Intern Report !
Intern Report !
1 Introduction 4
2 Concepts 5
2.1 Cyber infrastructure
2.2 Service-Oriented Architecture
3 Cloud Architecture 7
3.1 Cloud Types
4 Component 9
4.1 Virtualization
4.2 Users
5 Working 10
7 Conclusion
12
8 References 13
Today, almost any business or major activity uses, or relies in some form, on IT and IT services.
These services need to be enabling and appliance-like, and there must be an economy of- scale
for the total-cost-of-ownership to be better than it would be without cyber infrastructure.
Technology needs to improve end-user productivity and reduce Technology-driven overhead
This closely resembles the Unix philosophy of having multiple programs doing one thing well
and working together over universal interfaces. Complexity is controlled and the resulting
systems are more manageable than their monolithic counterparts.
Cloud architecture extends to the client, where web browsers and/or software applications access
cloud applications. Cloud storage architecture is loosely coupled, where metadata operations are
centralized enabling the data nodes to scale into the hundreds, each independently delivering data
to applications or users
Hybrid cloud:
Hybrid clouds combine both public and private cloud models. This is most often seen with the
use of storage clouds to support Web 2.0 applications.
Private cloud:
Private clouds are built for the exclusive use of one client, providing the utmost
control over data, security, and quality of service (Figure 4). The company owns the
infrastructure and has control over how applications are deployed on it. Private clouds can be
built and managed by a company’s own IT organization or by a cloud provider
.
Cloud computing products and services can be classified into 4 major categories:
They are
1. Application as service ( AaaS)
2. Platform as a Service (PaaS)
3. Infrastructure as a service (IaaS)
4. Software as a Service (SaaS)
1. Application as s service (AaaS): These are the first kind of cloud computing services that
came into being. Under this, a service is made available to an end-user. The end-user is asked to
create an account with the service provider and start using the application. One of first famous
application was web-based email service by hotmail started in 1996. Scores of such services are
available now on the web.
2. Platform as a Service (PaaS): Cloud vendors are companies that offer cloud computing
services and products. One of the services that they provide is called PaaS. Under this a
computing platform such as operating system is provided to a customer or end user on a monthly
rental basis. Some of the major cloud computing vendor are Amazon, Microsoft, Google etc
3. Infrastructure as a service: The cloud computing vendors offer infrastructure as a service. One
may avail hardware services such as processors, memory, networks etc on agreed basis for
specific duration and price.
4. Software as a service (SaaS): Software package such as CRM or CAD/CAM can be accessed
under cloud computing scheme. Here a customer upon registration is allowed to use software
accessible through net and use it for his or his business process. The related data and work may
be stored on local machines or with the service providers. SaaS services may be available on
rental basis or on per use basis.
The key to a SOA framework that supports workflows is componentization of its services, an
ability to support a range of couplings among workflow building blocks, fault-tolerance in its
data- and process-aware service-based delivery, and an ability to audit processes, data and
results, i.e., collect and use provenance information. Component-based approach is characterized
by reusability (elements can be re-used in other workflows), substitutability (alternative
implementations are easy to insert, very precisely specified interfaces are available, run-time
component replacement mechanisms exist, there is ability to verify and validate
substitutions, etc), extensibility and scalability (ability to readily extend system component pool
and to scale it, increase capabilities of individual components, have an extensible and scalable
architecture that can automatically discover new functionalities and resources,
etc),customizability (ability to customize generic features to the needs of a particular scientific
domain and problem), and composability (easy construction of more complex functional
solutions using basic components, reasoning about such compositions, etc.). There are other
characteristics that also are very important. Those include reliability and availability of the
components and services, the cost of the services, security, total cost of ownership, economy of
scale, and so on.In the context of cloud computing we distinguish many categories of
components. From differentiated and undifferentiated hardware, to general-purpose and
specialized software and applications, to real and virtual ―images‖, to environments, to no-root
Differentiated resources, to workflow-based environments and collections of services, and soon.
4.1 Virtualization
Virtualization is another very useful concept. It allows abstraction and isolation of lower-level
functionalities and underlying hardware. This enables portability of higher-level functions and
sharing and/or aggregation of the physical resources. The virtualization concept has been around
in some form since 1960s (e.g., in IBM mainframe systems). Since then, the concept has matured
considerably and it has been applied to all aspects of computing – memory, storage, processors,
software, networks, as well as services that IT offers. It is the combination of the growing needs
and the recent advances in the IT architectures and solutions that is now
bringing the virtualization to the true commodity level. Virtualization, through its economy of
scale, and its ability to offer very advanced and complex IT services at a reasonable cost, is
poised to become, along with wireless and highly distributed and pervasive computing devices,
such as sensors and personal cell-based access devices, the driving technology behind the next
waive in IT growth .Not surprisingly there are dozens of virtualization products, and a number of
small and large companies that make them. Some examples in the operating systems and
software applications space are VMware1, Xen - an open source Linux-based product developed
4.2 Users
The most important Cloud entity, and the principal quality driver and constraining influence is,
of course, the user. The value of a solutions depends very much on the view it has of its end-
user requirements and user categories.
There four broad sets of nonexclusive user categories:
System or Cyber infrastructure (CI) developers, developers (authors) of different component
services and underlying applications, technology and domain personnel that integrates basic
services into composite services and their orchestrations (workflows) and delivers those to end-
users, and finally users of simple and composite services. User categories also include domain
specific groups, and indirect users such as stakeholders, policy makers, and so on. Functional and
usability requirements derive, in most part, directly from the user profiles.
Demerits:
Stored data might not be secure: With cloud computing, all our data is stored on the cloud. The
unauthorized users gain access to our confidential data.
Dependent on internet connection:Internet connectivity isn’t completely stable and reliable.
It’s not platform agnostic:Most clouds force participants to rely on a single platform or host only
one type of product.
Can be slow:Even on a fast connection,web based application scan sometimes be slower than
accessing a similar software program on our desktop PC
Project agenda: To demonstrate the implementation of S3 buckets for hosting static website
content
Description: The organizational admin's goal is to deliver HTML content through a static
website. This objective is achieved by utilizing the capabilities of an S3 bucket for seamless
content deployment.
Steps to be followed:
1. Create an S3 bucket
2. Generate a bucket policy
3. Enable static website hosting
4. Test and verify the hosted website content
1.1 Navigate to the AWS Management Console. Now, search for and click S3
5
1.2 Click Create bucket
6
1.4 Enable ACLs (Access Control Lists) to ensure Object Ownership
7
The S3 bucket my-webcontent-demo has been successfully created.
2.1 Open the newly created bucket and navigate to the Permissions tab
8
2.2 Scroll down and click Edit to modify permissions
9
2.4 Select S3 Bucket Policy as the policy type
2.5 Set the Principal value to * and choose GetObject under Actions
10
2.6 Navigate to the bucket, click on the Properties tab, and copy the ARN (Amazon
Resource Name)
2.7 Paste the ARN in the Amazon Resource Name (ARN) field and click Add Statement
11
2.8 Click on the Generate Policy button
12
2.10 Paste the Policy JSON code in the Edit bucket policy section
13
The bucket policy has been successfully added. If the bucket policy does not change, click
on Edit in the Block public access section and disable all public access.
14
Step 3: Enable static website hosting
3.2 Click on Add files, upload any index.html file inside the S3 bucket my-webcontent-
demos, and click on Upload
15
3.3 Navigate to the Properties tab and click on Edit in Static website hosting
3.4 Enable Static website hosting, specify the default page, and click Save changes
16
The static website hosting has been successfully edited.
17
Step 4: Test and verify the hosted website content
4.1 Navigate to the Properties tab, scroll to Static website hosting, and click the Bucket
website endpoint link
By following these steps, you have effectively established a streamlined process for
hosting static website content using an S3 bucket, ensuring secure access and efficient
deployment.
18
19