Cloud Computing PDF
Cloud Computing PDF
1
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Programme Leader
signature (if required) Date
2
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID B.D.N.Nisansala/COL00131157
Unit 16: Cloud Computing
Unit Title
Assignment Number 1 Assessor
Date Received
Submission Date 1st submission
Date Received 2nd
Re-submission Date submission
Assessor Feedback:
LO1. Demonstrate an understanding of the fundamentals of Cloud Computing and its architectures.
Pass, Merit & Distinction P1 P2 M1
Descripts
LO2. Evaluate the deployment models, service models and technological drivers of Cloud Computing and
validate their use.
Pass, Merit & Distinction P3 P4 M2 D1
Descripts
LO3. Develop Cloud Computing solutions using service provider’s frameworks and open source tools.
Pass, Merit & Distinction P5 P6 M3 D2
Descripts
LO4. Analyse the technical challenges for cloud applications and assess their risks.
Pass, Merit & Distinction P7 P8 M4 D3
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
3
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
4
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Pearson Higher Nationals in
Computing
Unit 16: Cloud Computing
Assignment 01
5
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
6
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
E161708@esoft.acedamy.lk 17/03/2024
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
7
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Higher National Diploma in Business
Assignment Brief
Student Name /ID Number B.D.N.Nisansala/COL00131157
Unit Number and Title Unit 16: Cloud Computing
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced
using Harvard referencing system. Please also provide in-text citation and the list of references
using the Harvard referencing system. Please note that this is an activity-based assessment where
your document submission should include evidences of activities carried out.
The recommended word count is 4,000–4,500 words for the report excluding annexures. Note
that word counts are indicative only and you would not be penalised for exceeding the word
count.
8
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
LO1. Demonstrate an understanding of the fundamentals of Cloud Computing and its
architectures.
LO2. Evaluate the deployment models, service models and technological drivers of Cloud
Computing and validate their use.
LO3. Develop Cloud Computing solutions using service provider’s frameworks and open source
tools.
LO4. Analyse the technical challenges for cloud applications and assess their risks.
9
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Follow the guidelines given below assuming that you have recently joined as a trainee systems
administrator for the e-COM Telco, which is specializing in Telecommunication and other ICT
services in the country.
Background
Since 1985 e-COM Telco has been providing day to day ICT services for diversified client tale
including multinational companies, government sector, private institutions, non-profit
organizations, universities, Schools, community-based organizations and individuals.
The company is having number of data centres around the country and DR sites outside the
country. They have state of art server farms in few locations which can fulfil any requirement to
any scope in the country. They also have human resources required to provide services
including solution architects, systems engineers, systems administrators, Consultants and
technicians.
You have been asked to support your technical and development executive with the
researching, planning and implementation of a Cloud solution for the existing diversified
clientele of e-COM Telco.
Activity 1
Analyze the evolution and fundamental concepts of Cloud Computing and also discuss why an
10
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
organization should migrate to a Cloud Computing solution.
Design an appropriate architectural Cloud Computing framework for the scenario by identifying
different needs of cloud solutions for diversified groups.
Activity 2
Define an appropriate deployment model for e-COM Telco client base by comparing service
models and demonstrate above deployment models with real world examples.
Compare the service models in order to choose an adequate model for e-COM Telco and justify
the tools chosen to realize the proposed Cloud Computing solution.
Activity 3
Configure a Cloud Computing platform using a cloud service provider's framework and
Implement a cloud platform using an open-source tool for e-Com Telco. (should be supported
with necessary evidence)
Critically discuss the issues and constraints that you faced during the implementation of the
cloud computing platform and how those issues could be effectively overcome by you.
Activity 4
Analyze the common problems and assess the common security issues that are likely to arise in
cloud environments and discuss suitable solutions to overcome these issues. Critically discuss
how an organisation should protect their data when migrating to a cloud solution such as e-Com
Telco.
11
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Grading Rubric
Grading Criteria Achieved Feedback
12
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
P5 Configure a Cloud Computing platform with a cloud service
provider’s framework.
P6 Implement a cloud platform using open source tools.
M3 Discuss the issues and constraints one can face during the
development process.
13
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
B.D.N.Nisansala
COL00131157
Pearson HND in Computing
FEB\MARCH SUNDAY Batch 2022
UNIT16:
CLOUD
COMPUTING
14
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Acknowledgement
I would like to express my special thanks to the ESOFT Metro Campus for giving me this
opportunity.
Firstly, I would like to express my special thanks of gratitude to Mr. Ravindu who gave me
the guidance to do this assignment, which also helped me in studying a lot of things and I
learned how we work with Cloud Computing.
Secondly, I would like to express sincere and heartfelt thanks to my parents and my friends
who supported me a lot in finishing this assignment on time. This assignment would not
have been completed without their support and worthy experience.
So, I am thankful to all who helped me to do this assignment successfully. I did this
assignment not for the purpose of scoring. I was just hoping for from this assignment
increased my knowledge, get experience only. This assignment will help to shape my future
life.
15
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Table of Contents
Acknowledgement..................................................................................................................14
Table of Figures..................................................................................................................... 16
List of Tables..........................................................................................................................17
1.0 Activity 01........................................................................................................................18
1.1 Analyze the evolution and fundamental concepts of Cloud Computing.......................18
1.2 Discuss why an organization should migrate to a Cloud Computing solution..............23
1.3 Design an appropriate architectural Cloud Computing framework for the scenario by
identifying different needs of cloud solutions for diversified groups.................................25
2.0 Activity 02........................................................................................................................30
2.1 Define an appropriate deployment model for e-COM Telco........................................30
2.1.1 What is an appropriate deployment model for e-COM Telco?..............................32
2.2 Demonstrate above deployment models with real world examples..............................32
2.3 Compare the service models in order to choose an adequate model for e-COM Telco.35
2.4 Define an appropriate deployment model for a given scenario.....................................38
2.5 Justify the tools chosen to realize the proposed Cloud Computing solution.................41
3.0 Activity 03........................................................................................................................48
3.1Configure a Cloud Computing platform using a cloud service provider's framework...48
3.2 Implement a cloud platform using an open-source tool for e-Com Telco.....................57
3.3 Critically discuss the issues and constraints that you faced during the implementation
of the cloud computing platform........................................................................................66
3.4 How those issues could be effectively overcome by you..............................................68
4.0 Activity 04........................................................................................................................69
4.1 Analyze the common problems that are likely to arise in cloud environments.............69
4.2Assess the common security issues that are likely to arise in cloud environments........71
4.3 Discuss suitable solutions to overcome these issues.....................................................74
4.4 Critically discuss how an organization should protect their data when migrating to a
cloud solution such as e-Com Telco...................................................................................76
Gantt Chart............................................................................................................................. 79
Reference................................................................................................................................80
16
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Table of Figures
Figure 1-image.........................................................................................................................18
Figure 2-image.........................................................................................................................21
Figure 3-image.........................................................................................................................22
Figure 4-image.........................................................................................................................23
Figure 5-image.........................................................................................................................26
Figure 6-image.........................................................................................................................29
Figure 7-image.........................................................................................................................31
Figure 8-image.........................................................................................................................33
Figure 9-image.........................................................................................................................33
Figure 10-image.......................................................................................................................34
Figure 11-image.......................................................................................................................35
Figure 12-image.......................................................................................................................36
Figure 13-image.......................................................................................................................36
Figure 14-image.......................................................................................................................41
Figure 15-image.......................................................................................................................43
Figure 16-image.......................................................................................................................44
Figure 17-image.......................................................................................................................46
Figure 18-image.......................................................................................................................46
Figure 19-image.......................................................................................................................47
Figure 20-sign up AWS part 1.................................................................................................48
Figure 21-AWS management console......................................................................................48
Figure 22-sign in AWS............................................................................................................49
Figure 23-create E-COM telco dashboard................................................................................49
Figure 24-VPCs........................................................................................................................50
Figure 25-Create VPC part 1....................................................................................................50
Figure 26-Create VPC part 2....................................................................................................50
Figure 27-Create VPC part 3....................................................................................................51
Figure 28-Create VPC part 4....................................................................................................51
Figure 29-Create VPC part 5....................................................................................................52
Figure 30-Create VPC part 6....................................................................................................52
Figure 31-Create VPC part 7....................................................................................................52
Figure 32-Create VPC part 8....................................................................................................53
Figure 33-Create subnets..........................................................................................................53
Figure 34-router tables part 1...................................................................................................53
Figure 35-router tables part 2...................................................................................................54
Figure 36-router tables part 3...................................................................................................54
Figure 37-EC2 dashboard part 1..............................................................................................54
Figure 38-EC2 dashboard part 2..............................................................................................55
Figure 39-Launch instance.......................................................................................................55
Figure 40-network settings part 1.............................................................................................55
Figure 41-network settings part 2.............................................................................................56
Figure 42-Successfully launch instance...................................................................................56
Figure 43-view instances..........................................................................................................56
17
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 44-install virtual box.....................................................................................................57
Figure 45-install VMware........................................................................................................57
Figure 46-virtualbox file chosen..............................................................................................58
Figure 47-virtual box add.........................................................................................................58
Figure 48-next step...................................................................................................................59
Figure 49-finish step.................................................................................................................59
Figure 50-image.......................................................................................................................60
Figure 51-image.......................................................................................................................60
Figure 52-image.......................................................................................................................61
Figure 53-image.......................................................................................................................61
Figure 54-image.......................................................................................................................62
Figure 55-add password...........................................................................................................62
Figure 56-image.......................................................................................................................63
Figure 57-image.......................................................................................................................63
Figure 58-image.......................................................................................................................64
Figure 59-image.......................................................................................................................64
Figure 60-image.......................................................................................................................65
Figure 61-image.......................................................................................................................68
Figure 62-image.......................................................................................................................72
Figure 63-image.......................................................................................................................73
Figure 64-image.......................................................................................................................73
Figure 65-image.......................................................................................................................76
Figure 66-image.......................................................................................................................77
List of Tables
Table 1-Compare service model...............................................................................................37
18
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
1.0 Activity 01
The pay-per-use internet access to a wide range of computer resources, including software,
hardware, networking, data storage, application development tools, and AI-powered analytic
infrastructure, this architecture provides consumers with more flexibility and scalability.
Whether using a cloud service like Google Gmail, watching a Netflix movie, or playing a
technological services, which are housed at a remote data center under the management of a
19
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 1-image
1. Distributed System
Although it is made up of numerous separate systems, users are presented with each system
as a single unit. Resources should be shared and used effectively and efficiently, which is
the goal of distributed systems. Characteristics of distributed systems include heterogeneity,
scalability, concurrency, continuous availability, and independence from failures. However,
the primary issue with this method was that every single system had to be present at the
exact same place. In order to address this issue, distributed computing gave rise to three
additional computer types: mainframe, cluster, and grid.
2. Mainframe Computing
20
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
3. Cluster Computing
4. Grid Computing
Grid computing was first proposed in the 1990s. This indicates that several systems were
installed in widely disparate geographic areas and that they were all networked together
over the internet. The grid was made up of heterogeneous nodes because these systems
belonged to several corporations. While it did address certain issues, as the distance
between the nodes expanded, new issues surfaced. The primary issue that was experienced
was the low availability of high bandwidth connectivity, along with other challenges related
to the network. Hence, the term "Successor of grid computing" is frequently used to
describe cloud computing.
5. Virtualization
About 40 years ago, it was first presented. In order to enable the user to run many instances
of the hardware simultaneously, a virtual layer must be created over the hardware. In cloud
computing, it is an essential technology. Major cloud computing services like VMware
Cloud, Amazon EC2, and others operate on top of it. Virtualization of hardware is one of
the most popular forms of virtualization.
6. Web 2.0
It serves as the communication channel between customers and cloud computing services.
We have dynamic and interactive websites thanks to Web 2.0. It also makes web sites more
flexible. Web 2.0 applications like Facebook, Twitter, and Google Maps are well-known
examples. It goes without saying that this technology alone is what makes social media
possible. In 2004, it became extremely popular.
21
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
7. Service Orientation
It serves as the cloud computing industry standard model. It is compatible with adaptable,
affordable, and developing applications. With this computational model, two key ideas were
presented. Software as a Service (SaaS) and Quality of Service (QoS), which include the
SLA (Service Level Agreement), were these.
8. Utility Computing
The computing model in question outlines methods for providing compute services and
other important pay-per-use services like storage and infrastructure.
Figure 2-image
Grasp the paradigm change that cloud computing brings to the IT world requires a grasp of its
foundational ideas. Fundamentally, cloud computing offers a strategy to managing,
providing, and accessing computer resources over the internet that is dynamic and scalable,
marking a break from traditional IT models.
22
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
On-Demand Self-Service: Users can provide and manage computing resources as needed
with cloud services; no human administrators or assistance is needed.
Wide Network Access: Standard networks and heterogeneous devices are typically used to
deliver computing services.
Fast Elasticity: The computing services should have IT resources that are flexible enough to
expand as needed. The consumer will receive services whenever he needs them, and once his
needs are satisfied, the services will scale out.
Measured Service: This approach keeps track of and monitors resource usage for every
application and user, holding both the resource supplier and the user accountable for the
amount of resources consumed. For a number of reasons, including resource efficiency,
security concerns, and billing monitoring, this is done.
Ultimately, in order to fully utilize cloud computing and take advantage of its scalability,
flexibility, and affordability to spur innovation and gain a competitive edge in the digital age,
enterprises must grasp these core ideas. Here's more information on the main ideas.
23
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 3-image
24
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
1.2 Discuss why an organization should migrate to a Cloud
Computing solution.
Moving digital assets to the cloud, including data, apps, and IT resources, is known as cloud
migration. In the past, businesses operated their IT services and apps on independently
maintained IT infrastructure housed in an on-site data center. On-site system software,
databases, and applications numbering in the thousands may be operational at certain
businesses. Transfer these workloads in a planned, non-disruptive manner from on-premises
data centers to the cloud provider's infrastructure when migrating to the cloud. Prioritize
workloads, prepare, and test using a cloud migration strategy to transfer activities to the
cloud in a methodical manner.
Figure 4-image
Flexibility
By utilizing the newest cloud technology to enhance goods and services, cloud migration
enables companies to concentrate on their core skills. Furthermore, because cloud
computing can be accessed practically from any location, it gives stakeholders in an
organization—like employees—the flexibility to access data and operate remotely.
25
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Scalability
Businesses and organizations may rapidly and inexpensively scale infrastructure up or down
as needed thanks to the flexibility of the cloud.
Security
Since the cloud is being used by businesses more and more, governments and corporate
leaders have had to implement security standards, rules, and compliance measures to make
sure they are using cloud capabilities and private data responsibly. This guarantees that
businesses managing confidential information work tirelessly to protect it from hackers.
Cost
Reduced total cost of ownership (TCO) is one of the main advantages of moving to the
cloud. Businesses may drastically save maintenance and IT infrastructure costs by moving
to the cloud, all the while guaranteeing that their data is safe and easily accessible.
Instead of setting up physical data centers to efficiently accomplish tasks without over-
provisioning resources, cloud services can be leveraged to expand operations globally.
Data, apps, and other business components can be moved to a cloud computing environment
through a process called cloud migration.
One of the main areas of concentration will always be cybersecurity. Organizations may
update their IT infrastructure in accordance with the best standards and safeguard their apps
from malevolent cyberattacks by moving to the cloud.
26
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
1.3 Design an appropriate architectural Cloud Computing framework
for the scenario by identifying different needs of cloud solutions for
diversified groups.
Back-end cloud architecture: The cloud service provider, who manages and oversees all the
resources required to deliver cloud services, uses this design. It improves the functioning of
the front end and safeguards the cloud data, making it an essential component of the entire
cloud computing architecture. Massive data storage, deployment strategies, servers, virtual
machines, apps, and security procedures are all included.
27
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 5-image
28
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Architectural Cloud Computing framework.
Creating an architectural cloud computing framework based on the unique requirements and
goals of e-COM Telco needs to have a deep awareness of the needs, objectives, and current
infrastructure of the firm. We can pinpoint important areas where cloud computing can have
revolutionary effects and successfully handle obstacles by carrying out a thorough
examination. Evaluation of elements like scalability, adaptability, security, compliance, cost-
effectiveness, and performance is required for this.
Front End
o Client infrastructure
The devices and interfaces that users use to communicate with cloud services and apps are
referred to as client infrastructure. These gadgets can include mobile devices like tablets and
smartphones as well as more conventional desktop and laptop PCs. Furthermore, this
component includes software interfaces that allow users to access cloud resources, such as
web browsers, mobile apps, and command-line interfaces (CLIs).
o Internet
The communication channel between the client infrastructure and the cloud computing
system's back end is the internet. It enables safe and effective data and request transmission
between users' devices and cloud servers. Users can collaborate and use cloud services
remotely from any location with an online connection thanks to internet connectivity.
Back End
o Application Layer
One of the essential components of the cloud computing architecture is the application layer,
also referred to as software as a service. Any software program or web service that is backed
29
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
by SaaS and handles client requests and requirements can be found in this highest layer. This
application layer is nothing more than a prototype for distribution, where applications are
hosted by a third party and made accessible to users via the internet. SaaS eliminates the need
for hardware, maintenance, licensing, installation, and support costs and requirements.
o Infrastructure Layer
This layer powers all cloud software services at the host application and network levels. It
consists of storage units (CPU, Motherboard, GPU), virtual machines (VMs), virtualization
software, and servers on the Infrastructure as a Service (IaaS) platform. When needed, system
administrators have access to this scalable computing and storage capacity.
o Storage
The infrastructure and hardware that make up the core of the cloud computing environment
are included in this tier. Essentially, anything that can be physically managed, including
database servers, routers, switches, memory disks for controlling hardware configurations,
fault tolerance, power supplies, and traffic management, is included in this lowest tier of
cloud architecture.
o Management
The cloud environment's smooth operation is overseen, and resources are assigned to
designated tasks by the management software. In a cloud computing system, it serves as an
intermediary, coordinating backend and frontend architecture.
o Security
An essential part of any cloud computing architecture is security. Debugging is kept in line to
address security concerns by security. Regular storage backups are the first line of defense for
a cloud computing system; virtual firewalls are additional components that help keep the
cloud secure.
30
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 6-image
31
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
2.0 Activity 02
Deployment models
Depending on the amount of data a user wants to keep and who has access to the
infrastructure, they can choose from a variety of deployment models in this virtual
computing environment.
1) Public cloud
Public clouds are web-based computing resources (such servers and storage) that are owned
and operated by third parties. All infrastructure, including software and hardware, is owned
and operated by public cloud providers. Users can use the public cloud to access and
administer cloud services online. The greatest place to run web servers and endpoints is the
public cloud.
2) Private cloud
One corporation uses private clouds, which are cloud computing resources. While some
businesses employ third-party providers, private clouds can be hosted by on-site data
centers. Users can take advantage of self-service, scalability, and elasticity found in public
clouds by utilizing a private cloud. Additionally, users are able to customize and govern the
cloud. Confidential data can be stored in the private cloud. On private networks, user data
will remain secure and confidential.
3) Hybrid cloud
Both public and private clouds share apps and data in a hybrid cloud environment. Users
have more flexibility because it's simple to transfer apps and data between private and
public clouds. The hybrid cloud offers improved infrastructure, security, and compliance for
the user as well.
32
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4) Multi cloud
This strategy makes use of cloud computing services from several cloud providers,
including computation, storage, and applications. A hybrid cloud can be used in conjunction
with many public cloud providers, as in a multi-cloud approach. For instance, a business
may utilize its servers to hold sensitive data, and it may use one public cloud provider for
infrastructure-as-a-service (IaaS) and another for software-as-a-service (SaaS).
5) Community Cloud
The way the public cloud and community cloud function is similar. There is only one
distinction: only a particular group of users who have similar goals and use cases are
granted access. A third-party vendor or internal management team hosts and manages this
kind of cloud computing deployment architecture.
Figure 7-image
33
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
2.1.1 What is an appropriate deployment model for e-COM Telco?
Hybrid cloud is a combination of both private and public cloud models. Therefore, it is the
most suitable deployment model for E-COM Telco.
A hybrid model can be used as well. The hybrid model allows e-com telcos to use scale to
meet more flexible and evolving project demands.
Cost and performance can be optimized through hybrid cloud. Sensitive data is controlled
by the private cloud. Fluctuations are made based on the increase in demand through the
public cloud. The number one e-com company should be concerned about security.
A cloud storage service model transfers and stores data on remote storage systems, where it is
managed, updated, and made accessible to users via a network, usually the internet.
Cloud storage operates on a virtualized storage architecture featuring metered resources,
multi-tenancy, near-instant elasticity and scalability, and accessible interfaces.
Providers of cloud services oversee and preserve data that is moved to the cloud. In the cloud,
storage services are offered as needed, with capacity growing and shrinking as necessary.
When an organization chooses cloud storage, it does away with the requirement to purchase,
oversee, and maintain internal storage infrastructure.
Ex-: Dropbox, iCloud, Google Drive
Figure 8-image
34
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Ex-: Cloud Computing for education
Cloud computing has had a major impact on a number of industries, including education.
With technology at the forefront, teaching and learning activities are now focused on digital
devices like computers and mobile phones rather than just textbooks.
Ex-: Amazon Web Services (AWS)
Figure 9-image
Galen Data states that the term "cloud computing in healthcare" refers to the process of
managing healthcare-related data through the use of remote servers that are accessed online.
In the healthcare industry, where data is used in practically every procedure, cloud
computing offers a cutting-edge method for gathering, analyzing, presenting, preserving,
and safeguarding data.
Built In writer Mike Thomas writes “Cloud computing in healthcare increases the efficiency
of the industry while decreasing costs. Cloud computing makes medical record-sharing
easier and safer, automates backend operations, and even facilitates the creation, and
maintenance of, telehealth apps.”
35
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 10-image
Service models.
Another name for IaaS is Hardware as a Service (HaaS). It belongs to the platform's layers
for cloud computing. Clients can use it to outsource servers, networking, computing,
storage, virtual machines, and other components of their IT infrastructures. Pay-per-use is
the method used by customers to access these resources via the Internet.
36
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
With traditional hosting services, pre-configured hardware was rented out for a set amount
of time together with IT infrastructure. Regardless of the real use, the client paid for the
time and configuration.
Every firm no longer needs to maintain its IT infrastructure thanks to the IaaS cloud
computing platform layer.
Ex: -Azure, Amazon Web Services (AWS)
Figure 11-image
37
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 12-image
In the software as a service (SaaS) delivery and licensing paradigm, software is not installed
locally on computers but is instead accessed online through a subscription.
Businesses can run their apps without managing software or purchasing hardware when they
use SaaS. Rather than a corporation managing and hosting the infrastructure to support
software, a provider makes updates and patches available globally and automatically,
relieving the strain on an organization's IT staff.
Figure 13-image
38
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Compare the service models.
Infrastructure as a Platform as a Service Software as a Service
Service (IaaS) (PaaS) (SaaS)
Control and
Highest level Control Less Control Minimal Control
Management
Provides application-
The service provider
Scalability Highly scalable level scalability.
manages scalability.
SaaS refers to cloud-based software that businesses can purchase and utilize from cloud
providers. With an application programming interface that can be distributed over the cloud,
PaaS assists developers in creating personalized applications. IaaS assists businesses in
constructing the backend of cloud-based services, such as applications, media, or e-commerce
sites for the physical retail of goods.
Businesses that use SaaS are spared from having to maintain their apps or control how their
data is used. But with PaaS and IaaS, consumers are in charge of their own data usage and
apps. While operating systems are managed by SaaS and PaaS providers, IaaS users are
responsible for managing their own operating systems.
39
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Every project must select the appropriate deployment model to be successful, but this is
especially true in the quickly changing e-commerce industry. Given this, the Platform as a
Service (PaaS) approach becomes a very attractive choice for E-COM Telco implementation.
BENEFITS OF PaaS
1. Time Saving
PaaS enables the E-Com Telco to increase productivity and leverage development funds to
propel the business forward, enabling it to enter the market more quickly.
PaaS has many advantages, one of which is its ability to move swiftly and fast have an app
ready to start making money.
2. Scalability
With the use of cloud computing, various businesses and organizations can raise the stakes as
necessary.
They also have the option to freely reposition their computing resources as needed. Users of
Platform as a Service are promised this level of scaling freedom.
This is because consumers don't have to worry about starting from scratch when prototyping,
developing, and testing their goods because the clouding experience comes with pre-
configured environments.
This scalability technique enhances the overall functionality of this cloud computing service
in a reliable manner.
The infrastructure gives the businesses just the right amount of flexibility to grow without
significantly increasing costs.
40
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
3. Security
Essentially, this means that the supplier of the Platform as a Service cloud computing service
will now be accountable for protecting both the operating system and the physical
infrastructure, such as servers. This explains a built-in security system about which the user
should not bother.
4. Platform Maintenance
Continuous service provision is one of the advantages of PaaS that startups would value.
PaaS will stay on top of everything, including security upgrades, patching operating systems,
and any relevant network equipment, unlike other computing services where customers must
ask and verify for reasonable maintenance from suppliers.
Advantage of PaaS
1. Scalability
Because of a scaling mechanism, PaaS is scalable by default. The process entails the
autonomous distribution and release of essential resources, contingent on the quantity of
users the application serves. This is why every company can grow at any time without
worrying about becoming a victim of its own success.
2. Freedom of Action
41
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
For innovative developers and businesses in need of specialized solutions, this cloud
computing paradigm may be the most beneficial. Professionals handle low-level labor, and a
variety of tools are on hand and ready to use, saving time.
3. Continuous Updates
If e-Com Telco wishes to implement the app on a self-built stack, it must consider all the
elements that require periodic updates and reintegration in order to stay competitive. The
fundamental danger of this strategy is that you can lose out on the most recent enhancements
and additions, which could leave you using an antiquated stack or, worse yet, encounter
security problems.
In order to receive security patches and component updates automatically, PaaS specialists
continuously carry out all necessary tasks. This will save you time and resources by ensuring
that the application is operating on the most recent stack. Professional automated upgrading
also reduces security flaws and compatibility issues.
Disadvantage of PaaS
1. Security Risks
Typically, PaaS software is accessible in a public setting with shared basic resources for
several end users. This may not be a suitable choice for certain apps that have stringent
compliance requirements or hold sensitive data. Should your company fall into this group of
businesses, you should select the platform with even greater care.
The idea behind a new platform is to provide an environment where legacy solutions can still
function. When two systems interact, there will inevitably be some challenges and
inconsistencies. As a result, it's critical to anticipate potential compatibility issues and be
ready to address them.
42
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
2.5 Justify the tools chosen to realize the proposed Cloud Computing
solution.
Amazon offers AWS (Amazon Web Services), a feature-rich and dynamic cloud computing
platform. Offerings for platform-as-a-service (PaaS), packaged software-as-a-service (SaaS),
and infrastructure-as-a-service (IaaS) are mixed together in this category. AWS provides
resources like content delivery services, database storage, and processing power.
AWS has the ability to scale automatically e-COM Telco can use AWS to ensure the security
of data and applications. AWS allows the e-COM Telco to effectively manage costs by
paying only for the number of resources used.
Figure 14-image
1.Easy to use-: The biggest benefit of AWS is its ease of use. The platform's core architecture
has been designed to make it easy for consumers to utilize. The AWS Management Console
was created to make it simple to build new SAAS applications or to quickly access built-in
applications and services. To use the system, neither technical knowledge nor coding
proficiency is necessary.
43
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
2. Effortless Migration-: Any software or service can be uploaded to AWS, a virtual storage
box. Additionally, you can select from a variety of AWS services, such as the preferred
operating system, database, computer language, etc. Migrating to AWS is made simpler by
this flexibility.
2. Cloud Computing Concerns-: There are still a number of issues with cloud computing,
despite the fact that it has completely transformed the IT sector. Due to power outages or
network problems, millions of consumers could experience outages. Concerns about data
leaks, privacy issues, and backup protection have also been brought forward by critics.
Government departments at all levels can store data online with the Microsoft Azure Cloud
for Government Gov Cloud platform. Microsoft states on its Azure for Local Governments
page that the program would enable data-driven decision-making and "improve citizen
services with the broadest range of commercial innovation for government."
Azure gives governmental organizations access to digital data storage with frequent backups,
top-notch cybersecurity measures, and data analytics for well-informed decision-making.
44
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 15-image
1.Restricted Stock-: Because it is only accessible in specific areas, companies who conduct
business elsewhere cannot utilize the Azure cloud services.
2.Increased Prices-: Compared to the basic Azure cloud service, it costs more. This is because
its design aims to meet stricter security and compliance requirements, which may lead to
increased infrastructure, support, and maintenance expenses.
Salesforce
45
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
In order to manage customer contacts, sales, marketing, and other activities in a centralized
digital environment, Salesforce uses cloud computing, which is the process of hosting its
suite of CRM products and services on the cloud.
Figure 16-image
Tools of Salesforce
1.Dataloader.io
In any department, the process of importing and exporting data can be laborious and prone to
mistakes. Dataloader.io facilitates the rapid import, export, and deletion of large volumes of
data. The Salesforce integration tool is offered without charge.
2. Commerçient
An program called Commercial runs in the cloud and connects ERP and CRM platforms,
including Salesforce. With a core team of committed developers always working on new
platform connectors, Commerçient offers a great deal of flexibility and can be tailored to
meet specific company needs. About 65 systems can be integrated with Salesforce or other
CRMs by Commercial.
Advantages of Salesforce
46
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
1. There is little to no risk when using Salesforce. Due to its low acquiring costs and
low-risk management as an organization tool, there is very little to lose and a lot to
benefit from.
2. The database that Salesforce uses is also helpful in digitizing and organizing company
sale records. Thus, improving the overall organization of a company.
3. Salesforce and good customer service comes hand in hand. It allows customization of
profiles for individual customers as well as quick, organized access to individual
records.
Disadvantages of Salesforce
1. Because it operates on its own cloud server, Salesforce has its own maintenance
schedule. The program may occasionally become unavailable as a result.
2. Similar to the automated process, users may likewise lose their individuality.
3. The UI may have an excessive amount of customization options and be overflowing
with laborious, repetitive tools that could be annoying.
Similar to rivals Amazon Web Services (AWS) and Microsoft Azure, GCP is a provider of
public cloud services. Customers can use Google's global data centers' computer resources
for free or pay for each use by utilizing GCP and other cloud providers.
In order to handle GCP costs, manage data, transmit web content and video across the
internet, and provide AI and machine learning tools, GCP provides a range of computing
services.
47
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 17-image
Docker
Developers can create, deploy, run, update, and manage containers—standardized executable
components that combine application source code with the operating system (OS) libraries
and dependencies needed to run that code in any environment—using the open-source
Docker platform.
Figure 18-image
Terraform
IAC tools like Terraform are primarily utilized by DevOps teams to automate certain
infrastructure activities.
48
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 19-image
49
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
3.0 Activity 03
50
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 22-sign in AWS
51
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 24-VPCs
52
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 27-Create VPC part 3
53
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 29-Create VPC part 5
54
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 32-Create VPC part 8
55
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 35-router tables part 2
56
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 38-EC2 dashboard part 2
57
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 41-network settings part 2
58
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
3.2 Implement a cloud platform using an open-source tool for e-Com
Telco.
59
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 46-virtualbox file chosen
60
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 48-next step
61
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 50-image
Figure 51-image
62
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 52-image
Figure 53-image
63
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 54-image
64
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 56-image
Figure 57-image
65
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 58-image
Figure 59-image
66
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 60-image
67
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4.0 Activity 04
4.1 Analyze the common problems that are likely to arise in cloud
environments.
1. Security Concern
On cloud computing, security issues are the fears and possible hazards related to protecting
data and apps that are kept on the cloud. Data breaches, unauthorized access, and hacking
are risks associated with moving information to the cloud. The reason for these worries is
because cloud providers store data on shared servers, which means that safeguarding against
breaches and data theft is essential.
In addition, protecting sensitive data privacy and making sure data protection rules are
followed are issues. To allay these worries and keep data safe in the cloud, effective security
measures like encryption and access controls are crucial.
Protecting sensitive data and abiding by legal requirements are made possible in large part
by cloud computing compliance and data privacy. Stated differently, this refers to ensuring
the security of private or sensitive data, such as financial or medical records, during
processing or storage on the cloud.
Another prevalent issue in cloud computing is service dependability and downtime. The
term "downtime" describes the unavailability of cloud services, such as websites and
applications. It's like to when your beloved game abruptly quits functioning. Technical
problems or maintenance may be the cause of this. Most of the time, dependable services
are accessible.
68
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Companies rely on the cloud to run, so even a brief outage can be problematic. For example,
during downtime, sales may be lost by online stores. Cloud providers use redundancy and
backup solutions to minimize downtime in order to address this issue. It is comparable to
carrying extra tires in your automobile in case one blows out.
4. Cost management
To do this, a business must strike the correct balance between its needs and its expenses.
Optimal cost management guarantees that companies maximize their cloud investments
while maintaining a healthy financial bottom line.
Data corruption and restoration in cloud computing, there is a chance of losing important
digital data and ways to get that data back in case something goes wrong. Envision having
important files, documents, or even priceless memories stored on the cloud. There are
various reasons why data can be lost, including hardware failures, software errors.
6. Performance Challenge
Cloud computing solutions' effectiveness is contingent upon the vendors providing these
services to customers; in the event that a cloud vendor experiences a disruption, the business
is also impacted. This represents a significant obstacle linked to cloud computing.
69
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4.2Assess the common security issues that are likely to arise in cloud
environments.
The biggest security risk in cloud computing is account hijacking. A hacker gains complete
permission to carry out Unauthorized Activities if they manage to take control of a user's or
an organization's account.
DoS attacks have the ability to crash a computer or a network, rendering it inoperable for
users. Malevolent assailants have the ability to provide information to the target that causes
it to crash or overwhelm it with traffic, causing it to shut down.
A downed network can damage a company's reputation and customer relations in addition to
becoming the target of ransomware and revenue losses. Professionals in the field of cloud
security must possess an extensive understanding of DoS attack prevention and recovery
techniques.
For cybersecurity experts, protecting an entirely or partially migrated network from all
kinds of intrusions presents special difficulties. Due to their widespread accessibility over
the public internet, cloud-based networks are frequently the target of cybercriminals.
Malicious hackers are aware of this and have developed methods for taking advantage of
the fact that cloud-based infrastructures are typically not fully secured.
For any business, losing important data due to malicious assaults, natural disasters that
destroy physical servers, or human error can be fatal.
70
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4. Unsecure Access Control Points
The ability of cloud networks to be accessed from any location, enabling connections
between teams and consumers regardless of location, is one of their primary draws.
Regrettably, improper configuration and optimization of cloud security leaves many of the
technologies that users interact with—such as application programming interfaces (APIs)—
open to attack.
Figure 61-image
5. Data breach
When unapproved parties hack databases, computer systems, or networks to obtain private
data, it is referred to as a data breach. Any protected information that ends up in the wrong
hands, including financial records, intellectual property, and personal information, can be
considered compromised data. A data breach can have serious repercussions, including
possible harm to victims, financial losses, reputational damage, and legal ramifications.
Anyone can fall under this category, from tiny businesses to major international corporations
to individual consumers.
Although they have different meanings, the terms "data breach" and "cyber-attack" are often
used interchangeably. Unauthorized access to the data is the main concern in a data breach.
71
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Figure 62-image
6. Insider Threats
An insider threat is any hostile behavior directed at an organization by individuals who have
official access to its databases, apps, or network. These individuals may have access to the
company's digital or physical assets and may include current or past employees as well as
outside parties like partners, contractors, or temporary laborers. Even hacked service accounts
may be one way they manifest. The phrase can also apply to users who inadvertently damage
the company, even though it is most frequently used to characterize illegal or malevolent
behavior.
Figure 63-image
72
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4.3 Discuss suitable solutions to overcome these issues.
Events that disrupt operations and result in data loss can occur at any time and without
notice. For example, a significant bug could be disclosed, your network could go down, or a
natural disaster could affect your company. Businesses that have solid and tried-and-true
disaster recovery plans can lessen the effects of disruptions, recover more quickly, and
quickly return to core operations when things go wrong.
To mitigate this risk, backup and disaster recovery procedures must be well-tested and
functional. To guard against data loss due to cyberattacks, security solutions must be
integrated into each network layer.
Solution
Since these vulnerabilities give hackers an entry point, it’s important to use web application
firewalls to confirm that all HTTP requests originate from legitimate traffic, thus ensuring
that web applications and operations relying on APIs are constantly protected.
Solution
1. Enforce strong password policies
2. Monitor user activity
Network security and bandwidth management are significantly impacted by user activity
monitoring. Identification of internal network threats is aided by tracking and monitoring
end user behavior on company-owned IT resources, devices, and networks.
73
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Unsecure Access Control Points
Solution
Across various cloud services and platforms, manage user identities, access rights, and
authentication methods using centralized Identity and Access Management (IAM) solutions.
To find configuration errors, security holes, or access control weaknesses, conduct routine
security audits and assessments.
Solution
74
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
4.4 Critically discuss how an organization should protect their data
when migrating to a cloud solution such as e-Com Telco.
1. Data Encryption
The process of encrypting data such that only the owner of the correct encryption key may
decrypt it or access it is known as data encryption.
Protocols such as TSL/SSL can be used to encrypt data or to convert data into symbols
before transmission. These protocols are already used by e-COM Telco to ensure secure
data communication.
Figure 64-image
75
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
3. Limit Accessibility
Restricting end-user data access is one method of enhancing data security during the cloud
migration process.
Users don't want the wrong people meddling with any assets during the data migration to
the cloud. Give end users access to only what they require to do their responsibilities.
Possess the choice to dedupe the company's data. By doing this, extraneous copies of user
data are removed, making it easier to transfer and maximize storage space. Better data
security and reduced operating expenses are the long-term outcomes of this.
4. Determine Compliance
Compliance is an additional important consideration when migrating to the cloud. Study the
legal requirements that apply to corporate data, then. The user needs to be aware of the
precise needs for storage, encryption, backup, and transmission.
5. Cloud security
The technology and best practices used in cloud security are intended to safeguard data and
information stored in a cloud architecture. Any IT infrastructure plan that makes use of the
cloud must include cloud security. Data compliance and privacy are guaranteed by cloud
security for data that is stored on the cloud.
Figure 65-image
76
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
6. Recognize the Security of The Cloud
It would be best to reevaluate the security and vulnerabilities of the cloud following the
migration to it and the wiping of retired drives.
Notwithstanding their speed, clouds are not without flaws. Being alert to potential threats
and making sure that all essential security precautions are taken and the required updates are
installed are always a good idea.
77
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Gantt Chart
78
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
Reference
8. 7.What is AWS (Amazon Web Services) and How Does it Work? [online] SearchAWS.
Available at: https://www.techtarget.com/searchaws/definition/Amazon-Web-
Services.
79
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
10. Cisco. (2019). What Is SaaS - Software as a Service Definition. [online] Available at:
https://www.cisco.com/c/en/us/products/software/what-is-software-as-a-service-
saas.html.
11. Chai, W., Castagna, R. and Lelii, S. (n.d.). What is Cloud Storage? Cloud Storage
Definition | Search Storage. [online] SearchStorage. Available at:
https://www.techtarget.com/searchstorage/definition/cloud-storage.
13. Spencer, J. (2022). How To Secure Your Company Data During A Cloud Migration.
[online] Acquisition International. Available at: https://www.acquisition-
international.com/how-to-secure-your-company-data-during-a-cloud-migration/.
15. SailPoint. (n.d.). What Is Identity and Access Management? [online] Available at:
https://www.sailpoint.com/identity-library/identity-and-access-management/.
16. Amazon Web Services, Inc. (n.d.). Cloud Migration - Amazon Web Ser0076ices.
[online] Available at: https://aws.amazon.com/what-is/cloud-migration/.
18. IBM (2023). What is cloud computing | IBM. [online] www.ibm.com. Available at:
https://www.ibm.com/topics/cloud-computing.
19. Anon, (2022). Top 10 Benefits of PaaS - You won’t believe the number 2! [online]
Available at: https://blog.back4app.com/benefits-of-paas/ [Accessed 10 Mar. 2024].
80
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
20. www.ibm.com. (n.d.). What is Docker? | IBM. [online] Available at:
https://www.ibm.com/topics/docker.
21. Danao, M. and Aditham, K. (2023). What Is A Data Breach? Definition, Examples &
Prevention – Forbes Advisor. [online] www.forbes.com. Available at:
https://www.forbes.com/advisor/business/what-is-data-breach/.
22. Exabeam (n.d.). What Is an Insider Threat? Understand the Problem and Discover 4
Defensive Strategies. [online] Exabeam. Available at:
https://www.exabeam.com/explainers/insider-threat/insider-threats/.
81
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
82
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING
83
B.D.N. NISANSALA UNIT 16: CLOUD COMPUTING