0% found this document useful (0 votes)
20 views91 pages

Cloud

The document discusses network types including personal area networks, local area networks, and wide area networks. It also explains the OSI model and its seven layers including the physical, data link, network, transport, session, presentation, and application layers.

Uploaded by

indrekarmayur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views91 pages

Cloud

The document discusses network types including personal area networks, local area networks, and wide area networks. It also explains the OSI model and its seven layers including the physical, data link, network, transport, session, presentation, and application layers.

Uploaded by

indrekarmayur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 91

Cloud Computing

Sunbeam Infotech www.sunbeaminfo.com


Networking
-

Sunbeam Infotech www.sunbeaminfo.com


What is network ?
§ It is the interconnection of multiple devices, generally termed as

#
Hosts connected using multiple paths
§ The purpose of network is: sending/receiving data or media
§ It involves various devices like hubs, switches, routers etc.

÷÷→o

Sunbeam Infotech www.sunbeaminfo.com


Wired network
§ The network build by connecting devices together using wires/cables as a
-

medium to transfer the data


§ Cables
§ Coaxial cable
§ Twisted pairs cables
§ Fiber optics


Sunbeam Infotech www.sunbeaminfo.com
Wireless network
§ The network build by connecting devices together using air as a
medium to transfer the data
§ EM Waves are used to transfer data from sender to receiver

Emirates

Sunbeam Infotech www.sunbeaminfo.com


Network Types

-;÷⇐*i*
§ Personal Area Network
§ Smallest network which is very personal to the user
§ E.g. BlueTooth
§ Local Area Network
§ Spans across building(s) and operated under single administrative system
§ E.g. company, school network

-7¥
§ Technologies: TokenRing or Ethernet
§ Metropolitan Area Network
§ Spans across cities
§ E.g. cable network
§ Technologies: high speed fiber optics
§ Wide Area Network
§ Spans across countries
§ Technologies: ATM, Frame Relay

Sunbeam Infotech www.sunbeaminfo.com


What is a network topology ?

=
§ Physical arrangement of computers is known as topology
§ Famous topologies
§ Bus
§ Ring
§ Token Ring connected Ring

§ Star
§ Mesh

Sunbeam Infotech www.sunbeaminfo.com


ISO OSI model [ Open System Interconnect ]

§ Conceptual model that characterizes and standardizes the communication functions of a

_
telecommunication or computing system without regard to its underlying internal structure and
technology
§ Goal is the interoperability of diverse communication systems with standard communication protocols
§ Layered architecture having 7 layers
§ Application
§ Presentation
§ Session
§ Transport
§ Network
§ Data Link
§ Physical

Sunbeam Infotech www.sunbeaminfo.com


Application Layer

§ Specifies interface methods used by hosts in a communications network


§ Contains communication protocols ÷÷
§ HTTP [80]: Hyper Text Transfer Protocol ÷÷÷ ÷÷÷÷
§ HTTPs [443]: Secure Hyper Text Transfer Protocol ( I -
1029)
om
§ FTP [20, 21]: File Transfer Protocol
§ SFTP [115]: Simple FTP
§ DNS [53]: Domain Name Service
§ NFS [1023]: Network File System


§ POP3 [110]: Post Office Protocol
§ SMTP [25]: Simple Mail Transfer Protocol
§ SSH [22]: Secure Shell
§ LDAP [389]: Lightweight Directory Access Protocol

Sunbeam Infotech www.sunbeaminfo.com


Presentation Layer

§ Serves as the data translator for the network


§ Also known as syntax layer
Senator Receiver
§ Responsible for
→ Asc → EBc☐ / E☐cDIc→ASCt
§ Translation
§ Compression/Decompression www.m.mn .

§ Encoding/Decoding
§ Encryption/Decryption

Sunbeam Infotech www.sunbeaminfo.com


Session Layer

§ Provides mechanism for opening, closing and managing session between processes
§ Communication sessions consist of requests and responses that occur between applications
§ Protocols
§ ASP: AppleTalk Session Protocol
§ ADSP: AppleTalk Data Stream Protocol
§ NetBIOS: Network BIOS
§ PAP: Password Authentication Protocol
§ PPTP: Point to Point Tunnelling Protocol
§ RPC: Remote Procedure Call
§ SCP: Session Control Protocol
§ SDP: Socket Direct Protocol

Sunbeam Infotech www.sunbeaminfo.com


Transport Layer
§ Provide host-to-host communication services for applications


§ Creates Segment (data unit) containing Data
§ Sequence number
§ Checksum
§ Port number
Segment Segment
§ Protocols
-

- Sequence no - Sequence no
§ TCP - Checksum - Checksum
§ Connection oriented protocol - Data - Data
§ Provides: Flow Control, Error checking
§ Guarantees data delivery
§ Slower than UDP
§ E.g. WWW, HTTP
§ UDP
§ Connectionless protocol
§ Does not provide flow control
§ Does not guarantee data delivery
§ Faster than TCP
§ E.g. streaming, online games

Sunbeam Infotech www.sunbeaminfo.com


Network Layer
§ Responsible for packet forwarding including routing through

Io
intermediate routers Segment
§ Responsible for splitting segment into packets containing
§ Source IP address
§ Destination IP address
Packet Packet
§ Protocols - Source IP - Source IP
§ IP: Internet Protocol - Destination IP - Destination IP
§ IPX: Internetwork Packet Exchange
§ IPSec: Internet Protocol Security
§ EGP: Exterior Gateway Protocol

Sunbeam Infotech www.sunbeaminfo.com


Data Link Layer
§ Transfers data between

Éo
§ adjacent network nodes in a wide area network (WAN) or Packet
§ between nodes on the same local area network (LAN) segment
§ Encapsulates packet into Frames containing
§ Source MAC Address Frame Frame
§ Destination MAC Address - Source MAC - Source MAC
§ Sublayers - Destination MAC - Destination MAC
§ Logical Link Layer
§ Media Access Control Layer

Sunbeam Infotech www.sunbeaminfo.com


Data Link Layer: Logical Link Layer

§ The uppermost sublayer multiplexes protocols running at the top of data link layer, and optionally
provides flow control, acknowledgment, and error notification
§ Provides addressing and control of the data link
§ Services
§ Error control (automatic repeat request, ARQ)
§ Flow control [Data-link-layer flow control is not used in LAN protocols such as Ethernet, but in modems and
wireless networks]

Sunbeam Infotech www.sunbeaminfo.com


Data Link Layer: Media Access Control Layer

§ Refers to the sublayer that determines who is allowed to access the media at any one time
(CSMA/CD)
§ Determines where one frame of data ends and the next one starts (frame synchronization)
§ Frame synchronization uses: time based, character counting, byte stuffing and bit stuffing.
§ Services
§ Multiple access protocols for channel-access control,
§ CSMA/CD protocols for collision detection and re-transmission in Ethernet networks
§ CSMA/CA protocol for collision avoidance in wireless networks
§ Physical addressing (MAC addressing)
§ =
LAN switching (packet switching), including MAC filtering, Spanning Tree Protocol (STP) and Shortest Path
- -

Bridging (SPB)
§=Data packet queuing or scheduling

Sunbeam Infotech www.sunbeaminfo.com


Physical Layer

§ Consists of the electronic circuit transmission technologies of a network


§ Fundamental layer underlying the higher level functions in a network which provides means of
transmitting raw bits rather than logical packets or segments
§ The bitstream may be grouped into code words or symbols and converted to a physical signal that is
transmitted over a transmission medium
§ Translates logical communications requests from the data link layer into hardware-specific operations
to cause transmission or reception of electronic signals
§ Services
§ Modulation/Demodulation
§ Multiplexing
§ Consists of
§ Cables/wires
§ Devices like hub, repeaters etc.

Sunbeam Infotech www.sunbeaminfo.com


Addressing Modes: MAC Address #

§ Used to identify NIC uniquely


§ Consists of 6 bytes [48 bits]
§ First 3 bytes represents manufacturer
§ Next 3 bytes represents NIC’s unique address

Windows : Ip config fated

Linu✗/maonh

Sunbeam Infotech www.sunbeaminfo.com


Addressing Modes: IP Address

§ Used to identify every device uniquely


§ Set by operating system running on the device
§ Can be written in
§ Decimal: 192.168.100.10
§ Binary: 11000000.10101000.01100100.00001010
§ Types
§ Private: used to communicate with other devices in local network
§ Public: used to communicate with other devices over internet
§ Versions
§ IPv4
§ 32 bit [4 bytes] address
§ Classful and Classless addressing
§ IPv6
§ 128 bit address

Sunbeam Infotech www.sunbeaminfo.com



Virtualization

Sunbeam Infotech www.sunbeaminfo.com


Software Deployment

f-
§ Software deployment defines a process of making the software available for the users
§ E.g. a web site can be available for the end users, when it is hosted on a machine which can be
accessed from anywhere in the world

Sunbeam Infotech www.sunbeaminfo.com


Traditional Deployment

§ Early on, organizations ran applications on physical servers


§ There was no way to define resource boundaries for
applications in a physical server, and this caused resource

kF*
allocation issues
.

§ For example, if multiple applications run on a physical


server, there can be instances where one application would
take up most of the resources, and as a result, the other ÷!

÷i÷÷÷i÷i÷
applications would underperform
§ A solution for this would be to run each application on a
different physical server T
§ But this did not scale as resources were underutilized, and it physical
was expensive for organizations to maintain many physical .

servers

Sunbeam Infotech www.sunbeaminfo.com


|
hello -

java

¥"""¥¥

|
"" ""

" "" """

_phyachidg ,
multi -

booting
What is virtualization

ÉÉ⇐--
§ Virtualization is the creation of a virtual -- rather than actual -- version of something, such as an
operating system (OS), a server, a storage device or network resources
§ Virtualization uses software that simulates hardware functionality in order to create a virtual system
§ This practice allows IT organizations to operate multiple operating systems, more than one virtual
system and various applications on a single server
§ Types
§ Network virtualization
§ Storage virtualization
§ Data virtualization
§ Desktop virtualization
§ Application virtualization
§ Hardware virtualization

Sunbeam Infotech www.sunbeaminfo.com


Network Virtualization

§ Network virtualization takes the available resources on a network and breaks the bandwidth into

=
discrete channels
§ Admins can secure each channel separately, and they can assign and reassign channels to specific
devices in real time


§ The promise of network virtualization is to improve networks' speed, availability and security, and it's
particularly useful for networks that must support unpredictable usage bursts

Sunbeam Infotech www.sunbeaminfo.com


Storage Virtualization

§ Storage virtualization is the pooling of physical storage from multiple network storage devices into
what appears to be a single storage device that is managed from a central console
§ Storage virtualization is commonly used in storage area networks
§ Applications can use storage without having any concern for where it resides, what technical interface
it provides, how it has been implemented, which platform it uses and how much of it is available
§ Benefits
§ Makes the remote storage devices appear local
§ Multiple smaller volumes appear as a single large volume
§ Data is spread over multiple physical disks to improve reliability and performance
§ All operating systems use the same storage device
§ Provided high availability, disaster recovery, improved performance and sharing

Sunbeam Infotech www.sunbeaminfo.com


Data virtualization

§ Data virtualization is the process of aggregating data from different sources of information to develop
a single, logical and virtual view of information so that it can be accessed by front-end solutions such
as applications, dashboards and portals without having to know the data's exact storage location
§ The process of data virtualization involves abstracting, transforming, federating and delivering data
from disparate sources
§ The main goal of data virtualization technology is to provide a single point of access to the data by
aggregating it from a wide range of data sources
§ Benefits

€-
§ Abstraction of technical aspects of stored data like APIs, Language, Location, Storage structure
§ Provides an ability to connect multiple data sources from a single location
§ Provides an ability to combine the data result sets across multiple sources (also known as data federation)
§ Provides an ability to deliver the data as requested by users

Sunbeam Infotech www.sunbeaminfo.com


http://api.my-appomput
GET

⇐ ÷tEE¥÷÷÷
POST
DELETE

Myself

Mungo

uses

Desktop virtualization

§ With desktop virtualization, the goal is to isolate a desktop OS from the endpoint that employees use
to access it
§-
It provides an ability to connect to the desktop from remote site
§ When multiple users connect to a shared desktop, as is the case with Microsoft Remote Desktop
Services, it's known as shared hosted desktop virtualization

¥I§-!¥¥
"

Sunbeam Infotech www.sunbeaminfo.com


Application Virtualization

¥
§ With application virtualization, an app runs separately from the device that accesses it
§ Application virtualization makes it possible for IT admins to install, patch and update only one version
of an app rather than performing the same management tasks multiple times

Sunbeam Infotech www.sunbeaminfo.com


Hardware Virtualization

§ Hardware virtualization or platform virtualization refers to the creation of a virtual machine that acts
like a real computer with an operating system
§ The process of masking the hardware resources like
§ CPU
§ Storage
§ Memory
§ For example, a computer that is running Microsoft Windows may host a virtual machine that looks like
a computer with the Ubuntu Linux operating system; Ubuntu-based software can be run on the virtual
machine
§ The process of creating Machines

Sunbeam Infotech www.sunbeaminfo.com


f.
Type I Type I
-

virtual machine mainly used


by mainly used by
servers
/ cloud providers devs
/ testers / users

hello class
.
hello class
.

OS OS

y.r.wa.is
*.
-
Xen -
VMware
" - DOSBox

;÷÷÷É÷H÷
vra manages
parallels
/
-

Hypervisor
:*

,-÷%i÷÷÷÷÷÷.*⇐
*
.*** .

OS
layer
:2oG
win : ggyzx Layer
^
r
:÷ .
network card network card

machine machine
physical physical
Virtual Machine

§ A virtual machine is the emulated equivalent of a computer system that runs on top of another system
§ Virtual machines may have access to any number of resources
§ Computing power - through hardware-assisted but limited access to the host machine's CPU
§ Memory - one or more physical or virtual disk devices for storage
§ A virtual or real network interfaces
§ Any devices such as
§ video cards,
§ USB devices,
§ other hardware that are shared with the virtual machine
§ If the virtual machine is stored on a virtual disk, this is often referred to as a disk image

Sunbeam Infotech www.sunbeaminfo.com


Types of hardware virtualization

§ Type I
§ A Type 1 hypervisor runs directly on the host machine's physical hardware, and it's referred to as a bare-
metal hypervisor
§ It doesn't have to load an underlying OS first
§ With direct access to the underlying hardware and no other software, it is more efficient and provides better
performance
§ It is best suited for enterprise computing or data centers
§ E.g. VMware ESXi, Microsoft Hyper-V server and open source KVM
§ Type II
§ A Type 2 hypervisor is typically installed on top of an existing OS, and it's called a hosted hypervisor
§ It relies on the host machine's pre-existing OS to manage calls to CPU, memory, storage and network
resources
§ E.g. VMware Fusion, Oracle VM VirtualBox, Oracle VM Server for x86, Oracle Solaris Zones, Parallels and
VMware Workstation

Sunbeam Infotech www.sunbeaminfo.com


Virtualized Deployment

§ It allows you to run multiple Virtual Machines (VMs) on a single


physical server’s CPU
§ Virtualization allows applications to be isolated between VMs
and provides a level of security as the information of one
Virtual Machine
* Virtual Machine .

App App App App App App


application cannot be freely accessed by another application
§ Virtualization allows better utilization of resources in a physical Bin/Library Bin/Library
server and allows better scalability because
Operating System Operating System
§ an application can be added or updated easily
§ reduces hardware costs
§ With virtualization you can present a set of physical resources Hypervisor
as a cluster of disposable virtual machines
Operating System
§ Each VM is a full machine running all the components,
including its own operating system, on top of the virtualized Hardware
hardware

Sunbeam Infotech www.sunbeaminfo.com


Advantages of virtualization

§ Lower costs
§ Virtualization reduces the amount of hardware servers necessary within a company and data center
§ This lowers the overall cost of buying and maintaining large amounts of hardware
§ Easier disaster recovery
§ Disaster recovery is very simple in a virtualized environment
§ Regular snapshots provide up-to-date data, allowing virtual machines to be feasibly backed up and
-
recovered
§=Even in an emergency, a virtual machine can be migrated to a new location within minutes
-

§ Easier testing
§ Testing is less complicated in a virtual environment

⇐§ Even if a large mistake is made, the test does not need to stop and go back to the beginning
§ It can simply return to the previous snapshot and proceed with the test.

Sunbeam Infotech www.sunbeaminfo.com


Advantages of virtualization

§ Quicker backups


§ Backups can be taken of both the virtual server and the virtual machine
§ Automatic snapshots are taken throughout the day to guarantee that all data is up-to-date
§ Furthermore, the virtual machines can be easily migrated between each other and efficiently redeployed

=
§ Improved productivity
§ Fewer physical resources results in less time spent managing and maintaining the servers
§ Tasks that can take days or weeks in a physical environment can be done in minutes


§ This allows staff members to spend the majority of their time on more productive tasks, such as raising
revenue and fostering business initiatives

Sunbeam Infotech www.sunbeaminfo.com


0
Cloud

Sunbeam Infotech www.sunbeaminfo.com


Computing Model

§ Desktop computing
§ Client-Server computing
§ Cluster computing
§ Grid computing
§ Cloud Computing

Sunbeam Infotech www.sunbeaminfo.com


Poedesktop

£F÷÷÷ .

☐±¥¥¥?¥?*
terminal

÷µ terminal
Desktopcor-nput.org

¥¥¥¥÷÷¥÷ :
computational

E÷t÷÷-i
computational
☒ ¥¥:÷÷ .
power
÷:÷n•
'


Users

user I
client-seoueoco-mpat.mg

EÉ9÷÷É
> " " " " ""

index html

E-
.
-

pase
1.
jsp
÷


clientI


±
client2

clients
clusteocompting
""" "

¥¥±÷-ÉÉ-÷f☐÷¥÷±
Hairy

¥7¥TtEE
17.7.5.6

☐÷☐÷
cluster
j☐÷☐÷
÷_÷
1.7=-1:#

!¥-t÷
:#
40L

40L

6000 -

÷÷ .

¥ %ist
,
II I
'

year
* =$ '

"g,y-
Ctoadcomputing

:÷÷.⇐¥⇐¥É¥É÷f☐
ɕY00
6000

÷ ⇐÷i"
2000
-

- • 22
$960

year
$840
What is cloud computing ?

§ The practice of using a network of remote servers hosted on the Internet to store, manage, and

É-
process data, rather than a local server or a personal computer.
§ Is the delivery of on-demand computing resources – everything from data centers over the internet on
a pay for use basis
§ Cloud computing is an umbrella term used to refer to Internet based development and services

Sunbeam Infotech www.sunbeaminfo.com


What is Data Center ?

=
§ Where your IT devices and applications are
located
§ For a non-technical person it is the cloud where
the user’s files/data is stored
§ Components

¥É ¥
§ Servers
§ Security
§ WAN
§ Storage
§ File Sharing

Sunbeam Infotech www.sunbeaminfo.com


p-oackseouer-IOTB.IT
- -
ache = to servers = 10×10 = 100 TB

I 00W = 100 racks = 100×100 = 100001-13

I room ⇐ 50 TOWS = 50×10000 = 500000 TB

1 Floor E 10500ms = 10×5×105 = 5×106-113

5×106 5×107 TB
1 building to floors to ✗
= =
=

1 data centers = 5 buildings -_ 5×5×107=25×102 TB

{
1 zone = 3 data centers = 3×25×107 = 75×107 TB

I oegion = 2 zones = 72×75×107 = 150×107--15×108 TB


1 cloud provider = to regions = 40×15×108 = 6 ✗ to TB
What is Virtualization ?


§ Refers to the act of creating a virtual (rather than actual) version of something, including virtual
computer hardware platforms, storage devices, and computer network resources
§ Types
§ Type I
§ Type II
§ Containerization ( )
docker

Sunbeam Infotech www.sunbeaminfo.com


Terminologies

§ Scalability
§ refers to the idea of a system in which every application or piece of infrastructure can be expanded to handle
increased load
§ Elasticity
§ the degree to which a system is able to adapt to workload changes by provisioning and de-provisioning
resources in an autonomic manner, such that at each point in time the available resources match the current
demand as closely as possible
§ Availability
§ refers to the ability of a user to access information or resources in a specified location and in the correct
format
§ Information Assurance
§ availability, integrity, authentication, confidentiality and nonrepudiation
§ On-demand service
§ A model by which a customer can purchase cloud services as needed

Sunbeam Infotech www.sunbeaminfo.com


Service Models

"

"

Sunbeam Infotech www.sunbeaminfo.com


infrastructure
-
virtual machine

/


hosting
hosting
website
database

storage

-
container
Service Models

Google Apps,

08 É÷
Software Facebook, YouTube,
as a Service (SaaS) Applications / Software Dropbox, Google Photos

Google App Engine,


Platform Amazon Simple DB, S3,
as a Service (PaaS) Microsoft Azure
Platforms

Amazon EC2,
Google Compute VM,
Infrastructure Infrastructure Azure VM
as a Service (IaaS)

Data Center
Hardware

Sunbeam Infotech www.sunbeaminfo.com


Service Models: IaaS

§ Infrastructure as a Service
§ Allocates virtualized computing resources to the user through the internet
§ IaaS is completely provisioned and managed over the internet
§ helps the users to avoid the cost and complexity of purchasing and managing their own physical
servers
§ Every resource of IaaS is offered as an individual service component and the users only have to use
the particular one they need
§ The cloud service provider manages the IaaS infrastructure while the users can concentrate on
installing, configuring and managing their software

E-
§ Generally meant for operations team to setup the required infrastructure
§ Benefits
§ Time and cost savings: more installation and maintenance of IT hardware in-house,
§ Better flexibility: On-demand hardware resources that can be tailored to your needs,
§ Remote access and resource management.

Sunbeam Infotech www.sunbeaminfo.com


Service Models: PaaS

§ Provides a platform allowing customers to develop, run, and manage applications without the
complexity of building and maintaining the infrastructure typically associated with developing and
launching an app
§ Generally meant for developers
§ Benefits
§ Mastering the installation and development of software applications
§ Time saving and flexibility for development projects: no need to manage the implementation of the platform,
instant production
§ Data security: You control the distribution, protection, and backup of your business data

Sunbeam Infotech www.sunbeaminfo.com


É==
Service Models: SaaS

§ Software as a Service
§ Software distribution model in which a third-party provider hosts applications and makes them
available to customers over the Internet
§ User wont know which computer or operating system or infrastructure is used to host the software
§ Generally meant for end user
§ Benefits
§ You are entirely free from the infrastructure management and aligning software environment: no installation
or software maintenance
§ You benefit from automatic updates with the guarantee that all users have the same software version
§ It enables easy and quicker testing of new software solutions.

Sunbeam Infotech www.sunbeaminfo.com


Cloud Computing Characteristics
-

§ Rapid Elasticity ⇐ :÷÷ .


=

§ On Demand Self Service


§ Broad Network Access
§ Location Independent Resource Sharing $1s
§ Measured Services

☐ €
urn ② →

-0¥
Sunbeam Infotech www.sunbeaminfo.com
c

¥stÉdeploymen+
seovicemode.IS/



IaaS
Paas

Saas
Daces
fat
I:÷÷
{


→ public
.
Cloud Deployment Models: Public

§ Supports all users who want to make use of a computing resource, such as hardware (OS, CPU,
memory, storage) or software (application server, database) on a subscription basis
§ Most common uses of public clouds are for application development and testing, tasks such as file-
sharing, and e-mail service
§ Requires internet to access the resources

Sunbeam Infotech www.sunbeaminfo.com


Cloud Deployment Models: Private

§ Typically infrastructure used by a single organization


§ Such infrastructure may be managed by the organization itself to support various user groups, or it
could be managed by a service provider that takes care of it either on-site or off-site
§ Private clouds are more expensive than public clouds due to the capital expenditure involved in
acquiring and maintaining them
-

§ However, private clouds are better able to address the security and privacy concerns of organizations
-

Sunbeam Infotech www.sunbeaminfo.com


Cloud Deployment Models: Hybrid

§ Organization makes use of interconnected private and public cloud infrastructure


§ Many organizations make use of this model when they need to scale up their IT infrastructure rapidly,
such as when leveraging public clouds to supplement the capacity available within a private cloud
§ For example, if an online retailer needs more computing resources to run its Web applications during
the holiday season it may attain those resources via public clouds.

Sunbeam Infotech www.sunbeaminfo.com


Cloud Services compute : → u

lambda EES EKS


§ Compute: used to create the Virtual Machine 0
.
ECZ ,
,
,
→ -

§ Storage: used to provide the storage 8 S3 ,


EFS
-

§ Database: RDBMS + No SQL


-
I RDS ,
Dynamo
DB

§ Security and Identity Management 8 IAM


§ Media Services
§ Machine Learning
:
8
-

Saseraaker
§ Cost Management 8 Billing services

§=
Application Integration 8 SES, SOS ,
SMS

Sunbeam Infotech www.sunbeaminfo.com


?⃝
Advantages

=IE-
§ Lower computer costs
§ Improved performance
§ Reduced software costs
§ Instant software updates
§ Improved document format compatibility
§ Unlimited storage capacity
§ Increased data reliability
§ Universal document access
=
§ Latest version availability

Sunbeam Infotech www.sunbeaminfo.com


Disadvantages

§ Requires a constant Internet connection


-
§ Does not work well with low-speed connections
§ Features might be limited
§=
Stored data might not be secure
§ Stored data can be lost
-
§ Each cloud systems uses different protocols and different APIs

Sunbeam Infotech www.sunbeaminfo.com


Cloud Providers

÷
-1¥
§ Amazon Web Services
§ Google Cloud Platform
§ Microsoft Azure Godaddy
§ Rackspace
§ DigitalOcean
§ Alibaba Cloud
§ Oracle Cloud
§ IBM Cloud

Sunbeam Infotech www.sunbeaminfo.com


-0
AWS

Sunbeam Infotech www.sunbeaminfo.com


What is AWS ?

§ AWS stands for Amazon Web Services


§ Platform that offers flexible, reliable, scalable, easy-to-use and cost-effective cloud computing
solutions
§ Amazon’s cloud implementation
§ It’s a combination of IaaS, PaaS and SaaS offerings

Sunbeam Infotech www.sunbeaminfo.com


Traditional vs AWS

000 000
- -
- Doo
o o o
- -
- 00000
Sunbeam Infotech www.sunbeaminfo.com
AWS Services

Sunbeam Infotech www.sunbeaminfo.com


Edgelocat

÷÷÷÷☒
?⃝
Global Infrastructure: Region

§ Geographic area having availability zone(s)


§ Collection of availability zones that are geographically located close to one other
§ Every Region will act independently of the others, and each will contain at least two Availability Zones
§ E.g.
§ US East: N. Virginia, Ohio
§ US West: N. California, Oregon
§ Asia Pacific: Mumbai, Seoul, Singapore, Sydney, Tokyo
- -

latency
:
Teams,JÑpnÉ
time required to send

Sunbeam Infotech www.sunbeaminfo.com


Global Infrastructure: Availability Zone

§ Essentially the physical data centers of AWS


§ This is where the actual compute, storage, network, and database resources are hosted that we as
consumers provision within our Virtual Private Clouds (VPCs)
§ Availability Zones are always referenced by their Code Name, which is defined by the AZs Region
Code Name that the AZ belongs to, followed by a letter
§ E.g.
§ the AZs within the eu-west-1 region (EU Ireland), are
§ eu-west-1a
§ eu-west-1b
§ eu-west-1c

Sunbeam Infotech www.sunbeaminfo.com


Global Infrastructure: Edge Locations
-
Cloud front : →

§ Edge Locations are AWS sites deployed in major cities and highly populated areas across the globe

_-
§ Generally used to cache data and reduce latency for end-user access by using the Edge Locations as
a global Content Delivery Network (CDN)
§ Edge Locations are primarily used by end users who are accessing and using your services

==-
§ E.g.
§ Route 53: DNS Lookup
§ CloudFront
Edge location
§ Content Delivery Network (CDN)

qq÷÷¥¥÷÷*
§ Cached contents, streaming distribution, acceleration
E-
mumbai
,
¥
y

pane

Sunbeam Infotech www.sunbeaminfo.com


deptoy MERNapplication-

EC2

Sunbeam Infotech www.sunbeaminfo.com


EC2

§ Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute
capacity in the cloud
§ It is a virtual machine you will be building in the cloud
§ EC2 instances are designed to mimic traditional on-premise servers, but with the ability to be
commissioned and decommissioned on-demand for easy scalability and elasticity
§ EC2 supports variety of operating systems:
§ Linux: Amazon Linux, Ubuntu, Red Hat Enterprise, SUSE Linux Enterprise Server, Fedora, Debian, CentOS,
Gentoo Linux, Oracle Linux, FreeBSD
§ Windows: Windows Server, Windows
§ Every instance comprised of
§ Amazon Machine Image (AMI)
§ Instance type
§ Network Interface
§ Storage

Sunbeam Infotech www.sunbeaminfo.com


Step 1 - Choose AMI

Sunbeam Infotech www.sunbeaminfo.com


Amazon Machine Image (AMI)

§ Operating System used to create virtual machine (EC2 instance)


§ AMI are built for a specific region
§ You can copy an AMI from one region to another
§ You can also create a custom AMI with required applications/configuration
§ AMI contains
§ Template for root volume
§ Launch permissions that control which account can use the AMI
§ EBS mapping that specifies the volume(s) to attach the instance when its launched
§ AMI comes into two types
§ Instance store backed AMI
§ EBS backed AMI

Sunbeam Infotech www.sunbeaminfo.com


Step 2 - Instance Type

Sunbeam Infotech www.sunbeaminfo.com


Instance Type

§ Used to decide the EC2 instance configuration


§ AWS provides various instance types [https://aws.amazon.com/ec2/instance-types/]
§ General purpose: A (ARM), T (Cheapest), M (Main)
§ Compute optimized: C (Compute)
§ Memory optimized: R (RAM), X (Extreme RAM), Z (High compute and memory)
§ Accelerated computing: P (Picture-GPU), G (Graphics), F (Fast)
§ Storage optimized: I (IOPS), D (Data), H (High Disk Throughput)

Sunbeam Infotech www.sunbeaminfo.com


Instance Types

Type Category Description Use Cases


M5 General Purpose Balance of compute, memory and network Mid-sized databases
resources
C5 Compute Optimized Advanced CPUs Modelling, Analytics
H1 Storage Optimized Local HDD Storage Map Reduce
R4 Memory Optimized More RAM for $ In-memory caching
X1 Memory Optimized Terabytes of RAM and SSD In-memory database
I3 IO Optimized Local SSD storage, high IOPS NoSQL databases
G3 GPU Graphics GPUs with video encoders 3d rendering
P3 GPU Compute GPUs with tensor cores Machine Learning
F1 Accelerated Computing FPGA, custom hardware accelerations Genomics
T2 Burstable Shared CPUs, lowest cost Web servers

Sunbeam Infotech www.sunbeaminfo.com


Step 3 – Configure Instance Details

Sunbeam Infotech www.sunbeaminfo.com


On Demand

§ Low cost and flexibility with no upfront cost


§ Pay for hours used with no commitment
§ Good option for developers or testers
§ Ideal for
§ auto scaling groups
§ Unpredictable workloads

Sunbeam Infotech www.sunbeaminfo.com


Step 4 – Add Storage

Sunbeam Infotech www.sunbeaminfo.com


Storage options

§ Block storage
§ Instance store
§ EBS volume
§ Object storage
§ S3
§ File sharing
§ EFS

Sunbeam Infotech www.sunbeaminfo.com


EBS – Solid State Drives (SSD)

§ General Purpose (gp2)


§ Used for dev/test environments
§ Baseline performance: 100 IOPS – 3000 IOPS
§ Bursts up to 32000 IOPS (credit based)
§ Volume size from 1GiB to 16 TiB
§ Provisioned IOPS (io1)
§ Used for mission critical applications that require sustained IOPS performance
§ Large database workloads
§ Volume size: 4GiB to 16TiB
§ Performs at provisioned level and can provision up to 64K IOPS per volume
§ NOTE: EC2 instances have a maximum of 80K IOPS total

Sunbeam Infotech www.sunbeaminfo.com


EBS – Hard Disk Drive (HDD)

§ Can not be boot volume


§ Size: 500GiB – 16TiB
§ Types
§ Throughput Optimized (st1)
§ Low storage cost
§ Used for frequently accessed, throughout intensive workloads
§ E.g. Streaming, Big Data
§ Max throughput of 500 MiB/s
§ NOTE: EC2 instances have a maximum throughput of 1750MiB/s
§ Cold HDD (sc1)
§ Lowest cost
§ Infrequently accessed data
§ Max throughput of 250MiB/s

Sunbeam Infotech www.sunbeaminfo.com


Step 5 – Add Tags

Sunbeam Infotech www.sunbeaminfo.com


Step 6 - Add Security Group

Sunbeam Infotech www.sunbeaminfo.com


Security Group

§ Acts as a virtual firewall for your instance to control inbound and outbound traffic
§ Controls the ports and protocols that can reach the front-end listener
§ Every EC2 instance must have at least one security group attached
§ Up to 5 security groups can be attached to an EC2 instance
§ Security groups act at the instance level, not the subnet level
§ Security group contains rules
§ You can specify allow rules, but not deny rules
§ You can specify separate rules for inbound and outbound traffic
§ When you create a security group, it has no inbound rules
§ By default, a security group includes an outbound rule that allows all outbound traffic
§ Security groups are stateful
§ Instances associated with a security group can't talk to each other unless you add rules allowing it
§ Security groups are associated with network interfaces

Sunbeam Infotech www.sunbeaminfo.com


Step 7 – Review and create PEM file

Sunbeam Infotech www.sunbeaminfo.com


EC2 Key Pairs

§ Uses PEM format (Privacy Enhanced Mail)


§ Used to authenticate a client when logging into EC2 instance
§ Each key pair consists of a public key and a private key
§ AWS stores the public key on the instance and your are responsible for storing the private key
§ To log into the instance you must create and authenticate with key pair
§ Linux instances have no password and you use a key pair to log in
§ With windows you use a key pair to obtain the administrator password and then log into the instance with
RDP
§ During the creation process of an EC2 instance you are required to either create a new key pair or
use existing pair
§ The private key is available for download and stored on your local drive
§ NOTE: it will be available only once in the form of .pem file

Sunbeam Infotech www.sunbeaminfo.com

You might also like