IB & IT Notes
IB & IT Notes
Unit 1
Cloud Computing
Cloud Computing means storing and accessing the data
and programs on remote servers that are hosted on the
internet instead of the computer’s hard drive or local server.
Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided
as a service through the Internet to the user. The data that is
stored can be files, images, documents, or any other storable
document.
The following are some of the Operations that can be performed
with Cloud Computing
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audio
PaaS
Platform as a service (PaaS) refers to cloud computing services that
supply an on-demand environment for developing, testing,
delivering, and managing software applications.PaaS is designed to
make it easier for developers to quickly create web or mobile apps,
without worrying about setting up or managing the underlying
infrastructure of servers, storage, network, and databases needed
for development.
SaaS
Software as a service (SaaS) is a method for delivering software
applications over the internet, on demand and typically on a
subscription basis.
With SaaS, cloud providers host and manage the software
application
o Create a new key pair and enter the name of the key pair.
Download the Key pair.
Types of Scalability:
Storage in AWS
2. Containers
OpenStack Swift is used for storing the data that is in the form
of static data or binary objects such as massive data sets this
images media files etc. OpenStack Swift is a distributed storage
solution that makes use of bins for organizing this objects. Only
the volumes contents can be accessed by the instances where
as objects within a container can be accessed by the rest API of
the object storage.
The static nature of this routing technique comes with expected drawbacks, such as
network congestion
Dynamic routing
In dynamic routing, routers create and update routing tables at runtime based on actual
network conditions. They attempt to find the fastest path from the source to the
destination by using a dynamic routing protocol, which is a set of rules that create,
maintain, and update the dynamic routing table.
Hop counts, or the number of routers between the source and the destination
Delay, or the time taken to send the data from the source to the destination
Bandwidth, or the link capacity between the source and the destination
The Open Shortest Path First protocol (OSPF) collects information from all other routers
in the autonomous system to identify the shortest and fastest route to a data packet’s
destination.
BGP defines communication over the internet. The internet is a large collection of
autonomous systems all connected together. Every autonomous system has
autonomous system number (ASN) that it obtains by registering with the Internet
Assigned Numbers Authority.
The Distance Vector Routing algorithm requires all routers to periodically update each
other about the best path information they have found. Each router sends information
about the current assessment of the total cost to all known destinations.
Eventually, every router in the network discovers the best path information for all possible
destinations.
In Link State Routing, every router discovers all other routers in the network. Using this
information, a router creates a map of the complete network and then calculates the
shortest path for any data packet.
1. Authentication
This process actively verifies the identity of employees or users by
requesting their unique identifiers and necessary credentials to
prove the authenticity of each user. This can include usernames,
emails, passwords, biometric features like fingerprint or facial
recognition, and electronic access like swipe cards, smartcards,
RFID, etc.
2. Authorization
This is the act of granting access to tools and resources. While the
above (authentication) confirms the user’s identity, authorization
creates the boundary and jurisdiction where the user can
operate. The authorization framework actively distinguishes User A’s
access from User B’s. This framework controls role-based access in
the IAM system and is commonly referred to as AuthZ.
3. Administration
The administration is the framework on which other frameworks are
built. It is the sub-system that makes authorization and
authentication possible.This component of the IAM system manages
users’ accounts, groups, permissions, and password policies. It
monitors the creation and modification of users’ accounts.