Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cloud Computing Computer Science Innovations, LLC.

Similar presentations


Presentation on theme: "Cloud Computing Computer Science Innovations, LLC."— Presentation transcript:

1 Cloud Computing Computer Science Innovations, LLC

2 Infrastructure as a Service

3 Google Technology Starting out... Google ingested the entire web and searches it. But the technology that ingest the entire web is called Map/Reduce and is the open source Apache project – Hadoop. The technology to read the entire web is called the Apache project Solr.

4 Infrastructure as a Service Seemingly boundless resources on a pay as you go model. Choose systems Linux Load Balancing - Last Module Loosely coupled systems participating load balancing and fault tolerance such that all computers minus one may fail and processing continues.

5 Amazon Web Services AWS.amazon.com/amis – these are amazon machine images. Systems are typically a pain in the neck to create. Not with AWS Configure say Ubuntu and make it yourself. Generally find one so close to what you want to just do it yourself. A

6 Pick an AMI First go to amazon ece2. (Elastic Compute Cloud) I'm going to go launch an instance Classic wizard or quick launch. Let's pick Ubuntu. Then windows.

7 Create an Instance Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default. Can go out to community and see the ones out there running. Choose an instance of them. Takes the image out there running and takes a copy of it.

8 Key/Value Pairs Allows you to put key value pairs. Lets say you've gone out and created a property. AMI, it needs something to tell them what to do. Not needed it for this point. Mostly because most are done at system loading time.

9 Option to Create a Private Key Create the key/pair It uses RSA Asymmetric Private Key When you store, you must change permissions to 400. Must be individual read, since it is a private key.

10 Custom TCP Rule Allows to select open or closed ports. By default only 22 is open And access by Private Key Only Open 443 https or 80 http and Port 8080 - Java Web Server

11 Lets Launch It Need to take a list of it. Need to set the key to get it to log in. to login: ssh -i ubuntu@ Must have private key to login.

12 Now You Have Infrastructure as A Service As an Ubuntu instance. Now we will try windows To do this we need rdesktop or a windows box to launch a login.

13 Pick a Windows Server Takes longer to launch. We connect through a graphical interface. RSA is used to transmit the password. Now let's login using rdesktop

14 IAAS - Why Amazon Paradigm Gives access to seemingly endless computer resources. API to create instances. API to create AMI's Defacto Standard. Runs as SAAS.

15 Amazon - AMI Amazon Machine Images https://aws.amazon.com/amis 65,000 different machine machine images. Ubuntu 12.04, MySQL Apache, php, postfix Server … Elastic... Managed in a secure way.

16 How For Lab Classic wizard gives you different ones to choose from. Amazon gives you their own AMI default. Choose an instance of them. Option to create a new key pair. Custom TCP rule. Allow all of 80 8080 22 Then lets launch it. Need to take a list of it. Need to set the key to get it to log in.

17 1. Go to Amazon EC2. Create a Linux instance. Connect to it. 2. Go to Amazon EC2. Create a Windows instance. Connect to it. 3. Create a public/key private key scenario on your system. Give the private key to your neighbor, have them connect to your system without logging in. Homework Assignment #3

18 Let's Look At This Web Server 8443 Browser 443 Firewall Al Admin Map Incoming 443 to intenal 8443 On a specifc Server

19 Unix Cheat Sheet The command ls is the same thing as dir in windows The command ps is process status and commonly used as ps -ef | more Do a ps -ef | more The command pwd is print working directory The command chmod is change mode The command chgrp is change user and group

20 Unix History How did we get to Unix? Who created it? Brian Kerrnighan, Dennis Ritchie, Thompson. They worked for AT&T in New Jersey in the 70's. They had an idea. What if an operating systems was created that worked on any hardware? So they needed a hardware independent language – they called it C.

21 Unix History How did we get to Unix? Who created it? Brian Kerrnighan, Dennis Ritchie, Thompson. They worked for AT&T in New Jersey in the 70's. They had an idea. What if an operating systems was created that worked on any hardware? So they needed a hardware independent language – they called it C.

22 Unix History Continued AT&T gave it away for free. How many run Android's. Unix kernel How many run IPhones. Unix. There are two flavors. System V – MIT – Linux BSD – Berkeley – Cal Berkley – Mac/OS AT&T – Created this.

23 AmazonUnix vs. Windows Unix and Windows are both available in the Cloud. The pricing difference is what? Windows is more expensive differing by licensing costs. Access is a little different.

24 Commands - Unix Permissions wwwxxxyyy for a file or directory. Now let's define www it has 3 digit for RWE So RWE is what … 7 now www is for the user's permission. xxx is for the group's permission and yyy is for the world's permission. So if a file is 400 like.pem file what is that? 400 100 000 000 which is R------ at the owner level.

25 More Permissions So if I want a file to be Read and Write for the Owner (User) of the file and Read for the Group and Nothing for the world. Let's do it together www xxx yyy U G O The three digits RWE 110 100 000 = 6 4 0

26 So Back to Commands The command ls -al full listing. You can see the pattern. So we a couple more commands and we are done. The command chmod 3DIGITS files changes the mode. chmod 777 allows all access. The command chgrp user:group and it lets yo set the owner.

27 Bit Patterns for File Permissions File www xxx yyy The first w bit is 4 The next w bit is 2 The last w bit is 1 So if we have 111 what is that 7 So if we have rwe what is that 7 So if we have Read only that is 4


Download ppt "Cloud Computing Computer Science Innovations, LLC."

Similar presentations


Ads by Google