Identify the key elements in cloud and mainframe computing

Assignment Help Computer Engineering
Reference no: EM133538473

Cloud And Enterprise Computing

Learning Outcome

K1. Identify the key elements in cloud and mainframe computing;
K2. Explain the importance of cloud and mainframes in contemporary business models; K4. Reproduce various services provided by cloud and mainframes;

S1. Demonstrate cloud architectures models for different user types.

A1. Apply knowledge of the cloud service for range business models; A2. Ability to use cloud environment for enterprise computing.

 

Major assignment report and video presentation
Assignment specification

Overview

This assignment is designed to reinforce the concept of leveraging AWS-cloud service instances in a complex scenario. You will be expected to write a report (approximately 2000-2500 words, excluding references) demonstrating the usage of AWS cloud platform and related cloud technologies by deploying AWS services in a Amazon Virtual Private Cloud.

This is an individual assignment. The assignment consists of three parts:
1. an environment development with AWS;
2. a written report and

How and where to develop.

This assignment task will be implemented in "Academy Learner Lab ". In this environment you have usage limit of $100.

You should try and test development parts, first in "AWS Academy Introduction to Cloud

These environment do not use your $100 limit and does not incurring any actual costs

Tip: To refresh the session length at any time, choose Start Lab again before the timer reaches 0:00. When you are confident with your development part migrate it into "Academy Learner Lab ".

You should also consider stopping (not terminating) instances to reduce costs.

When you decide to terminate an EC2 instance make sure to delete or reattach associated resources. EBS volumes which do not have "Delete on Termination" set to true as they will persist after this instance is terminated. These volumes may incur costs even if you don't use it.

It is recommended to take and save screenshots which are requested, or which show intermediate results early enough in case you run out of credit and cannot access the environment anymore.

Application Development Requirements
In this task you are required to create the following Scenario:

Summary: One VPC with four subnets (two private and two public subnets) in two Availability Zones and one security group.
An Amazon RDS DB instance with high availability which is deployed in the private subnets on both Availability Zones.
One EC2 instance as windows workstation deployed in the public subnet. The EC2 has 30 Gb root storage and a second 80 Gb EBS storage.
The windows workstation has an installation of SQL Server Management Studio which is configured to connect and use the database.
Not in the picture: Add Identity and Access Management (IAM) service and create a user with access rights to the RDS but not to the EC2 and one user with access rights to the EC2 but not to the RDS.

To create this scenario, you should:
• Create a VPC with Amazon Virtual Private Cloud (VPC).
• Create subnets.
• Create Route tables or associate existing route tables to the new subnets.

• Launch an Amazon RDS DB instance with high availability
The RDS instance must have your name in its instance name

Configure the DB instance to permit connections from your window Workstation.

• Launch a EC2 instance as Window Workstation into the public subnet of the VPC.
• Add a EBS with 80 GB to the Window Workstation.
• Install SQL Server Management Studio on the Window Workstation
• Connect to the RDS using SQL Server Management Studio on the Window Workstation Create screenshot 4: SQL Server Management Studio.

The screenshot must show the Remote desktop instance and the RDS instance with student name.

• Add Identity and Access Management (IAM) service and create a user with access rights to the RDS but not to the EC2. The name of this user must be RDS_Admin_<your_Name> and one user with access rights to the EC2 but not to the RDS. The name of this user must be EC2_Admin_<your_Name>.

• Sign in as RDS_Admin_<your_Name>. Try to stop the EC2. An error message appears and says that you are not authorized to perform this operation.
Create screenshot 5: Take a screenshot showing the name: RDS_Admin_<your_Name> in the right upper corner and the error message.
• Sign in as EC2_Admin_<your_Name>. Try to stop the RDS. An error message appears and says that you are not authorized to perform this operation.
Create screenshot 6: Take a screenshot showing the name: EC2_Admin_<your_Name> in the right upper corner and the error message.

3. Written Report Requirements
The report should contain a cover page with the university name, school name, course code, course name, assignment title, student name and student. The text format must be single spaced with font size Arial 12 and larger font size for the headings.

The report must contain a table of content, an brief introduction which contains a general description of the AWS Cloud.

The report text should explain the implementation with the following FOUR (4) headings (sections):

1. Scenario Overview
- Describe the scenario in your own words using the names from your instances and the four required screenshots. You can use additional screens to support your explanation.
Your explanation should be more detailed than the summary of theses instructions and also explain the rout tables used.

- Explain a possible technical/business applicability. Support your description with references.

2. Cloud Services Used
- Provide a brief description of the AWS services used in the scenario.

3. Screenshots from previous instructions

4. List of references
- Provide a list of references which contains URLs (web links) to Internet resources used for the service descriptions.

4. Video Recording Requirements
Demonstration of your scenario should be captured in a video recording between 5 to 6 minutes duration in which you present:
1) Overview of the scenario: VPC, EC2, subnets and security groups.
2) How you use the remote desktop to connect to the EC2 Windows workstation instance
3) In the remote desktop section how, you connect to the RDS database using Microsoft SQL Server Management Studio.

The video must be taken via Kaltura Capture Desktop Recorder with Screen and Camera to capture you presenting, including your face. Video and sound should be of high quality and the voice is understandable.

Reference no: EM133538473

Questions Cloud

Why did the second business model fail for command audio : Why did the second business model fail for Command Audio? Could that failure have been avoided?
Compare the competitors product offerings-prices : Compare the competitors' product offerings, prices, website ease of navigation, appeal, and use.
Write a few paragraphs on how you might use insights gained : Write a few paragraphs on how you might use insights gained from exercise and how adopting more rational beliefs about situations might benefit you personally.
What problems do you anticipate in generating cash flows : What are the various methods that cash will flow into your business? What problems do you anticipate in generating cash flows?
Identify the key elements in cloud and mainframe computing : ITECH1104 Cloud And Enterprise Computing, Federation University - Explain the importance of cloud and mainframes in contemporary business models
What are the barriers the young people face in their search : What are the barriers the young people face in their search for work? How are these barriers reflective of structural and institutional barriers
Describe a well-designed life as a community : Describe what your ideal team would look like. Reflect on how often you would meet to describe a well-designed life as a community.
What ways are judaism-islam and christianity alike : Comparison In what ways are Judaism, Islam, and Christianity alike?
Do you think that newspapers and their reporters today work : COM 310- Do you think that newspapers and their reporters today work on our behalf, perform a watchdog journalism function or are simply agenda setters.

Reviews

len3538473

10/4/2023 3:30:51 AM

The work needs to be done in the learner lab the login details I have shared with above is for you to do the work in that only. You can’t use aws. Note 2: There’s a video part as well which needs to be done with myself If you send me what to say and do I can do that part on my own and the documentation you guys can do. like in PPT or word file As my uni account needs to be used. These are our labs most of the steps are given here

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd