CC Module 5
CC Module 5
• A popular cloud-based platform for creating videos using images, music, and video
fragments.
• Users upload photos and videos, select themes, and the service’s AI engine
automatically applies animation and transition effects.
• It uses Amazon Web Services (AWS) infrastructure:
➢ EC2 for web front-end and worker nodes.
➢ S3 for storage of media files.
➢ SQS for managing rendering tasks through a queue system.
• It uses auto-scaling capabilities managed by Rightscale to dynamically scale based on
demand.
• Handles up to 4,000 servers during peak times, ensuring scalability and reliability.
• Biology applications require high computational power and often operate on large
datasets.
• Protein structure prediction is a critical task in life sciences, especially for drug
design.
• It involves complex computations to identify the protein structure with minimal
energy, requiring exploration of vast state spaces.
• Cloud computing provides scalable computational power on demand, eliminating the
need for dedicated clusters or bureaucratic processes.
• Jeeva is a project utilizing cloud technology for protein structure prediction, offering a
web portal for scientists.
• The prediction uses machine learning (support vector machines) to classify protein
structures into secondary classes (E, H, C).
• The classification phase leverages parallel execution, significantly reducing
computation time.
• The task is translated into a task graph, submitted to Aneka cloud middleware for
processing.
• Results are made available through the web portal for visualization.
• Cloud advantages include scalability (grow/shrink on demand), pay-per-use pricing,
and ease of offering the service dynamically.
iv) Biology: gene expression data analysis for cancer diagnosis
1.Compute Services
• Core component of cloud systems.
• Amazon EC2 is a key service offering IaaS, enabling deployment of virtual servers
(instances) using images.
• Users can configure instances (e.g., memory, CPU, storage) and access them
remotely.
Amazon Machine Images (AMIs)
• AMIs are templates for creating virtual machines.
• Stored in Amazon S3 with unique identifiers (e.g., ami-xxxxxx).
• Contain OS and predefined file system layouts.
• Can be created from scratch or bundled from existing instances.
• Stored AMIs can be private or shared, with optional product code association for
revenue.
EC2 Instances
• Virtual machines created from AMIs with customizable configurations.
• Compute power is defined using EC2 Compute Units (ECUs), ensuring consistent
performance over hardware upgrades.
• Instance categories include:
o Standard Instances: General-purpose configurations.
o Micro Instances: Low resources, suitable for small applications with
occasional workload surges.
o High-Memory Instances: Large memory for high-traffic web apps.
o High-CPU Instances: Compute-intensive applications.
o Cluster Compute Instances: High CPU, memory, and I/O for HPC.
o Cluster GPU Instances: For graphics-heavy or GPU-compute tasks (e.g.,
rendering clusters).
EC2 Environment
• Provides essential services (e.g., address allocation, storage attachment, security).
• Instances have internal IPs for internal communication and Elastic IPs for external
accessibility.
• Elastic IPs support failover and remapping between instances.
• EC2 instances have domain names based on IP and availability zone.
Advanced Compute Services
• AWS CloudFormation:
o Facilitates complex deployments using JSON templates to define resource
dependencies.
o Integrates EC2 with other AWS services like S3, Route 53, etc.
• AWS Elastic Beanstalk:
o Simplifies deployment and management of web applications.
o Automates provisioning while allowing control over underlying EC2
infrastructure.
o Focuses on application deployment, unlike CloudFormation, which handles
infrastructure setup.
• Amazon Elastic MapReduce (EMR):
o Cloud platform for running Hadoop-based MapReduce applications.
o Utilizes EC2 for computing and S3 for storage.
o Supports tools like Pig and Hive, and provides elasticity for cluster
management.
2. Storage Services
• Amazon S3 (Simple Storage Service):
o Object-based storage system with components like buckets (containers) and
objects (stored data).
o Supports REST APIs for operations like PUT, GET, and DELETE.
o Features include metadata tagging, access control policies (ACPs), and
advanced features like logging and BitTorrent integration.
o Immutability and eventual consistency for stored objects.
• Amazon EBS (Elastic Block Store):
o Block storage for EC2 instances with persistent data storage.
o Provides features like snapshots, cloning, resizing, and cross-zone
connectivity.
o Pricing based on allocated storage and I/O requests.
• Amazon Glacier:
o Low-cost archival storage for infrequent data access.
o Retrieval modes: Expedited, Standard, and Bulk, with varying speeds and
costs.
• Amazon ElastiCache:
o In-memory caching service compatible with Memcached for fast data access.
o Offers dynamic cluster resizing, automation, and compatibility with EC2
instances.
• Structured Storage Services:
o Preconfigured EC2 AMIs: Custom DBMS configurations like MySQL,
Oracle, and PostgreSQL.
o Amazon RDS: Managed relational database with features like backups, Multi-
AZ deployment, and read replicas.
o Amazon SimpleDB: Semi-structured data storage with flexible querying and
eventual consistency.
• Amazon CloudFront:
o Content Delivery Network (CDN) for global distribution of static and
streaming content.
o Uses globally distributed edge servers for low-latency delivery.
o Supports protocol-based restrictions and content invalidation.
3. Communication Services
• Amazon VPC (Virtual Private Cloud):
o Enables the creation of isolated virtual networks within AWS.
o Supports public, private, or hybrid networking setups.
• Amazon Direct Connect:
o Provides dedicated, high-bandwidth connectivity between on-premises systems
and AWS.
• Amazon Route 53:
o Dynamic DNS service to map domain names to AWS resources with high
reliability.
o Supports hosted zones and query management.
• Messaging Services:
o Amazon SQS (Simple Queue Service): For decoupling application
communication via message queues.
o Amazon SNS (Simple Notification Service): Publish-subscribe system for real-
time notifications.
o Amazon SES (Simple Email Service): Scalable email service for reliable email
delivery.
4. Additional Services
• Amazon CloudWatch:
o Monitoring service providing performance statistics for AWS resources.
o Assists in application optimization and cost management.
• Amazon FPS (Flexible Payment Service):
o Payment infrastructure for selling goods and services, supporting one-time,
periodic, and aggregated payments.
• EC2 instances run in a virtual environment that allocates resources like addresses,
storage, and security settings for hosting applications.
• By default, EC2 instances are assigned internal IP addresses, enabling communication
within the EC2 network and allowing them to access the Internet as clients.
• Instances can be associated with an Elastic IP (EIP). EIPs are static IP addresses that
can be remapped to different instances, enabling high availability and failover
capabilities.
• Each EC2 instance receives an external IP address and a domain name, typically in
the format ec2-xxx.xxx.xxx.compute-x.amazonaws.com, where the domain name
includes the instance's external IP and availability zone information.
• EC2 instances can be deployed in different availability zones, with options in regions
like the United States (Virginia, Northern California), Europe (Ireland), and Asia
Pacific (Singapore, Tokyo). Pricing may vary by zone.
• Instance owners can control where to deploy instances and configure the security of
the instances, ensuring access and network availability according to their needs.
• A key pair (public and private keys) can be associated with an instance during
creation. This allows the owner to securely connect to the instance and access it with
root privileges.
• EC2 uses a basic firewall configuration to control accessibility. Security groups,
which can be attached to instances, allow specifying rules for source addresses, ports,
and protocols (TCP, UDP, ICMP). Instances can be part of multiple security groups.
• While security groups manage external access, internal security configurations within
the instance itself are also essential for comprehensive protection.