Cloud Computing Computer Science Innovations, LLC.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

B. Ramamurthy 4/17/ Overview of EC2 Components (fig. 2.1) 10..* /17/20152.
Amazon Web Services (aws) B. Ramamurthy. Introduction  Amazon.com, the online market place for goods, has leveraged the services that worked for their.
University of Notre Dame
© 2010 VMware Inc. All rights reserved Amazon Web Services.
Lecture 12: Cloud Computing-C Amazon Web Service Tutorial.
Cloud Computing Imranul Hoque. Today’s Cloud Computing.
1 NETE4631 Cloud deployment models and migration Lecture Notes #4.
Cloud Computing Brandon Hixon Jonathan Moore. Cloud Computing Brandon Hixon What is Cloud Computing? How does it work? Jonathan Moore What are the key.
Creating an AMI at Amazon’s EC2 Joe Steele
Creating a Biolinux AMI at Amazon’s EC2
CMPTR1 CHAPTER 3 COMPUTER SOFTWARE Application Software – The programs/software/apps that we run to do things like word processing, web browsing, and games.
Network+ Guide to Networks, Fourth Edition
Microsoft Windows in Amazon Cloud Ishwor Thapa January 20, 2011.
Amazon Web Services CSE 490H This presentation incorporates content licensed under the Creative Commons Attribution 2.5 License.
Matt Bertrand Building GIS Apps in the Cloud. Infrastructure - Provides computer infrastructure, typically a platform virtualization environment, as a.
Chien-Chung Shen Google Compute Engine Chien-Chung Shen
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
Engineering the Cloud Andrew McCombs March 10th, 2011.
What is Cloud Computing?. Why call it “Cloud” Computing?
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Linux Operations and Administration
Additional SugarCRM details for complete, functional, and portable deployment.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Cloud Computing. Cloud Computing Overview Course Content
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Chapter 10 – UNIX. History In late 1960s, two employees of Bell Labs (Ken Thompson & Dennis Ritchie) designed a new operating system to overcome the constraints.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Overview of Linux CS3530 Spring 2014 Dr. José M. Garrido Department of Computer Science.
1 John Magee 9 November 2012 CS120 Lecture 17a: Publishing Web pages.
Module 1 Introduction to UNIX/Linux
K. Liu, Q. Huang, J. Xia, Z. Li, P. Lostritto, Chapter 4 How to use cloud computing?, In Spatial Cloud Computing: a practical approach, edited by.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Customer Relationship Management. Content CRM SugarCRM System Requirement Installation Process Configuration.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
1 Installation When this module is complete, you will be able to:  Set a static IP address for your laptop  Install the snom ONE software  Navigate.
Cloud Computing Computer Science Innovations, LLC.
Cybersecurity Computer Science Innovations, LLC. Overview Define Security Discretionary Access Control Trusted Computer System Evaluation Criteria (TCSEC)
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Cisco ASA 5505 Joseph Cicero Northeast Wisconsin Technical College.
CS 7: Introduction to Computer Programming Java and the Internet Sections ,2.1.
1 Apache and... Virtual Hosts ---- aliases mod_rewrite ---- htaccess AFNOG X Cairo, Egypt May 2009 Hervey Allen.
AWS Amazon Web Services Georges Akpoly CS252. Overview of AWS Amazon Elastic Compute Cloud (EC2) Amazon Simple Storage Service (S3) Amazon Simple Queue.
Basic UNIX Concepts. Why We Need an Operating System (OS) OS interacts with hardware and manages programs. A safe environment for programs to run is required.
Introduction to UNIX CS 2204 Class meeting 1 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Getting Connected CPSC 1010 August 21, Connecting to the SOC Servers Why would we need to connect Work with files Transfer files from your local.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
KAASHIV INFOTECH – A SOFTWARE CUM RESEARCH COMPANY IN ELECTRONICS, ELECTRICAL, CIVIL AND MECHANICAL AREAS
Canadian Bioinformatics Workshops
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Canadian Bioinformatics Workshops bioinformatics.ca.
INTRODUCTION TO AMAZON WEB SERVICES (EC2). AMAZON WEB SERVICES  Services  Storage (Glacier, S3)  Compute (Elastic Compute Cloud, EC2)  Databases (Redshift,
AMAZON SIMPLE CLOUD DEPLOYMENT Matt Quill Charlie Cano.
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Overview of Linux Fall 2016 Dr. Donghyun Kim
Canadian Bioinformatics Workshops
Introduction and Getting Started guide Alex Zlotnik Technion
Chapter 5 : Designing Windows Server-Level Security Processes
The Linux Operating System
Lab 1 introduction, debrief
Cloud Computing ISY143.
Webinar # April 2017 Isolates in the Cloud
Brandon Hixon Jonathan Moore
Security and File Permission
Different types of Linux installation
Jerald Overstreet, GISP Server Portal SQL Manager Admin
06 | SQL Server and the Cloud
Presentation transcript:

Cloud Computing Computer Science Innovations, LLC

Infrastructure as a Service

Google Technology Starting out... Google ingested the entire web and searches it. But the technology that ingest the entire web is called Map/Reduce and is the open source Apache project – Hadoop. The technology to read the entire web is called the Apache project Solr.

Infrastructure as a Service Seemingly boundless resources on a pay as you go model. Choose systems Linux Load Balancing - Last Module Loosely coupled systems participating load balancing and fault tolerance such that all computers minus one may fail and processing continues.

Amazon Web Services AWS.amazon.com/amis – these are amazon machine images. Systems are typically a pain in the neck to create. Not with AWS Configure say Ubuntu and make it yourself. Generally find one so close to what you want to just do it yourself. A

Pick an AMI First go to amazon ece2. (Elastic Compute Cloud) I'm going to go launch an instance Classic wizard or quick launch. Let's pick Ubuntu. Then windows.

Create an Instance Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default. Can go out to community and see the ones out there running. Choose an instance of them. Takes the image out there running and takes a copy of it.

Key/Value Pairs Allows you to put key value pairs. Lets say you've gone out and created a property. AMI, it needs something to tell them what to do. Not needed it for this point. Mostly because most are done at system loading time.

Option to Create a Private Key Create the key/pair It uses RSA Asymmetric Private Key When you store, you must change permissions to 400. Must be individual read, since it is a private key.

Custom TCP Rule Allows to select open or closed ports. By default only 22 is open And access by Private Key Only Open 443 https or 80 http and Port Java Web Server

Lets Launch It Need to take a list of it. Need to set the key to get it to log in. to login: ssh -i Must have private key to login.

Now You Have Infrastructure as A Service As an Ubuntu instance. Now we will try windows To do this we need rdesktop or a windows box to launch a login.

Pick a Windows Server Takes longer to launch. We connect through a graphical interface. RSA is used to transmit the password. Now let's login using rdesktop

IAAS - Why Amazon Paradigm Gives access to seemingly endless computer resources. API to create instances. API to create AMI's Defacto Standard. Runs as SAAS.

Amazon - AMI Amazon Machine Images 65,000 different machine machine images. Ubuntu 12.04, MySQL Apache, php, postfix Server … Elastic... Managed in a secure way.

How For Lab Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default. Choose an instance of them. Option to create a new key pair. Custom TCP rule. Allow all of Then lets launch it. Need to take a list of it. Need to set the key to get it to log in.

1. Go to Amazon EC2. Create a Linux instance. Connect to it. 2. Go to Amazon EC2. Create a Windows instance. Connect to it. 3. Create a public/key private key scenario on your system. Give the private key to your neighbor, have them connect to your system without logging in. Homework Assignment #3

Let's Look At This Web Server 8443 Browser 443 Firewall Al Admin Map Incoming 443 to intenal 8443 On a specifc Server

Unix Cheat Sheet The command ls is the same thing as dir in windows The command ps is process status and commonly used as ps -ef | more Do a ps -ef | more The command pwd is print working directory The command chmod is change mode The command chgrp is change user and group

Unix History How did we get to Unix? Who created it? Brian Kerrnighan, Dennis Ritchie, Thompson. They worked for AT&T in New Jersey in the 70's. They had an idea. What if an operating systems was created that worked on any hardware? So they needed a hardware independent language – they called it C.

Unix History How did we get to Unix? Who created it? Brian Kerrnighan, Dennis Ritchie, Thompson. They worked for AT&T in New Jersey in the 70's. They had an idea. What if an operating systems was created that worked on any hardware? So they needed a hardware independent language – they called it C.

Unix History Continued AT&T gave it away for free. How many run Android's. Unix kernel How many run IPhones. Unix. There are two flavors. System V – MIT – Linux BSD – Berkeley – Cal Berkley – Mac/OS AT&T – Created this.

AmazonUnix vs. Windows Unix and Windows are both available in the Cloud. The pricing difference is what? Windows is more expensive differing by licensing costs. Access is a little different.

Commands - Unix Permissions wwwxxxyyy for a file or directory. Now let's define www it has 3 digit for RWE So RWE is what … 7 now www is for the user's permission. xxx is for the group's permission and yyy is for the world's permission. So if a file is 400 like.pem file what is that? which is R at the owner level.

More Permissions So if I want a file to be Read and Write for the Owner (User) of the file and Read for the Group and Nothing for the world. Let's do it together www xxx yyy U G O The three digits RWE = 6 4 0

So Back to Commands The command ls -al full listing. You can see the pattern. So we a couple more commands and we are done. The command chmod 3DIGITS files changes the mode. chmod 777 allows all access. The command chgrp user:group and it lets yo set the owner.

Bit Patterns for File Permissions File www xxx yyy The first w bit is 4 The next w bit is 2 The last w bit is 1 So if we have 111 what is that 7 So if we have rwe what is that 7 So if we have Read only that is 4