0% found this document useful (0 votes)
411 views5 pages

Case Study On Amazon EC2

This document provides an overview of Amazon Web Services (AWS), a popular cloud computing platform. It discusses key AWS services such as AWS Identity and Access Management (IAM) for authentication and authorization, Amazon EC2 for scalable computing, Amazon S3 for storage, AWS Certificate Manager, and Amazon RDS database service. The document includes diagrams to illustrate these AWS services and how they work.

Uploaded by

ShahanwazHavale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
411 views5 pages

Case Study On Amazon EC2

This document provides an overview of Amazon Web Services (AWS), a popular cloud computing platform. It discusses key AWS services such as AWS Identity and Access Management (IAM) for authentication and authorization, Amazon EC2 for scalable computing, Amazon S3 for storage, AWS Certificate Manager, and Amazon RDS database service. The document includes diagrams to illustrate these AWS services and how they work.

Uploaded by

ShahanwazHavale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/355040335

A Case Study of Amazon Web Services

Technical Report · October 2021


DOI: 10.13140/RG.2.2.18114.09921

CITATION READS
1 1,272

1 author:

Pooja Pandit

28 PUBLICATIONS   3 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Pooja Pandit on 04 October 2021.

The user has requested enhancement of the downloaded file.


A Case Study of Amazon Web Services
Pooja D Pandit,
Mumbai University,
India

Abstract—A tremendous growth in user data has led to


design and development of a number of analytic tools. To
support such tools, efficient cloud computing services have
become the need of the hour. This paper studies Amazon
Web Services, a popular cloud computing platform. The
paper provides an overview of features of the platform
such as AWS security and identify, computation, storage,
content delivery, etc. Fig. 1: AWS Identity and Access Management

I. I NTRODUCTION
A rapid growth of network usage has led to an
increasing transmission of user data over it [1]–
[8]. User data not only exposes what users want
but also provides an insight into how users think
and behave. Consequently, a number of analytic
tools [9]–[16] have been developed to process such Fig. 2: Amazon Web Services
user data to generate interesting trends from them.
However, to support such features, efficient cloud in the Northwestern United States, provided for
computing platforms are extremely important. U.S. government customers, complementing exist-
Amazon Web Services (AWS) is a collection of ing government agencies already using the US East
cloud computing services, also called services that Region. Each Region is wholly contained within a
make up a cloud-computing platform offered by single country and all of its data and services stay
Amazon.com. These services operate from 12 geo- within the designated Region. Refer fig. 1 to get an
graphical regions across the world. The most central overview of various Amazon Web services .
and well-known of these services arguably include
Amazon Elastic Compute Cloud, also known as III. AWS SECURITY AND IDENTITY
”EC2”, and Amazon Simple Storage Service, also
A. AWS Identity and Access Management
known as ”S3”. Amazon markets AWS as a service
to provide large computing capacity more quickly AWS Identity and Access Management (IAM)
and more cheaply than a client company building is a web service that helps you securely control
an actual physical server farm. access to AWS resources for your users. You use
IAM to control who can use your AWS resources
II. L OCATIONS OF SERVICE (authentication) and what resources they can use and
AWS is located in 12 geographical ”regions”: in what ways (authorization). Refer fig. 2 to get an
US East (Northern Virginia), where the majority overview of AWS Identity and Access Management
of AWS servers are based, US West (northern .
California), US West (Oregon), Brazil (São Paulo),
Europe (Ireland and Germany), Southeast Asia (Sin- B. Features
gapore), East Asia (Tokyo, Seoul, Beijing) and Aus- • Shared access to your AWS account
tralia (Sydney). There is also a ”GovCloud”, based • Granular permissions
Fig. 4: AWS Directory Operations

• Microsoft AD: Microsoft AD is a Microsoft


Fig. 3: AWS Directory Service Active Directory hosted on AWS. It integrates
most Active Directory features with AWS ap-
plications.
• Secure access to AWS resources for applica-
• AD Connector: AD Connector uses your ex-
tions that run on Amazon EC2
isting on-premises Microsoft Active Directories
• Multi-factor authentication (MFA)
to access AWS applications and services.
• Identity federation
• Identity information for assurance Refer fig. 4 to get an overview of AWS Directory
• PCI DSS Compliance Operations.
• Integrated with many AWS services
• Eventually Consistent IV. C OMPUTE F EATURE OF AWS: A MAZON EC2
• Free to use Amazon Elastic Compute Cloud (Amazon EC2)
• AWS SDKs provides scalable computing capacity in the Ama-
C. AWS Certificate Manager zon Web Services (AWS) cloud. Using Amazon
EC2 eliminates your need to invest in hardware up
AWS Certificate Manager (ACM) handles the
front, so you can develop and deploy applications
complexity of provisioning, deploying, and man-
faster. You can use Amazon EC2 to launch as many
aging certificates provided by ACM (ACM Certifi-
or as few virtual servers as you need, configure secu-
cates) for your AWS-based websites and applica-
rity and networking, and manage storage. Amazon
tions. You use ACM to request and manage the
EC2 enables you to scale up or down to handle
certificate and then use other AWS services to provi-
changes in requirements or spikes in popularity,
sion the ACM Certificate for your website or appli-
reducing your need to forecast traffic.
cation. As shown by the following illustration, ACM
Certificates are currently available for use with only
A. Features of Amazon EC2
Elastic Load Balancing and Amazon CloudFront.
You cannot use ACM Certificates outside of AWS. Amazon EC2 provides the following features:
Refer fig. 3 to get an overview of AWS Directory • Virtual computing environments, known as in-
Service. stances
AWS Directory Service is a managed service that • Preconfigured templates for your instances,
makes it easy to connect AWS services to your known as Amazon Machine Images (AMIs),
existing on-premises Microsoft Active Directory that package the bits you need for your server
(AD Connector), or to set up and operate a new (including the operating system and additional
directory in the AWS cloud (Simple AD and AWS software)
Directory Service for Microsoft Active Directory). • Various configurations of CPU, memory, stor-
Your directory users and groups can access the AWS age, and networking capacity for your in-
Management Console and AWS applications, such stances, known as instance types
as Amazon WorkSpaces and Amazon WorkDocs, • Secure login information for your instances
using their existing credentials. You have three using key pairs (AWS stores the public key, and
choices: you store the private key in a secure place)
• Simple AD: Simple AD is a Microsoft Active • Storage volumes for temporary data that’s
Directory–compatible directory that is powered deleted when you stop or terminate your in-
by Samba 4 and hosted on the AWS cloud. stance, known as instance store volumes
Fig. 5: AWS Management Console Fig. 6: Cloudfront

• Persistent storage volumes for your data using


Amazon Elastic Block Store (Amazon EBS),
known as Amazon EBS volumes
• Multiple physical locations for your resources,
such as instances and Amazon EBS volumes,
known as regions and Availability Zones
Fig. 7: RDS
B. How to Get Started with Amazon EC2
D. Database: RDS
The first thing you need to do is get set up to use
Amazon EC2. After you are set up, you are ready Amazon Relational Database Service (Amazon
to complete the Getting Started tutorial for Amazon RDS) is a web service that makes it easier to set
EC2. Whenever you need more information about a up, operate, and scale a relational database in the
feature of Amazon EC2, you can read the technical cloud. It provides cost-efficient, resizeable capac-
documentation. Refer fig. 5 to get an idea of how ity for an industry-standard relational database and
to get started with Amazon EC2. manages common database administration tasks.
Amazon RDS manages backups, software patching,
C. Storage & Content Delivery: Cloudfront automatic failure detection, and recovery.In order to
deliver a managed service experience, Amazon RDS
Amazon CloudFront is a content delivery web does not provide shell access to DB instances, and
service. It integrates with other Amazon Web Ser- it restricts access to certain system procedures and
vices products to give developers and businesses tables that require advanced privileges.You can have
an easy way to distribute content to end users automated backups performed when you need them,
with low latency, high data transfer speeds, and or create your own backup snapshot. These backups
no minimum usage commitments. Amazon Cloud- can be used to restore a database, and the Amazon
Front can be used to deliver your entire website, RDS restore process works reliably and efficiently.
including dynamic, static, streaming, and interactive Refer fig. 7 to get to know about RDS.
content using a global network of edge locations.
Requests for your content are automatically routed V. C ONCLUSION
to the nearest edge location, so content is deliv- We studied various Amazon Web Services (AWS)
ered with the best possible performance. Amazon which is a collection of cloud computing services
CloudFront is optimized to work with other Amazon that make up a cloud-computing platform offered
Web Services, like Amazon Simple Storage Ser- by Amazon.com. Also studied about Amazon EC2
vice (Amazon S3), Amazon Elastic Compute Cloud in detail.
(Amazon EC2), Amazon Elastic Load Balancing,
and Amazon Route 53. Amazon CloudFront also R EFERENCES
works seamlessly with any non-AWS origin server,
[1] P. B. Nayak, S. Verma, and P. Kumar. Multiband fractal antenna
which stores the original, definitive versions of your design for Cognitive radio applications. In Proc. of ICSC. IEEE,
files. Refer fig. 6 to get to know about Cloudfront. 2013.
[2] P. B. Nayak, S. Verma, and P. Kumar. A novel compact tri-band
antenna design for WiMax, WLAN and bluetooth applications.
In Proc of NCC. IEEE, 2014.
[3] P. B. Nayak, R. Endluri, S. Verma, and P. Kumar. Compact
dual-band antenna for WLAN applications. In Proc. of PIMRC).
IEEE, 2013.
[4] P. B. Nayak, S. Verma, and P. Kumar. Ultrawideband (UWB)
Antenna Design for Cognitive Radio. In Proc. of CODEC.
IEEE, 2012.
[5] R. Endluri, P. B. Nayak, and P. Kumar. A Low Cost Dual Band
Antenna for Bluetooth, 2.3 GHz WiMAX and 2.4/5.2/5.8 GHz
WLAN. International Journal of Computer Applications.
[6] Peshal Nayak, Sudhanshu Verma, and Preetam Kumar. A
study of ultrawideband (uwb) antenna design for cognitive radio
applications. arXiv preprint arXiv:2106.15272, 2021.
[7] Peshal B Nayak, Ramu Endluri, Sudhanshu Verma, and Preetam
Kumar. A novel compact dual-band antenna design for wlan
applications. arXiv preprint arXiv:2106.13232, 2021.
[8] Peshal Nayak. A Study of Technology Roadmap for Application-
Specific Integrated Circuit. PhD thesis, Rice University, 2021.
[9] Peshal Nayak. 802.11 Multiuser MIMO WLAN Performance
Under the Dynamics of Open Loop Traffic. PhD thesis, Rice
University, 2021.
[10] Peshal Nayak. Performance evaluation of mu-mimo under
the impact of open loop traffic dynamics. arXiv preprint
arXiv:2108.03745, 2021.
[11] P. Nayak. Performance Evaluation of MU-MIMO WLANs
Under the Impact of Traffic Dynamics. Master’s thesis, 2016.
[12] P. Nayak, M. Garetto, and E. W. Knightly. Modeling Multi-User
WLANs Under Closed-Loop Traffic. IEEE/ACM Transactions
on Networking, 2019.
[13] P. Nayak, M. Garetto, and E. W. Knightly. Multi-user downlink
with single-user uplink can starve TCP. In IEEE INFOCOM.
IEEE, 2017.
[14] Peshal Nayak and Edward W Knightly. uscope: a tool for
network managers to validate delay-based slas. In Proc of
MobiHoc, pages 171–180, 2021.
[15] Peshal Nayak, Santosh Pandey, and Edward W Knightly. Virtual
speed test: an ap tool for passive analysis of wireless lans. In
IEEE INFOCOM 2019-IEEE Conference on Computer Com-
munications, pages 2305–2313. IEEE, 2019.
[16] P. Nayak. AP-side WLAN Analytics. PhD thesis, Rice Univer-
sity, 2019.

View publication stats

You might also like