0% found this document useful (0 votes)
8 views17 pages

Cloud Computing Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views17 pages

Cloud Computing Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

L.

Guna Vardhan Reddy


2211CS010324

Cloud Computing Assignment-1


1) Explain AWS and Azure
Ans.

Aws:
 AWS stands for Amazon Web Services.
 The AWS service is provided by the Amazon that uses distributed IT infrastructure to
provide different IT resources available on demand. It provides different services such as
infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as
a service (SaaS).
 Amazon launched AWS, a cloud computing platform to allow the different organizations
to take advantage of reliable IT infrastructure.
Uses of AWS
 A small manufacturing organization uses their expertise to expand their business by
leaving their IT management to the AWS.
 A large enterprise spread across the globe can utilize the AWS to deliver the training to
the distributed workforce.
 An architecture consulting company can use AWS to get the high-compute rendering of
construction prototype.
 A media company can use the AWS to provide different types of content such as ebox or
audio files to the worldwide files
Advantages of AWS
1) Flexibility
 We can get more time for core business tasks due to the instant availability of new
features and services in AWS.
 It provides effortless hosting of legacy applications. AWS does not require learning new
technologies and migration of applications to the AWS provides the advanced computing
and efficient storage.
2) Cost-effectiveness
AWS requires no upfront investment, long-term commitment, and minimum expense when
compared to traditional IT infrastructure that requires a huge investment.
3) Scalability/Elasticity
Through AWS, autoscaling and elastic load balancing techniques are automatically scaled up
or down, when demand increases or decreases respectively. AWS techniques are ideal
for handling unpredictable or very high loads. Due to this reason, organizations enjoy the
benefits of reduced cost and increased user satisfaction.
4) Security
 AWS provides end-to-end security and privacy to customers.
 AWS has a virtual infrastructure that offers optimum availability while managing full
privacy and isolation of their operations.
 Customers can expect high-level of physical security because of Amazon's several years
of experience in designing, developing and maintaining large-scale IT operation centers.
L.Guna Vardhan Reddy
2211CS010324

 AWS ensures the three aspects of security, i.e., Confidentiality, integrity, and availability
of user's data.

Azure:
Microsoft Azure is a cloud computing platform that provides a wide variety of services that
we can use without purchasing and arranging our hardware. It enables the fast
development of solutions and provides the resources to complete tasks that may not be
achievable in an on-premises environment. Azure Services like compute, storage,
network, and application services allow us to put our effort into building great solutions
without worrying about the assembly of physical infrastructure.
Microsoft Azure is a growing set of cloud computing services created by Microsoft that hosts
your existing applications, streamline the development of a new application, and also
enhances our on-premises applications. It helps the organizations in building, testing,
deploying, and managing applications and services through Microsoft-managed data
centers.
Azure Services
 Compute services: It includes the Microsoft Azure Cloud Services, Azure Virtual
Machines, Azure Website, and Azure Mobile Services, which processes the data on the
cloud with the help of powerful processors.
 Data services: This service is used to store data over the cloud that can be scaled
according to the requirements. It includes Microsoft Azure Storage (Blob, Queue Table,
and Azure File services), Azure SQL Database, and the Redis Cache.
 Application services: It includes services, which help us to build and operate our
application, like the Azure Active Directory, Service Bus for connecting distributed
systems, HDInsight for processing big data, the Azure Scheduler, and the Azure Media
Services.
 Network services: It helps you to connect with the cloud and on-premises infrastructure,
which includes Virtual Networks, Azure Content Delivery Network, and the Azure
Traffic Manager.
Key Features:
 Compute Services: Virtual Machines, Azure Functions
 Storage: Blob Storage, Azure Files
 Databases: SQL Database, Cosmos DB (global NoSQL database)
 Networking: Azure Virtual Network, Azure Front Door
 Security: Azure Active Directory, Security Center
 AI/ML: Azure Machine Learning, Cognitive Services
Hybrid Cloud: Azure Arc, Azure Stack (for on-premises integration)

2. Key components of AWS & AZURE


Ans
L.Guna Vardhan Reddy
2211CS010324

Here are some key components of AWS (Amazon Web Services) and Azure (Microsoft
Azure):

 AWS key components:

1. Compute Services: Amazon Elastic Compute Cloud (EC2), AWS Lambda


2. Storage Services: Amazon Simple Storage Service (S3), Amazon Elastic Block Store
(EBS)
3. Database Services: Amazon Relational Database Service (RDS), Amazon DynamoDB
4. Networking Services: Amazon Virtual Private Cloud (VPC), Amazon Route 53
5. Management Tools: AWS Management Console, AWS CloudFormation

 Azure key components:

1. Compute Services: Azure Virtual Machines, Azure Functions


2. Storage Services: Azure Blob Storage, Azure File Storage
3. Database Services: Azure SQL Database, Azure Cosmos DB
4. Networking Services: Azure Virtual Network, Azure Load Balancer
5. Management Tools: Azure Portal, Azure Resource Manager

Both AWS and Azure offer a wide range of services beyond these key components, catering
to different needs for cloud computing, storage, databases, networking, security, and
more. The choice between AWS and Azure often depends on specific requirements,
expertise, and preferences of the users or organizations.

3. What is IAM user and root user?

A. Root User:

1.Definition:

o The Root User is the account created when you first set up your AWS account.

o It has full administrative access to all resources and services in the account.

2.Key Features:

o The root user is tied to the email address and password used during account creation.

o It has unrestricted access, including tasks like:

 Changing billing settings.


L.Guna Vardhan Reddy
2211CS010324

 Deleting the account.

 Modifying root-level permissions.

o Cannot be deleted or disabled but can be secured.

3.Best Practices:

o Use the root user only for initial setup or critical account-level tasks.

o Enable Multi-Factor Authentication (MFA) for the root user.

o Avoid sharing root user credentials.

o Create and use IAM users for everyday tasks.

IAM User:

1.Definition:

o An IAM User (Identity and Access Management User) is a user created under an AWS
account to represent a person or application that interacts with AWS resources.

o Each IAM user has specific permissions defined by policies.

2.Key Features:

o IAM users have unique credentials (username, password, access keys).

o Permissions are assigned using IAM policies.

o Can be used for individual access, ensuring fine-grained control and accountability.

3.Benefits:

o Granular control over access to AWS resources.

o Better security by delegating specific permissions rather than using the root user.

o Separate credentials for multiple users or applications.

4.Example Use Cases:


L.Guna Vardhan Reddy
2211CS010324

o A developer needing access to specific AWS services (e.g., EC2, S3).

o An application requiring programmatic access using access keys

4. Explain instance in AWS and its types


Ans:
An instance in AWS refers to a virtual server running on Amazon EC2 (Elastic Compute
Cloud). It acts as a resizable computing environment where users can run applications,
host websites, and perform data processing. AWS instances can scale up or down based
on demand.
Types of Instances in AWS (EC2):
AWS offers different types of instances to handle various workloads. These instances are
categorized based on CPU, memory, storage, and networking capabilities.
1. General Purpose Instances
 Balanced resources (CPU, memory, and networking).
 Ideal for web servers, application servers, and small databases.
 Examples: t4g, t3, t2: Burstable performance (cost-effective).
2. Compute Optimized Instances
 High-performance processors for compute-heavy tasks.
 Best for batch processing, scientific modeling, and game servers.
 Examples: c6g, c5, c4: High CPU, lower memory.
3. Memory Optimized Instances
 Designed for memory-intensive workloads (large databases, analytics).
 Ideal for in-memory databases like Redis, and real-time big data processing.
o Examples: z1d: High memory with strong CPU performance.
4. Storage Optimized Instances
 High disk throughput for large-scale data processing and analytics.
 Best for NoSQL databases, data warehousing, and high-speed storage needs.
o Examples:d2, d3: Dense storage, suitable for data lakes.
5. Accelerated Computing Instances
 Use GPU or FPGA for graphics processing, AI, and machine learning.
 Best for deep learning, video rendering, and simulations.
L.Guna Vardhan Reddy
2211CS010324

 Examples:f1: FPGA for custom hardware acceleration.


6. High-Performance Computing (HPC) Instances
 Designed for scientific computing, modeling, and simulations.
 High network performance and enhanced CPU.
 Examples: hpc6id, hpc6a: High compute and networking performance.

By selecting the appropriate instance type based on your application's requirements, you can
optimize performance, cost, and scalability in the AWS cloud environment.
5.explain AMI
Ans:
"AMI" can stand for various things depending on the context.
An Amazon Machine Image is a special type of virtual appliance that is used to instantiate
(create) a virtual machine within EC2. It serves as the basic unit of deployment for
services delivered using EC2. Whenever you want to launch an instance, you need to
specify AMI. To launch instances, you can also use different AMIs. If you want to
launch multiple instances from a single AMI, then you need multiple instances of the
same configuration.

Properties of AMI
L.Guna Vardhan Reddy
2211CS010324

 A template for the root volume for the instance (for example, an operating system, an
application server, and applications)
 Launch permissions that control which AWS accounts can use the AMI to launch
instances.
 A block device mapping that specifies the volumes to attach to the instance when it’s
launched
Here are a few common meanings:

1. Amazon Machine Image (AMI): In the context of cloud computing, an AMI is a


template that contains the software configuration (operating system, application server,
and applications) required to launch an instance in the cloud. It's a packaged environment
that allows you to easily launch virtual servers.
2. Associate Member of the Institution of Engineers (India) (AMIIE): This is a
professional certification awarded in India by the Institution of Engineers (India) to
candidates who meet the required qualifications and pass the necessary examinations.
3. African Minds Initiative (AMI): This is a non-profit organization focused on
empowering young Africans through education, mentorship, and leadership
development.

7. Relationship Between An Instance And AMI?


Ans:

The relationship between an Instance and an AMI (Amazon Machine Image) in AWS is
foundational to how EC2 instances are created and deployed. Here's how they are
connected:

AMI is the Blueprint, Instance is the Running Machine

1. AMI as the Blueprint:

o An AMI serves as the template or blueprint for launching an EC2 instance.

o It contains all the information required to start a virtual server:

 Operating system (e.g., Ubuntu, Windows).

 Pre-installed software or applications.

 Configuration settings.

2. Instance as the Deployed Machine:

o An EC2 instance is the realized version of an AMI.

o When you launch an instance, you choose an AMI to use as the starting point for that
instance.
L.Guna Vardhan Reddy
2211CS010324

o The instance inherits all the configurations and software defined in the AMI.

Steps in the Relationship:

1. Create/Choose an AMI:

o Select an existing AMI (e.g., AWS-provided, custom, or from the Marketplace).

o Alternatively, create a custom AMI by configuring an EC2 instance and then saving it as
a new AMI.

2. Launch an Instance:

o Use the AMI to launch one or more EC2 instances.

o You can specify instance-specific settings (e.g., instance type, networking, security
group) during this process.

3. Instance Runtime:

o Once launched, the instance is independent of the AMI. You can modify it (e.g., install
new software, change configurations) without affecting the original AMI.

4. Create New AMI from Instance:

o If you want to preserve changes made to an instance, you can create a new AMI from it.

o This AMI can be used to launch additional instances with the updated configurations.
L.Guna Vardhan Reddy
2211CS010324

8.difference between amazon S3 and EC2 is?


Amazon S3 (Simple Storage Service) and EC2 (Elastic Compute Cloud) are two core
services offered by Amazon Web Services (AWS) but serve different purposes:

1. Amazon S3 (Simple Storage Service):

 Amazon S3 is a scalable storage service primarily designed for storing and retrieving
data.
 It is ideal for storing large amounts of data, such as images, videos, backups, logs, and
other types of files.
 S3 provides high durability, availability, and low latency for accessing stored data.
 It is commonly used for data backup, static website hosting, data archiving, and content
distribution.

2. Amazon EC2 (Elastic Compute Cloud):

 Amazon EC2 is a web service that provides resizable compute capacity in the cloud.
L.Guna Vardhan Reddy
2211CS010324

 EC2 allows users to create virtual servers called instances to run applications and
services.
 Users can choose instance types with different CPU, memory, storage, and networking
capabilities to meet their specific requirements.
 EC2 is often used for web hosting, application development, data processing, and
running various workloads in a scalable manner.

Amazon S3 is primarily for storage, while Amazon EC2 is for computing power in the cloud.
They can be used together to build scalable and resilient applications on the AWS
platform.

9.What Are Key Pairs In Aws?


Ans:
A key pair in AWS consists of two cryptographic keys: a public key and a private
key.These keys are used for securely accessing Amazon EC2 instances. AWS uses key
pairs to enable SSH (Secure Shell) or RDP (Remote Desktop Protocol) access to
instances without requiring a password.
Components of a Key Pair

1. Public Key:

o Stored in AWS and associated with an EC2 instance.

o Used to encrypt data sent to the instance.

2. Private Key:

o Downloaded and stored securely by the user on their local system.

o Used to decrypt data and establish secure communication with the instance.

Key Pairs Working:

1. Creating a Key Pair:

o A key pair is created in AWS (via the Management Console, AWS CLI, or API).

o The private key is downloaded by the user at the time of creation. AWS does not store
the private key.

2. Assigning the Key Pair:

o When launching an EC2 instance, you specify the key pair to associate with the instance.
L.Guna Vardhan Reddy
2211CS010324

o AWS stores the public key on the instance in the ~/.ssh/authorized_keys file of the
default user (e.g., ec2-user for Amazon Linux).

3. Accessing the Instance:

o The user connects to the instance using the private key and an SSH client (for Linux
instances) or RDP client (for Windows instances).

o The private key validates the user by matching the stored public key, enabling secure
access.

Key Features and Benefits:

1. Secure Access:

o Eliminates the need for passwords, reducing vulnerability to brute-force attacks.

o Ensures secure and encrypted communication between the user and the EC2 instance.

2. Ease of Use:

o Once set up, logging in is straightforward using SSH or RDP.

3. Key Pair Management:

o Multiple key pairs can be created for different users or projects.

o Key pairs can be deleted or rotated for security.

10. What is an EIP?

An Elastic IP Address (EIP) in AWS is a static, public IPv4 address designed to enable
consistent and persistent access to your resources, such as Amazon EC2 instances, over the
L.Guna Vardhan Reddy
2211CS010324

internet. Unlike a standard public IP address, an EIP remains associated with your AWS
account and can be dynamically remapped to different resources within the same region.

Key Features of an Elastic IP Address (EIP)

1. Static and Persistent:

 Unlike public IPs that may change when an instance is stopped and restarted, an
EIP remains constant.
 Ideal for applications or services that require a consistent public IP.

2. Flexibility:

 Can be re-associated from one instance to another within the same region without
downtime.
 Enables quick recovery in case of instance failure.
3. Controlled Allocation:
 EIPs are allocated to your AWS account, and you control when and where they are
associated.

4. Chargeable Resource:

 EIPs are free when associated with a running instance.


 AWS charges a small fee for any EIP that is allocated but not associated with an
active resource to encourage efficient usage.

Use Cases

 Failover and Recovery:

 Quickly remap an EIP to a backup instance if the primary instance


fails.

 Consistent IP for Applications:

 Use a fixed IP for DNS records or external-facing applications.


L.Guna Vardhan Reddy
2211CS010324

 Testing and Staging:

 Assign a consistent IP for testing environments that require public


access.

How to Use an EIP

1. Allocate an EIP:

 Use the AWS Management Console, CLI, or SDK to allocate an


Elastic IP.

2. Associate the EIP:

 Attach the EIP to an EC2 instance or network interface.

3. Reassociate as Needed:

 Detach and reattach the EIP to different resources within the same
region for flexibility.

4. Release the EIP:

 If no longer needed, release the EIP to avoid unnecessary charges.

Key Considerations

1. Regional Scope:

 EIPs are region-specific and cannot be transferred across regions.

2. Availability:

 Limited to five EIPs per AWS account per region by default (limit can
be increased upon request).

3. Cost Management:
L.Guna Vardhan Reddy
2211CS010324

 AWS charges for unused EIPs to encourage efficient allocation and


usage.

11. what are the key benefits of adopting cloud computing and how does microsoft
azure address these benefits?
Ans
The key benefits of adopting cloud computing include scalability, cost-efficiency, flexibility,
security, and accessibility. Microsoft Azure, as a leading cloud computing platform,
addresses these benefits in the following ways:

1. Scalability: Azure offers the ability to scale resources up or down based on demand,
allowing businesses to adjust their computing power and storage easily.
2. Cost-efficiency: Azure provides a pay-as-you-go model, where you only pay for the
resources you use, reducing the need for upfront investments in hardware and
infrastructure.
3. Flexibility: With Azure, organizations have the flexibility to choose from a wide
range of services and tools to meet their specific needs, whether it's developing
applications, storing data, or running virtual machines.
4. Security: Azure incorporates robust security measures to protect data, applications,
and infrastructure. It offers compliance certifications and features like encryption,
identity management, and threat detection.
5. Accessibility: Azure enables access to resources from anywhere with an internet
connection, promoting collaboration among teams and allowing for remote work
capabilities.

By leveraging Microsoft Azure, businesses can harness these benefits to improve their
operations, enhance performance, and drive innovation in a secure and cost-effective manner.
Microsoft Azure is a cloud computing platform that addresses various benefits by offering a
range of services and features.

Here's how Microsoft Azure addresses some key benefits:

1. Scalability:

 Azure allows users to scale resources up or down based on demand, ensuring


that they have the capacity they need when they need it.
 Azure's flexible pricing and pay-as-you-go model enable businesses to scale
their resources cost-effectively.
L.Guna Vardhan Reddy
2211CS010324

2. Flexibility:

 Azure provides a wide range of services, including virtual machines,


databases, analytics, AI, and IoT, giving users the flexibility to choose the
services that best fit their needs.
 Azure supports multiple programming languages, frameworks, and operating
systems, allowing for flexibility in development and deployment.

3. Reliability:

 Azure offers a global network of data centers that provide high availability and
redundancy, ensuring that services remain operational even in the event of
failures.
 Azure's SLAs guarantee a certain level of uptime and performance, giving
users confidence in the reliability of the platform.

4. Security:

 Azure has built-in security features such as network security groups,


encryption, identity management, and threat detection to protect data and
applications.
 Azure complies with industry standards and regulations, providing a secure
environment for sensitive workloads.

5. Cost-effectiveness:

 Azure's pay-as-you-go pricing model allows users to pay only for the
resources they use, reducing upfront costs and providing cost-effectiveness.
 Azure offers cost management tools and options like reserved instances and
hybrid benefits to optimize costs.

12.Explain the role of the azure resource manager ARM in managing resources in
azure?

Ans
Azure Resource Manager (ARM) in Azure plays a crucial role in managing cloud resources
efficiently. Here is an explanation of its role in managing resources in Azure:

1. Resource Organization: ARM helps to organize and manage Azure resources as a


group, known as a resource group. This makes it easier to manage, monitor, and
secure related resources together.
2. Deployment and Automation: ARM allows for the deployment and management of
templates that define the infrastructure and configuration of Azure resources. This
enables automated resource deployment and consistency across environments.
3. Role-Based Access Control: ARM provides a granular level of access control
through Azure Role-Based Access Control (RBAC). This allows defining who can
access and manage Azure resources at different levels within the organization.
L.Guna Vardhan Reddy
2211CS010324

4. Resource Tagging and Metadata: ARM supports resource tagging, which helps in
logically organizing and categorizing resources. Tags can be used for billing,
monitoring, and managing resources effectively.
5. Lifecycle Management: ARM helps in managing the lifecycle of Azure resources,
enabling actions such as creation, updating, deletion, and tracking changes to
resources over time.
6. Monitoring and Alerts: ARM integrates with Azure Monitor to provide monitoring
capabilities for resources, enabling users to set up alerts based on resource metrics and
take proactive actions based on defined conditions.
7. Resource Dependencies: ARM manages dependencies between resources, ensuring
that resources are deployed and managed in the correct order to maintain consistency
and avoid configuration issues.
8. Resource Locks: ARM allows applying locks at different levels to prevent accidental
deletion or modification of critical resources, ensuring operational safety and
compliance.

By effectively utilizing Azure Resource Manager, organizations can streamline resource


management, improve operational efficiency, enhance security, and ensure cost optimization
in their Azure environments.

13.what is the difference between the general purpose vm and computer optimised vm?

Ans
The difference between a general-purpose VM and a computer-optimized VM lies in their
intended use and performance characteristics:

1. General-Purpose VM:
o Usage: Designed for versatile workloads like web servers, development
environments, small databases, and applications that don't require highly
specialized hardware.
o Performance: Offers a balance of CPU, memory, storage, and networking
resources suitable for a wide range of tasks.
o Cost: Typically more cost-effective than specialized VMs due to their
flexibility.
2. Compute-Optimized VM:
o Usage: Tailored for compute-intensive tasks that require high computational
power like scientific modeling, high-performance computing (HPC), and data
analytics.
L.Guna Vardhan Reddy
2211CS010324

o Performance: Emphasizes powerful CPUs with high clock speeds and ample
memory to handle demanding workloads efficiently.
o Cost: Can be more expensive than general-purpose VMs due to the
specialized hardware configuration.

In essence, if your workload requires intensive computational tasks, a compute-optimized


VM would likely provide better performance, whereas a general-purpose VM offers
flexibility for a variety of tasks without the need for specialized hardware.

You might also like