0% found this document useful (0 votes)
17 views

IB & IT Notes

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

IB & IT Notes

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

IT & IB

Unit 1
Cloud Computing
 Cloud Computing means storing and accessing the data
and programs on remote servers that are hosted on the
internet instead of the computer’s hard drive or local server.
 Cloud computing is also referred to as Internet-based
computing, it is a technology where the resource is provided
as a service through the Internet to the user. The data that is
stored can be files, images, documents, or any other storable
document.
The following are some of the Operations that can be performed
with Cloud Computing
 Storage, backup, and recovery of data
 Delivery of software on demand
 Development of new applications and services
 Streaming videos and audio

History of Cloud Computing


 Before emerging the cloud computing, there was Client/Server
computing which is basically a centralized storage in which all
the software applications, all the data and all the controls are
resided on the server side.
 If a single user wants to access specific data or run a program,
he/she need to connect to the server and then gain appropriate
access, and then he/she can do his/her business.
 Then after, distributed computing came into picture cloud
computing concept emerged
 In 2002, Amazon started Amazon Web Services, providing
services like storage, computation and even human intelligence.
 n 2009, Google Apps also started to provide cloud computing
enterprise applications.

Types of cloud computing


Public cloud
Public clouds are owned and operated by third-party cloud service
providers, which deliver computing resources like servers and
storage over the internet. Microsoft Azure is an example of a public
cloud.
Private cloud
A private cloud refers to cloud computing resources used exclusively
by a single business or organization. A private cloud can be
physically located on the company’s onsite datacenter.
Hybrid cloud
Hybrid clouds combine public and private clouds, bound together by
technology that allows data and applications to be shared between
them.By allowing data and applications to move between private
and public cloud
Types of cloud services:
IaaS
With infrastructure as a service (IaaS), you rent IT
infrastructure—servers and virtual machines (VMs), storage,
networks, operating systems—from a cloud provider on a
pay-as-you-go basis.

PaaS
Platform as a service (PaaS) refers to cloud computing services that
supply an on-demand environment for developing, testing,
delivering, and managing software applications.PaaS is designed to
make it easier for developers to quickly create web or mobile apps,
without worrying about setting up or managing the underlying
infrastructure of servers, storage, network, and databases needed
for development.
SaaS
Software as a service (SaaS) is a method for delivering software
applications over the internet, on demand and typically on a
subscription basis.
With SaaS, cloud providers host and manage the software
application

Introduction to Amazon Web


Services
 AWS stands for Amazon Web Services, It is an
expanded cloud computing platform provided by Amazon
Company.
 AWS provides a wide range of services with a pay-as-per-
use pricing model over the Internet such as Storage,
Computing power, Databases, Machine Learning services,
and much more.
 AWS facilitates for both businesses and individual users with
effectively hosting the applications, storing the data
securely, and making use of a wide variety of tools and
services improving management flexibility for IT resources.

Creating an instance in AWS


o Sign in to the AWS Management Console.
o Click on the EC2 service.
o Click on the Launch Instance button to create a new
instance.

o Now, we have different Amazon Machine Images. These are


the snapshots of different virtual machines. We will be using
Amazon Linux AMI 2018.03.0 (HVM) as it has built-in tools
such as java, python, ruby, perl, and especially AWS command
line tools.

o Choose an Instance Type, and then click on the Next. Suppose


I choose a t2.micro as an instance type.

o define setup configuration like,Number of


Instances ,Purchasing
Option ,Tenancy ,Network ,Subnet.
o Add Storage configuration Volume Type
o Add the Tags and then click on the Next.
o Configure Security Group.
o Review the instace details

o Create a new key pair and enter the name of the key pair.
Download the Key pair.

o Click on the Launch Instances button.

Scalability in Cloud Computing


Cloud Scalability: Cloud scalability is used to handle the
growing workload where good performance is also needed to
work efficiently with software or applications. Scalability is
commonly used where the persistent deployment of
resources is required to handle the workload statically.

Types of Scalability:

1. Vertical Scalability (Scale-up) –


In this type of scalability, we increase the power of existing
resources in the working environment in an upward direction.
2. Horizontal Scalability: In this kind of scaling, the
resources are added in a horizontal row.
3. . Diagonal Scalability –
It is a mixture of both Horizontal and Vertical scalability
where the resources are added both vertically and
horizontally.

Storage in AWS

Instance Storage: is the physical storage that comes along


with the specific EC2 instanceYou can avail the instance storage
before the instance launch after launching you cannot increase
or decrease the storage.

 the instance store has high IOPS performance as it is


attached to the instance physically.
 If an instance reboots, the data in the instance store will
persist
 Data backup is manual

Elastic Block Storage (EBS):

EBS provides the block storage volume that can be attached to


your instance. This is the raw, unformatted storage volumes that
are independent of the instance life cycle.EBS provides better
throughput so that it can be useful for the high intensive data
applications.
 You can create the snapshots at any point in EBS and it will
be stored in the S3 bucket.
 You can encrypt the data in EBS volumes.
 You can monitor the EBS volume performance metrics
Simple Storage Service (S3):

S3 is the object storage repository. So, you don’t need to


calculate how much storage you want for your application.
Amazon S3 provides the facility to store your data and request
your data at any time. S3 looks cheapest for most of the
applications.
 AWS S3 is highly scalable
 S3 stores the data redundantly. It has high reliability.
 The major advantage of S3 is its security features.
Persistent Storage in AWS
 Persistent Storage is defined as a device that is used for
storing the data. Persistent storage saves the data even if
the power is turned off therefore they are also known as non-
volatile material.
 . Persistent storage systems are in the form of files, blocks
and the object storage. Some typical type of persistent
storage consists of optical media such as DVDs, and
magnetic media such as hard disk drives and tapes.
 Persistent storage systems are used because it increases the
performance of the system and enables a fundamental
change in the overall computing architectures
 persistent storage is used in various applications such
as database, storage, Big Data, cloud computing, IOT
applications, virtualization and Artificial Intelligence
applications.
Types of Persistent Storage
1. Kubernetes

Kubernetes is an open-source platform that manages Docker


containers in the form of a cluster.Kubernetes is an open-
source Container Management tool that automates container
deployment, container scaling, descaling, and container load
balancing (also called a container orchestration tool). it
provides healing by automatically restarting failed containers
and rescheduling them when their hosts die

2. Containers

OpenStack Swift is used for storing the data that is in the form
of static data or binary objects such as massive data sets this
images media files etc. OpenStack Swift is a distributed storage
solution that makes use of bins for organizing this objects. Only
the volumes contents can be accessed by the instances where
as objects within a container can be accessed by the rest API of
the object storage.

Routing From AWS


 Routing is the process of path selection in any network. A computer network is made
of many machines, called nodes, and paths or links that connect those nodes.
Communication between two nodes in an interconnected network can take place
through many different paths. Routing is the process of selecting the best path using
some predetermined rules.
 Routing helps minimize network failure by managing data traffic so that a network
can use as much of its capacity as possible without creating congestion.

What are the types of routing


Static routing
In static routing, a network administrator uses static tables to manually configure and
select network routes. Static routing is helpful in situations where the network design or
parameters are expected to remain constant.

The static nature of this routing technique comes with expected drawbacks, such as
network congestion

Dynamic routing
In dynamic routing, routers create and update routing tables at runtime based on actual
network conditions. They attempt to find the fastest path from the source to the
destination by using a dynamic routing protocol, which is a set of rules that create,
maintain, and update the dynamic routing table.

The biggest advantage of dynamic routing is that it adapts to changing network


conditions, including traffic volume, bandwidth, and network failure.

Main routing protocols


Interior gateway protocols
These protocols assess the autonomous system and make routing decisions based on
different metrics,

 Hop counts, or the number of routers between the source and the destination
 Delay, or the time taken to send the data from the source to the destination
 Bandwidth, or the link capacity between the source and the destination

Routing Information Protocol


The Routing Information Protocol (RIP) relies on hop counts to determine the shortest
path between networks. RIP is a legacy protocol that no one uses today because it does
not scale well for larger network implementation.

Open Shortest Path First protocol

The Open Shortest Path First protocol (OSPF) collects information from all other routers
in the autonomous system to identify the shortest and fastest route to a data packet’s
destination.

External gateway protocols


The Border Gateway Protocol (BGP) is the only external gateway protocol.

Border Gateway Protocol

BGP defines communication over the internet. The internet is a large collection of
autonomous systems all connected together. Every autonomous system has
autonomous system number (ASN) that it obtains by registering with the Internet
Assigned Numbers Authority.

What are routing algorithms?


Routing algorithms are software programs that implement different routing protocols.
They work by assigning a cost number to each link; the cost number is calculated using
various network metrics. Every router tries to forward the data packet to the next best link
with the lowest cost.

The following are some example algorithms.

Distance Vector Routing

The Distance Vector Routing algorithm requires all routers to periodically update each
other about the best path information they have found. Each router sends information
about the current assessment of the total cost to all known destinations.

Eventually, every router in the network discovers the best path information for all possible
destinations.

Link State Routing

In Link State Routing, every router discovers all other routers in the network. Using this
information, a router creates a map of the complete network and then calculates the
shortest path for any data packet.

Identity and Access Management(IAM)


 Identity and access management (IAM) is a security discipline
that enables organizations to manage digital identities and
control user access to critical information and systems.
 Identity and Access Management (IAM) is a combination of
policies and technologies that allows organizations to identify
users and provide the right form of access as and when
required.
 IAM can be used for many purposes such as, if one want’s to
control access of individual and group access for your AWS
resources.
 With IAM policies, managing permissions to your workforce
and systems to ensure least-privilege permissions becomes
easier. The AWS IAM is a global service.
IAM Features
1. Free of cost: IAM feature of the AWS account is free to use
& charges are added only when you access other Amazon
web services using IAM users.
2. Have Centralized control over your AWS account: Any
new creation of users, groups, or any form of cancellation
that takes place in the AWS account is controlled by you, and
you have control over what & how data can be accessed by
the user.
3. Grant permission to the user: As the root account holds
administrative rights, the user will be granted permission to
access certain services by IAM.
4. Multifactor Authentication: Additional layer of security is
implemented on your account by a third party, a six-digit
number that you have to put along with your password when
you log into your accounts.
Components of Identity and Access
Management (IAM)

1. Authentication
This process actively verifies the identity of employees or users by
requesting their unique identifiers and necessary credentials to
prove the authenticity of each user. This can include usernames,
emails, passwords, biometric features like fingerprint or facial
recognition, and electronic access like swipe cards, smartcards,
RFID, etc.

2. Authorization
This is the act of granting access to tools and resources. While the
above (authentication) confirms the user’s identity, authorization
creates the boundary and jurisdiction where the user can
operate. The authorization framework actively distinguishes User A’s
access from User B’s. This framework controls role-based access in
the IAM system and is commonly referred to as AuthZ.

3. Administration
The administration is the framework on which other frameworks are
built. It is the sub-system that makes authorization and
authentication possible.This component of the IAM system manages
users’ accounts, groups, permissions, and password policies. It
monitors the creation and modification of users’ accounts.

4. Auditing and Reporting (A&R)


the A&R focuses on what users use their given access for, what
they do with the data or resources they accessed, and how this
helps the organization to track and detect unauthorized or
suspicious activities.

You might also like