Cloud Module 5 - Part 1
Cloud Module 5 - Part 1
A M A Z O N WE B S E R V IC E S
1
12/11/2024
A M A Z O N WE B S E R V IC E S
3 4
2
12/11/2024
Some Compute Service: from a pre-existing AMI, log into it once it is booted and running, and
⚫ Amazon machine images install software needed.
⚫ E C 2 instances Using tools, convert the instance into a new image.
⚫ E C 2 environment
⚫ Advanced computer services Once an AMI is created, it is stored in an S3 bucket and making its
5
availability is user’s choice. 6
3
12/11/2024
4
12/11/2024
5
12/11/2024
STORAGE SERVICES
Resource naming
S3 key concepts
Buckets, objects, and attached metadata are made
S3 has been designed to provide a simple storage service accessible through a R E S T interface.
that’s accessible through a Representational State
Transfer(REST) interface.
Therefore, they are represented by uniform resource
The storage is organized in a two-level hierarchy. identifiers (URIs) under the domain s3.amazonaws.com
Stored objects cannot be manipulated like std. files.
Contents are not immediately available to users. Amazon offers three ways of addressing a bucket:
Request will occasionally fail.
⚫ Canonicalform: http://s3.amazonaws.com/bukect_name/
Access to S3 is provided with RESTful Web services. ⚫ Sub domainform : http://bucketname.s3.amazon.com/
These express all the operations that can be ⚫ Virtual hostingform: http://bucket-name.com/
performed on the storage in the form of HT T P
requests(GET, P U T, D E L E T E , H EA D, and POST). 11 12
6
12/11/2024
It can be thought of as a virtual drive hosted on the Users either store files or push to the S3 text stream
7
12/11/2024
objects by means of Access Control Policies (ACPs) persistent storage in the form of volumes that can be
which is a set of grant permissions. mounted at instance startup.
A policy allows defining up to 100 access rules, each of The capacity is upto1 T B of space and are accessed
them granting one of the available permissions to a through a block device interface.
grantee. EBS volumes normally reside within the same
Currently, five different permissions can be used: availability zone of the EC2 instances.
⚫ R EA D allows the grantee to retrieve an object and its It is also possible to connect volumes located in different
metadata and to list the content of a bucket availability zones.
⚫ WR IT E allows the grantee to add an object to bucket as well Once mounted as volumes, their content is lazily loaded
as modify and remove it. in the background and according to the request made by
⚫ R EA D _ AC P allows the grantee to read the A C P of a the operating system.This reduces the number of I/O
resource.
requests that go to the network
⚫ W R I T E _ AC P allows the grantee to modify the A C P resourc15 16
⚫ F U L L _ C O N T R O L grants all the above.
8
12/11/2024
Elasti Cache is an implementation of an elastic in- Amazon provides applications with structured storage
memory cache based on a cluster of EC2 instances. services in three different forms:
It provides fast data access through a Memcached- Preconfigured EC2 AMIs,
9
12/11/2024
COMMUNICATION SERVICES
Amazon CloudFront
Virtual networking comprises a collection of services that
CloudFront is an implementation of a content delivery allow AWS users to control the connectivity to and
network on top of the Amazon distributed storage between compute and storage services.
infrastructure. Amazon Virtual Private Cloud (VPC) and Amazon Direct
It leverages a collection of edge servers strategically Connect - infrastructure solutions and Route 53 - naming.
located around the globe to better serve Amazon V P C provides flexibility in creating virtual private
requests for static and streaming Web networks within the Amazon infrastructure.
content so that the transfer time is reduced. The service provides prepared templates for network service
AW S provides users with simple Web service APIs to for advanced configurations. Templates include public
manage CloudFront subnets, isolated networks, private networks accessing
Internet through NAT and hybrid networks.
The content that can be delivered through CloudFront is
static (HTTP and HTTPS) or streaming (Real Time Amazon Direct Connect allows AWS users to create dedicated
networks between the user private network and Amazon
Messaging Protocol, or RMTP).
Direct Connect locations, called ports.
19 22
Route 53 implements dynamic D N S services.
10
12/11/2024
MESSAGING ADDITIONAL S E R V I C E S
The three different types of messaging services offered A collection of additional services are provided and
are particularly relevant are
Amazon Simple Queue Service ( SQS) – disconnected
model for exchanging messages through message Amazon cloudwatch – provides a comprehensive set of
queues. statistics to help developers to understand and optimize
the behavior of their application.
Amazon Simple Notification Service(SNS) – publish-
subscribe method for connecting heterogeneous Flexible payment service (FPS) – billing infrastructure
applications to set goods and services, it includes one-time payment,
delayed, periodic payment based on subscription, usage
Amazon Simple Email Service(SES) – scalable email and transaction.
service
21 22
11
12/11/2024
12
12/11/2024
13
12/11/2024
14
12/11/2024
Image manipulation
15
12/11/2024
UrlFetch - The sandbox environment provide developers Mail and instant messaging –
with the capability of retrieving a remote resource It is common to use email for folowing up with users
through HTTP/HTTPS by means of the UrlFetch service
about operations performed by the application.
Ability to set deadlines for requests so that they can be
AppEngine provides developers with the ability to
completed (or aborted) within a given time.
send and receive mails through Mail. It is also
UrlFetch is also used to leverage remote Web services in
possible to include several types of attachments.
accordance with the S OA reference model for distributed
applications. Mail operates asynchronously, and in case of failed
delivery the sending address is notified through an
MemCache - Caching service by means of MemCache, is
email detailing the error.
a distributed in-memory cache that is optimized for fast AppEngine provides also another way to communicate
access and provides developers with a volatile store for with the external world: the Extensible Messaging
the objects that are frequently accessed. and Presence Protocol (XMPP).
The caching algorithm implemented by MemCache will Any chat service that supports X M P P, such as Google
automatically remove the objects that are rarely Talk, can send and receive chat messages to and from34
accessed. The use of MemCache can significantly reduce 33 the Web application.
the access time to data.
16
12/11/2024
Image Manipulation is mostly designed for lightweight operation at the desired time by using the Cron
35 36
image processing and is optimized for speed. J o b s service.
17
12/11/2024
35 36
18
12/11/2024
37
applications within the Azure infrastructure. 38
19
12/11/2024
20
12/11/2024
3.C O R E I N F R A S T R U C T U R E : A P P F A B R I C
B. Azure drive: File system can be stored in the form of a
single Virtual Hard Drive (VHD) file using page blobs. AppFabric is a comprehensive middleware for
This can then be mounted as a part of the N T F S file developing, deploying, and managing applications on
system by Azure compute resources, thus providing the cloud or for integration of existing applications.
persistent and durable storage. AppFabric supports high availability, sandboxing,
multitenancy, state management, dynamic address
resolution and routing.
C . Tables: Tables constitute a semi-structured storage
Offers a collection of services and simplifies distributed
solution, allowing users to store information in the form
applications tasks.
of entities with a collection of properties. Tables are
similar to spreadsheets and handles large data.
Access control: AppFabric provides the capability of
encoding access control to resources in Web applications
D. Q ueues: Allows applications to communicate by and services into a set of rules expressed.
exchanging messages through durable queues. Access control services also integrate several
Applications enter messages into a queue, and other 43
authentication providers into a single coherent identit4y4
applications can read them in a F I F O style. management framework.
21
12/11/2024
22
12/11/2024
23