0% found this document useful (0 votes)
73 views275 pages

Clud Merged PDF

The document provides an introduction to cloud computing, detailing its evolution, types of systems, and benefits compared to on-premise solutions. It outlines various cloud service models, deployment models, and key characteristics such as on-demand self-service and resource pooling. Additionally, it discusses the economic aspects of cloud computing, including utility pricing and the value of common infrastructure.

Uploaded by

rbrohit2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views275 pages

Clud Merged PDF

The document provides an introduction to cloud computing, detailing its evolution, types of systems, and benefits compared to on-premise solutions. It outlines various cloud service models, deployment models, and key characteristics such as on-demand self-service and resource pooling. Additionally, it discusses the economic aspects of cloud computing, including utility pricing and the value of common infrastructure.

Uploaded by

rbrohit2002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Introduction to Cloud

Computing
Dr. Vanjari Venkata Ramana
Assistant Professor
Department of Electrical Engineering
Delhi Technological University

1
Evolution of access to data
" Cassettes
" VCRs
" Home computers
" Internet
" Storage
" Different Computing Technologies

2
Types of Systems
" Centralized
" Decentralized
" Distributed

3
Cloud Computing
" Cloud computing is the delivery of different services
through the Internet. These resources include tools and
applications like data storage, servers, databases,
networking, and software, analytics and intelligence
" Cloud computing refers to applications and services
that run on a distributed network using virtualized
resources and accessed by common Internet protocols
and networking standards.
" It is distinguished by the notion that resources are
virtual and limitless and that details of the physical
systems on which software runs are abstracted from
the user.

4
On-Premise Vs Cloud Computing
On-Premise Cloud Computing
Higher pay, less scalability Pay for what you use
" Scale up=pay more
" Scale down=pay less
Huge space for servers " Server space is not required
A team is required for maintain No Team is required for maintain
hardware and software hardware and software
Poor data Security Better data security
Less chance of data recovery Disaster recovery
Lack of Flexibility High Flexibility
No automatic updates Automatic Software updates
Less Collaboration Teams can collaborate from widespread
locations
5
Data cannot be accessed remotely Data can be accessed and shared
anywhere via internet
Takes longer implementation time Implementation Time is very less
History of Cloud
Year Developments
1955 Renting Time shared Computing resources to companies who
could not afford technology (Beginning of Cloud Concept)
1969 Advanced Research Projects Agency Network (ARPANET)
1972 IBM Developed a mainframe VM/370
1980-89 Computer boom: Consumers started accessing Remote Networks
Via Modems
1990-98 Internet Growth: Cloud Computing; Internet Solution Division
Strategy for Cloud Computing
1999 Salesforce.com
2002 Amazon Web Services
2006 Elastic Computing Cloud (EC2) launched by AWS 6

2011 iCloud by Apple


2012 Google Drive
Benefits of Cloud

" Storage
" Compute
" Email
" Development
" Collaboration
" Sharing
" Streaming
" Many Other 7
Examples of Computing Resources
" Networks
" Servers
" Storage
" Applications
" Services

8
Types of Cloud Services
" Backup as a Service
" Data as a service
" Communication as a Service
" Database as a Service
" Platform as a Service
" Identity as a Service
" Software as a Service
" Infrastructure as a Service
" Storage as a Service
9
AWS Services
" Compute
" Storage
" Database
" Network and Content Delivery
" Analytics
" Machine Learning
" Security, Identity and Compliance

10
Working on Specific Service
" Service Introduction
" Learning about the Console
" Working on Console Using Python

11
Definition of Cloud
" According to the official NIST definition, "cloud
computing is a model for enabling ubiquitous,
convenient, on-demand network access to a shared
pool of configurable computing resources (e.g.,
networks, servers, storage, applications and
services) that can be rapidly provisioned and
released with minimal management effort or
service provider interaction."

12
What is Cloud Computing?
" Storage of data/applications on remote servers
" Processing Applications and data from servers
" Accessing data/Applications Via Internet

13
Cloud Model
" Essential Characteristics 2 5
" Deployment Models 2 3
" Service Models - 3

14
Essential Characteristics of Cloud
" On Demand Self Service
" Broad Network Access
" Rapid Elasticity or Expansion
11.3
AN
" Resource Pooling
" Measured Service

15
On-Demand Self Service
" Access to Cloud Resources such as
" Processing Power
" Storage
" Network
" Done by a simple interface without human
interaction with the service provider

16
Broad Access Network
" Resources can be accessed via networks through
standard machines and platforms such as
" Mobile phones
" Tablets
" Laptops
" Workstations

17
Resource Pooling
" gives the cloud providers economics of scale
" Resources are dynamically assigned to the demand
" Customers need not be concerned about the
physical location of the resources

Rapid Elasticity
" Scale up the resources when there is a need and
scale down when there is no demand

18
Measured Service
" Pay only for what you use or reserve as you go
" Resource usage is monitored measured and
reported transparently based on utilization

19
Cloud Computing as a Service
" we utilize cloud computing as a service leveraging
the remote system on-demand over the internet
" Scaling up
" Scaling back
" Pay for what we use
" As a Service, cloud computing is
" Cost effective
" More Agile to market changes
20
Benefits
" Pay as you go
" Security and Disaster Assistance
" Off-site Data Storage
" Lower Cost of Ownership
" Access the data from any where
" Automatic and easily upgraded

21
Deployment Models
" Public
" Leverage Cloud services over the open internet on hardware owned
by the cloud provider, but its usage is shared by other companies
" Cloud infrastructure is made available to the general public
" Example: AWS, Azure, IBM9S Bluecloud
" Private
" Cloud infrastructure is provisioned for exclusive use by a signal
organization
" Could run on-premise or off-premise
" could be managed and operated by a service provider
" Example: AWS, VMware
" Hybrid
" Consists of the functionality of both public and private clouds
" Example: Federal Agencies
" opt for private cloud when sensitive information is involved
" Public cloud to share data with general public or other government
22
departments
Service Models
" Infrastructure as a Service (IaaS)
" Abstract the user from a physical machine
" Get access to infrastructure and physical computing resources such as
" Servers
" Networking
" Storage
" No Need to manage or operate them
" If your business needs a virtual machine
" Platform as a Service (PaaS)
" No Control over the underlying architecture including OS, Storage, servers, etc.
" Cloud provider gives the ability to customer to deploy customer-created apps using
programming languages and tools that are provided by the service provider
" If your business requires a platform for building software products
" Software as a Service (SaaS)
" Software licensing and delivery model
" Software and applications are centrally hosted and licensed on a subscription bases
" If your business doesn't want any IT equipment 23
Analogy

24

Source: simplilearn.com
compute
Storage
Source: stackscale Nlw 20
25
Service Models

Source: c-sharpcorner.com 21
26
Agility
Key Drivers for
CC Flexibility

Competitiveness
Key Considerations for Cloud
Computing

" Infrastructure and Workloads


" SaaS and development platforms
" Speed and productivity
" Risk Exposure

28
Benefits of Cloud Adoption
" Flexibility
" Users can scale back or scale-up services to fit their needs
" Customize applications
" Access cloud services from anywhere
" Helps keep data secure
" Virtual Private Clouds
" Encryption
" Efficiency
" Users can get applications to the market quickly without worrying
about underlying infrastructure costs or their maintenance
" Applications are accessible virtually
" No data loss because of backups
" Strategic Values
" Provides innovative technologies
" Enables organizations to focus on their priorities

29
Challenges of Cloud Adoption
" Data Security DDOS
" Governance issues
" Legal, regulatory, and compliance issues
" Lack of Standardization
" Choosing the correct deployment and service
model to serve specific needs
" Partnering with right cloud service providers
" Concerns related to business continuity and
disaster recovery

30
Future of Cloud Computing
Gartner.com
" As per predictions by Gartner
Service CAGR (In 2022)
Public Cloud Service Market 12.6%
Spending on Iaas 27.5%
Spending on Paas 21.8%
Spending on Saas 22%

31
Cloud Service Providers
" Alibaba Cloud
" Amazon Web Services
" Microsoft Azure
" Google Cloud
" SAP
" IBM Cloud
" Salesforce
" Oracle Cloud

32
Alibaba Cloud (Aliyun)
" Largest Chinese Cloud Computing Service Provider
" It provides services for its
" customers online business
" Own e-commerce ecosystem
" Offers various products and services
" Compute
" Network
" Storage
" Security
" Monitoring and Managing
" Communication
" Analytics I
" IoT
" Application Development
" Data Migration
" Webhosting

33
Amazon Web Services
" Offers Extensive range of infrastructure and platform
services to
" Individuals
" Companies
" Governments
" Donee at pay-as-you-go basis
" Products and Services
" Compute
" DevOPs
" Data Analytics
" IoT
" Machine Learning
" Networking
" Content Delivery
" Robotics
" Serverless computing, etc.

34
Google Cloud Platform
" Provides Infrastructure, platforms, and Serverless
Computing
" Uses internally for Google Search and YouTube
" It also clouds G Suite for
" Communication
" Collaboration
"
"
Productivity
Storage
I
" Google App Engine is used for developing and hosting
web applications in google managed data centers
automatically allocating and de-allocating resources to
handle demand
35
IBM Cloud

" Offerings
" Bare Metal Servers
H
Full Stack Products and " VMWare
platform Services
" Virtual Private Cloud
" Public " Compute " BlockChain
" Private " Network
" Hybrid " Storage " AI ƒ

" Management " Data Analytics


" Security
" DevOps
" Databases " Leading hybrid cloud
provider
and technloog
Full stack is the entire setof stweproducts
a particular platform for
applications
used to accomplish
36
Microsoft Azure
" Provides applications and services for
" Building
" Testing
" Deploying
" Managing
" Done by Microsoft managed data centers
" Provides Infrastructure, Software, and platform
services supporting Microsoft specific and third-
party languages, tools and frameworks

37
Oracle Cloud

" Known for


" SaaS
" DbaaS (Oracle Data Cloud)
" Oracle Software Cloud provides
Supply chain and management
Humancapitalmanganet
" Marketing
" Sales
" Provides few infrastructure and platform services
38
Salesforce
" Specialized in SaaS
" Customer relationship management
" Supporting business
" Offers multiple cloud Services
" Sales Cloud
" Service Cloud
" Marketing Cloud
" Key Functions
" Track analytics in real time
" Customer success and support

39
SAP
" Meant for enterprise software and applications
" ERP
" CRM Customer Relationship and management
" HR
" Finance

40
References
" Text Book: Sosinsky, B. (2010). Cloud computing
bible. John Wiley & Sons for Unit-1
" https://in.coursera.org/learn/introduction-to-
cloud? (You can Audit this course)

41
Economics Related to
Cloud
Dr. Vanjari Venkata Ramana
Assistant Professor
Department of Electrical Engineering
Delhi Technological University

1
Introduction
" Economics is the foundation of Cloud Computing
" Reference is:
" J. Weinmann, <Cloudonomics: A Rigorous Approach to
Cloud Benefit Quantification=.
" Two Parts:
" Part 1: Utility Pricing
" Part 2: Benefits Common Infrastructure

2
Value of Utility Pricing
" Cloud services don9t need to be cheaper to be
economic!
" Consider a car
" Buy or lease for Rs. 500 per day
" Rent a car for Rs. 4500 a day
" If you need a car for 2 days in a trip, buying would be
much more costly than renting
" It depends on the demand

3
Utility Pricing in Detail
D(t): demand for resources, 0<t<T
A = Avg ( D(t) ): Average Demand
P = max( D(t) ): Peak Demand;
BT = Total Baseline Cost
B = Baseline (owned) unit cost;
CT = Total Cloud Cost
C = Cloud unit cost;

1am

4
Utility Pricing in Detail
" Utility Premium = C/B
" Eg. If the Cloud Unit Cost is Rs. 2500/- and baseline unit
cost is Rs. 500/-
" The Utility Premium is 5

" Total Baseline Cost

" BT= P × B × T
T
Iday
5
C CDAdt
Utility Pricing in Detail
" Total Cloud Cost (CT)
" �㗃 = + �㗄 × �㗃 × �㗃 �㗆 . �㗅�㗆

IEA
" In order to choose cloud for our usage, the
U

condition is �㗃 < �㗃
say
" i.e., A × U × B × T < P × B × T Hdt
" �㗄 <
A

PxBXT 45 107
D dt 6
800 2 30 1 It
Utility Premium in Real World
" In practice, demands are often highly spiky
" News stories, marketing promotions, product launches, tax
season, festival shopping, etc.
" Often a hybrid model is the best
" You own a car for daily commute, and rent a car when
traveling or when you need a van to move
" Key factor is again the ratio of Peak Demand to Average
Demand
" But we should also consider other costs
" Network cost (both fixed costs and usage costs)
" Interoperability overhead
" Consider reliability, accessibility

7
Key Points on Utility Premium
" Utility Pricing is good when demand varies over
time, as is the case of a start-up or a seasonal
business
" When Utility Premium is less than ratio of Peak
Demand to Average Demand, Cloud computing
is beneficial

8
The Value of Common Infrastructure
" For infrastructure built to peak requirements:
Multiplexing demand ð higher utilization
" Lower cost per delivered resource than unconsolidated
workloads 7

" For infrastructure built to less than peak:


Multiplexing demand
" ð reduce the unserved demand
" Lower loss of revenue or a Service-Level agreement
violation payout

9
Measure of Smoothness
" The coefficient of variation:
standard deviation Ã
�㗃�㗄 =
mean |¿|

" �㗃�㗆 is a measure of smoothness


" small is smooth!
" large mean and/or smaller standard deviation

10
Coefficient of Variation
standard deviation Ã
" �㗃 =
mean |¿|
3( ¿)
"Ã=

11
12
13
14
15
Problem on Cloud Economics
Consider that the peak demand for an organization is 900 units.
The demand as a function of time is expressed as:

D(t) = 100(2 + 3e −t )

Where t is the time units. The baseline unit cost is 1000, the cloud
unit cost is 2500. In this situation, is cloud cheaper than an
on-premise enterprise for a period of 500 time units?
Be 1000
C 2500
P 900
T 500
Comparison

Figure: On-Premise Vs IaaS Vs PaaS Vs SaaS


Important Terms Related to Cloud

I Networking
I Storage
I Servers
I Virtualization
I Operating System
I Middleware
I Runtime
I Data
I Applications
Cloud Networking

I Cloud networking is a type of IT infrastructure in which some


or all of an organization’s network capabilities and resources
are hosted in a public or private cloud platform.
I These resources can be managed either in-house or by a
service provider, and they are available on demand.
I Companies have the flexibility to use on-premises cloud
networking resources to build a private cloud network or
utilize cloud-based networking resources in the public cloud.
I Additionally, a hybrid cloud approach, combining both private
and public cloud resources, is also an option.
I Typical network resources in cloud networking include virtual
routers, firewalls, bandwidth, and network management
software, with other tools and functions available as required.
Comparison of Storage Types-GCP (Slide 1)
Storage Description Best for
Type
Standard Storage for data that ”Hot” data, includ-
Storage is frequently accessed ing websites, stream-
(”hot” data) and/or ing videos, and mobile
stored for only brief apps.
periods of time.
Nearline Low cost, highly Data that can be
Storage durable storage stored for 30 days.
service for storing
infrequently accessed
data.
Coldline A very low cost, Data that can be
Storage highly durable storage stored for 90 days.
service for storing
infrequently accessed
data.
Comparison of Storage Types-GCP (Slide 2)

Storage Description Best for


Type
Archival The lowest cost, Data that can be
Storage highly durable stor- stored for 365 days.
age service for data
archiving, online
backup, and disaster
recovery.
Cloud Servers

I A cloud server is a pooled, centralized server resource that is


hosted and delivered over a network—typically the
Internet—and accessed on demand by multiple users.
I Cloud servers can perform all the same functions of a
traditional physical server, delivering processing power,
storage, and applications.
I Cloud servers can be located anywhere in the world and deliver
services remotely through a cloud computing environment.
I In contrast, traditional dedicated server hardware is typically
set up on premises for exclusive use by one organization.
Regions and Availability Zones

Figure: Regions and Availability Zones


Regions and Availability Zones

Figure: Regions and Availability Zones


Data Center

Figure: Data Center


Data Center

Figure: Data Center


Data Center

Figure: Data Center


Data Center

Figure: Data Center


Cloud Virtualization

Definition
Cloud virtualization is a key technology in cloud computing that
involves creating virtual instances of computing resources, such as
servers, storage, or networks, within a cloud infrastructure.
I It allows for the abstraction and sharing of physical resources
to create multiple virtualized instances.
I These virtual instances, often referred to as virtual machines
(VMs) or containers, operate independently and can run
different operating systems and applications.
I Cloud virtualization optimizes resource utilization, enhances
scalability, and improves resource isolation.
I It is a fundamental component for creating and managing
cloud services and is a key enabler of cloud flexibility and
efficiency.
Operating Systems in the Cloud
Introduction
Operating systems play a crucial role in the cloud computing
ecosystem, enabling the efficient management of cloud resources
and services.
I Cloud OS: Cloud service providers often use specialized cloud
operating systems that are optimized for virtualized
environments.
I User Choice: Cloud users can select their preferred operating
system when provisioning virtual machines (VMs) or cloud
services.
I Compatibility: Compatibility and support for various
operating systems are essential to accommodate diverse
application requirements.
I Management: Effective OS management ensures security,
scalability, and resource allocation in cloud environments.
Middleware in Cloud Computing

Definition
Middleware in cloud computing acts as an intermediary software
layer facilitating communication, integration, and management of
services and resources in the cloud environment.
I Middleware provides essential functions like data storage,
communication, security, and scalability.
I It enables seamless integration of various cloud services and
components, promoting interoperability.
I Middleware assists in orchestrating complex cloud workflows
and automating processes.
I Examples include message queues, database connectors, API
gateways, and service buses.
Sensors

I Usage of sensors in devices like cameras, mobiles, and various


other devices has increased drastically.
I Sensor devices are available widely.
I Wireless sensor technology plays a key role in this aspect.
I Sensors:
I Collect data for their environment.
I Generate information.
I Raise awareness about the context.
I Example: Electronic Jacket
Runtime in Cloud Computing

Definition
In cloud computing, runtime refers to the period during which an
application or service is actively executing on cloud infrastructure.
It encompasses the execution of code, data processing, and the
runtime environment.
I Dynamic Scaling: Cloud platforms allow dynamic scaling of
resources to match runtime demands, ensuring optimal
performance.
I Resource Management: Effective runtime management
involves monitoring, load balancing, and resource allocation.
I Billing and Cost: Runtime duration often affects cost, as
cloud providers charge based on resource usage over time.
I Efficiency: Optimizing runtime contributes to efficient
resource utilization and improved user experiences.
Comparison

Figure: On-Premise Vs IaaS Vs PaaS Vs SaaS


Working of Sensor

Figure: Working of Sensor


Introduction to IoT - Part 1
Transforming the World Through Connectivity
I Definition of IoT: IoT, or the Internet of Things, is a
transformative technological paradigm that encompasses a
vast network of interconnected physical devices, objects, and
sensors. These ”things” are embedded with sensors, software,
and network connectivity, enabling them to collect, exchange,
and act on data without direct human intervention.
I Ubiquitous Connectivity: At its core, IoT is about enabling
connectivity and communication between everyday objects
and the digital world. It allows ”things” to share information,
perform tasks, and make decisions autonomously, all while
being connected to the internet.
I Diverse Applications: IoT finds applications across various
domains, including healthcare, manufacturing, agriculture,
transportation, smart cities, and more. It is not limited to a
specific industry, making it a versatile technology with the
potential to revolutionize numerous sectors.
Introduction to IoT - Part 2
Transforming the World Through Connectivity (Continued)

I The IoT Ecosystem: To understand IoT fully, it’s essential


to grasp the components of its ecosystem, which includes
devices, sensors, communication protocols, cloud platforms,
and data analytics tools. These components work together to
enable the seamless flow of data and information.
Introduction to IoT - Part 3
Transforming the World Through Connectivity (Continued)

I Key Characteristics: IoT is characterized by several key


features, such as connectivity, data collection, automation,
and scalability. These characteristics enable IoT to bridge the
physical and digital worlds, creating new opportunities and
efficiencies.
I Transformation Impact: IoT has the potential to transform
industries, improve efficiency, enhance decision-making, and
create entirely new business models. It offers benefits like
predictive maintenance, real-time monitoring, and data-driven
insights.
Key Takeaway: IoT is a groundbreaking technology that leverages
connectivity and data to revolutionize industries and enhance our
daily lives. It connects physical objects to the digital realm,
enabling automation, insights, and unprecedented opportunities for
innovation.
IoT Connectivity

I ”People” connect to ”Things.”


I With the help of motion sensors in humans to different areas
like hospitals.
I ”Things” connecting to ”Things.”
I Examples:
I Driverless cars.
I Searching for the nearest petrol station in case of emergencies.
Examples of IoT Applications

I Ultra-high speed wireless


I Electric Vehicles with internet
built-in sensors I Biometric cybersecurity
I Power Systems scanners
I Smart home security systems I Shipping container and
I Autonomous farming logistics tracking
equipment I Thermostats
I Wearable health monitors I Cars, lights, refrigerators
I Smart factory equipment I Farm animals with biochip
I Wireless inventory trackers transponders
I Heart monitor implants
IoT: Extending Connectivity

I Extending the internet connection between devices and


physical objects (Things).
I Provides connection, communication, and internet working.
I Developed in such a way that there is no requirement of:
I Human to human interaction
I Human to computer interaction
I Objects or people are provided with:
I Unique identifiers
I Ability to transfer data over a network
The Convergence of IoT and Cloud

I IoT devices generate an enormous amount of data, often


requiring extensive computational resources and storage for
data analysis and decision-making.
I Cloud computing provides the ideal platform for processing,
storing, and analyzing this data efficiently.
I The convergence of IoT and cloud computing refers to the
integration of IoT devices and the cloud infrastructure to
enhance IoT capabilities.
IoT Cloud Architecture

I Basic Building Blocks:


I Things
I Gateways
I Network
I Cloud

Figure: IoT Cloud Architecture


DEVELOPING VEHICULAR DATA CLOUD SERVICES IN
THE IoT ENVIRONMENT

Figure: Source: He, W., Yan, G.,et al.. (2014). Developing vehicular data
cloud services in the IoT environment. IEEE transactions on industrial
informatics, 10(2), 1587-1595.
Key Aspects of Convergence
I Scalability: Cloud platforms can easily scale up or down to
accommodate the growing number of IoT devices and the
data they generate.
I Data Storage: Cloud storage solutions provide a secure and
scalable repository for storing historical and real-time IoT
data.
I Data Processing: Cloud-based data analytics tools enable
organizations to extract valuable insights from IoT data, often
in real-time.
I Device Management: Cloud-based device management
platforms simplify the administration and monitoring of IoT
devices across various locations.
I Security: Cloud providers offer robust security features,
including encryption and access control, to protect IoT data
and devices.
I Integration: Cloud platforms facilitate the integration of IoT
data with other enterprise systems, enabling more
comprehensive analysis and automation.
Importance of IoT in Modern World

I The Internet of Things (IoT) has become a cornerstone of


modern society.
I It connects billions of devices, transforming industries and
daily life.
I IoT enhances efficiency, data-driven decision-making, and
automation.
I Key areas impacted include healthcare, transportation,
industry, and more.
Benefits of Cloud in IoT
I Scalability: Cloud platforms provide the ability to scale IoT
solutions easily as the number of devices and data volume
grow.
I Storage: Cloud offers secure and cost-effective storage for vast
amounts of IoT data, accessible from anywhere.
I Real-time Processing: Cloud services enable real-time data
processing, allowing for instant insights and actions.
I Device Management: Centralized cloud-based device
management simplifies control and monitoring of IoT devices.
I Data Analytics: Cloud analytics tools extract valuable insights
from IoT data, supporting data-driven decision-making.
I Security: Cloud providers offer robust security measures,
including encryption and access control, enhancing IoT
security.
I Integration: Cloud facilitates seamless integration of IoT data
with other enterprise systems and applications.
Challenges in IoT and Cloud Integration
I Interoperability: Heterogeneous IoT devices may have
different communication protocols, making seamless
integration challenging.
I Security Concerns: Protecting IoT data during transmission
and storage in the cloud is critical due to privacy and
cybersecurity risks.
I Scalability: Ensuring that cloud infrastructure can handle the
increasing number of IoT devices and data volume is a
challenge.
I Latency: Real-time IoT applications require low latency, which
can be affected by cloud data processing delays.
I Reliability: Downtime in cloud services can disrupt IoT
operations, particularly in critical applications.
I Data Governance: Compliance with data regulations and data
ownership can be complex when using cloud services for IoT.
I Cost Management: Cloud costs can escalate with IoT scale,
necessitating careful cost monitoring and optimization.
Aspects of IoT Systems
I Scalability
I Number of Sensors and Actuators
I Network
I Data
I Speed of Movement
I Processing Power
I Big Data
I Role of Cloud Computing
I Cloud computing platforms offer the potential to use large
amounts of resources.
I Scalability and Flexibility.
I Pay as You Use and On-Demand.
I Clients can offload their data and applications on the cloud for
storage and processing.
I All other advantages of cloud computing.
I Data and Services are stored remotely but accessible from
anywhere.
I Real-Time
I Highly Distributed
Power distribution
Electricity is
generated and
distributed in a
number of ways
Data center power path

Generators Switchgear Uninterruptable Power Remote Rack


Power Supply Distribution Unit Power Panel PDU
& distribution (UPS) (PDU) (RPP)

Utility

Utility

Data center electrical path

• Voltage is transformed down as power goes downstream


• Each step has controls and safeguards
Server power supply
Rear of rack

Rack power
distribution Servers
unit (PDU) 120V
Server internal power distribution
Servers and other IT equipment have
internal transformers and regulators
5V
Components
Internal Drive

12V
External Drive

3.3V
I/O
12V 1.5/2.5V
120V Multi-output Memory Controller
AC/DC DC/DC
DC/DC
Switcher 12V 1.1V-1.85V
DC/DC Microprocessor

3.3V
SDRAM

3.3V
Graphics Controller

AC/DC Multi output power supply


DC/DC Voltage Regulator Modules
Section 1: Basics of IaaS
What is IaaS?

▶ Definition and Explanation


▶ Comparison with Other Cloud Service Models
▶ Key Characteristics of IaaS
Infrastructure as a Service (IaaS)

Definition
IaaS is a cloud computing service model that provides virtualized
computing resources over the internet, allowing users to provision
and manage infrastructure components such as virtual machines,
storage, and networking on-demand.

Explanation
▶ IaaS abstracts and virtualizes physical hardware, delivering it
as a service.
▶ Users can access and control their infrastructure through a
web-based interface or APIs.
▶ It eliminates the need for organizations to invest in and
maintain physical data centers.
▶ IaaS is known for its scalability, flexibility, and
cost-effectiveness.
IaaS Components
Virtualization

▶ Virtualization is a fundamental component of IaaS.


▶ It abstracts physical hardware, enabling the creation of
virtualized resources.
▶ Hypervisors, such as VMware and Hyper-V, manage
virtualization.
IaaS Components
Virtual Machines (VMs)

▶ Virtual Machines (VMs) are virtualized instances of operating


systems.
▶ They run on top of physical servers but are isolated from each
other.
▶ VMs offer flexibility and scalability for running applications.
IaaS Components
Storage Services

▶ Storage services provide scalable and reliable data storage in


IaaS.
▶ Options include block storage, file storage, and object storage.
▶ Cloud providers offer storage services like Amazon EBS and
Azure Blob Storage.
IaaS Components
Networking in IaaS

▶ Networking plays a crucial role in IaaS for connecting


resources.
▶ IaaS provides virtual networks, load balancers, and firewalls.
▶ Networking configurations are defined to support the desired
architecture.
Key Characteristics of IaaS - Part 1

Scalability
IaaS allows you to scale computing resources up or down based on
demand. This ensures that you always have the right amount of
resources without overprovisioning or underprovisioning.

Cost-efficiency
IaaS follows a pay-as-you-go model, where you only pay for the
resources you use. This eliminates the need for large upfront
capital expenses and reduces overall costs.
Key Characteristics of IaaS - Part 2

Flexibility
IaaS offers flexibility by allowing you to customize your
infrastructure according to your specific requirements. You can
choose different operating systems, configurations, and software
stacks.

Self-Service Provisioning
Users can provision and manage their infrastructure resources
without the need for IT intervention. This self-service aspect
streamlines resource allocation.

Disaster Recovery Capabilities


IaaS typically includes built-in redundancy and backup options,
ensuring data protection and enabling efficient disaster recovery
strategies.
Types of Scalability - Part 1

1. Vertical Scalability (Scaling Up)


▶ Also known as ”scaling up.”
▶ Involves adding more resources to a single server or machine.
▶ Commonly done by increasing CPU, RAM, or storage capacity.
▶ Limited by the hardware constraints of a single server.

2. Horizontal Scalability (Scaling Out)


▶ Also known as ”scaling out.”
▶ Involves adding more servers or machines to distribute the
workload.
▶ Typically used in cloud computing and modern web
applications.
Types of Scalability - Part 2

3. Elastic Scalability
▶ A dynamic approach to scaling resources based on real-time
demand.
▶ Resources are automatically provisioned or de-provisioned as
needed.
▶ Common in cloud services, enabling cost optimization.
Cost-efficiency in IaaS - Part 1

Cost-Efficient Resource Allocation


▶ IaaS follows a pay-as-you-go model, where you only pay for
the resources you use.
▶ Traditional infrastructure often requires significant upfront
capital expenditures.

Scaling Without Overhead


▶ Scalability in IaaS allows for cost-effective expansion.
▶ Resources are provisioned on-demand, minimizing unnecessary
overhead.
Cost-efficiency in IaaS - Part 2

Economies of Scale
▶ Cloud providers benefit from economies of scale, driving down
infrastructure costs.
▶ Users can take advantage of these cost savings without the
need for large, upfront investments.
▶ This cost-efficiency is especially valuable for startups and
small businesses.
Flexibility in IaaS - Part 1

Customization Options
▶ IaaS offers flexibility by allowing you to customize your
infrastructure according to your specific requirements.
▶ Users can choose different operating systems, configurations,
and software stacks to suit their needs.

Resource Scaling
▶ IaaS allows for dynamic resource scaling based on workload
demands.
▶ You can adjust CPU, memory, and storage resources to match
changing requirements.
Flexibility in IaaS - Part 2

Application Development
▶ Developers benefit from IaaS flexibility for application
development and testing.
▶ They can quickly provision development environments,
experiment with new technologies, and rapidly deploy
applications.
▶ This agility accelerates the development lifecycle.
Self-Service Provisioning in IaaS - Part 1

User Empowerment
▶ IaaS enables self-service provisioning, empowering users to
manage and allocate resources independently.
▶ Users can access and provision virtual servers, storage, and
networking resources through a web-based interface or APIs.

Reduced IT Overhead
▶ Self-service provisioning reduces the burden on IT teams by
automating resource allocation processes.
▶ Users no longer need to wait for IT administrators to provision
resources, leading to faster deployment.
Self-Service Provisioning in IaaS - Part 2

Resource Management
▶ Users have control over resource management, allowing them
to allocate and de-allocate resources as needed.
▶ This flexibility optimizes resource utilization and reduces costs.

Agility and Innovation


▶ Self-service provisioning fosters agility and innovation within
organizations.
▶ Teams can experiment with new technologies, test
applications, and rapidly respond to changing business needs.
Disaster Recovery Capabilities in IaaS - Part 1

Redundancy and Data Protection


▶ IaaS providers often offer built-in redundancy and data
protection mechanisms.
▶ Data is typically replicated across multiple data centers or
regions to ensure availability.
▶ Redundancy helps in minimizing downtime and data loss
during disasters.

High Availability
▶ IaaS environments are designed for high availability, with
failover mechanisms in place.
▶ In case of hardware or software failures, services can
automatically switch to backup resources.
Disaster Recovery Capabilities in IaaS - Part 2

Backup and Restore


▶ IaaS platforms often offer backup and restore features for
virtual machines and data.
▶ Users can schedule regular backups and easily restore systems
to previous states in case of failures.

Geographic Redundancy
▶ Some IaaS providers offer geographic redundancy, allowing
data and applications to be stored in multiple regions or even
across continents.
▶ This ensures that data remains accessible even in the event of
regional disasters.
Use Case: Hosting Websites and Applications
Overview
IaaS is a popular choice for hosting websites and applications,
providing flexible and scalable infrastructure without the need for
physical servers.

Benefits
▶ Cost-Efficiency: Pay-as-you-go pricing model eliminates
upfront hardware costs.
▶ Scalability: Easily adjust resources to handle traffic
fluctuations.
▶ High Availability: Built-in redundancy ensures website uptime.

Examples
▶ Launching a new e-commerce website.
▶ Hosting web applications with variable workloads.
Use Case: Development and Testing Environments

Overview
IaaS provides on-demand resources for creating, testing, and
deploying applications without hardware constraints.

Benefits
▶ Rapid Provisioning: Developers can quickly set up
environments.
▶ Cost Control: Resources can be scaled down when not in use.
▶ Isolation: Isolate development and testing from production
environments.

Examples
▶ Developing and testing new software features.
▶ Simulating various configurations for compatibility testing.
Use Case: Big Data and Analytics

Overview
IaaS supports big data processing by providing the necessary
computing power and storage for large-scale analytics.

Benefits
▶ Scalability: Easily scale resources to process vast datasets.
▶ Performance: High-performance computing for data-intensive
tasks.
▶ Cost-Efficiency: Pay only for the resources used during
processing.

Examples
▶ Analyzing customer behavior data for targeted marketing.
▶ Processing and analyzing IoT-generated data.
Use Case: Disaster Recovery
Overview
IaaS offers robust disaster recovery solutions, ensuring data and
applications remain accessible in the event of disasters or system
failures.

Benefits
▶ Data Protection: Data is replicated across multiple locations.
▶ Business Continuity: Ensures minimal downtime and data loss.
▶ Cost Savings: Eliminates the need for a separate physical
disaster recovery site.

Examples
▶ Regularly backing up critical data to an IaaS environment.
▶ Failing over to cloud resources in case of on-premises server
failures.
Use Case: Scaling Workloads
Overview
IaaS enables organizations to dynamically scale resources to meet
varying workload demands, ensuring optimal performance and
cost-efficiency.

Benefits
▶ Scalability: Easily adjust resources to match workload
fluctuations.
▶ Performance Optimization: Ensures consistent application
performance.
▶ Cost Control: Pay only for resources when needed.

Examples
▶ Handling increased website traffic during holiday sales.
▶ Scaling up processing power for batch jobs and seasonal
workloads.
Benefits of Using IaaS
Cost Savings

▶ IaaS offers significant cost savings by eliminating the need for


upfront hardware investments.
▶ Pay only for the resources you use, reducing operational
expenses.
▶ Optimize costs through dynamic resource allocation, scaling
as needed.
Benefits of Using IaaS
Rapid Deployment

▶ IaaS enables rapid deployment of resources, reducing


time-to-market for projects.
▶ Provision virtual machines, storage, and networking with ease.
▶ Accelerate application development and testing through
on-demand environments.
Benefits of Using IaaS
Improved Resource Utilization

▶ IaaS allows for improved resource utilization by dynamically


adjusting capacity.
▶ Avoid overprovisioning and underutilization of hardware.
▶ Optimize performance and reduce waste with flexible scaling.
Benefits of Using IaaS
Enhanced Security and Compliance

▶ IaaS providers invest in robust security measures and


compliance certifications.
▶ Benefit from advanced security features, including firewalls
and encryption.
▶ Simplify compliance efforts with infrastructure that adheres to
industry standards.
Benefits of Using IaaS
Global Reach

▶ IaaS offers global reach, allowing businesses to expand and


serve customers worldwide.
▶ Deploy resources in data centers across multiple regions and
continents.
▶ Ensure high availability and low latency for a global user base.
Managing IaaS Resources
Cloud Management Tools

▶ Cloud management tools are essential for efficient IaaS


resource management.
▶ They provide a centralized interface for provisioning,
monitoring, and managing cloud resources.
▶ Examples include AWS Management Console, Azure Portal,
and Google Cloud Console.
Managing IaaS Resources
Infrastructure as Code (IaC)

▶ IaC allows for defining and provisioning infrastructure using


code.
▶ Automate resource creation, configuration, and updates
through code scripts.
▶ Popular IaC tools include Terraform, AWS CloudFormation,
and Azure Resource Manager Templates.
Managing IaaS Resources
Automation and Orchestration

▶ Automation and orchestration streamline resource


management tasks.
▶ Automate routine processes such as scaling, backups, and
resource provisioning.
▶ Orchestration tools like Kubernetes manage containerized
workloads efficiently.
Managing IaaS Resources
Monitoring and Optimization

▶ Monitoring tools provide insights into resource performance


and health.
▶ Optimize resource usage based on real-time data and
historical trends.
▶ Utilize cloud provider services or third-party monitoring
solutions.
Challenges and Considerations
Security Concerns

▶ Security is a top concern in IaaS due to shared responsibility


models.
▶ Protecting data, networks, and access control is crucial.
▶ Implement security best practices and use encryption to
mitigate risks.
Challenges and Considerations
Compliance Requirements

▶ Compliance regulations vary by industry and region.


▶ Ensure that your IaaS environment meets specific compliance
standards.
▶ Regular audits and adherence to compliance frameworks are
essential.
Challenges and Considerations
Vendor Lock-In

▶ Vendor lock-in can limit flexibility and increase costs.


▶ Choose open standards and avoid proprietary technologies.
▶ Plan for potential migrations or multi-cloud strategies.
Challenges and Considerations
Resource Sizing and Optimization

▶ Determining the right resource sizes can be challenging.


▶ Avoid overprovisioning or underutilization to optimize costs.
▶ Use monitoring and analytics to make informed resource
decisions.
Challenges and Considerations
Backup and Recovery Strategies

▶ Backup and recovery are critical for data protection and


business continuity.
▶ Define backup schedules, retention policies, and disaster
recovery plans.
▶ Test backup and recovery processes regularly to ensure
reliability.
What is PaaS?

▶ Platform as a Service (PaaS) is a cloud computing model.


▶ It provides a platform and tools for application development
and deployment.
▶ Developers focus on coding, while the platform handles
infrastructure.
Key Characteristics of PaaS

▶ Development Tools and Frameworks


▶ Middleware Services (Databases, Messaging)
▶ Scalability and Elasticity
▶ Resource Management and Allocation
▶ Integration and APIs
Benefits of PaaS

▶ Accelerated Application Development


▶ Simplified Infrastructure Management
▶ Automatic Scaling and Resource Allocation
▶ Integration with External Services
▶ Cost-Efficiency
Understanding SaaS (Software as a Service)
1.1 What is SaaS?

▶ SaaS stands for Software as a Service.


▶ It’s a cloud computing model where software is hosted and
provided as a service over the internet.
▶ Users access software applications through web browsers,
eliminating the need for local installations.
Understanding SaaS (Software as a Service)
1.2 Key Characteristics of SaaS

▶ SaaS has several defining characteristics:


▶ Multi-tenancy
▶ Accessibility
▶ Automatic Updates
▶ Subscription-Based Pricing
▶ Scalability
Understanding SaaS (Software as a Service)
1.3 Advantages of SaaS

▶ SaaS offers numerous benefits:


▶ Cost-Efficiency
▶ Accessibility and Mobility
▶ Automatic Updates and Maintenance
▶ Scalability
▶ Lower Total Cost of Ownership (TCO)
Understanding SaaS (Software as a Service)
1.4 SaaS vs. Traditional Software

▶ Compare SaaS with traditional software:


▶ Installation and Maintenance
▶ Cost Structure
▶ Accessibility and Collaboration
▶ Upgrades and Updates
Understanding SaaS (Software as a Service)
1.5 SaaS Deployment Models

▶ SaaS can be deployed in various models:


▶ Public SaaS
▶ Private SaaS
▶ Hybrid SaaS
▶ Each model has its own characteristics and use cases.
SaaS Architecture and Key Concepts
2.1 Multi-Tenancy in SaaS

▶ Multi-tenancy is a fundamental concept in SaaS.


▶ Multiple customers (tenants) share a single software
application and infrastructure.
▶ Tenants’ data and configurations are isolated for security and
efficiency.
SaaS Architecture and Key Concepts
2.2 Scalability in SaaS

▶ Scalability is essential for handling varying workloads.


▶ SaaS applications can scale horizontally or vertically.
▶ It ensures that SaaS services remain responsive and available.
SaaS Architecture and Key Concepts
2.3 Data Security in SaaS

▶ Data security is a top priority in SaaS.


▶ Measures include encryption, access controls, and compliance
with regulations.
▶ SaaS providers invest in robust security to protect customer
data.
SaaS Architecture and Key Concepts
2.4 SaaS Application Layers

▶ SaaS applications are organized into layers:


▶ Presentation Layer
▶ Application Logic Layer
▶ Data Storage Layer
▶ Each layer serves a specific purpose in delivering the service.
SaaS Architecture and Key Concepts
2.5 SaaS Data Centers

▶ SaaS providers operate data centers to host and manage


services.
▶ Data centers ensure high availability, redundancy, and disaster
recovery.
▶ Geographical distribution of data centers enhances reliability.
SaaS Applications and Services
3.1 Types of SaaS Applications

▶ SaaS offers a wide range of application types:


▶ Productivity Suites
▶ Customer Relationship Management (CRM)
▶ Enterprise Resource Planning (ERP)
▶ Collaboration and Communication Tools
▶ Industry-Specific Applications
SaaS Applications and Services
3.2 Popular SaaS Providers

▶ Numerous SaaS providers offer a variety of services:


▶ Microsoft 365 (formerly Office 365)
▶ Salesforce
▶ Google Workspace
▶ Amazon Web Services (AWS)
▶ Zoom
SaaS Applications and Services
3.3 Customization and Configuration in SaaS

▶ SaaS applications often allow customization:


▶ Tailoring features and settings to meet specific needs.
▶ Adjusting user interfaces and workflows.
▶ Implementing business rules and logic.
SaaS Applications and Services
3.4 Integration with SaaS Applications

▶ Integration is crucial for seamless business operations:


▶ Connect SaaS apps with on-premises systems.
▶ Enable data flow between different SaaS solutions.
▶ Use APIs and middleware for integration.
SaaS Applications and Services
3.5 Mobile SaaS Applications

▶ Mobile access is a key feature of many SaaS applications:


▶ Access SaaS services on smartphones and tablets.
▶ Native mobile apps and responsive web interfaces.
▶ Enhance productivity and accessibility.
SaaS Adoption and Trends
4.1 SaaS Adoption in Businesses

▶ SaaS adoption is on the rise across industries.


▶ Explore how businesses are embracing SaaS solutions.
▶ Discover the driving factors behind increased adoption.
SaaS Adoption and Trends
4.2 Benefits of SaaS for Enterprises

▶ Enterprises benefit from SaaS in various ways:


▶ Cost Savings
▶ Scalability
▶ Accessibility
▶ Rapid Deployment
▶ Automatic Updates
SaaS Adoption and Trends
4.3 Challenges in SaaS Implementation

▶ Implementing SaaS solutions comes with challenges:


▶ Data Security Concerns
▶ Integration Complexity
▶ User Adoption
▶ Data Migration
▶ Vendor Lock-In
SaaS Adoption and Trends
4.4 Emerging Trends in SaaS

▶ Stay up-to-date with the latest trends in SaaS:


▶ Artificial Intelligence (AI) Integration
▶ Edge Computing in SaaS
▶ Serverless SaaS
▶ Industry-Specific SaaS Solutions
▶ Enhanced Data Analytics
AWS Services

February 13, 2025

AWS Services February 13, 2025 1 / 41


AWS Global Data Centers

AWS services are deployed in specific geographical areas.


These geographical areas are called AWS Regions.
Available worldwide.
As of February 2025, Amazon Web Services (AWS) operates 36 regions
worldwide, encompassing 114 Availability Zones.
Selection of a specific region is required during service deployment.
Each region typically consists of two or more data centers, referred to
as Availability Zones.

AWS Services February 13, 2025 2 / 41


Edge Locations and AWS Services

AWS also provides Edge Locations.


Edge Locations act as caching devices available in over 100 cities
across the world.
Content such as videos, media, and images from platforms like
Facebook or YouTube is cached at the nearest location and delivered
to the user from there.
Performance is improved by minimizing network latency.
Overall, AWS offers over 200 services.

AWS Services February 13, 2025 3 / 41


Region and Availability Zones
Region: Independent geographic area.
Availability Zone: Multiple isolated locations or data centers within
a region.

Figure: AWS Region and Availability Zones (Example: US West - California)

AWS Services February 13, 2025 4 / 41


AWS Account, Users, and Service Scope
An AWS Account is a top-level entity used to access and manage
AWS resources.
It is associated with IAM Users (Identity and Access Management),
which are granted specific permissions to perform actions within the
account.
Resources can be deployed in any AWS region, and each region
contains multiple Availability Zones (AZs) for redundancy and fault
tolerance.
Proper management of IAM policies is crucial to ensure security and
prevent unauthorized access.

AWS Services February 13, 2025 5 / 41


Different AWS Services

Compute: EC2, AutoScaling, Lambda, ELB (Elastic Load Balancer),


ECS (Elastic Container Service).
(Includes Serverless Computing)
Data Analytics: EMR (Elastic MapReduce) → Hadoop.
Storage: EBS, EFS, S3.
Database:
Relational Database Service (RDS)
DynamoDB
Redshift (Data Warehousing)
Elastic Cache (Fast and Flexible Caching)

Definition of a Database:
A database is an organized collection of structured information or data,
typically stored electronically in a computer system, usually controlled by a
Database Management System (DBMS).
AWS Services February 13, 2025 6 / 41
Network and Management Services

Network Services:
Virtual Private Cloud (VPC)
Route 53 (Domain Name System)
AWS Direct Connect (Dedicated network link)
CloudFront (Content Delivery Network)
Management Services:
CloudWatch: Application and infrastructure monitoring.
CloudFormation: Provision infrastructure as code.
Elastic Beanstalk: Application orchestration service.
OpsWorks: Infrastructure configuration management.
Management services offer partial or complete management of client
cloud resources or infrastructure.

AWS Services February 13, 2025 7 / 41


Application and Development Services

Application Services:
API Gateway: Managed REST and WebSocket APIs.
SQS: Simple Queue Service.
SNS: Simple Notification Service.
SES: Simple Email Service.
Cognito: User management for web and mobile applications.
Development Services:
CodeCommit: Hosted Git repository by AWS.
CodeBuild: Continuous integration service.
CodeDeploy: Automated deployments.
CodePipeline: Continuous delivery service.

AWS Services February 13, 2025 8 / 41


Build a Social Media App Using AWS
Consider a scenario where users access the website abc.com.
Step 1: Deploying this application in an on-premise data center
requires setting up a private network.

Figure: Private Network Setup

AWS Services February 13, 2025 9 / 41


Step 2: Adding a Web Server
After setting up a private network, the next requirement is a web
server.
A virtual machine (VM) with attached storage (disk) is typically used
to host the web server.

Figure: Web Server Setup (VM with Disk)

AWS Services February 13, 2025 10 / 41


Step 3: Assigning IP address
A web server is software and hardware that uses HTTP (Hypertext
Transfer Protocol) and other protocols to respond to client requests
made over the World Wide Web.
Main Job of a Web Server: Display website content by storing,
processing, and delivering web pages to users.
Initially, a small code can be built in PHP and executed on a web
server to handle less than 100 users.
User Access: Users access the application through an IP Address.

AWS Services February 13, 2025 11 / 41


Step 4: Extending the Application

As the application grows, additional features like business logic, user


interface enhancements, and login functionality need to be added.
At this stage, both a web server and an application server are
required to handle the increased complexity.

AWS Services February 13, 2025 12 / 41


Step 5: Adding Relational Database
As the application grows further, a database is required to store user data, application
state, and other information.
A Relational Database is commonly used for structured data storage.
The architecture expands to include:
A Web Server to handle HTTP requests.
An Application Server to execute business logic and application
processes.
A Relational Database to store structured data.

Figure: Architecture with Web Server, Application Server, and Relational


Database

AWS Services February 13, 2025 13 / 41


Application Server, Relational Database, and Three-Tier
Architecture

Application Server: Designed to install, operate, and host associated


services and applications for IT services, end users, and organizations.
Relational Database: Each row in a table is a record with a unique
ID called the key.
Three-Tier Architecture:
The combination of a web server, application server, and relational
database is referred to as a three-tier architecture.
In this architecture, users access the application using an IP Address.
Scaling Challenge:
If the site performs well, demand increases.
Web servers and application servers may struggle to handle the
increased load.

AWS Services February 13, 2025 14 / 41


Scaling Solutions in Three-Tier Architecture

Scaling Up is the solution when web servers and application servers


struggle to handle increased load.
Types of Scaling:
Vertical Scaling: Increase the capacity of an existing machine (e.g.,
add more CPU, RAM, or storage).
Horizontal Scaling: Add more servers to distribute the load.
In a Three-Tier Architecture, Horizontal Scaling is generally
preferred for better scalability and fault tolerance.
Three Tiers in the Architecture:
Data Tier: Database (Backend)
Application Tier: Application Server (Middle)
Presentation Tier: Web Server (Frontend) for end users.

AWS Services February 13, 2025 15 / 41


Step 6: Scaling Using Multiple Servers
To handle increased demand, multiple web servers and application
servers can be added.
This approach is an example of horizontal scaling, which improves
load distribution and fault tolerance.
All servers connect to a common relational database for data
consistency.

AWS Services February 13, 2025 16 / 41


Step 7: Load Balancers and DNS
When multiple web servers and application servers are used, multiple
IP addresses exist.
A Load Balancer is required to distribute incoming traffic across
multiple web servers.
Function of Load Balancer:
Receives user requests and evenly distributes them to backend servers.
Ensures no single server is overloaded, improving performance and
reliability.
Accessing applications using an IP address becomes impractical with
multiple servers.
DNS (Domain Name System) is required to map a domain name
(e.g., abc.com) to the load balancer’s IP address.
Function of DNS:
Translates human-readable domain names into IP addresses.
Ensures users reach the correct load balancer, which forwards requests
to backend servers.
AWS Services February 13, 2025 17 / 41
Step 7: Load Balancers and DNS

Figure: Load Balancer and DNS Integration


AWS Services February 13, 2025 18 / 41
Step 8: Introducing NoSQL Database

As data grows significantly (e.g., number of friends, posts), relational


databases may struggle to manage such large-scale and unstructured
data efficiently.
Scalable databases, particularly NoSQL databases like MongoDB
and Cassandra, are preferred for such situations.
A hybrid approach is often adopted:
Some data is stored in a relational database (structured data).
Other data is stored in a NoSQL database (unstructured or
large-scale data).

AWS Services February 13, 2025 19 / 41


Step 8: Introducing NoSQL Database

Figure: Hybrid Database Approach: Relational + NoSQL


AWS Services February 13, 2025 20 / 41
Step 9: Database Cache and Non-Relational Database
Details

Non-Relational Database (NoSQL):


Does not use a tabular schema of rows and columns.
Uses a storage model optimized for specific data requirements (e.g.,
key-value, document, graph, or wide-column).
Database Cache:
Read-heavy operations can put a strain on the database.
A database cache stores frequently accessed data in memory to
reduce load and improve performance.
Common caching services: Redis, Memcached.

AWS Services February 13, 2025 21 / 41


Step 9: Database Cache and Non-Relational Database
Details

Figure: Database Cache Integration


AWS with
ServicesRelational and NoSQL Databases
February 13, 2025 22 / 41
Step 10: Object Storage for Media Files

Platforms like Facebook handle millions of images and videos


uploaded daily.
Disks attached to virtual machines (VMs) have size limitations and
are not easily scalable.
Media files (images, videos) are not typically stored on web or
application servers.
Object Storage (Unlimited Storage) is used instead:
Provides scalable and virtually unlimited storage capacity.
Examples: AWS S3, Google Drive, Shared File Systems.
Object storage is suitable for static content like media files (images,
videos, documents, etc.).

AWS Services February 13, 2025 23 / 41


Step 10: Object Storage Integration (Media Files)

Figure: Integration of Object Storage for Media Files


AWS Services February 13, 2025 24 / 41
Step 11: Click-Stream Analysis

Platforms like Facebook continuously track user activity to


understand behavior and improve user experience.
Examples of Activity Tracking:
Products viewed, posts liked, time spent on content, etc.
Based on this data, personalized suggestions and advertisements are
provided.
Click-Stream Analysis:
Every user click is captured and analyzed in real-time.
Helps in improving content recommendations and ad targeting.

AWS Services February 13, 2025 25 / 41


Step 11: Click-Stream Analysis Integration

Figure: Integration of Click-Stream Analysis with Existing Architecture

AWS Services February 13, 2025 26 / 41


Step 12: Data Storage, Hadoop, and Data Warehousing

Storage for Analysis is required to retain large volumes of user


activity and application data for processing.
Hadoop Platform (MapReduce):
Enables distributed computing across multiple systems.
Used for processing large datasets (e.g., sorting, aggregation, deriving
insights).
Data Warehousing:
A central repository to store structured data for analysis.
Supports Business Intelligence tools to generate reports and insights.
Helps understand user behavior over time (e.g., end-of-year user
activity analysis).
Example platforms: Amazon Redshift, Google BigQuery.

AWS Services February 13, 2025 27 / 41


Step 12: Data Analysis and Warehousing Integration

Figure: Data Storage, Hadoop, and Data Warehousing Integration

AWS Services February 13, 2025 28 / 41


Step 13: Mobile User Access

Modern applications are accessed not only through web browsers but
also via mobile applications.
Mobile users interact with the same backend infrastructure through
APIs and mobile-friendly interfaces.
Mobile apps often rely on cloud storage for media uploads, databases
for real-time data synchronization, and caching for performance.
The backend system remains the same, but additional endpoints and
optimizations ensure a seamless mobile experience.

AWS Services February 13, 2025 29 / 41


Step 13: Complete Architecture Including Mobile User
Access

Figure: Mobile User Access Integrated

AWS Services February 13, 2025 30 / 41


Step 14: Content Delivery Network (CDN) for Media Files

Media files such as images and videos are served from external
storage.
When millions of users view the same media, fetching from a single
location leads to:
High bandwidth costs.
Increased latency for users far from the storage location.
CDN (Content Delivery Network) solves this problem:
Media files are cached in servers at geographically distributed locations.
Users receive content from the nearest cache location, reducing latency
and data transfer costs.
Popular CDN providers: Amazon CloudFront, Akamai, Cloudflare.

AWS Services February 13, 2025 31 / 41


Step 14: CDN Integration with Media Delivery

Figure: CDN Integration in System Architecture

AWS Services February 13, 2025 32 / 41


Step 15: Notifications, Message Queue, and Monitoring
Dashboards

Notifications:
Notifications are sent via SMS, email, or in-app alerts to users.
Used for event updates, account alerts, or other system messages.
Message Queue:
Implements a FIFO (First In First Out) queue-based system for reliable
message processing.
Decouples components, enabling asynchronous task execution (e.g.,
Amazon SQS).
Monitoring Dashboard:
Monitors system health in real-time.
Tracks metrics such as VM performance, database status, storage
utilization, and network activity.
Helps ensure system reliability and performance (e.g., AWS
CloudWatch).

AWS Services February 13, 2025 33 / 41


Step 15: Complete Integrated System Architecture

Figure: Final Integrated System Architecture with Notifications, Message Queue,


and Monitoring
AWS Services February 13, 2025 34 / 41
AWS Services Mapping I

Service Name AWS Equivalent Service


Private Cloud VPC (Virtual Private Cloud)
Virtual Machine + Stor- EC2 + EBS (Auto Scaling Enabled)
age
Relational Database RDS (Relational Database Service)
NoSQL Database DynamoDB
DB Cache ElastiCache
Load Balancer Elastic Load Balancer (ELB)
DNS Route 53
Ext. Storage S3
Content Filter Rekognition (Removes Objectionable
Content)
Video Convert Lambda
Click Stream Analysis Kinesis

AWS Services February 13, 2025 35 / 41


Explanations

• Lambda: A serverless compute service that executes code


automatically in response to events, such as a new video upload,
without requiring server management.
• S3: Scalable object storage used to store media files, backups, and
data from various AWS services.
• Rekognition: An image and video analysis service that can detect
inappropriate content and analyze media files.
• Kinesis: Captures, processes, and analyzes real-time streaming data.
Suitable for click-stream analysis, it can store data in S3 for further
processing.

AWS Services February 13, 2025 36 / 41


AWS Services Mapping - Extended I

Service Name AWS Equivalent Service


Hadoop Elastic Map Reduce (EMR)
Data Warehousing Redshift
Business Intelligence QuickSight
CDN CloudFront
Email Simple Email Service (SES)
Notification Simple Notification Service (SNS)
Messaging Queue Simple Queue Service (SQS)
Monitoring Dashboard CloudWatch
Web and Mobile User Cognito
Management

AWS Services February 13, 2025 37 / 41


Explanations

• Elastic Map Reduce (EMR): A managed Hadoop framework that allows processing of
large data sets using distributed computing techniques like sorting and running distributed
jobs.
• Redshift: A data warehouse service that can store petabytes of data and allows for
complex queries and analytics.
• QuickSight: A business intelligence tool that helps visualize data and create dashboards.
• CloudFront: A content delivery network (CDN) service that delivers content with low
latency.
• Simple Email Service (SES): A cloud-based email service to send notifications and
transactional emails.
• Simple Notification Service (SNS): A fully managed messaging service for both
application-to-application and application-to-person communication.
• Simple Queue Service (SQS): A fully managed message queuing service enabling
decoupling and scaling of microservices.
• CloudWatch: A monitoring service that provides metrics, logs, and alarms to monitor
AWS resources and applications.
• Cognito: A user identity service that provides authentication, authorization, and user
management for web and mobile apps.

AWS Services February 13, 2025 38 / 41


What is an API?

API (Application Programming Interface) is a set of rules and protocols that allows different
software applications to communicate and interact with each other.

Analogy: Restaurant Analogy


• Think of an API like a waiter in a restaurant.
• You (the customer) sit at a table and look at the menu to place an order.
• The waiter (API) takes your order to the kitchen (system/server) and brings back your
food (response) from the kitchen to your table.
• You don’t need to know how the food is prepared or how the kitchen operates. You just
place an order and get your food.

Key Takeaways:
• APIs simplify and standardize the process of communication between systems.
• You get what you need (data/service) without worrying about the internal workings.

AWS Services February 13, 2025 39 / 41


Need of APIs in Building a Social Media Site Like
Facebook
• Service Integration: APIs allow seamless integration between various microservices like
user management, media storage, notifications, and content filtering.
• Data Flow: APIs facilitate data exchange between web servers, application servers, and
databases to ensure real-time content updates.
• Third-party Services: Integrate external services like payment gateways, social logins
(Google/Facebook), and analytics platforms.
• Automation: Automate processes such as uploading videos to storage, triggering content
analysis, or sending notifications when a post is uploaded.
• Scalability: APIs enable scaling individual services independently, like expanding media
storage without affecting the application layer.
• Security: Control access using authentication and authorization mechanisms through
APIs.
• Platform Agnostic: Provide data to web, mobile apps, and third-party developers
consistently using REST or GraphQL APIs.
• Real-time Updates: Enable real-time notifications, messaging, and content delivery using
APIs for event-driven architecture.
• Monitoring and Insights: Collect system health metrics and user activity using monitoring
APIs.

AWS Services February 13, 2025 40 / 41


Need for IAM (Identity and Access Management)
Why IAM is Required?
• Access Control: In a cloud environment, multiple services interact with each other. It is
important to manage and control who can access what.
• Example:
→ If an EC2 instance wants to upload data to an S3 bucket, it needs
permission to perform that action.
→ Without permission, the action will be denied.
• IAM Service:
→ IAM is a service in AWS that helps manage access to AWS resources
securely.
→ It allows the creation of users, roles, and policies to grant or restrict
access to specific services.
• Security:
→ Helps prevent unauthorized access to critical services and data.
→ Provides fine-grained access control.
• Encryption:
→ IAM also facilitates encryption at various levels to protect sensitive
data.
AWS Services February 13, 2025 41 / 41
Overview of Networking

F
February 11, 2025

ififitiÞi

Overview of Networking February 11, 2025 1 / 132


What is a Network?
A network is a group of devices that can communicate with each
other.
Devices can include computers, printers, scanners, etc.
Networks are used both in offices and at home.
Purpose: Enable communication between devices on the network.

Overview of Networking February 11, 2025 2 / 132


Components of a Network (cont’d)

Wired Network: Requires physical NIC and cable connection.


Wireless Network: Connects via Wi-Fi SSID.
Both serve the same purpose of enabling communication between
devices.

Overview of Networking February 11, 2025 3 / 132


Types of Networks

There are two main types of networks: public and private.


A public network allows devices to access each other over the
Internet, making it accessible to anyone.
A private network restricts access, ensuring that only authorized
devices within the network can communicate, enhancing security.
Example:
Public Network: Free Wi-Fi at a café or airport.
Private Network: Home or office Wi-Fi with password protection.

Overview of Networking February 11, 2025 4 / 132


Network Connectivity

A typical home or office network connects to the Internet through a


router provided by an Internet Service Provider (ISP).
Even if the router loses Internet connectivity, devices within the
private network can still communicate with each other.
The ability to connect to the Internet is not a prerequisite for devices
to interact within the local network.
Example: A local printer or file-sharing system will work even without
an Internet connection.

Overview of Networking February 11, 2025 5 / 132


Components of a Network
Physical Cables: Media for communication.
Switches, HUb and Routers: Connect devices in the network.
Bridge: Network device that connects multiple network segments or
LANs
Repeater: Regenerates and amplifies signals in order to extend the

l reach of a network.
Network Interface Card (NIC): Present in each device, facilitates
network connection.
Wired or Wireless: Can have either type of network.

Overview of Networking February 11, 2025 6 / 132


Components of a Network (cont’d)

Wired Network: Requires physical NIC and cable connection.


Wireless Network: Connects via Wi-Fi SSID.
Both serve the same purpose of enabling communication between
devices.

Overview of Networking February 11, 2025 7 / 132


Understanding SSID

SSID stands for Service Set Identifier, which is the technical term
for a network’s name.
It is used by access points and wireless routers to identify themselves
to devices seeking to connect.
The SSID is typically displayed on the router near the cable ports or
on the side or back of the device.

Overview of Networking February 11, 2025 8 / 132


Importance of Changing Your SSID

Changing the default SSID is a crucial step in enhancing network


security.
Default SSIDs often reveal the brand and model of the router, which
can be exploited by attackers.
A unique SSID can help obscure your network from potential security
threats.
Personalizing the SSID makes it easier to identify and connect to the
correct network.

Overview of Networking February 11, 2025 9 / 132


802.11 WLAN Standard

According to the 802.11 wireless local area networks (WLAN)


standard:
An SSID can be as long as 32 characters.
This allows for flexibility in naming wireless networks.

Overview of Networking February 11, 2025 10 / 132


Connecting Computers

Computers communicate using IP addresses or hostnames.


IP addressing uniquely identifies a computer on a network.
Computers understand only bits and bytes, so IP addressing is
essential.

Overview of Networking February 11, 2025 11 / 132


Using Hostnames

Hostnames are easier for humans to remember than IP addresses.


Hostnames need to be resolved to IP addresses for communication.
In a network, computers typically communicate using IP addresses.

Overview of Networking February 11, 2025 12 / 132


Host Files for Resolution

Host files contain mappings of hostnames to IP addresses.


Maintaining host files can be cumbersome in large networks.
A central DNS server provides a better solution for hostname
resolution.

Overview of Networking February 11, 2025 13 / 132


DNS Server
32 bits
Ipv4 ptu.ac.in 1Pa
IPV6 128 bits

DNS servers store hostname-IP address mappings.


Computers in the network query the DNS server for hostname
resolution.
DNS servers ensure high availability through clustering and
replication.

Overview of Networking February 11, 2025 14 / 132


Key Points

Computers understand IP addresses for communication.


Humans prefer using names for easier identification.
DNS bridges the gap by resolving hostnames to IP addresses.

Overview of Networking February 11, 2025 15 / 132


Screenshot of Network Connection

Overview of Networking February 11, 2025 16 / 132


Introduction to IP Addressing

Internet Protocol (IP) addressing is a way of uniquely identifying


computers in a network.
Each computer on a network needs a unique identifier.
IP addresses are used for this purpose.
Computers Understand Binary.

Overview of Networking February 11, 2025 17 / 132


IPv4 vs IPv6

IPv4: Uses a 32-bit addressing scheme.


IPv6: Uses a 128-bit addressing scheme.
IPv6 was introduced due to the exhaustion of IPv4 addresses.
IPv4 Address: 192.0.2.1
IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

Overview of Networking February 11, 2025 18 / 132


IPv4 Addressing
17111111

IPv4 addresses are represented in 32 bits.


The total number of unique identifiers can be calculated using
permutations and combinations.
Each octet (set of 8 bits) can have values ranging from 0 to 255.
Example: 192.168.0.1
IPv4 addresses are represented as a range from 0 to 255 in each octet.
Example: 0.0.0.0 to 255.255.255.255

28

Overview of Networking February 11, 2025 19 / 132


Why IPv6 Addresses are 128 Bits Long
2ts 2
IPv4 Limitation: IPv4 addresses are 32 bits long, allowing for
approximately 4.3 billion unique addresses. With the growth of the
internet and the increasing number of devices connecting to it, IPv4
addresses became insufficient to accommodate all these devices.
Address Space: To overcome the limitation of IPv4, IPv6 was
developed with a much larger address space. IPv6 addresses are 128
bits long, providing approximately 3.4 × 1038 unique addresses. This
vast address space ensures that every device can have a unique IP
address, even with the proliferation of internet-connected devices.
Address Representation: IPv6 addresses are typically represented as
eight groups of four hexadecimal digits separated by colons, such as
2001:0db8:85a3:0000:0000:8a2e:0370:7334. This representation
allows for a concise and human-readable way of expressing IPv6
addresses while still accommodating the large address space.

Overview of Networking February 11, 2025 20 / 132


Key Points

IPv4 and IPv6 are both used for IP addressing.


IPv6 provides a larger address space compared to IPv4.
Understanding IP addressing is crucial for network configuration and
management.

Overview of Networking February 11, 2025 21 / 132


Checking IP Address on Windows
Use ipconfig command on Windows
Displays list of network interface cards and their IP addresses
Example of IP address allocation on a laptop with LAN and Wi-Fi
adapters

Overview of Networking February 11, 2025 22 / 132


Understanding CIDR Notation

CIDR: Classless Inter-Domain Routing


It is the basis for assigning IP addresses to networks
Range of IP address for the network
CIDR notation: Combines network prefix and suffix length (e.g.,
10.0.0.0/16)

Overview of Networking February 11, 2025 23 / 132


Example of CIDR Notation

sk
T.o.TO
Example: 10.0.0.0/16 10 255 255
10.0.0.0 is the network prefix
/16 indicates the number of fixed bits for the network
Since IPv4 addresses consist of 32 bits in total and /16 denotes that
the first 16 bits are fixed for the network, there are 32 - 16 = 16 bits
remaining for the host portion.
Therefore, the number of possible IP addresses in this CIDR block is
216 , which equals 65,536 IP addresses.

Overview of Networking February 11, 2025 24 / 132


Example of CIDR Notation

192.168 1.0
Example: 192.168.1.0/24
32
192.168.1.0 is the network prefix
/24 indicates the number of fixed bits for the network
Since IPv4 addresses consist of 32 bits in total and /24 denotes that
the first 24 bits are fixed for the network, there are 32 - 24 = 8 bits
remaining for the host portion.
Therefore, the number of possible IP addresses in this CIDR block is
28 , which equals 256 IP addresses.
0 0 00 0000
10 9
https://www.ipaddressguide.com/cidr
o

Overview of Networking February 11, 2025 25 / 132


Planning IP Address Allocation

Choose CIDR notation when setting up a network


Determines range of IP addresses for the network
Examples of CIDR notations for office and home networks

Overview of Networking February 11, 2025 26 / 132


Explanation of CIDR Range Calculation

CIDR range calculation based on the specified prefix


Example calculations for /16 and /24 CIDR notations
I
Importance of correctly sizing the network for future scalability

Overview of Networking February 11, 2025 27 / 132


CIDR in Networking

CIDR (Classless Inter-Domain Routing) is essential for both private


and public networks.
It ensures unique identification of computers on a network.
The public internet has its own range of IP addresses, separate from
private networks.

Overview of Networking February 11, 2025 28 / 132


Reserved IP Ranges for Private Networking

To prevent conflicts between public and private IP ranges, certain IP


ranges are reserved for private networking.
These reserved IP ranges include:
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
1
These ranges are specified in RFC 1918.

Overview of Networking February 11, 2025 29 / 132


RFC 1918: Address Allocation for Private Internets

RFC 1918 defines reserved IP address ranges for private networks.


These addresses are not routable on the public internet.
They are commonly used within private networks, such as homes or
businesses.
Allows for multiple private networks without conflicting with public
internet addresses.
RFC 1918 reserved ranges:
10.0.0.0/8 (10.0.0.0 - 10.255.255.255)
172.16.0.0/12 (172.16.0.0 - 172.31.255.255)
192.168.0.0/16 (192.168.0.0 - 192.168.255.255)

Overview of Networking February 11, 2025 30 / 132


Benefits of Reserved IP Ranges

Ensures that private networks do not clash with public IP addresses.


Allows for the creation of multiple private networks with repeating IP
addresses.
Prevents IP conflicts when accessing the internet from private
networks.

Overview of Networking February 11, 2025 31 / 132


Interconnection of Private Networks

Private networks with the same CIDR cannot be directly


interconnected.
Enterprises often use CIDRs specified in RFC 1918 for their private
networks.
CIDR selection ensures compatibility and avoids IP conflicts.

Overview of Networking February 11, 2025 32 / 132


Key Points

CIDR plays a crucial role in both private and public networking.


Reserved IP ranges ensure seamless communication without IP
conflicts.
Following RFC 1918 guidelines simplifies network management and
interconnectivity.

Overview of Networking February 11, 2025 33 / 132


Understanding Subnets and Network Interfaces

Purpose of subnetting in a network


Dividing the network into smaller components for management and
security
Introduction to subnets and their significance

Zunian

Overview of Networking February 11, 2025 34 / 132


Creating Subnets

Splitting the network into smaller logical components


Each subnet is assigned a CIDR within the main network’s CIDR
Example: Dividing 10.0.0.0/16 into subnets like 10.0.1.0/24,
10.0.2.0/24, etc.

Overview of Networking February 11, 2025 35 / 132


Purpose of Subnets

Logical grouping for easier management


Allows for specific network rules and security settings per subnet

7
Example: DHCP options, firewall rules, route tables, etc.

Ingress Engress

Overview of Networking February 11, 2025 36 / 132


Subnet Address Allocation

CIDR range of subnets must fall within the main network’s CIDR
First and last IP addresses in each subnet are reserved for network
and broadcast addresses
Example: In a /24 subnet, 10.0.1.0 and 10.0.1.255 cannot be
assigned to hosts
I last
0
10W 70.0.7

Overview of Networking February 11, 2025 37 / 132


Reserved IP Addresses in Networking

Network Address: The first IP address in a subnet, identifying the


network itself. Traffic sent to this address is interpreted as being
intended for the entire network.

Broadcast Address: The last IP address in a subnet, used for


broadcasting messages to all devices within the network segment.

By reserving the first and last IP addresses in a subnet:


Ensures these addresses are not assigned to individual devices.
Prevents conflicts and maintains consistency in networking practices.

Overview of Networking February 11, 2025 38 / 132


Network Interface Cards (NICs)

A Computer is placed in a specific subnet or in specific NIC


Network Interface Cards connect computers to networks
Each NIC is associated with a subnet
A computer can have multiple NICs, each associated with different
subnets

Overview of Networking February 11, 2025 39 / 132


Bonding in NIC (Network Interface Card)
Bonding in NIC refers to combining multiple network interfaces into a
single logical interface.
Also known as NIC bonding, network bonding, or link aggregation.

Purpose:
Increase overall network bandwidth.
Provide fault tolerance.
Improve network reliability.
Overview of Networking February 11, 2025 40 / 132
Introduction to DHCP

DHCP stands for Dynamic Host Configuration Protocol


Provides automated configuration of IP addresses and other network
parameters
Essential for managing network connectivity efficiently

Overview of Networking February 11, 2025 41 / 132


Purpose of DHCP

Automatically assigns IP addresses to computers joining the network


Simplifies network configuration process
Ensures uniqueness of IP addresses within the network

Overview of Networking February 11, 2025 42 / 132


Configuration Information Provided by DHCP

Primary function: Assigning IP addresses to computers


Also provides information about DNS servers in the network
Automation of IP address and DNS server configuration for each
computer

Overview of Networking February 11, 2025 43 / 132


DHCP Options

Additional configuration options provided by DHCP


Ensures consistency and efficiency in network management
Examples include multiple DNS servers, gateway addresses, etc.

Overview of Networking February 11, 2025 44 / 132


Dynamic IP Address Assignment

DHCP dynamically allocates IP addresses from a pool of available


addresses
Ensures that each computer gets a unique IP address
Allows for easy scalability and management of network resources

Overview of Networking February 11, 2025 45 / 132


Key Points

DHCP simplifies network management by automating IP address and


DNS server configuration
Provides flexibility and efficiency in assigning and managing network
resources

Overview of Networking February 11, 2025 46 / 132


Introduction to Gateways and Route Tables

Gateways and route tables facilitate inter-network communication


Vital components in networking infrastructure
Ensure connectivity between different networks

Overview of Networking February 11, 2025 47 / 132


Network Configuration Example

Example networks: Network 1 and Network 2


Assigned CIDRs: 192.168.0.0/16 for Network 1, 10.0.0.0/16 for
Network 2
Each network may have multiple subnets and computers with unique
IP addresses

Overview of Networking February 11, 2025 48 / 132


Establishing Inter-Network Connectivity

Gateways act as points of entry and exit for data packets between
networks
Example: Setting up Gateway 1 and Gateway 2 to connect Network 1
and Network 2
Cable connection between gateways enables inter-network
communication

Overview of Networking February 11, 2025 49 / 132


Overview of Networking February 11, 2025 50 / 132
Scaling to Multiple Networks

Additional networks (Network 3 and Network 4) can be connected


similarly
Each network has its own unique CIDR
Gateways (Gateway 3 and Gateway 4) facilitate inter-network
communication

Overview of Networking February 11, 2025 51 / 132


Route Tables

Route tables determine the path for data packets within a network
Example: Route table entries specify which gateway to use for
reaching specific IP address ranges
Ensures efficient routing of packets between networks

Overview of Networking February 11, 2025 52 / 132


Example of Route Table Entry

Route table entry for Network 1:


Use Gateway 1 to reach 192.168.0.0/16
Use Gateway 2 to reach 10.0.0.0/16
Route table entries are crucial for determining packet routes

Overview of Networking February 11, 2025 53 / 132


Longest Prefix Matching

Route tables can have multiple entries with overlapping CIDRs


Longest prefix matching determines the most specific route for a
given destination IP address
Enables accurate packet routing in complex network configurations

Overview of Networking February 11, 2025 54 / 132


Key points

Gateways and route tables play essential roles in network


communication
Ensure connectivity and efficient packet routing between networks
Longest prefix matching ensures accurate routing even in complex
network setups

Overview of Networking February 11, 2025 55 / 132


Packet in a Network
In computer networking, a packet is a small unit of data that travels
across a network.
It is the fundamental unit of communication in packet-switched
networks.
Components of a Packet:
Header: Contains control information such as source and destination
addresses, protocol information, and error detection codes.
Payload: Carries the actual data being transmitted.
Trailer: Includes error detection and correction codes to ensure data
integrity.
Packet Journey:
1 Created by the sending device.
2 Routed through the network based on destination address.
3 Received by the destination device.
Overview of Networking February 11, 2025 56 / 132
What is a Port?

A port is not a physical connection but a logical connection used by


programs and services to exchange information.
It determines which program or service on a computer or server is
utilized, such as accessing web pages, FTP, or email.
Each port has a unique number ranging from 0 to 65535.

Overview of Networking February 11, 2025 57 / 132


Port Numbers

Common ports include:


Port 80 and 443 for web pages.
Port 21 for FTP.
Port 25 for email.
A port number is always associated with an IP address.
IP address and port number work together to exchange data on a
network.

Overview of Networking February 11, 2025 58 / 132


Port Usage Example: Port 80 (HTTP)

Port 80 is associated with HTTP (web pages).


When visiting a website, your computer uses port 80 to communicate
with the web server.

Overview of Networking February 11, 2025 59 / 132


Port Usage Example: Connection to Google

When connecting to Google’s web page, your computer converts the


domain name into Google’s IP address.
The computer adds port 80 to the IP address.
Google’s server receives the request with port 80 and forwards it to its
web service.

Overview of Networking February 11, 2025 60 / 132


Port Number Categories

Port numbers are assigned by the Internet Assigned Numbers


Authority (IANA).
They are categorized into three ranges:
System or well-known ports (0 - 1023).
User or registered ports (1024 - 49151).
Dynamic or private ports (49152 - 65535).

Overview of Networking February 11, 2025 61 / 132


Port Usage on Servers and Clients

Well-known and registered ports are used on servers for services.


Dynamic or private ports are used on clients for temporary sessions.
Example: Port 21 for FTP server, and dynamic ports on client
machines.

Overview of Networking February 11, 2025 62 / 132


Introduction to Firewalls

Firewalls are security mechanisms for network traffic


Analogous to security measures in the physical world
Control ingress and egress traffic based on predefined rules

Overview of Networking February 11, 2025 63 / 132


Ingress Rules

Define rules for inbound traffic


Example: Allowing TCP traffic on port 80 from any source IP address
(0.0.0.0/0)
Specify source CIDR, protocol, and port

Overview of Networking February 11, 2025 64 / 132


Egress Rules

Define rules for outbound traffic


Example: Allowing TCP traffic on port 22 only from source IP
addresses in the office network (192.168.0.0/16)
Specify destination CIDR, protocol, and port

Overview of Networking February 11, 2025 65 / 132


Whitelist vs Blacklist

Whitelist: Specify what is allowed, everything else is denied


Blacklist: Specify what is denied, everything else is allowed
Whitelist offers better security, while blacklist provides more
convenience

Overview of Networking February 11, 2025 66 / 132


Analogous Examples

Analogous to security measures in physical world


Whitelist: Similar to allowing specific individuals into a building
Blacklist: Similar to restricting access based on specific criteria (e.g.,
carrying weapons)

Overview of Networking February 11, 2025 67 / 132


Key Points

Firewalls are crucial for network security


Ingress and egress rules control inbound and outbound traffic
Choice between whitelist and blacklist depends on security and
convenience requirements

Overview of Networking February 11, 2025 68 / 132


Scenario: Building a Scalable Website

Imagine: You’re building a highly popular website.


Need to scale to serve millions of users simultaneously.
Each user’s experience depends on efficient traffic routing.

Overview of Networking February 11, 2025 76 / 132


Understanding Load Balancers

Load balancer: intermediary between users and application servers.


Determines which server handles each request.
Essential for scalability and efficient resource utilization.

Overview of Networking February 11, 2025 77 / 132


Scaling Application Servers

As user load increases, scaling out application servers is necessary.


Horizontal scaling: adding more servers to handle increased load.
Load balancer directs traffic among these servers.

Overview of Networking February 11, 2025 78 / 132


Types of Load Balancers

Hardware or software-defined.
Key role in cloud-native architectures.
Ensures traffic distribution and efficient resource usage.

Overview of Networking February 11, 2025 79 / 132


Load Balancing Algorithms

1 Round Robin
2 Smart Load Balancing
3 Random Selection

Overview of Networking February 11, 2025 80 / 132


1. Round Robin

Simple and effective.


Assigns traffic sequentially to servers.
May lead to imbalanced server loads over time.

Overview of Networking February 11, 2025 81 / 132


2. Smart Load Balancing

Monitors server loads in real-time.


Routes traffic based on server capacity.
More complex and expensive to set up.

Overview of Networking February 11, 2025 82 / 132


3. Random Selection

Provides a balance between simplicity and control.


Randomizes server selection for each request.
Offers flexibility without the complexity of smart load balancing.

Overview of Networking February 11, 2025 83 / 132


Key Points

Load balancers are critical for scalable and efficient web services.
Choosing the right algorithm depends on your specific needs.

Overview of Networking February 11, 2025 84 / 132


Understanding DNS (Domain Name System)

DNS: Domain Name System.


Translates domain names to IP addresses.
What are domain names and IP addresses?
Domain Name: Text entered in web browser (e.g., ibm.com,
google.com).
Used for human communication. item Four sets of numbers (e.g.,
192.168.1.1).
Used by computers for communication.

Overview of Networking February 11, 2025 85 / 132


DNS Resolver

Acts as a phone book.


Bridges human communication with networking.
Matches domain names to IP addresses.

Overview of Networking February 11, 2025 86 / 132


DNS Lookup Process

1 User enters website address.


2 Web browser checks cache.
3 If not found, request forwarded to DNS resolver.
4 DNS resolver checks its cache.
5 If not found, request forwarded to root server.
6 Root server directs to Top Level Domain (TLD) server.
7 TLD server directs to authoritative name server.
8 Authoritative name server provides IP address.
9 IP address returned to DNS resolver and cached.
10 IP address sent to web server for content retrieval.

Overview of Networking February 11, 2025 87 / 132


Key Points

DNS facilitates the translation of domain names to IP addresses.


DNS resolver acts as a bridge between human communication and
networking.
DNS lookup process involves multiple steps for resolving domain
names.
Understanding DNS is crucial for navigating the internet effectively.

Overview of Networking February 11, 2025 88 / 132

You might also like