Cloud Computing Assignment
Cloud Computing Assignment
Aws:
AWS stands for Amazon Web Services.
The AWS service is provided by the Amazon that uses distributed IT infrastructure to
provide different IT resources available on demand. It provides different services such as
infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as
a service (SaaS).
Amazon launched AWS, a cloud computing platform to allow the different organizations
to take advantage of reliable IT infrastructure.
Uses of AWS
A small manufacturing organization uses their expertise to expand their business by
leaving their IT management to the AWS.
A large enterprise spread across the globe can utilize the AWS to deliver the training to
the distributed workforce.
An architecture consulting company can use AWS to get the high-compute rendering of
construction prototype.
A media company can use the AWS to provide different types of content such as ebox or
audio files to the worldwide files
Advantages of AWS
1) Flexibility
We can get more time for core business tasks due to the instant availability of new
features and services in AWS.
It provides effortless hosting of legacy applications. AWS does not require learning new
technologies and migration of applications to the AWS provides the advanced computing
and efficient storage.
2) Cost-effectiveness
AWS requires no upfront investment, long-term commitment, and minimum expense when
compared to traditional IT infrastructure that requires a huge investment.
3) Scalability/Elasticity
Through AWS, autoscaling and elastic load balancing techniques are automatically scaled up
or down, when demand increases or decreases respectively. AWS techniques are ideal
for handling unpredictable or very high loads. Due to this reason, organizations enjoy the
benefits of reduced cost and increased user satisfaction.
4) Security
AWS provides end-to-end security and privacy to customers.
AWS has a virtual infrastructure that offers optimum availability while managing full
privacy and isolation of their operations.
Customers can expect high-level of physical security because of Amazon's several years
of experience in designing, developing and maintaining large-scale IT operation centers.
L.Guna Vardhan Reddy
2211CS010324
AWS ensures the three aspects of security, i.e., Confidentiality, integrity, and availability
of user's data.
Azure:
Microsoft Azure is a cloud computing platform that provides a wide variety of services that
we can use without purchasing and arranging our hardware. It enables the fast
development of solutions and provides the resources to complete tasks that may not be
achievable in an on-premises environment. Azure Services like compute, storage,
network, and application services allow us to put our effort into building great solutions
without worrying about the assembly of physical infrastructure.
Microsoft Azure is a growing set of cloud computing services created by Microsoft that hosts
your existing applications, streamline the development of a new application, and also
enhances our on-premises applications. It helps the organizations in building, testing,
deploying, and managing applications and services through Microsoft-managed data
centers.
Azure Services
Compute services: It includes the Microsoft Azure Cloud Services, Azure Virtual
Machines, Azure Website, and Azure Mobile Services, which processes the data on the
cloud with the help of powerful processors.
Data services: This service is used to store data over the cloud that can be scaled
according to the requirements. It includes Microsoft Azure Storage (Blob, Queue Table,
and Azure File services), Azure SQL Database, and the Redis Cache.
Application services: It includes services, which help us to build and operate our
application, like the Azure Active Directory, Service Bus for connecting distributed
systems, HDInsight for processing big data, the Azure Scheduler, and the Azure Media
Services.
Network services: It helps you to connect with the cloud and on-premises infrastructure,
which includes Virtual Networks, Azure Content Delivery Network, and the Azure
Traffic Manager.
Key Features:
Compute Services: Virtual Machines, Azure Functions
Storage: Blob Storage, Azure Files
Databases: SQL Database, Cosmos DB (global NoSQL database)
Networking: Azure Virtual Network, Azure Front Door
Security: Azure Active Directory, Security Center
AI/ML: Azure Machine Learning, Cognitive Services
Hybrid Cloud: Azure Arc, Azure Stack (for on-premises integration)
Here are some key components of AWS (Amazon Web Services) and Azure (Microsoft
Azure):
Both AWS and Azure offer a wide range of services beyond these key components, catering
to different needs for cloud computing, storage, databases, networking, security, and
more. The choice between AWS and Azure often depends on specific requirements,
expertise, and preferences of the users or organizations.
A. Root User:
1.Definition:
o The Root User is the account created when you first set up your AWS account.
o It has full administrative access to all resources and services in the account.
2.Key Features:
o The root user is tied to the email address and password used during account creation.
3.Best Practices:
o Use the root user only for initial setup or critical account-level tasks.
IAM User:
1.Definition:
o An IAM User (Identity and Access Management User) is a user created under an AWS
account to represent a person or application that interacts with AWS resources.
2.Key Features:
o Can be used for individual access, ensuring fine-grained control and accountability.
3.Benefits:
o Better security by delegating specific permissions rather than using the root user.
By selecting the appropriate instance type based on your application's requirements, you can
optimize performance, cost, and scalability in the AWS cloud environment.
5.explain AMI
Ans:
"AMI" can stand for various things depending on the context.
An Amazon Machine Image is a special type of virtual appliance that is used to instantiate
(create) a virtual machine within EC2. It serves as the basic unit of deployment for
services delivered using EC2. Whenever you want to launch an instance, you need to
specify AMI. To launch instances, you can also use different AMIs. If you want to
launch multiple instances from a single AMI, then you need multiple instances of the
same configuration.
Properties of AMI
L.Guna Vardhan Reddy
2211CS010324
A template for the root volume for the instance (for example, an operating system, an
application server, and applications)
Launch permissions that control which AWS accounts can use the AMI to launch
instances.
A block device mapping that specifies the volumes to attach to the instance when it’s
launched
Here are a few common meanings:
The relationship between an Instance and an AMI (Amazon Machine Image) in AWS is
foundational to how EC2 instances are created and deployed. Here's how they are
connected:
Configuration settings.
o When you launch an instance, you choose an AMI to use as the starting point for that
instance.
L.Guna Vardhan Reddy
2211CS010324
o The instance inherits all the configurations and software defined in the AMI.
1. Create/Choose an AMI:
o Alternatively, create a custom AMI by configuring an EC2 instance and then saving it as
a new AMI.
2. Launch an Instance:
o You can specify instance-specific settings (e.g., instance type, networking, security
group) during this process.
3. Instance Runtime:
o Once launched, the instance is independent of the AMI. You can modify it (e.g., install
new software, change configurations) without affecting the original AMI.
o If you want to preserve changes made to an instance, you can create a new AMI from it.
o This AMI can be used to launch additional instances with the updated configurations.
L.Guna Vardhan Reddy
2211CS010324
Amazon S3 is a scalable storage service primarily designed for storing and retrieving
data.
It is ideal for storing large amounts of data, such as images, videos, backups, logs, and
other types of files.
S3 provides high durability, availability, and low latency for accessing stored data.
It is commonly used for data backup, static website hosting, data archiving, and content
distribution.
Amazon EC2 is a web service that provides resizable compute capacity in the cloud.
L.Guna Vardhan Reddy
2211CS010324
EC2 allows users to create virtual servers called instances to run applications and
services.
Users can choose instance types with different CPU, memory, storage, and networking
capabilities to meet their specific requirements.
EC2 is often used for web hosting, application development, data processing, and
running various workloads in a scalable manner.
Amazon S3 is primarily for storage, while Amazon EC2 is for computing power in the cloud.
They can be used together to build scalable and resilient applications on the AWS
platform.
1. Public Key:
2. Private Key:
o Used to decrypt data and establish secure communication with the instance.
o A key pair is created in AWS (via the Management Console, AWS CLI, or API).
o The private key is downloaded by the user at the time of creation. AWS does not store
the private key.
o When launching an EC2 instance, you specify the key pair to associate with the instance.
L.Guna Vardhan Reddy
2211CS010324
o AWS stores the public key on the instance in the ~/.ssh/authorized_keys file of the
default user (e.g., ec2-user for Amazon Linux).
o The user connects to the instance using the private key and an SSH client (for Linux
instances) or RDP client (for Windows instances).
o The private key validates the user by matching the stored public key, enabling secure
access.
1. Secure Access:
o Ensures secure and encrypted communication between the user and the EC2 instance.
2. Ease of Use:
An Elastic IP Address (EIP) in AWS is a static, public IPv4 address designed to enable
consistent and persistent access to your resources, such as Amazon EC2 instances, over the
L.Guna Vardhan Reddy
2211CS010324
internet. Unlike a standard public IP address, an EIP remains associated with your AWS
account and can be dynamically remapped to different resources within the same region.
Unlike public IPs that may change when an instance is stopped and restarted, an
EIP remains constant.
Ideal for applications or services that require a consistent public IP.
2. Flexibility:
Can be re-associated from one instance to another within the same region without
downtime.
Enables quick recovery in case of instance failure.
3. Controlled Allocation:
EIPs are allocated to your AWS account, and you control when and where they are
associated.
4. Chargeable Resource:
Use Cases
1. Allocate an EIP:
3. Reassociate as Needed:
Detach and reattach the EIP to different resources within the same
region for flexibility.
Key Considerations
1. Regional Scope:
2. Availability:
Limited to five EIPs per AWS account per region by default (limit can
be increased upon request).
3. Cost Management:
L.Guna Vardhan Reddy
2211CS010324
11. what are the key benefits of adopting cloud computing and how does microsoft
azure address these benefits?
Ans
The key benefits of adopting cloud computing include scalability, cost-efficiency, flexibility,
security, and accessibility. Microsoft Azure, as a leading cloud computing platform,
addresses these benefits in the following ways:
1. Scalability: Azure offers the ability to scale resources up or down based on demand,
allowing businesses to adjust their computing power and storage easily.
2. Cost-efficiency: Azure provides a pay-as-you-go model, where you only pay for the
resources you use, reducing the need for upfront investments in hardware and
infrastructure.
3. Flexibility: With Azure, organizations have the flexibility to choose from a wide
range of services and tools to meet their specific needs, whether it's developing
applications, storing data, or running virtual machines.
4. Security: Azure incorporates robust security measures to protect data, applications,
and infrastructure. It offers compliance certifications and features like encryption,
identity management, and threat detection.
5. Accessibility: Azure enables access to resources from anywhere with an internet
connection, promoting collaboration among teams and allowing for remote work
capabilities.
By leveraging Microsoft Azure, businesses can harness these benefits to improve their
operations, enhance performance, and drive innovation in a secure and cost-effective manner.
Microsoft Azure is a cloud computing platform that addresses various benefits by offering a
range of services and features.
1. Scalability:
2. Flexibility:
3. Reliability:
Azure offers a global network of data centers that provide high availability and
redundancy, ensuring that services remain operational even in the event of
failures.
Azure's SLAs guarantee a certain level of uptime and performance, giving
users confidence in the reliability of the platform.
4. Security:
5. Cost-effectiveness:
Azure's pay-as-you-go pricing model allows users to pay only for the
resources they use, reducing upfront costs and providing cost-effectiveness.
Azure offers cost management tools and options like reserved instances and
hybrid benefits to optimize costs.
12.Explain the role of the azure resource manager ARM in managing resources in
azure?
Ans
Azure Resource Manager (ARM) in Azure plays a crucial role in managing cloud resources
efficiently. Here is an explanation of its role in managing resources in Azure:
4. Resource Tagging and Metadata: ARM supports resource tagging, which helps in
logically organizing and categorizing resources. Tags can be used for billing,
monitoring, and managing resources effectively.
5. Lifecycle Management: ARM helps in managing the lifecycle of Azure resources,
enabling actions such as creation, updating, deletion, and tracking changes to
resources over time.
6. Monitoring and Alerts: ARM integrates with Azure Monitor to provide monitoring
capabilities for resources, enabling users to set up alerts based on resource metrics and
take proactive actions based on defined conditions.
7. Resource Dependencies: ARM manages dependencies between resources, ensuring
that resources are deployed and managed in the correct order to maintain consistency
and avoid configuration issues.
8. Resource Locks: ARM allows applying locks at different levels to prevent accidental
deletion or modification of critical resources, ensuring operational safety and
compliance.
13.what is the difference between the general purpose vm and computer optimised vm?
Ans
The difference between a general-purpose VM and a computer-optimized VM lies in their
intended use and performance characteristics:
1. General-Purpose VM:
o Usage: Designed for versatile workloads like web servers, development
environments, small databases, and applications that don't require highly
specialized hardware.
o Performance: Offers a balance of CPU, memory, storage, and networking
resources suitable for a wide range of tasks.
o Cost: Typically more cost-effective than specialized VMs due to their
flexibility.
2. Compute-Optimized VM:
o Usage: Tailored for compute-intensive tasks that require high computational
power like scientific modeling, high-performance computing (HPC), and data
analytics.
L.Guna Vardhan Reddy
2211CS010324
o Performance: Emphasizes powerful CPUs with high clock speeds and ample
memory to handle demanding workloads efficiently.
o Cost: Can be more expensive than general-purpose VMs due to the
specialized hardware configuration.