A. Objective:To study and simulate thesecure file sharing in cloud computing
infrastructures and services using cloudsim.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Simulate thefile sharing in cloud computing infrastructures and services using
cloudsim.

D. Expected Course Outcomes(Cos)


CO5
E. Practical Outcome(PRo)
Study and simulate thesecure file sharingin cloud computing infrastructures and
services using cloudsim.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
CloudSim is a simulation tool that allows cloud developers to test the performance
of their provisioning policies in a repeatable and controllable environment, free of
cost. It helps tune the bottlenecks before real-world deployment. It is a simulator;
hence, it doesn't run any actual software.
Simulating a secure file-sharing system using a cloud simulation framework
involves creating a model that replicates the essential components of a real-world
secure file-sharing system.
Components of a Secure File Sharing System:
User Authentication:Simulate user authentication mechanisms to ensure that only
authorized users can access the file-sharing system.Use CloudSim Plus entities to
represent users and authentication processes.
File Encryption and Decryption:Implement encryption algorithms (e.g., AES) for
securing files during storage and transmission.Simulate the encryption and
decryption processes within the cloud simulation.

56 | Page
Cloud and Data Center Technologies (4361602)

Access Control:Model access control policies to define who can access, modify, or
share specific files.Simulate access control mechanisms within the cloud
simulation.
Secure Communication:Simulate secure communication channels to ensure that
data transferred between users and the cloud is protected.Implement secure
communication protocols or use existing ones provided by CloudSim Plus.
Cloud Infrastructure:Model the cloud infrastructure, including data centers,
virtual machines (VMs), and storage resources.Utilize CloudSim Plus classes to
create data centers, VMs, and other infrastructure components.
Prerequisites:
 Java installed on your system.
 Integrated Development Environment (IDE) like Eclipse or IntelliJ.
Steps:
 Download CloudSim:Visit the CloudSim website and download the latest
version of CloudSim.
 Setup Your Java Project: Create a new Java project in your IDE.
 Add CloudSim Library
 Create a Simple CloudSim Simulation:
o Add SecureCloudlet.java, SecureFileSimulation.java file in package
org.cloudbus.cloudsim.examples;
o Run the Simulation: Run the Java Program.
H. Resources/Equipment Required
Sr.No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Java

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Use below sample approach or develop your own code.

57 | Page
Cloud and Data Center Technologies (4361602)

SecureCloudlet.java
packageorg.cloudbus.cloudsim.examples;

importorg.cloudbus.cloudsim.Cloudlet;
importorg.cloudbus.cloudsim.UtilizationModel;

importjavax.crypto.*;
importjava.security.*;
import java.util.Base64;

publicclassSecureCloudletextends Cloudlet {

privatestaticfinal String ALGORITHM = "AES";

publicSecureCloudlet(intcloudletId, longcloudletLength, intpesNumber,


longcloudletFileSize, longcloudletOutputSize,
UtilizationModelutilizationModelCpu, UtilizationModelutilizationModelRam,
UtilizationModelutilizationModelBw) {
super(cloudletId, cloudletLength, pesNumber, cloudletFileSize,
cloudletOutputSize, utilizationModelCpu, utilizationModelRam,
utilizationModelBw);
// Additional initialization for secure cloudlet
}
public String encrypt(String content) {
try {
Cipher cipher = Cipher.getInstance(ALGORITHM);
SecretKeysecretKey = generateSecretKey();
cipher.init(Cipher.ENCRYPT_MODE, secretKey);
byte[] encryptedBytes = cipher.doFinal(content.getBytes("UTF-8"));
return Base64.getEncoder().encodeToString(encryptedBytes);
} catch (Exception e) {
e.printStackTrace();
returnnull;
}
}

public String decrypt(String content) {


try {
Cipher cipher = Cipher.getInstance(ALGORITHM);
SecretKeysecretKey = generateSecretKey();
cipher.init(Cipher.DECRYPT_MODE, secretKey);
byte[] decryptedBytes =
cipher.doFinal(Base64.getDecoder().decode(content.getBytes()));
returnnew String(decryptedBytes);
} catch (Exception e) {
e.printStackTrace();
returnnull;
}
}

privateSecretKeygenerateSecretKey() throwsNoSuchAlgorithmException {
KeyGeneratorkeyGen = KeyGenerator.getInstance(ALGORITHM);
returnkeyGen.generateKey(); }}

58 | Page
Cloud and Data Center Technologies (4361602)

SecureFileSimulation.java

packageorg.cloudbus.cloudsim.examples;

importjava.text.DecimalFormat;
importjava.util.*;

importorg.cloudbus.cloudsim.*;
importorg.cloudbus.cloudsim.core.CloudSim;
importorg.cloudbus.cloudsim.provisioners.*;

publicclassSecureFileSimulation {

/** The cloudlet list. */


privatestatic List<Cloudlet>cloudletList;

/** The vmlist. */


privatestatic List<Vm>vmlist;

@SuppressWarnings("unused")
publicstaticvoid main(String[] args) {

Log.printLine("Starting SecureFileSimulation...");

try {
intnum_user = 1; // number of cloud users
Calendar calendar = Calendar.getInstance();
booleantrace_flag = false; // mean trace events

// Initialize the CloudSim library


CloudSim.init(num_user, calendar, trace_flag);

// Second step: Create Datacenters


Datacenter datacenter0 =
createDatacenter("Datacenter_0");

// Third step: Create Broker


DatacenterBrokerbroker = createBroker();
intbrokerId = broker.getId();

// Fourth step: Create one virtual machine


vmlist = newArrayList<Vm>();

// VM description
intvmid = 0;
intmips = 1000;
longsize = 10000; // image size (MB)
intram = 512; // vm memory (MB)
longbw = 1000;
intpesNumber = 1; // number of cpus
String vmm = "Xen"; // VMM name

// create VM
Vmvm = newVm(vmid, brokerId, mips, pesNumber, ram,

59 | Page
Cloud and Data Center Technologies (4361602)

bw, size, vmm, newCloudletSchedulerTimeShared());

// add the VM to the vmList


vmlist.add(vm);
// submit vm list to the broker
broker.submitVmList(vmlist);

// Fifth step: Create one Cloudlet


cloudletList = newArrayList<Cloudlet>();

// Cloudlet properties
intid = 0;
longlength = 400000;
longfileSize = 300;
longoutputSize = 300;
UtilizationModelutilizationModel =
newUtilizationModelFull();

// Create SecureCloudlets (file-sharing tasks)


for (inti = 0; i< 5; i++) {
SecureCloudletcloudlet = newSecureCloudlet(i +
1, 1000, 1, 1000, 1000, newUtilizationModelFull(),
newUtilizationModelFull(),
newUtilizationModelFull());
cloudlet.encrypt("This is a secure file
content.");
cloudlet.setUserId(brokerId);
cloudletList.add(cloudlet);
}
// submit cloudlet list to the broker
broker.submitCloudletList(cloudletList);

// Sixth step: Starts the simulation


CloudSim.startSimulation();

CloudSim.stopSimulation();

// Final step: Print results when simulation is over


List<Cloudlet>newList =
broker.getCloudletReceivedList();
printCloudletList(newList);

Log.printLine("SecureFileSimulation finished!");
} catch (Exception e) {
e.printStackTrace();
Log.printLine("Unwanted errors happen");
}
}

privatestatic Datacenter createDatacenter(String name) {

List<Host>hostList = newArrayList<Host>();
List<Pe>peList = newArrayList<Pe>();
intmips = 1000;
peList.add(newPe(0, newPeProvisionerSimple(mips)));
60 | Page
Cloud and Data Center Technologies (4361602)

inthostId = 0;
intram = 2048; // host memory (MB)
longstorage = 1000000; // host storage
intbw = 10000;

hostList.add(new Host(hostId, newRamProvisionerSimple(ram),


newBwProvisionerSimple(bw), storage, peList,
newVmSchedulerTimeShared(peList))); // This is
our machine

String arch = "x86"; // system architecture


String os = "Linux"; // operating system
String vmm = "Xen";
doubletime_zone = 10.0; // time zone this resource located
doublecost = 3.0; // the cost of using processing in this
resource
doublecostPerMem = 0.05; // the cost of using memory in this
resource
doublecostPerStorage = 0.001; // the cost of using storage
in this
//
resource
doublecostPerBw = 0.0; // the cost of using bw in this
resource
LinkedList<Storage>storageList = newLinkedList<Storage>();
// we are not adding SAN
DatacenterCharacteristicscharacteristics =
newDatacenterCharacteristics(arch, os, vmm, hostList, time_zone,
cost, costPerMem, costPerStorage, costPerBw);

// 6. Finally, we need to create a PowerDatacenter object.


Datacenter datacenter = null;
try {
datacenter = new Datacenter(name, characteristics,
newVmAllocationPolicySimple(hostList), storageList, 0);
} catch (Exception e) {
e.printStackTrace();
}

returndatacenter;
}

privatestaticDatacenterBrokercreateBroker() {
DatacenterBrokerbroker = null;
try {
broker = newDatacenterBroker("Broker");
} catch (Exception e) {
e.printStackTrace();
returnnull;
}
returnbroker;
}

privatestaticvoidprintCloudletList(List<Cloudlet>list) {
61 | Page
Cloud and Data Center Technologies (4361602)

intsize = list.size();
Cloudlet cloudlet;

String indent = " ";


Log.printLine();
Log.printLine("========== OUTPUT ==========");
Log.printLine("Cloudlet ID" + indent + "STATUS" + indent +
"Data center ID" + indent + "VM ID" + indent + "Time"
+ indent + "Start Time" + indent + "Finish
Time");

DecimalFormatdft = newDecimalFormat("###.##");
for (inti = 0; i<size; i++) {
cloudlet = list.get(i);
Log.print(indent + cloudlet.getCloudletId() + indent
+ indent);

if (cloudlet.getCloudletStatus() == Cloudlet.SUCCESS)
{

Log.print("SUCCESS");

Log.printLine(indent + indent +
cloudlet.getResourceId() + indent + indent + indent + cloudlet.getVmId()
+ indent + indent +
dft.format(cloudlet.getActualCPUTime()) + indent + indent
+
dft.format(cloudlet.getExecStartTime()) + indent + indent
+
dft.format(cloudlet.getFinishTime()));
}
}
}

K. Practical related Quiz.

1. What is CloudSim?
a. A secure file-sharing platform
b. A cloud simulation framework
c. An encryption algorithm
d. A data storage solution

2. What is an essential component in a secure file-sharing simulation that ensures


only authorized users can access the system?
a. Datacenter
b. Encryption
c. Authentication
d. VM Scheduler

62 | Page
Cloud and Data Center Technologies (4361602)

L. References / Suggestions
1. https://www.geeksforgeeks.org/what-is-cloudsim/
2. https://cloudsimtutorials.online/cloudsim-setup-using-eclipse/
3. https://www.youtube.com/watch?v=jfjvOmTQxz8&ab_channel=SHOBINAK
4. http://www.cloudbus.org/cloudsim/
5. https://cloudsimplus.org/
M. Assessment-Rubrics
Tot Exceptional Satisfactory Developing( Limited(1-
Criteria al (5- Marks) (4 to 3 - 2-Marks) Mark)
Mar Marks)
ks

Present in practical
Watched other
session but not
Engagement Performed Performed students
attentively
practical practical with performing
participated in
/5 him/herself others help practical but not
performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood the performance but understood Partially
Understanding& understood and
/5 performance cannot explain the
Explanation cannot give
&can explain performance
&can give explanation
perfectly
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of
1week of 3rd week
2ndweek

Total Marks: /25 Signature with Date:

63 | Page
Cloud and Data Center Technologies (4361602)

Date: ……………

Practical No.12:Creating and Executing Your First Container Using Docker platform.
A. Objective:To create and run container on docker platform.

B. Expected Program Outcomes (POs): PO1, PO2, PO3, PO4, PO5, PO6, PO7

C. Expected Skills to be developed based on competency:


Create image and run container on docker platform.

D. Expected Course Outcomes(Cos)


CO6
E. Practical Outcome(PRo)
Creating and Executing Your First Container Using Docker platform.
F. Expected Affective domain Outcome(ADos)
Follow ethical practices
G. Prerequisite Theory:
Docker is a centralized platform for packaging, deploying, and running
applications. Before Docker, many users face the problem that a particular code is
running in the developer's system but not in the user's system. So, the main reason
to develop docker is to help developers to develop applications easily, ship them
into containers, and can be deployed anywhere.
Docker uses container on the host's operating system to run applications. It allows
applications to use the same Linux kernel as a system on the host computer, rather
than creating a whole virtual operating system. Containers ensure that our
application works in any environment like development, test, or production.
Docker includes components such as Docker client, Docker server, Docker
machine, Docker hub, Docker composes, etc.
Docker Containers:Docker containers are the lightweight alternatives of the
virtual machine. It allows developers to package up the application with all its
libraries and dependencies, and ship it as a single package. The advantage of using
a docker container is that you don't need to allocate any RAM and disk space for
the applications. It automatically generates storage and space according to the
application requirement.
Virtual Machine:A virtual machine is a software that allows us to install and use
other operating systems (Windows, Linux, and Debian) simultaneously on our
machine. The operating system in which virtual machine runs are called virtualized

64 | Page
Cloud and Data Center Technologies (4361602)

operating systems. These virtualized operating systems can run programs and
preforms tasks that we perform in a real operating system.
Docker Dockerfile: A Dockerfile is a text document that contains commands that
are used to assemble an image. We can use any command that call on the command
line. Docker builds images automatically by reading the instructions from the
Dockerfile. The docker build command is used to build an image from the
Dockerfile.
Docker Commands:let's explore some basic Docker commands:
Commands Description
dockerps Lists running containers.
dockerps –a Lists all containers (running and
stopped).
docker images Lists the Docker images on your
system.
docker pull <image_name> Downloads a Docker image without
running a container.
docker stop <container_id> Stops a running container.
dockerrm<container_id> Removes a stopped container.
dockerrmi<image_id> Removes a Docker image.
docker build -t image-name docker-file- Build Docker Image from a Dockerfile
location
-t : it is used to tag Docker image with
the provided name.

docker exec -it container-id bash Enter into Docker container

Creating and executing your first container using Docker involves the following
steps.
Step 1: Install Docker or Use online Lab environment (https://labs.play-with-
docker.com/)
Before you start, you need to have Docker installed on your machine. You can
download Docker from the official website and follow the installation instructions.

65 | Page
Cloud and Data Center Technologies (4361602)

Step 2: Verify Docker Installation


docker –version
Step 3: Run the Docker Container
docker run hello-world
This command will download the "hello-world" image from Docker Hub and run a
container that prints a message. If everything is set up correctly, you should see a
message indicating that your Docker installation is working.
Alternatively, Create image and Run Docker container from scratch as below:
Step 1: Install Docker or Use online Lab environment (https://labs.play-with-
docker.com/)
Step 2: Create a Dockerfile
Create a file named Dockerfile (without any file extension) in your project directory
and add the following content:
Sample Dockerfile:
FROM alpine:latest
CMD [―echo‖, ―Hello World!‖]
Step 3: Build the Docker Image
Open a terminal, navigate to the directory containing your Dockerfile, and run the
following command to build the Docker image:
docker build -t my-first-container .
This command tells Docker to build an image using the instructions in the
Dockerfile and tag it with the name "my-first-container."
Step 4: Run the Docker Container
Now, you can run a container from the image you just built:
docker run my-first-container
You should see the output "Hello World!" printed in the terminal.
This is a minimal example, and you can customize the Dockerfile and CMD
instruction based on your specific requirements for more complex applications.

66 | Page
Cloud and Data Center Technologies (4361602)

H. Resources/Equipment Required
Sr.No. Instrument/Equipment Specification
/Components/Trainer kit
1 Computer system with Windows 7 or higher Ver., macOS, and
operating system Linux, with 4GB or higher RAM, Docker

I. Safety and necessary Precautions followed


 Read the experiment thoroughly before starting and ensure that you understand
all the steps and concepts involved from underpinning theory.
 Keep the workspace clean and organized, free from clutter and unnecessary
materials.
 Use the software according to its intended purpose and instructions.
 Ensure that all the necessary equipment and software are in good working
condition.
J. Procedure to be followed/Source code:
Students must use the space for writing code.

67 | Page
Cloud and Data Center Technologies (4361602)

K. Practical related Quiz.


1. What is Docker primarily used for?
a. Virtualization
b. Containerization
c. Cloud Storage
d. Networking

2. In Docker, what is a Dockerfile used for?


a. To run containers
b. To build images
c. To create networks
d. To manage volumes

L. References / Suggestions
1. https://docs.docker.com/get-started/overview/
2. https://labs.play-with-docker.com/
68 | Page
Cloud and Data Center Technologies (4361602)

3. https://youtu.be/PwwhFXDD5q4?si=9yQje_aCqO4eqWLW
4. https://ibm.github.io/docker101/lab-1/
5. https://riptutorial.com/docker/example/10772/helloworld-dockerfile
6. https://www.javatpoint.com/docker-tutorial
7. https://www.geeksforgeeks.org/docker-tutorial/
M. Assessment-Rubrics
Tot Exceptional Satisfactory Developing( Limited(1-
Criteria al (5- Marks) (4 to 3 - 2-Marks) Mark)
Mar Marks)
ks

Present in practical
Watched other
session but not
Engagement Performed Performed students attentively
practical practical with performing
participated in
/5 him/herself others help practical but not performance
tried him/herself

Accuracy /5 Accurately done 1-2 3-5 Morethan5errors/m


istakes committed
errors/mistake errors/mistakes
s found identified

No errors, Complete Some of the


Program is well write-up and commands
Documentation /5 Executed and output tables missing with Poor write-up and
Documented but missing outputs diagram or missing
Properly. presentation is content
poor

Fully Understood the Partially


understood the performance but understood Partially
Understanding& understood and
/5 performance cannot explain the
Explanation cannot give
&can explain performance
&can give explanation
perfectly
little
explanation

Work is
Work done after
submitted later
Completed the 2nd week but Work submitted after
Time /5 than1weekbut
work within before the end 3 week time
by the end of of 3rd week
1week 2ndweek

Total Marks: /25 Signature with Date:

69 | Page
Cloud and Data Center Technologies (4361602)

Cloud and Data Center Technologies


4361602
Lab manuals are prepared by
Ms.Pooja V. Garach
Lecturer
Government Polytechnic for Girls, Ahmedabad

Mr. Pradipsinh K. Chavda


Lecturer
LEC Polytechnic, Morbi

Dr. Lataben J. Gadhavi


Lecturer
Government Polytechnic, Gandhinagar

Branch Coordinator
Shri.Nandu A. Fatak
Head of Department
Information Technology
Government Polytechnic for Girls, Ahmedabad

Committee Chairman
Shri. R. D. Raghani
(HOD-EC)
Principal (I/C)
Government Polytechnic, Gandhinagar

70 | Page

You might also like