Seminar
Seminar
ON
Vinal Gahlot
Session 2024-25
Page 1
Chapter Index
Certificate 4
Acknowledgement 5
PREFACE 6
1 INTRODUCTION 7
3 APP ENGINE 22
4 COMPUTE ENGINE 25
Page 2
4.1 Advantages of Compute Engine 25
5 EDGE COMPUTING 31
6 PROJECT 36
Conclusion 40
Future Scope 41
References 42
Page 3
CERTIFICATE
This is to certify that the report of the seminar submitted is the outcome of the seminar work
entitled “Scaling Decentralized finance” carried out by Vinal Gahlot bearing Roll No.:
21EJCEC138 carried under my guidance and supervision for the award of Degree in
Bachelor of Technology of Jaipur Engineering College & Research Centre, Jaipur (Raj.),
India during the academic year 2024-25.
To the best my knowledge the report
iii) Fulfills the requirement of the ordinance relating to the bachelor of technology
degree of the Rajasthan Technical University and
iv) Is up to the desired standard for the purpose of which is submitted.
Guide
Dr. Shweta Sharda
Page 4
ACKNOWLEDGEMENT
Signature
Vinal Gahlot
Page 5
PREFACE
Bachelor of Technology in Electronics and Communication is the Rajasthan Technical
University course (Approved by AICTE) having duration of 4 years. As a prerequisite
of the syllabus every student on this course has to make a report on seminar lab in
order to complete his studies successfully. And it is required to submit the report on the
completion of it.
The main objective of this report is to create awareness regarding the application of theories
in the practical world of Electronics and Communication and to give a practical exposure of
the real world to the student.
I, therefore, submit this seminar report on “Dark web: The Hidden Threats”, which was
undertaken at JECRC, Jaipur. I feel great pleasure to present this seminar report.
Page 6
CHAPTER 1
INTRODUCTION
Cloud Computing provides an alternative to the on-premises data
centre. With an on-premises datacenter, we have to manage
everything, such as purchasing and installing hardware, virtualization,
installing the operating system, and any other required applications,
setting up the network, configuring the firewall, and setting up
storage for data. After doing all the set-up, we become responsible for
maintaining it through its entire lifecycle
Page 7
The cloud environment provides an easily accessible online portal
that makes handy for the user to manage the compute, storage,
network, and application resources.
But of course time has passed and the technology caught that
idea and after few years we mentioned that:
Page 8
Of course, all the big players are present in the cloud computing evolution,
some were earlier, some were later. In 2009, Microsoft launched Windows
Azure, and companies like Oracle and HP have all joined the game. This proves
that today, cloud computing has become mainstream.
Page 9
flexibility and more deployment options to the business.
Page
10
Software as a Service (SaaS): It provides a centrally hosted and
managed software service the end-users. It delivers software over
the internet, on-demand, and typically on a subscription basis.
E.g., Microsoft One Drive, Drop box, Word Press, Office 365,
and Amazon Kindle. SaaS is used to minimize the operational cost
to the maximum extent.
Page
11
Front End
The front end is used by the client. It contains client-side interfaces
and applications that are required to access the cloud computing
platforms. The front end includes web servers (including Chrome,
Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile
devices.
Back End
The back end is used by the service provider. It manages all the
resources that are required to provide cloud computing services. It
includes a huge amount of data storage, security mechanism,
virtual machines, deploying models, servers, traffic control
mechanisms, etc.
Client Infrastructure
Application
The application may be any software or platform that a client wants to
access.
Service
Page
12
Example: Google Apps, Salesforce Dropbox, Slack, Hubspot, Cisco
WebEx.
Page
13
1.5.5. Security
Security is an in-built back end component of cloud computing. It
implements a security mechanism in the back end. 19. Internet The
Internet is medium through which front end and back end can interact
and communicate with each other.
1.5.6. Internet
The Internet is medium through which front end and back end can
interact and communicate with each other.
Page
14
CHAPTER-2
GOOGLE CLOUD PLATFORM
Google Cloud Platform is known as one of the leading cloud providers in the
IT field. The services and features can be easily accessed and used by the
software developers and users with little technical knowledge. Google has
been on top amongst its competitors, offering the highly scalable and most
reliable platform for building, testing and deploying the applications in the
real-time environment.
Page
15
Therefore, Google Cloud Platform is a viable option for businesses, especially
when the businesses require an extensive catalog of services with global
recognition.
• Best Pricing: Google enables users to get Google Cloud hosting at the
cheapest rates. The hosting plans are not only cheaper than other hosting
platforms but also offer better features than others. GCP provides a pay-as-
you-go option to the users where users can pay separately only for the services
and resources they want to use.
• Scalable: Users are getting a more scalable platform over the private
network. Because Google uses fiber-optic cables to extend its network range, it
is likely to have more scalability.Google is always working to scale its
network because there can be any amount of traffic.
Page
16
data on the Cloud platform. This gives assurance to the users that their data is
completely safe and secure from unauthorized sources.
• Redundant Backup: Google always keeps backup of user's data with built-
in redundant backup integration. In case a user has lost the stored data, it's not
a big problem. Google always has a copy of the users' data unless the data is
deleted forcefully. This adds data integrity, reliability and durability with GCP.
• Broad network access: The resources and the information can be accessed
from anywhere.
Page
17
2.4 GOOGLE CLOUD PLATFORM SERVICE
Page
18
• Kubernetes Engines: This computing service is responsible for offering a
platform for automatic deployment, scaling, and other operations of
application containers across clusters of hosts. The engine supports several
container tools like a docker, etc.
2.4.2 Networking
• VPC: VPC stands for Virtual Private Network. The primary function of
VPC is to offer a private network with routing, IP allocation, and network
firewall policies. This will help to create a secure environment for the
application deployments.
• Google Cloud Storage: It is an online data storage web service that Google
provides to its users to store and access data from anywhere. The service also
includes a wide range of features like maximum performance, scalability,
security and sharing.
• Cloud SQL: It is a web-service that enables users to create, manage, and use
relational databases stored on Google Cloud servers. The service itself
maintains and protects the databases, which helps users focus on their
applications and other operations.
• Cloud Bigtable: It is known for its fast performance and highly manageable
feature. It is a highly scalable NoSQL database service that allows collecting
and retaining data from as low as 1 TB to hundreds of PB.
Page
19
• BigQuery: It is a fully managed data analysis service by Google. The
primary aim of Google BigQuery service is to helps businesses to analyze Big
Data. It offers a highly scalable data management option. This means
BigQuery allows users to perform ad-hoc queries and share data insights
across the web.
• Datastore is the capability of automatic scaling. This means that the service
can itself scale up and down, depending on the requirement of resources.
• Google Cloud Dataproc: It is a very fast and easy to use big data service
offered by Google. It mainly helps in managing Hadoop and Spark services for
distributed data processing. The service allows users to create Hadoop or
Spark clusters sized according to the overall workload and can be accessed
whenever users want them. 2.4.5 Security and Identity Management GCP
includes the following services related to Security and Identity management:
Page
20
features of Google Cloud services directly from their mobile devices anytime,
anywhere. The primary functions of this service is alerting, monitoring, and
performing critical actions on resources.
2.4.5 Cloud AI
• Cloud IoT Core: It is one of the fully managed core services. It allows
usersto connect, control, and ingest data from various devices that are securely
connected to the Internet. This allows other Google cloud services to analyze
process, collect and visualize IoT data in real-time.
• Cloud IoT Edge: The Edge computing service brings memory and other
computing-power resources near to the location where it is required.
Page
21
CHAPTER 3
APP ENGINE
Google App Engine is Google's platform as a service offering that allows
developers and businesses to build and run applications using Google's
advanced infrastructure. These applications are required to be written in one of
a few supported languages, namely: Java, Python, PHP and Go. It also requires
the use of Google query language and that the database used is Google Big
Table. Applications must abide by these standards, so applications either must
be developed with GAE in mind or else modified to meet the requirements.
GAE is a platform, so it provides all of the required elements to run and host
Web applications, be it on mobile or Web. Without this all-in feature,
developers would have to source their own servers, database software and the
APIs that would make all of them work properly together, not to mention the
entire configuration that must be done. GAE takes this burden off the
developers so they can concentrate on the app front end and functionality,
driving better user experience.
• Google app engine allows you to build web applications on the same stable
and extendable platform which having support facility of Google’s large
number of applications.
• Google app engine gives facility to use and run applications in Google's data
centre.
• Google app engine's language Java and Python are easy to understand and
implement.
• Using Google accounts, you can use Google app engine's services.
• It is easy to scale up as your data storage and traffic needs grows with time. •
Google also provides marketing facility to our apps.
Page
22
• User can easily write the application code, and can test it on own local
system and upload it to
• Google takes care of all the apps maintenance and allows users/developers to
focus on the features of the application.
• Start Quickly, Build Faster: With built-in services such as load balancing,
health checks and application logging, you can deploy web and mobile
application much faster.
• Use the Tools you Love: App Engine works with popular development tools
such as Eclipse, IntelliJ, Git, Jenkins and PyCharm. You can build your apps
with the tools you love without changing your workflow.
Page
23
3.3 FEATURE OF APP ENGINE
• Fully Managed: Google allows you to add your web application code to the
platform while managing the infrastructure for you. The engine ensures that
your web apps are secure and running and saves them from malware and
threats by enabling the firewall.
• Traffic Splitting: The app engine automatically routes the incoming traffic
to different versions of the apps as a part of A/B testing. You can plan the
consecutive increments based on what version of the app works best.
Page
24
CHAPTER-4
COMPUTE ENGINE
Google Compute Engine (GCE) is an Infrastructure as a Service (IaaS)
offering that allows clients to run workloads on Google's physical hardware.
• Cost: Within the GCP ecosystem, users pay only for the computing time that
they have consumed. The per-second billing plan is used by the Google
compute engine.
• Stability: It offers more stable services because of its ability to provide live
migration of VMs between the hosts.
Page
25
• Scalability: It makes reservations to help ensure that applications have the
capacity they need as they scale.
• Security: Google Compute Engine is a more secure and safe place for cloud
applications.
• Gain Infinite Value: Preventing cost only for executing Compute with
sustained-use discounts, and obtaining huge profits while implementing
devoted-use discounts.
Each VM has its own operating system, and functions separately from other
VMs, even if they are located on the same physical host. VMs generally run on
computer servers, but they can also be run on desktop systems, or even
embedded platforms. Multiple VMs can share resources from the physical
host, including CPU cycles, network bandwidth and memory.
In general, there are two types of VMs: Process VMs, which separate a single
process, and system VMs, which offer a full separation of the operating system
and applications from the physical computer.
Page
26
4.4. SET UP VIRTUAL MACHINE
Ideal for typical balanced instances with respect to RAM and CPU
Up to 1TB of memory
Page
27
Say that none of these predefined machine types match your requirements. No
worries, you can completely customize the machine type to fit your CPU and
Memory needs.
This is ideal if you have a workload that maybe requires more processing
power or memory than what is offered by the Google-provided types, or if you
need GPUs.
4.4.3. Disks
After choosing a machine type which covers CPU and Memory, it’stime to
choose a disk option. The disk you choose will be your single root disk in
which your image is loaded during the boot process.
You have the option to keep your disk when deleting your instance, or having
it terminated along with the instance.
Page
28
4.4.5 Local SSD
Local SSD disks are physically attached to VM instances. These will offer the
highest possible IOPS and are used for seriously intensive workloads.
4.4.6 Images
• Images contain a boot loader, Operating System, file system structure, and
any software customizations needed for your deployment.
• The image describes what actually gets loaded onto the root disk.
• Tons of public images are available from Google and other authorized third-
party vendors.
Page
29
4.4.7 Networking &Firewall
Each VM will have a single interface by default. This interface can be placed
in a particular subnet of a particular network with respect to the zone that you
choose.
You can add multiple interfaces if desired, but that is more of an advanced
topic. By default, the primary internal IP will be set to Automatic (DHCP) and
the External IP set to Ephemeral (DHCP).
A couple of easy checkboxes can get your VM setup with the proper firewall
rules for HTTP and HTTPS traffic as well.
Well, if your VM is running Linux, you can access it via the console through
SSH, from another VM running Cloud Shell via the Cloud SDK, or from your
computer via SSH.
If your VM is running Windows, you can use an RDP client or Power shell
terminal
Page
30
CHAPTER – 5
EDGE COMPUTING
Edge computing directs computational data, applications, and services away
from Cloud servers to the edge of a network. The content providers and
application developers can use the Edge computing systems by offering the
users services closer to them. Edge computing is characterized in terms of high
bandwidth, ultra-low latency, and real-time access to the network information
that can be used by several applications. The service provider can make
available the radio access network (RAN) to the Edge users by opening access
to new applications and services. Edge computing enables several new services
for enterprises and consumers. The use cases of Edge computing are location
services, augmented reality, video analytics, and data caching. Thus, these new
Edge computing standards and deployment of Edge platforms become key
enablers for new revenue streams to vendors, third-parties, and operators.
Page
31
Edge computing is limited. Lastly, Edge hardware possesses limited
capabilities that make it less scalable than the Cloud.
HPC at the Edge for medical imaging merges HPC/AI and medical sensing
technology in order to provide precision medicine through the use of real-time
advanced monitoring and analysis of a patient’s medical data to detect early
pathologies while lowering the risk of privacy breaches by keeping the data on
site. This granular, yet massive amount of patient data can be analyzed at the
Edge, transformed, and then only pertinent data is sent to the cloud such as
alerts or data stripped of information that could lead to the patient’s privacy
being compromised. Medical Imaging at the Edge using HPC/AI removes the
latency and dependence on Cloud Computing resources, as well as reduces the
patient’s digital footprint by limiting how many systems have access to data.
AI used in medical imaging provides tools that augment the clinician’s
intelligence in a way where they are able to provide better care at reduced
costs. the digital development in healthcare and how Edge Computing is being
used in healthcare.
Page
32
5.2.2 SMART CITY
In the future cities will have sensors that will collect various data, for
example, in transportation, medical health, and urban security. Moreover,
urbanization is rapidly increasing. According to the UN, it is estimated that, by
2050, over 6 billion people will be living in the cities [57]. In the future, to
have sustainable development in the town, a smart city is an excellent solution.
This might help to solve the problems that may arise in food supply, medical
care, transportation, culture and entertainment in the cities. These sensors will
usually generate a large volume of data, and this data should be processed
quickly. Sending these data to the cloud will need faster data movement
(latency and data traffic in the network), and privacy. Therefore, these
generated data should be processed closer to where it is produced. In general,
Edge devices have limited computing and storage, so it is also necessary to
integrate multiple computing models. A few cases of Edge Computing used in
a smart city are listed below.
Page
33
Examples:
Case 1: Closed-Circuit Televisions CCTV are nowadays typically installed in
almost all private and government premises. These CCTVs will capture the
movements of the objects. This will ensure the safety protocol in the given
premises. For this reason, the data collected by the CCTVs should be
processed quickly. To enable this, CCTVs should be connected to the Edge
device through the LAN connection. Edge devices can also use the latest
technology called special image processing chip to process videos more
efficiently [58]. Figure 15 shows an example of a smart city.
Electricity is one of the primary sources for humans to conduct most of the
activities in daily life. In recent years, special emphasis has been placed on
how electricity is produced and distributed to facilitate better economic,
technical, and environmental reports. In particular, 28 how it is generated,
distributed, and controlled, and monitored through digital instruments. The
Page
34
smart grid is a term that refers to how the whole electricity production and
distribution are controlled by the smart digital instruments (for example,
sensors) and embedded systems. Figure 16 shows an example of Edge
Computing in the smart grid. Over the past years, surveillance security has
been playing an important role in our daily life, for example, ATM centre.
Most of the surveillance security is based on the visual feed, where this feed
needs to be analysed quickly using AI/ML/DL for better security reasons
without taking much time with accuracy. And also, sometimes, there is some
high risk of data being manipulated or leaked over the network. The following
cases show how Edge Computing will improve or tackle this problem
Page
35
CHAPTER 6
PROJECT HOSTING A WEBSITE
A website can be either static containing client-side technologies such as
HTML, JavaScript and CSS, or dynamic using server-side scripts such as PHP,
ASP or node.js. If you plan on relying on Google Cloud website hosting for
dynamic websites that require server-side rendering technologies, you can
check between the multiple options available which one is better suited for
your case and taken into consideration different complexity factors such as
scalability, storage, load balancing, etc. However, if your website is purely
static and rendered in the client side, you should definitely consider how
object-based Google Cloud Storage can serve your needs. In this post, we’ll
show you how to do that step by step.
For the first stage of Google Cloud website hosting, start by creating an HTML
file (our website) using our preferred IDE or text editor, and save it in our
workstation with “index.html” as the file name, the default filename for web
server directory index.
To use the Google Cloud Web Hosting feature for your static content, we start
by creating a new Google Cloud Storage bucket. If you have never created a
GCS bucket, you can read about how to create a Google Cloud Storage bucket
and how to manage its lifecycle. While the usual creation procedure applies
and is essential the same, there is one important twist that you need to be
aware if you are planning to use a custom domain name with your Google
Cloud static website. The bucket name will need to match your domain name,
i.e., if your domain name is www.example.com, the Google Cloud Storage
bucket will also need to be called www.example.com. Creating a bucket
named after a custom domain requires verification prior to start the bucket
creation process. If you want to use a custom domain and follow that route,
you will also need to create a CNAME DNS record pointing to
c.storage.googleapis.com
1. With your newly bucket created, upload to Google Cloud Storage the
website static content, i.e., the index.html file.
Page
36
2. As expected, the permissions of the uploaded file will be defined as Not
Public by default. To enable the hosting of web content, the bucket & files
permissions will need to be changed to public
Page
37
4. Enable the public access of content by clicking “Add Member” and add a
new member named “all Users” with the role “Storage Object Viewer.”
Take the changes into effect by clicking “Save.”
Page
38
Page
39
CONCLUSION
Page
40
FUTURE SCOPE OF CLOUD COMPUTING
Over the past few years, the future of cloud computing has changed
drastically. Today, the world is strongly connected with one another, with
the help of digital technologies. This is one of the primary reasons why the
scope of cloud computing changed. The number of jobs, technologies, and
research investments required to ascertain the cloud computing future
scope, has also increased. This is why we come across many impressive
trends in cloud computing.
2. Security
Page
41
References
1) E. Ahmed, A. Akhunzada, M. Whaiduzzaman, A. Gani, S. H. Ab
Hamid, R. Buyya, Network-centric performance analysis of runtime
application migration in mobile cloud computing,Simulation Modelling
Practice and Theory 50 (2015) 42–56.
Page
42
12) Microsoft, Cloud Computing Web Site. Cloud Computing in
Education.http://www.microsoft.com/education/en-
us/solutions/Pages/cloud_computing.aspx
Page
43