You are on page 1of 69

Name : Mayur Dnyandev Shinde Subject : Cloud Computing

Class : T.Y.B.Sc.C.S. Roll No. : 89


==================================================================
Index

Sr.
No. Practical Name Date Sign

1. Study and implementation of Infrastructure as a


Service.

2. Installation and Configuration of virtualization using


KVM.

3. Study and implementation of Infrastructure


as a Service

4. Study and implementation of Storage as a


Service

5. Study and implementation of identity management

6. Study Cloud Security management

7. Write a program for web feed.

8. Study and implementation of Single-Sing-On.

9. User Management in Cloud.

10. Case study on Amazon EC2/Microsoft Azure/Google


Cloud Platform

==================================================================================
1
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
PRACTICAL NO-1
AIM:- Study cloud architecture and cloud computing model.
Objectives: From this experiment, the student will be able to  
• provide an overview of concepts of Cloud Computing . 
• To encourage students to indulge into research in Cloud Computing. 

Outcomes: The learner will be able to 

• understand and appreciate cloud architecture. 


• analyze the local and global impact of computing on 
• individuals, organizations, and society. 
• recognize the need for, and an ability to engage in life-long learning. 

Hardware / Software Required: Ubuntu operating system, Internet 

Theory: 

Cloud computing enables companies to consume compute resources as a utility – just


like electricity -- rather than having to build and maintain computing infrastructures in-
house. Cloud computing promises  several attractive benefits for businesses and end
users. 

Three of the main benefits of cloud computing include: 

• Self-service provisioning: End users can spin up computing resources for almost
any type of  workload on-demand. 
• Elasticity: Companies can scale up as computing needs increase and then scale
down again as  demands decreases. 
• Pay per use: Computing resources are measured at a granular level, allowing users to
pay only for  the resources and workloads they use. 

Cloud computing services can be Private, Public or Hybrid. 

Private cloud services are delivered from a business data center to internal users. This
model offers  versatility and convenience, while preserving management, control and
security. Internal customers may or  may not be billed for services through IT
chargeback. 

In the Public cloud model, a third-party provider delivers the cloud service over the
Internet. Public cloud  services are sold on-demand, typically by the minute or the
hour. Customers only pay for the CPU cycles,  storage or bandwidth they consume.
Leading public cloud providers include Amazon Web services (AWS),  Microsoft
Azure, IBM/SoftLayer and Google Compute Engine.

Hybrid cloud is a combination of public cloud services and on-premises private cloud
with orchestration  and automation between the two. Companies can run mission-
critical workloads or sensitive applications  on the private cloud while using the public

==================================================================================
2
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
cloud for workloads that must scale on-demand. The goal of  hybrid cloud is to create a
unified, automated, scalable environment which takes 

Advantage of all that a public cloud infrastructure can provide, while still maintaining
control over mission critical data. 

Types of cloud computing: 

IT people talk about three different kinds of cloud computing, where different services
are being provided  for you. Note that there's a certain amount of vagueness about how
these things are defined and some  overlap between them. 

Infrastructure as a Service (IaaS) means you're buying access to raw computing


hardware over the  Net, such as servers or storage. Since you buy what you need and
pay-as-you-go, this is often referred to as  utility computing. Ordinary web hosting is a
simple example of IaaS: you pay a monthly subscription or a  per-megabyte/gigabyte
fee to have a hosting company serve up files for your website from their servers. 

Software as a Service (SaaS) means you use a complete application running on


someone else's system.  Web-based email and Google Documents are perhaps the best-
known examples. Zoho is another well known SaaS provider offering a variety of
office applications online. 

Platform as a Service (PaaS) means you develop applications using Web-based


tools so they run on  systems software and hardware provided by another company.
So, for example, you might develop your  own ecommerce website but have the
whole thing, including the shopping cart, checkout, and payment  mechanism
running on a merchant's server. Force.com (from salesforce.com) and the Google
App Engine  are examples of PaaS. 

Procedure : Installation of Ubuntu.

Step 1)
Download Ubuntu iso

Step 2)
Open Vmware and click on new virtual machine

==================================================================================
3
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
4
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 3)Ubuntu will start installing

==================================================================================
5
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
6
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
7
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step4)Open the terminal and type in the command


$ sudo apt -y install bridge-utils cpu-checker libvirt-clients libvirt-daemon qemu qemu-kvm
==================================================================================
8
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Then type in
$ kvm-ok
$ sudo virt-install --name ubuntu-guest --os-variant ubuntu20.04 --vcpus 2 --ram 2048 --
location http://ftp.ubuntu.com/ubuntu/dists/focal/main/installer-amd64/ --network
bridge=virbr0,model=virtio --graphics none --extra-args='console=ttyS0,115200n8 serial'

==================================================================================
9
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Advantages and disadvantages of cloud computing 

Advantages 

• The pros of cloud computing are obvious and compelling. If your business is selling
books or  repairing shoes, why get involved in the nitty gritty of buying and
maintaining a complex computer  system? If you run an insurance office, do you
really want your sales agents wasting time running  anti-virus software, upgrading
word-processors, or worrying about hard-drive crashes? 
• Do you really want them cluttering your expensive computers with their personal
emails, illegally  shared MP3 files, and naughty YouTube videos—when you could
leave that responsibility to  someone else? Cloud computing allows you to buy in
only the services you want, when you want  them, cutting the upfront capital costs
of computers and peripherals. You avoid equipment going  out of date and other
familiar IT problems like ensuring system security and reliability. You can  add
extra services (or take them away) at a moment's notice as your business needs
change. It's  really quick and easy to add new applications or services to your
business without waiting weeks  or months for the new computer (and its software)
to arrive.

Disadvantages 

• Instant convenience comes at a price. Instead of purchasing computers and software,


cloud  computing means you buy services, so one-off, upfront capital costs become
ongoing operating  costs instead. That might work out much more expensive in the
long-term. 
• If you're using software as a service (for example, writing a report using an online
word processor  or sending emails through webmail), you need a reliable,
highspeed, broadband Internet connection  functioning the whole time you're
working. That's something we take for granted in countries such  as the United
States, but it's much more of an issue in developing countries or rural areas where 
broadband is unavailable. 
• If you're buying in services, you can buy only what people are providing, so you may
be restricted  to off-the-peg solutions rather than ones that precisely meet your
needs. Not only that, but you're  completely at the mercy of your suppliers if they
suddenly decide to stop supporting a product  you've come to depend on.  
• Google, for example, upset many users when it announced in September 2012 that its
cloud-based  Google Docs would drop support for old but de facto standard
Microsoft Office file formats such  as .DOC, .XLS, and .PPT, giving a mere one
week's notice of the change—although, after public  pressure, it later extended the
deadline by three months. 
• Critics charge that cloud-computing is a return to the bad-old days of mainframes and
proprietary  systems, where businesses are locked into unsuitable, long-term
arrangements with big, inflexible  companies. Instead of using "generative"
systems (ones that can be added to and extended in  exciting ways the developers
never envisaged), you're effectively using "dumb terminals" whose  uses are
severely limited by the supplier. Good for convenience and security, perhaps, but

==================================================================================
10
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
what  will you lose in flexibility? And is such a restrained approach good for the
future of the Internet as  a whole? (To see why it may not be, take a look at
Jonathan Zittrain's eloquent book The Future of  the Internet—And How to Stop
It.) 

Conclusion: 

Cloud computing enables a convenient and on-demand network access to a wide range
of resources. The  different services and also the deployment models allow flexible
service provider interaction with minimal  human intervention. It saves costs but also
can lead to risk issues and suspension of resources when in huge  quantity. 

Practical NO-2
Aim:- Installation and Configuration of virtualization using KVM. 

Objectives 

- Understand the concepts of virtualization. 


- Understand KVM architecture and its configuration. 

Outcomes:  

- To analyze user models and develop user centric interfaces 

- To analyze the local and global impact of computing on individuals, organizations,


and society. - To engage in life-long learning development and higher studies. 

- To understand, identify, analyze and design the problem, implement and validate the
solution  including both hardware and software. 

Hardware / Software Required: Ubuntu operating system, open source


software KVM, Internet. Theory: 
Virtualization is software that separates physical infrastructures to create various
dedicated resources. It is  the fundamental technology that powers cloud computing.
The technology behind virtualization is known  as a virtual machine monitor (VMM)
or virtual manager, which separates compute environments from the actual physical
infrastructure. Virtualization makes servers, workstations, storage and other systems
independent of the physical hardware layer. This is done by installing a Hypervisor on
top of the hardware  layer, where the systems are then installed. There are three areas

==================================================================================
11
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
of IT where virtualization is making  headroads, network virtualization, storage
virtualization and server virtualization: 

• Network virtualization is a method of combining the available resources in a network


by splitting up the  available bandwidth into channels, each of which is independent
from the others, and each of which can be assigned (or reassigned) to a particular
server or device in real time. The idea is that virtualization disguises  the true
complexity of the network by separating it into manageable parts, much like your
partitioned hard  drive makes it easier to manage your files. 

• Storage virtualization is the pooling of physical storage from multiple network


storage devices into what  appears to be a single storage device that is managed from a
central console. Storage virtualization is  commonly used in storage area networks
(SANs). 

• Server virtualization is the masking of server resources (including the number and
identity of individual  physical servers, processors, and operating systems) from server
users. The intention is to spare the user  from having to understand and manage
complicated details of server resources while increasing resource  sharing and
utilization and maintaining the capacity to expand later. 

Virtualization can be viewed as part of an overall trend in enterprise IT that includes


autonomic computing,  a scenario in which the IT environment will be able to manage
itself based on perceived activity, and utility  computing, in which computer
processing power is seen as a utility that clients can pay for only as needed.  The usual
goal of virtualization is to centralize administrative tasks while improving scalability
and work  loads.

Procedure:-

1) $cat /proc/cpuinfo

==================================================================================
12
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

2) $sudo apt-get update

3) $sudo apt-get install qemu-kvm libvirt-bin bridge-utils virt-manager

4) $sudo adduser tycs

==================================================================================
13
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

5) $sudo adduser tycs libvirtd

Go to search and type virtual. It will show “Virtual Machine Manager”

Logout current user and login as tycs user.

==================================================================================
14
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Go to search and type virtual. It will show “Virtual Machine Manager”

OR type command as $virt-manager.

==================================================================================
15
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Click on Create button.

Create a new virtual machine and select iso file and click on forward.

==================================================================================
16
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
17
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Conclusion: 

Installation and configuration of KVM have been done successfully onto Ubuntu and
users added. Like this  we can create as many virtual machines as possible on OS and
can install any windows onto it. 

==================================================================================
18
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No:-3
Aim: To study and implementation of Infrastructure as a Service 

Objectives:  

- Understand concepts of virtualization and to use cloud as


Infrastructure as a services. - Learn the technique and its complexity 
- Understand the importance of this technique from application point of view
Outcomes: The learner  will be able, 
- To match the industry requirements in the domains of
Database management, - Programming and Networking with
limited infrastructure. 
- To analyze the local and global impact of computing on individuals,
organizations, and society. - To use current techniques, skills, and tools
necessary for computing practice. 

Hardware / Software Required: AWS Account 

Theory: 

Iaas is also known as Hardware as a Service (HaaS). It is one of the layers of the cloud
computing platform.  It allows customers to outsource their IT infrastructures such as
servers, networking, processing, storage,  virtual machines, and other resources.
Customers access these resources on the Internet using a pay-as-per  use model. 

In traditional hosting services, IT infrastructure was rented out for a specific period of
time, with pre determined hardware configuration. The client paid for the configuration
and time, regardless of the actual  use. With the help of the IaaS cloud computing
platform layer, clients can dynamically scale the  configuration to meet changing
requirements and are billed only for the services actually used. 

IaaS cloud computing platform layer eliminates the need for every organization to
maintain the IT  infrastructure. 

IaaS is offered in three models: public, private, and hybrid cloud. The private cloud
implies that the  infrastructure resides at the customer-premise. In the case of public
cloud, it is located at the cloud  computing platform vendor's data center, and the
hybrid cloud is a combination of the two in which the  customer selects the best of both
public cloud or private cloud. 

IaaS provider provides the following services - 

1. Compute: Computing as a Service includes virtual central processing units and


virtual main  memory for the Vms that is provisioned to the end- users. 

2. Storage: IaaS provider provides back-end storage for storing files. 

3. Network: Network as a Service (NaaS) provides networking components such as


routers, switches,  and bridges for the Vms. 

4. Load balancers: It provides load balancing capability at the infrastructure layer.


==================================================================================
19
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Procedure:-

Step 1 : Create user & do login your account.

Step 2: Search EC2 Service click on it

Step 3 : Launch the instance

==================================================================================
20
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 4: select amazon linux 2 AMI (64bit)

Step 5: Click on Review and Launch

==================================================================================
21
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 6: click on launch

Step 7: Select an Existing key pair or create a new key pair (create new key pair & download
it)

==================================================================================
22
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 8 : after downloading complete , click on launch instances

Step 9: Your instances is successfully launch

==================================================================================
23
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Conclusion: 

We have created account on AWS and it provides access to computing resources in a


virtual environment.  With the help of Infrastructure as a service we can build our own
IT platform. We can install Windows  Operating System on Ubuntu and vice versa. 

==================================================================================
24
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No-4
Aim: To study and implementation of Storage as a Service 

Objectives:  
- Understand use of cloud as Platform, Storage as a services. 
- To learn the efficient tools to implement the technique 

Hardware / Software Required: Google Account 

Theory: 

Storage as a Service (STaaS) is the practice of using public cloud storage resources to
store  your data. Using STaaS is more cost efficient than building private storage
infrastructure,  especially when you can match data types to cloud storage offerings. 

Procedure:
Step 1 : Login as gmail account

Step 2 : Create Excel Sheet

==================================================================================
25
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 3 : Create PPt

==================================================================================
26
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Step 4 : Create Google Classroom

Step 5 : You can see all created document in drive. here you can save all other existing
document as well.

==================================================================================
27
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Conclusion: 

Google Docs provide an efficient way for storage of data. It fits well in Storage as a
service  (STaaS). It has varied options to create documents, presentations and also
spreadsheets. It saves  documents automatically after a few seconds and can be shared
anywhere on the Internet at the  click of a button. 

==================================================================================
28
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical NO. 5

Aim: To study and implementation of identity management 

Objectives:  
- Understand concepts of virtualization and to use cloud as Infrastructure as a services.
Learn  the technique and its complexity 
- Understand the importance of this technique from application
point of view Hardware / Software Required: AWS Account 
Theory: 

Identity and access management (IAM) is a framework of business processes, policies


and  technologies that facilitates the management of electronic or digital identities.
With an IAM  framework in place, information technology (IT) managers can control
user access to critical  information within their organizations. Systems used for IAM
include single sign-on systems, two 
factor authentication, multifactor authentication and privileged access management.
These  technologies also provide the ability to securely store identity and profile data
as well as data  governance functions to ensure that only data that is necessary and
relevant is shared. 

IAM systems can be deployed on premises, provided by a third-party vendor through


a cloud based subscription model or deployed in a hybrid model. 

Procedure:

Open aws.amazon.com in your browser

==================================================================================
29
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Login As Root User

==================================================================================
30
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
31
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Conclusion: 

We have studied how to use AWS for ensuring identity management of the users. We
can create  multiple groups and provide privileges to view or modify data as per
defined permissions. It also  enables simplified look and feel to be used by anyone. 

==================================================================================
32
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No-6
Aim: To Study Cloud Security management 

Objectives: 
- To understand the security features of Cloud. 
- To learn the technique of application security management and its complexity
- To understand the importance of cloud security management from application
point of  view 

Hardware / Software Required: AWS Account 

Theory: 

Cloud computing security is the set of control-based technologies and policies


designed to adhere  to regulatory compliance rules and protect information, data
applications and infrastructure  associated with cloud computing use. Because of the
cloud's very nature as a shared resource, identity management, privacy and access
control are of particular concern. With more  organizations using cloud computing and
associated cloud providers for data operations, proper  security in these and other
potentially vulnerable areas have become a priority for organizations  contracting with
a cloud computing provider. 

Cloud computing security processes should address the security controls the cloud
provider will  incorporate to maintain the customer's data security, privacy and
compliance with necessary  regulations. The processes will also likely include a
business continuity and databackup plan in  the case of a cloud security breach. 

Physical security:- Cloud service providers physically secure the IT hardware (servers,
routers, cables etc.) against unauthorized access, interference, theft, fires, floods etc.
and ensure that  essential supplies (such as electricity) are sufficiently robust to
minimize the possibility of  disruption. This is normally achieved by serving cloud
applications from 'world-class' (i.e.  professionally specified, designed, constructed,
managed, monitored and maintained) data centers. 

Personnel security:- Various information security concerns relating to the IT and other
professionals associated with cloud services are typically handled through pre-, para-
and post employment activities such as security screening potential recruits, security
awareness and training  programs, proactive security monitoring and supervision,
disciplinary procedures and contractual obligations embedded in employment
contracts, service level agreements, codes of conduct,  policies etc. 

Application security:- Cloud providers ensure that applications available as a service


via the cloud (SaaS) are secure by specifying, designing, implementing, testing and
maintaining appropriate  application security measures in the production environment.
Note that - as with any commercial  software - the controls they implement may not
necessarily fully mitigate all the risks they have identified, and that they may not
necessarily have identified all the risks that are of concern to  customers.
Consequently, customers may also need to assure themselves that cloud applications 
==================================================================================
33
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
are adequately secured for their specific purposes, including their compliance
obligations.

Procedure:-

Open AWS Management Console

Click on security Credentials

Click on MFA

Click on Activate MFA

==================================================================================
34
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Select Virtual MFA device and Click on Continue.

Enter MFA Code and click on Assign MFA

==================================================================================
35
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

==================================================================================
36
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Successfully set up virtual MFA device

Create a new access key

Click on Roles

Select AWS Service

==================================================================================
37
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Add permissions to user

Click on Roles

==================================================================================
38
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Create Role

Click on Policies

==================================================================================
39
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Choose Policy

Click on next

Click on Next Tags

==================================================================================
40
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Create Policy.

Conclusion: 

We have studied how to secure the cloud and its data. Amazon AWS provides the best
security  with its extended facilities and services like MFA device. It also gives you the
ability to add your  own permissions and policies for securing data more encrypted. 

==================================================================================
41
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No-7
Aim:- Write a program for web feed RSS - Really Simple Syndication

Concept: Web feed and RSS 

Objective:  

- To understand wed from feed RSS 


- To learn the technique of application publishing content by third party. - To
understand the importance of cloud security management from application point of 
view 

Hardware/Software Requirement:-

XML / PHP, HTML 


https://www.w3schools.in/php/php-rss-feed/ 
RSS technology is used by millions of users around the world to get the latest
information from their  favorite websites. 

https://www.xul.fr/en-xml-rss.html 
Building and Using an RSS Feed 

Procedure:-

Open notepad type the rss code save as rss.xml all file
<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
  <title>W3Schools Home Page</title>
  <link>https://www.w3schools.com</link>
  <description>Free web building tutorials</description>
  <item>
    <title>RSS Tutorial</title>
    <link>https://www.w3schools.com/xml/xml_rss.asp</link>
    <description>New RSS tutorial on W3Schools</description>
  </item>
  <item>
    <title>XML Tutorial</title>
==================================================================================
42
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
    <link>https://www.w3schools.com/xml</link>
    <description>New XML tutorial on W3Schools</description>
  </item>
</channel>

</rss>

Open visual studio 2010

==================================================================================
43
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

The select visual c#  ASP.NET empty website

Add new item

Add new Item

==================================================================================
44
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Select Web Form

Right click website name add exiting item

==================================================================================
45
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Give file As Rss.xml

==================================================================================
46
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Enter below code in added rss file:

RSS FEED DEMO<br /><br />


    Click here to open<a href="rss.xmal">RSS FEED</a>

Click on ok

==================================================================================
47
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Rss feed

==================================================================================
48
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Theory:- 

A syndicated feed, also called a web feed, provides users with frequently updated
content.  Syndicated feeds allow you to publish content to a third-party feed reader. ...
The preconfigured  syndicated feeds are compatible with RSS feed technology and
consist of URL formats that can  be read by most RSS readers. 

Conclusion:- We understood concept of syndication feed as part of RSS. 

==================================================================================
49
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No-8 

Aim:- Study and implementation of Single-Sing-On.

Concept: Single Sing On (SSO),openID 

Objective: is to understand the concept of access control in cloud and single sing on
(SSO), Use  SSO and advantages of it, and also students should able to implementation of
it. 

Hardware/software Requirement:- Auth0 account 

Procedure:-

Open Auth0 Website and click on personal then click on next

Click on Applications

==================================================================================
50
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on SOS integrations

Click on Create SOS Integration

Search Any Website on search bar

==================================================================================
51
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Continue

This is the Lucidchart Website

Click on Save

==================================================================================
52
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Copy URL

Paste link on Chrome Search bar

Theory:- 

Single sign-on (SSO) is an authentication method that enables users to securely


authenticate with  multiple applications and websites by using just one set of
credentials. 

SSO works based upon a trust relationship set up between an application, known as the
service  provider, and an identity provider, like OneLogin. This trust relationship is
often based upon a  certificate that is exchanged between the identity provider and the
service provider. This certificate  can be used to sign identity information that is being
sent from the identity provider to the service  provider so that the service provider
==================================================================================
53
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
knows it is coming from a trusted source. In SSO, this identity  data takes the form of
tokens which contain identifying bits of information about the user like a  user’s email
address or a username. 

Conclusion:- We understood that by using only single account how we can login to
different  websites i.e SSO. 

==================================================================================
54
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Practical No-9
Aim:-User Management in Cloud.

Concept: Administrative features of Cloud Management, User Management

Objective: is to understand how to create, manage user and group of users


accounts.

Hardware/software Requirement:- AWS Account 

Procedure:-

Create a new access key

Click on Roles

Select AWS Service

==================================================================================
55
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Add permissions to user

Click on Roles

==================================================================================
56
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Create Role

Click on Policies

Choose Policy

==================================================================================
57
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on next

Click on Next Tags

==================================================================================
58
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Click on Create Policy.

Theory:- 

User management has been around for a long time now, especially within the IAM, it
has assumed  new importance with introducing cloud-based subscriptions. Recent
trends show that there is a  sure shift to cloud-based IAM, granting administrators
greater access and control over digital  assets management. 

Conclusion:- We understood how to create different users in AWS and assign policies
and roles  as per their requirements. 

==================================================================================
59
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
PRACTICAL NO 10
AIM:- Case Study on Amazon EC2/Microsoft Azure/Google Cloud Platform.

Case Study on Amazon EC2 

What Is Amazon EC2? 

Amazon Elastic Compute Cloud (Amazon EC2) provides scalable computing capacity in
the  Amazon Web Services (AWS) cloud. Using Amazon EC2 eliminates your need to
invest in  hardware up front, so you can develop and deploy applications faster. You can
use Amazon EC2  to launch as many or as few virtual servers as you need, configure
security and networking, and  manage storage. Amazon EC2 enables you to scale up or
down to handle changes in requirements  or spikes in popularity, reducing your need to
forecast traffic. 

Features of Amazon EC2  :Amazon EC2 provides the following features: 

• Virtual computing environments, known as instances 


• Preconfigured templates for your instances, known as Amazon Machine Images (AMIs),
that  package the bits you need for your server (including the operating system and
additional software) • Various configurations of CPU, memory, storage, and networking
capacity for your instances,  known as instance types 
• Secure login information for your instances using key pairs (AWS stores the public key, and
you  store the private key in a secure place) 
• Storage volumes for temporary data that's deleted when you stop or terminate your instance,
known  as instance store volumes 
• Persistent storage volumes for your data using Amazon Elastic Block Store (Amazon EBS),
known  as Amazon EBS volumes 
• Multiple physical locations for your resources, such as instances and Amazon EBS volumes, 
known as Regions and Availability Zones 
• A firewall that enables you to specify the protocols, ports, and source IP ranges that can
reach your  instances using security groups 
• Static IPv4 addresses for dynamic cloud computing, known as Elastic IP addresses •
Metadata, known as tags, that you can create and assign to your Amazon EC2 resources •
Virtual networks you can create that are logically isolated from the rest of the AWS cloud,
and  that you can optionally connect to your own network, known as virtual private clouds
(VPCs) 

How to Get Started with Amazon EC2

15 
First, you need to get set up to use Amazon EC2. After you are set up, you are ready to
complete  the Getting Started tutorial for Amazon EC2. Whenever you need more
information about an  Amazon EC2 feature, you can read the technical documentation. 

==================================================================================
60
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
- Get Up and Running 
Setting Up with Amazon EC2 
Getting Started with Amazon EC2 Linux Instances 
- Basics 
Instances and AMIs 
Regions and Availability Zones 
Instance Types 
- Tags 
Networking and Security 
Amazon EC2 Key Pairs 
Security Groups 
Elastic IP Addresses 
Amazon EC2 and Amazon VPC 
- Storage 
Amazon EBS 
Instance Store 

Accessing Amazon EC2 

Amazon EC2 provides a web-based user interface, the Amazon EC2 console. If you've
signed up  for an AWS account, you can access the Amazon EC2 console by signing
into the AWS  Management Console and selecting EC2 from the console home page.
If you prefer to use a  command line interface, you have the following options: 

AWS Command Line Interface (CLI) 


Provides commands for a broad set of AWS products, and is supported on Windows,
Mac, and  Linux. To get started, see AWS Command Line Interface User Guide. For
more information  about the commands for Amazon EC2, see ec2 in the AWS CLI
Command Reference. 

AWS Tools for Windows PowerShell 


Provides commands for a broad set of AWS products for those who script in the
PowerShell  environment. To get started, see the AWS Tools for Windows
PowerShell User Guide. For more  information about the cmdlets for Amazon EC2,
see the AWS Tools for PowerShell Cmdlet  Reference.

Amazon EC2 provides a Query API. These requests are HTTP or HTTPS requests that
use the  HTTP verbs GET or POST and a Query parameter named Action. For more
information about the  API actions for Amazon EC2, see Actions in the Amazon EC2
API Reference. 

If you prefer to build applications using language-specific APIs instead of submitting a


request  over HTTP or HTTPS, AWS provides libraries, sample code, tutorials, and
other resources for  software developers. These libraries provide basic functions that
automate tasks such as  cryptographically signing your requests, retrying requests, and
handling error responses, making  it is easier for you to get started.  
==================================================================================
61
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Pricing for Amazon EC2 

When you sign up for AWS, you can get started with Amazon EC2 for free using the
AWS Free  Tier. Amazon EC2 provides the following purchasing options for
instances: 

On-Demand Instances 
Pay for the instances that you use by the second, with no long-term commitments or
upfront  payments. 
Savings Plans 
You can reduce your Amazon EC2 costs by making a commitment to a consistent
amount of  usage, in USD per hour, for a term of 1 or 3 years. 
Reserved Instances 
You can reduce your Amazon EC2 costs by making a commitment to a specific
instance  configuration, including instance type and Region, for a term of 1 or 3
years. Spot Instances 
Request unused EC2 instances, which can reduce your Amazon EC2 costs significantly. 

Case Study on Microsoft Azure 

What is Microsoft Azure? 

Azure is a cloud computing platform which was launched by Microsoft in February 2010.
It is an  open and flexible cloud platform which helps in development, data storage,
service hosting, and service management. The Azure tool hosts web applications over the
internet with the help of  Microsoft data centers. 

Types of Azure Clouds 

There are mainly three types of clouds in Microsoft Azure are: 

1) PAAS 
2) SAAS 
3) IASS 

==================================================================================
62
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Azure key Concepts
Concept Description
Name 

Regions  Azure is a global cloud platform which is available across various


regions  around the world. When you request a service, application, or
VM in Azure, you  are first asked to specify a region. The selected region
represents datacenter  where your application runs.

Datacenter  In Azure, you can deploy your applications into a variety of data centers
around  the globe. So, it is advisable to select a region which is closer to
most of your  customers. It helps you to reduce latency in network
requests.

Azure The Azure portal is a web-based application which can be used to create,
portal  manage  and remove Azure resource and services. It is located at
https://portal.azure.com.

Resources  Azure resource is an individual computer, networking data or app


hosting services which charged individually. Some common resources
are virtual  machines( VM), storage account, or SQL databases.

Resource   An Azure resource group is a container which holds related resource for
groups an  Azure solution. It may include every resource or just resource which
you wants  to manage.

Resource   It is a JSON which defines one or more resource to deploy to a resource


Manager   group.  It also establishes dependencies between deployed resources.
templates

Automation:  Azure allows you to automate the process of creating, managing and
deleting  resource by using PowerShell or the Azure command-line
Interface(CLI)

Azure Domains (Components) 

==================================================================================
63
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Advantages of Azure 

- Azure infrastructure will cost-effectively enhance your business continuity


strategy - It allows you to access the application without buying a license for the
individual machine - Windows Azure offers the best solution for your data needs,
from SQL database to blobs  to tables
- Offers scalability, flexibility, and cost-effectiveness 
- Helps you to maintain consistency across clouds with familiar tools and resources
- Allows you to extend data center with a consistent management toolset and
familiar  development and identity solutions. 
- You can deploy premium virtual machines in minutes which also include Linux and 
Windows servers 
- Helps you to scale your IT resources up and down based on your needs - You are
not required to run the high-powered and high-priced computer to run cloud 
computing web-based applications. 
- You will not require processing power or hard disk space if you are
using Azure - Cloud computing offers virtually limitless storage 
- If your personal computer or laptop crashes, all your data is still out there in the
cloud, and  it is still accessible 
- Sharing documents leads directly to better collaboration 
- If you change your device your computers, applications and documents follow you
through  the cloud 

Disadvantages of Azure 

- Cloud computing is not possible if you can't connect to the Internet 


- Azure is a web-based application which requires a lot of bandwidth to download, as
do  large documents 
- Web-based applications can sometimes be slower compared to accessing a similar
software  program on your desktop PC. 

Case Study on Google Cloud Platform 

What Is Google Cloud Platform? 


==================================================================================
64
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Among various cloud providers, Google Cloud protrudes because of its innovative
tools and  services. Gartner announced Google Cloud as a leader in the IaaS Magic
Quadrant in 2018.  According to its prediction, the worldwide public cloud services
market is projected to grow 17.3  percent in 2019 to $206.2 billion, from $175.8 billion
in 2018. Learn about What Is Google  Cloud Platform end to end from this blog.
Google Cloud is a suite of Cloud Computing services offered by Google. The
platform provides various services like compute, storage, networking, Big Data, and
many more that run on the  same infrastructure that Google uses internally for its end
users like Google Search and  YouTube. 

Google server hasn’t gone down in years. So, if you are planning to run your
application on the  Google Cloud infrastructure, then you can be assured of your
applications being safe and secure. 

Let’s look into a few benefits that Google Cloud has to offer to its users:

==================================================================================
65
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Best Pricing: Google Cloud hosting plans are cheaper than other platforms’ hosting
plans. Google  Cloud offers to its customers the pay-as-you-go feature where the users
only have to pay for the  resources they use. 

Work from Anywhere: Employees gain complete access to information across devices
from  anywhere in the world through web-based applications powered by Google. 

Private Network: Google provides its own network to every customer so that they have
more  control and scalability over the network. It uses fiber-optic cables to spread its
network, as they  tend to bear any amount of traffic. Users get maximum time and
efficiency due to this private  network. 

If you have any doubts or queries related to GCP, do post on GCP Community 

Security: Google has hired a large set of security professionals who help in protecting
the data on  servers. All data on the Cloud platform is encrypted. So, users can be sure
of their data being safe  and secure. 

Redundant Backup: Google has its own in-built redundant backups. So, if the data
stored by the  user is lost, then Google would have created a backup for it. So, your
data is technically not lost!  Redundancy helps ensure data integrity, reliability, and
durability. 

Google Cloud Services 

Google Cloud has been expanding across the globe. The reason is the wide array of
services it  offers to its users: 

- Compute Services 
- Storage Services 
- Networking
- Big Data Services 
- Security and Identity Management 
- Management Tools 
- Cloud AI 
- IoT 

==================================================================================
66
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Compute Services 
Google App Engine: Platform as a Service to deploy Java, PHP, and other
applications. It is a  Cloud Computing platform for developing and hosting web
applications in Google-managed data  centers. It offers the automatic scaling feature,
i.e., as the number of requests for an application  increases, the App Engine
automatically allocates more resources for the application to handle  additional
demand. 

Compute Engine: Infrastructure as a Service to run Microsoft Windows and Linux


virtual  machines. It is a component of the Google Cloud platform which is built on the
same infrastructure  that runs Google’s search engine, YouTube, and other services. 

Kubernetes Engine: It aims at providing a platform for automating deployment,


scaling, and  operations of application containers across clusters of hosts. It works with
a wide range of  container tools including docker. 

Storage Services 

Google Cloud Storage: An online file storage web service for storing and accessing
data on a  Google Cloud platform infrastructure. The service combines the
performance and scalability of  Google Cloud with advanced security and sharing
capabilities.

Cloud SQL: A web service that allows you to create, configure, and use relational
databases that  live in Google Cloud. It maintains, manages, and administers your
databases allowing you to focus  on your applications and services. 

Cloud Bigtable: A fast, fully managed, and a highly scalable NoSQL database service.
It is  designed for the collection and retention of data from 1 TB to hundreds of PB. 

Networking 

VPC: Virtual Private Cloud provides a private network with IP allocation, routing, and
network  firewall policies to create a secure environment for your deployments. 

Cloud Load Balancing: It is a process of distributing workloads across multiple


computing  resources. This reduces the cost and maximizes the availability of the
resources. 

Content Delivery Network: A geographically distributed network of proxy servers and


their data  centers. The goal here is to provide high availability and high performance
by spatially distributing  the service relating to end users. 

Big Data 

BigQuery: Google BigQuery Service is a fully managed data analysis service that
enables  businesses to analyse Big Data. It features highly scalable data storage, the
ability to perform ad hoc queries, and the ability to share data insights via the web. 

==================================================================================
67
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================
Google Cloud Datastore: A fully managed, schema less, non-relational datastore. It
supports  atomic transactions and a rich set of query capabilities and can automatically
scale up and down  depending on the load. 

Google Cloud Dataproc: A fast, easy-to-use and manage Spark and Hadoop service
for  distributed data processing. With Cloud Dataproc, you can create Spark or Hadoop
clusters, sized  for your workloads precisely when you need them. 

Top Users of Google Cloud 

Now that we are well aware of the Google Cloud benefits and services, let’s now have
a look on  the top users of this cloud platform. 

Twitter: A well-known application, which lets people share information. With people
tweeting  more and more every day, the data produced is enormously large. Google
Cloud is used for storing  and computing purpose.

20th Century Fox: Data scientists at 20th Century Fox and Google Cloud have developed a 
Machine Learning software that can analyse movie trailers and predict how likely people are
to  see those movies in theaters. 

PayPal: PayPal partners with Google Cloud to increase security, build a faster network, and 
develop services for its customers. 

eBay: eBay uses Google Cloud to innovate in image search, improve customer experiences
in  China, and train translation models. 

Chevron:Chevron uses Google AutoML Vision to find information that is always challenging
to  get when you need it. 

HSBC: HSBC brings a new level of security, compliance, and governance to its banks using 
Google Cloud. 

LG CNS: LG CNS data analytics solution, with Google AI and Edge TPU, will provide a
great  value for LG CNS customers in the smart factory arena.

==================================================================================
68
Name : Mayur Dnyandev Shinde Subject : Cloud Computing
Class : T.Y.B.Sc.C.S. Roll No. : 89
==================================================================

Google Cloud Pricing 

GCP is not only cheaper but they offer other benefits too. Let’s have a
look at a few: Lower Prices: 

Compared to other cloud providers, Google offers a massive 60 percent savings which
consists of: 

- 24 percent sustained usage discounts 


- 21 percent list price differences 
- 15 percent rightsizing recommendation 

Pay-as-you-go: Google Cloud offers the ‘use now, pay later’ policy. Users have to pay
only for  the services they use. 

No Termination Fee: The moment you stop using the services, you stop paying for it.

==================================================================================
69

You might also like