0% found this document useful (0 votes)
5 views50 pages

Siva CCV Record Final

This study investigates the NIST model of cloud computing, focusing on its conceptual framework, service models (SaaS, PaaS, IaaS), and deployment models (private, community, public, hybrid). It includes a literature review, comparative analysis with other models, case studies, expert interviews, and quantitative assessments to understand the model's adoption and effectiveness. The findings aim to provide insights and recommendations for enhancing the NIST model in the context of evolving cloud computing technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views50 pages

Siva CCV Record Final

This study investigates the NIST model of cloud computing, focusing on its conceptual framework, service models (SaaS, PaaS, IaaS), and deployment models (private, community, public, hybrid). It includes a literature review, comparative analysis with other models, case studies, expert interviews, and quantitative assessments to understand the model's adoption and effectiveness. The findings aim to provide insights and recommendations for enhancing the NIST model in the context of evolving cloud computing technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

AIM:

The aim of this study is to explore and analyze the NIST (National Institute of Standards and
Technology) model of cloud computing, examining its conceptual framework, key components,
and their interrelationships. This investigation seeks to provide a comprehensive understanding of
the NIST model's structure and its implications for cloud computing architecture and deployment.
THEORY:
The NIST cloud computing definition is widely accepted as a valuable contribution toward
providing a clear understanding of cloud computing technologies and cloud services. It provides a
simple and unambiguous taxonomy of three service models available to cloud consumers: cloud
software as a service (SaaS), cloud platform as a service (PaaS), and cloud infrastructure as a
service (IaaS). It also summarizes four deployment models describing how the computing
infrastructure that delivers these services can be shared: private cloud, community cloud, public
cloud, and hybrid cloud.
Finally, the NIST definition also provides a unifying view of five essential characteristics that all
cloud services exhibit: on demand self-service, broad network access, resource pooling, rapid
elasticity, and measured service. These services and their delivery are at the core of cloud
computing. In the cloud computing model, the primary focus is a more economic method of
providing higher quality and faster services at a lower cost to the users. In the traditional IT service
delivery model, there is a large emphasis on procuring, maintaining and operating the necessary
hardware and related infrastructure. The cloud computing model enables CIOs, IT project
managers and procurement officials to direct their attention to innovative service creation for the
customers.

Fig 1: The Conceptual Reference Model

22TK0050/ B.Tech-CSE(ICB)
Figure 1 presents an overview of the NIST cloud computing reference architecture, which
identifies the major actors, their activities and functions in cloud computing. The diagram depicts
a generic high-level architecture and is intended to facilitate the understanding of the requirements,
uses, characteristics and standards of cloud computing.

PROCEDURE:
Literature Review: Conduct an extensive review of academic papers, industry reports, and official
NIST documentation to gather insights into the NIST model of cloud computing. Conceptual
Analysis: Break down the NIST model into its fundamental components, including essential
characteristics, service models, and deployment models.
Comparative Study: Compare the NIST model with other prevalent cloud computing models,
such as the ISO/IEC 17788 and the Cloud Security Alliance (CSA) model, to identify similarities,
differences, and areas of convergence.
Case Studies: Analyze real-world case studies and implementations of cloud computing
architectures based on the NIST model to understand its practical applications and challenges.
Expert Interviews: Conduct interviews with experts in cloud computing architecture and
standards to gather qualitative insights into the strengths and limitations of the NIST model.
Quantitative Analysis: Employ quantitative methods, such as surveys or data analysis, to assess
the adoption rate and effectiveness of the NIST model within the industry.
Documentation Analysis: Scrutinize official NIST publications, guidelines, and white papers
related to cloud computing to elucidate the rationale behind the development and evolution of the
NIST model.
Synthesis: Synthesize findings from the literature review, conceptual analysis, case studies,
interviews, and quantitative analysis to develop a comprehensive understanding of the NIST model
of cloud computing.
Conceptual Framework: Provide a detailed overview of the NIST model's conceptual framework,
including its essential characteristics, service models (IaaS, PaaS, SaaS), and deployment models
(public, private, hybrid, community).
Comparison Analysis: Present a comparative analysis of the NIST model with other cloud
computing models, highlighting its unique features, advantages, and potential areas for
improvement.
Case Study Insights: Share insights from real-world case studies, illustrating how organizations
have implemented cloud computing architectures based on the NIST model, along with associated
benefits and challenges.
Expert Perspectives: Summarize insights gathered from expert interviews, showcasing expert
opinions on the effectiveness, relevance, and future prospects of the NIST model in the context of
cloud computing.
Adoption Rate: Provide quantitative data on the adoption rate of the NIST model within the
industry, along with factors influencing adoption and perceived benefits.
Recommendations: Offer recommendations for practitioners, policymakers, and researchers
based on the study's findings, outlining potential areas for further refinement or extension of the
NIST model to address emerging challenges and technological advancements in cloud computing.

22TK0050/ B.Tech-CSE(ICB)
RESULT:
The Study of NIST model of cloud computing , examining its conceptual framework, key
components, and their inter-relationships successfully studied and completed successfully.

22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to establish a virtualization environment capable of hosting
multiple operating systems on a single physical machine. By leveraging virtualization
technology, this endeavor seeks to enable efficient resource utilization, facilitate software
testing and development, and enhance system flexibility and scalability.

Required Tools:

1. Hypervisor Software: Choose a hypervisor platform such as VMware vSphere, Microsoft


Hyper-V, or Oracle VirtualBox to create and manage virtual machines.
2. Operating System Images: Obtain installation ISO files or virtual machine images for the
various operating systems you intend to deploy, including Windows, Linux distributions
(e.g., Ubuntu, CentOS), and other specialized OS versions.
3. Hardware: Ensure that the host machine meets the hardware requirements for running
virtualization software and hosting multiple virtual machines simultaneously, including
CPU, RAM, and storage capacity.
4. Internet Connection: A stable internet connection may be required for downloading
operating system images and updates during the installation process.
5. Virtualization Configuration Guidelines: Refer to documentation and best practices guides
provided by the selected hypervisor software to configure virtualization settings,
networking, and storage options.

Procedures:

Hypervisor Installation: Install and configure the chosen hypervisor software on the host
machine following the vendor's instructions.

Virtual Machine Creation: Use the hypervisor's management interface to create virtual
machines, specifying parameters such as CPU cores, RAM allocation, disk space, and
network settings.

Operating System Installation:


 Mount the installation ISO file or attach the virtual machine image to the newly created
virtual machine.
 Boot the virtual machine and follow the standard operating system installation procedure,
including partitioning, language selection, and user account setup.
 Repeat the installation process for each desired operating system, creating separate virtual
machines for each OS instance.

22TK0050/ B.Tech-CSE(ICB)
Configuration and Updates:
 Configure network settings, such as IP addressing and DNS resolution, within each
operating system instance to enable communication with other virtual machines and
external networks.
 Install software updates, patches, and drivers as needed to ensure the stability and security
of each operating system environment.
 Integration and Testing: Test inter-operability and compatibility between different
operating system instances by configuring networking, file sharing, and application
deployment scenarios.
 Backup and Recovery: Implement backup strategies for virtual machine data and
configurations to prevent data loss in case of system failures or corruption.

Virtualization Environment Setup: Successfully establish a virtualization environment


capable of hosting multiple operating systems concurrently on a single physical machine.

Operating System Deployment: Install and configure various operating systems, including
Windows and Linux distributions, within separate virtual machine instances.

Resource Utilization: Monitor resource usage metrics such as CPU, memory, and disk
utilization to ensure optimal performance and resource allocation across virtual machines.

Functional Testing: Validate the functionality and compatibility of deployed operating


systems through testing scenarios involving networking, file sharing, and application
execution.

Documentation: Document the virtualization setup procedures, configuration settings, and


troubleshooting steps for future reference and knowledge sharing.

22TK0050/ B.Tech-CSE(ICB)
OUTPUT:

Step 1. To download and install the VMware product, visit the official website of VMware.
https://www.vmware.com/in.html

Step 2. Click on Free Product Trials & Demo >> Workstation Pro. You will be redirected to
the download page.

22TK0050/ B.Tech-CSE(ICB)
Step 3. Once the download is complete, run the .exe to install VMware Workstation. A popup will
appear.

Step 4. Once Initialization gets completed, Click on Next.

22TK0050/ B.Tech-CSE(ICB)
Step 5. Accept the terms and click Next

Step 6. On the next screen, It will ask for additional features; it is not mandatory to check this box.
Click on Next.

22TK0050/ B.Tech-CSE(ICB)
Step 7. On the next screen, some checkboxes are populated; check them as per your requirement.

Click on Next.

Step 8. At this step, VMware Workstation is ready to install. Click on Install.

22TK0050/ B.Tech-CSE(ICB)
Step 9. At this step, you can see installation taking place. The installation will take some time; wait
for it to install properly.

Step 11. Upon Finishing, the window will close, and You can see VMware Workstation installed
icon on your Desktop.

The icon looks like this,

Double Click on the icon to open the application.

22TK0050/ B.Tech-CSE(ICB)
Step 12. For the first time opening, if you have not entered the License key in step 7, it will ask for a
license key. You can go for the trial version, free for 15 to 30 days. Click on Continue. Make sure you
have Admin rights for this in Windows.

At this stage, you will get the final installation message. Click on Finish.

22TK0050/ B.Tech-CSE(ICB)
Finally, this will open a window of VMware Workstation Pro.

RESULT:
Thus the created Virtualization environment and install various operating system is
verified and completed successfully.

22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to design and implement an Infrastructure as a Service (IaaS) platform
utilizing existing resources. This implementation will enable users to provision and manage virtualized
computing infrastructure, including virtual machines, storage, and networking, through a centralized
management interface.

Introduction:
What is Infrastructure as a Service (IaaS)?
Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualized
computing resources over the internet. It allows users to provision and manage virtual
machines (VMs), networking, and storage without investing in physical hardware.

Why Use VMware for IaaS?


VMware is a leading provider of virtualization technology, enabling users to create and
manage virtual environments efficiently. Using VMware, we can set up an IaaS model on a local
machine to understand how cloud providers offer infrastructure services.

Prerequisites:
Before starting the lab, ensure you have the following:
• A computer with at least 16GB RAM, 100GB free disk space, and a 64-bit processor with
virtualization support.
• Installed VMware Workstation Pro / VMware ESXi.
• ISO images of the operating systems you want to install (e.g., Windows Server, Ubuntu
Server, or CentOS).
• A basic understanding of networking and operating systems.

Step-by-Step Guide to Implement IaaS Using VMware:


Step 1: Install and Set Up VMware Workstation
1. Download VMware Workstation from the official VMware website.
2. Install it by following the installation wizard.
3. Launch VMware Workstation and verify the installation.

22TK0050/ B.Tech-CSE(ICB)
Step 2: Create a Virtual Machine (VM)
1. Open VMware Workstation and click on Create a New Virtual Machine.
2. Choose Typical installation and click Next.
3. Select Installer disc image file (ISO) and browse for the OS ISO file.
4. Configure VM settings:
• Name: Assign a name (e.g., "Ubuntu-Server")
• Disk Size: Allocate at least 20GB (adjust based on OS requirements)
• Memory: Assign 4GB RAM or more
• Processor: Set at least 2 cores
5. Click Finish to create the VM.
6. Start the VM and complete the OS installation process.

22TK0050/ B.Tech-CSE(ICB)
Step 3: Configure Networking for the VM
1. Open VMware and select your VM.
2. Go to Settings > Network Adapter.
3. Choose Bridged Networking (for direct access to the host network) or NAT (for internet
access through the host machine).
4. Save settings and restart the VM.
5. Verify connectivity using ping google.com (for internet access) or ifconfig / ip a to check
the assigned IP.

Step 4: Set Up a Cloud-Like Environment 1.


Install necessary services based on your OS:
• Linux: sudo apt install openssh-server (for remote access)
• Windows: Enable Remote Desktop Protocol (RDP) 2.
Configure DHCP and Static IPs for better network management.
3. Set up User Access Control:
• Create multiple users (sudo adduser username in Linux)
• Assign roles and permissions

22TK0050/ B.Tech-CSE(ICB)
Step 5: Install Virtualization Tools
1. In VMware, go to VM > Install VMware Tools.

2. Follow the installation guide inside the VM (helps with performance and screen
resolution).

22TK0050/ B.Tech-CSE(ICB)
Step 6: Automate VM Deployment (IaaS Feature) 1.
Clone existing VMs for quick deployment:
• Right-click on VM → Manage → Clone
• Select Full Clone (creates an independent copy)
2. Use VMware templates for standardization:
• Convert VM into a template for future use

Step 7: Monitor and Manage Resources


1. Open Task Manager (Windows) or top (Linux) to monitor CPU and memory usage.
2. Use df -h in Linux to check disk usage.
3. Use VMware Workstation’s Performance Monitor for real-time monitoring.

22TK0050/ B.Tech-CSE(ICB)
Step 8: Enable Remote Access to VMs
1. Install SSH Server on Linux (sudo systemctl enable ssh)
2. Enable Remote Desktop Connection for Windows VMs.
3. Use VMware Remote Console for GUI-based access.

Conclusion:
By following these steps, you have successfully implemented an Infrastructure as a Service
(IaaS) environment using VMware. This lab provides a foundational understanding of how cloud
providers set up and manage virtualized resources.

22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to simulate and configure identity management within a private cloud
infrastructure using OpenStack. This involves setting up authentication, authorization, and user
management functionalities to control access to cloud resources and services. The simulation will enable
the understanding and testing of various identity management features and policies within a controlled
environment

Prerequisites:
Before starting this lab, ensure you have:
• A machine with at least 16GB RAM, 100GB disk space, and a 64-bit processor.
• Installed OpenStack via DevStack or PackStack.
• Access to OpenStack Dashboard (Horizon) or CLI.
• Basic knowledge of Linux and networking.
Step-by-Step Guide to Simulating Identity Management Using OpenStack:

Step 1: Install OpenStack and Access Horizon Dashboard


1. If OpenStack is not installed, install it using DevStack:
git clone https://opendev.org/openstack/devstack.git cd
devstack
./stack.sh
2. Once installed, access the Horizon dashboard:

• Open a web browser and go to http://<your-openstack-ip>/dashboard


• Log in with admin credentials.

22TK0050/ B.Tech-CSE(ICB)
Step 2: Explore Keystone (OpenStack Identity Service)
1. Log in to the OpenStack CLI:
source openrc admin admin openstack
token issue
2. View available services:
openstack service list
3. Verify Keystone API endpoints:
openstack endpoint list

Step 3: Create a New User in OpenStack


1. Create a new user:
openstack user create --domain default --password <your-password> newuser
2. Assign a role to the user:
openstack role add --user newuser --project admin _member_
3. List users to confirm:
openstack user list

22TK0050/ B.Tech-CSE(ICB)
Step 4: Create and Manage Projects and Roles
1. Create a new project (tenant):
openstack project create --domain default new_project
2. Assign a user to the project:
openstack role add --user newuser --project new_project member
3. Verify project assignments:
openstack role assignment list --user newuser

Step 5: Implement Multi-Tenant Access Control


1. Create multiple projects:
openstack project create projectA openstack
project create projectB
2. Assign different roles to a user in different projects:
openstack role add --user newuser --project projectA admin openstack
role add --user newuser --project projectB member
3. Verify user roles per project:
openstack role assignment list --user newuser

22TK0050/ B.Tech-CSE(ICB)
Step 6: Test Access Control and Authentication
1. Log out of Horizon and log in as newuser.
2. Try accessing different projects to verify permissions.
3. Use OpenStack CLI to authenticate as newuser:
source openrc newuser new_project openstack
token issue

Conclusion:
By following this lab, you have successfully simulated Identity Management using OpenStack’s
Keystone service. This hands-on experience demonstrates how cloud providers implement
authentication, role-based access control, and multi-tenancy security.

22TK0050/ B.Tech-CSE(ICB)
Aim:
To explore and demonstrate the use of Storage as a Service (StaaS) for remote file access by
implementing a web-based interface that allows users to upload, retrieve, and manage files stored
in a cloud storage environment.
Introduction:
Storage as a Service (StaaS) is a cloud computing model where storage resources are provided
over the internet or a private cloud. In OpenStack, Swift is the object storage service that allows
users to store and retrieve files remotely via a web interface.
In this lab, you will:
• Set up OpenStack Swift
• Create and manage containers
• Upload, download, and access files remotely using the Horizon Web Interface
Prerequisites:
Before starting this lab, ensure that:
• You have OpenStack installed (via DevStack, PackStack, or a cloud provider).
• OpenStack Horizon Dashboard is accessible.
• Swift is enabled in your OpenStack environment.
• A user account with access to OpenStack Swift is available.
Step-by-Step Lab Guide:

Step 1: Log in to the OpenStack Horizon Web Interface


1. Open a web browser and enter the Horizon dashboard URL:
http://<OpenStack_IP>/dashboard
2. Log in with your admin or user credentials.
3. Navigate to Project → Object Store → Containers.

22TK0050/ B.Tech-CSE(ICB)
Step 2: Create a Storage Container
1. Click on + Create Container.
2. Enter a Container Name (e.g., my-storage).
3. Choose Access Control:
• Private: Only authenticated users can access it.
• Public: Anyone can access it via a URL.
4. Click Create to confirm.

Step 3: Upload a File to OpenStack Swift


1. Click on the newly created my-storage container.
2. Click on Upload Object.
3. Select a file from your local system (e.g., document.txt).
4. Click Upload Object to confirm.

22TK0050/ B.Tech-CSE(ICB)
Step 4: Access Files via Web URL
1. If the container is public, get the file URL:
• Click on the More dropdown beside the uploaded file.
• Select Copy URL and open it in a web browser.
2. If the container is private, authenticate using an OpenStack Swift client like curl or
OpenStack CLI.

22TK0050/ B.Tech-CSE(ICB)
Step 5: Download a File from OpenStack Swift
1. Click on the More dropdown beside the file.
2. Click Download to save it to your local system.

Step 6: Delete a File or Container


1. To delete a file: Click More → Delete Object.
2. To delete a container:
• Ensure it is empty (delete all files first).
• Click More → Delete Container.

Conclusion:
You have successfully explored Storage as a Service (StaaS) using OpenStack Swift!
• Created a storage container
• Uploaded and accessed files via the web
• Downloaded and deleted files
• Used CLI for advanced interactions
This lab helps you understand how cloud storage services work and how users can access their
files remotely via a web interface.

22TK0050/ B.Tech-CSE(ICB)
Aim:
To deploy a basic web application on commercial cloud AWS using AWS Elastic Beanstalk and
assess the ease of deployment and accessibility of the deployed application.

Experiment Setup:
• Web Application: Develop a simple Flask web application that displays "Hello,
World!" when accessed.
• AWS Account: Ensure you have an AWS account to access AWS services.
• AWS Elastic Beanstalk: Utilize AWS Elastic Beanstalk, a service that simplifies the
deployment, management, and scaling of web applications and services.
• Deployment Configuration: Configure Elastic Beanstalk environment with necessary
settings, including selecting the programming language, platform version, and
instance type.
• Access Testing: Test the accessibility of the deployed application by accessing its
URL.

Procedures:
1. Go to Microsoft 365 Admin center and log in using your credentials.
2. From the navigation menu on the left, go to Settings > Integrated apps, and then select Get
apps.

22TK0050/ B.Tech-CSE(ICB)
3. In the admin center AppSource window, search for Adobe Acrobat for Microsoft 365.
From the search results, locate Adobe Acrobat for Microsoft 365 and click Get it now.

4. In the dialog that appears, click Deploy.

22TK0050/ B.Tech-CSE(ICB)
5. In the Deploy New App window, select Adobe Acrobat for Microsoft 365, and then click
Next.

6. You can add the users you want the app to be deployed to. Select the desired option and
click Next.

22TK0050/ B.Tech-CSE(ICB)
7. Acrobat app requests permissions before deployment. Click Accept permissions.

8. A new app permissions window pops up. Enter your Microsoft login credentials if
prompted, and then click Accept.

22TK0050/ B.Tech-CSE(ICB)
9. The Deploy New App window confirms the Permissions accepted. Click Next.

10. To Review and finish deployment, click Finish deployment.

22TK0050/ B.Tech-CSE(ICB)
11. Click Done when the deployment is completed.

12. You will see Adobe Acrobat for Microsoft 365 listed in the list of Integrated apps.

Result:
Thus the Deploy web applications on commercial cloud executed successfully

22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this project is to demonstrate the usage of various AWS (Amazon Web Services)
components, including EC2 (Elastic Compute Cloud), S3 (Simple Storage Service), SimpleDB,
and DynamoDB, for managing virtual machine (VM) instances within a cloud environment. This
project will showcase the provisioning, configuration, and utilization of VM instances alongside
these AWS services to illustrate their functionalities and integration capabilities.

Procedure:

AWS Account Setup:


• Create an AWS account or utilize an existing one to access AWS services.
• Ensure appropriate IAM (Identity and Access Management) permissions are configured to
allow access to EC2, S3, SimpleDB, and DynamoDB services.

EC2 Instance Provisioning:


• Launch EC2 instances using the AWS Management Console or AWS CLI (Command Line
Interface), selecting desired instance types, AMIs (Amazon Machine Images), and
configuration options.
• Configure security groups and key pairs to control inbound and outbound traffic and enable
SSH (Secure Shell) access to EC2 instances.

S3 Bucket Creation:
• Create S3 buckets to store data objects and files, setting access permissions and versioning
options as needed.
• Upload sample data files or objects to S3 buckets using the AWS Management Console or
AWS CLI.

SimpleDB Setup:
• Create SimpleDB domains to store structured data in the form of key-value pairs.
• Define attribute names and data types for SimpleDB domains and populate them with
sample data.

DynamoDB Configuration:
• Create DynamoDB tables to store semi-structured or NoSQL data, specifying primary keys
and read/write capacity units.
• Insert sample records into DynamoDB tables to demonstrate data storage and retrieval
operations.

22TK0050/ B.Tech-CSE(ICB)
EC2 Instance Access and Integration:
• Connect to EC2 instances via SSH or remote desktop protocols to demonstrate interactive
access and management capabilities.
• Install AWS CLI or SDKs (Software Development Kits) on EC2 instances to interact with
other AWS services programmatically.

Demonstration of Component Interactions:


• Showcase integration between EC2 instances and S3 for data storage and retrieval,
demonstrating the transfer of files and objects.
• Illustrate the use of SimpleDB and DynamoDB from EC2 instances to perform database
operations such as querying, inserting, and updating data.

Testing and Validation:


• Perform functional testing of EC2 instances, S3 buckets, SimpleDB domains, and
DynamoDB tables to validate their configurations and operations.
• Verify data consistency, access permissions, and performance metrics across the AWS
services.

Documentation and Presentation:


• Document the implementation procedures, configurations, and demonstration steps for
future reference and knowledge sharing.
• Prepare a presentation or report summarizing the project objectives, methodologies, results,
and key findings.
AWS Environment Setup:
• Successfully configure and access AWS services including EC2, S3, SimpleDB, and
DynamoDB within the AWS environment.

EC2 Instance Provisioning:


• Launch and manage EC2 instances with specified configurations and security settings.

S3 Bucket Creation:
• Create S3 buckets and upload data objects, demonstrating storage and retrieval
functionalities.

SimpleDB and DynamoDB Configuration:


• Set up SimpleDB domains and DynamoDB tables to store and query structured and NoSQL
data respectively.
Component Integration:
• Showcase interaction and integration between EC2 instances and other AWS services for
data storage, retrieval, and database operations.

22TK0050/ B.Tech-CSE(ICB)
Testing and Validation:
• Validate the functionality, performance, and access controls of EC2 instances and AWS
services through comprehensive testing scenarios.

Documentation and Presentation:


• Document implementation procedures and outcomes, and prepare a presentation or report
highlighting the project objectives, methodologies, and results for dissemination and
knowledge sharing.

OUTPUT:

To create a new virtual machine instance on AWS, follow these steps:


1. Open the Amazon EC2 console.
2. From the EC2 console dashboard, select Launch Instance.
3. Provide a name for the VM instance. For this tutorial, we’ll use the name
“RhinoComputeVM”.
4. Under the section titled Application and OS Images, click on the Windows button under the
Quick Start tab. Under the Amazon Machine Image (AMI) section there should be a drop-
down menu listing all of the available machine images. Select the AMI for Microsoft
Windows Server 2022 Base.

22TK0050/ B.Tech-CSE(ICB)
5. In the Instance Type section, select the t2.micro instance type (default) or a larger
instance type if needed. Note: the t2.micro instance type is elegible for the free tier. In regions
where t2.micro is unavailable, you can use a t3.micro* instance under the free tier.

6. In the Key Pair (login) section, select the key pair name that you created in step 2 of the
prerequisite section prerequisite section from the drop-down list.

7. In the Network Settings section, under the Firewall (security groups) choose the Select
existing security group radio button. Then, under the Common Security Groups dropdown
list, select the security group you created in step 3 of the prerequisite section.

22TK0050/ B.Tech-CSE(ICB)
Important

If the Auto-assign public IP setting is set to Disabled, click on the Edit button on the
topright of this section panel and change this setting to Enabled.

8. In the Configure storage section, select the default amount of storage for this instance.
9. Now, on the far right select the Launch Instance.
10. A confirmation page lets you know that your instance has successfully launched. In the
topmost menu which reads EC2 > Instances > Launch an instance, select the Instances
menu item to view the instances console window.

11. On the Instances screen, you can view the status of the launched instance. The instance
should automatically be running after launch, but if not select the instance row checkbox and
then select the Instance State menu item at the top. Select Start Instance to start the virtual
machine.

22TK0050/ B.Tech-CSE(ICB)
12. With the instance row selected, click the Connect button in the top menu.
13. On the Connect to instance page, select the RDP client tab. Select the Download remote
desktop file and save the .rdp file somewhere on your local computer.
14. Next, select the Get password button.
15. Choose Upload private key file and navigate to the private key (.pem) file that you created
when you launched the instance.
16. Choose Decrypt Password. The console displays the default administrator password for the
instance under Password, replacing the Get password link shown previously. Save this
password in a safe place. This passord is required to connect to the instance.
17. Select Download remote desktop file to save the .rdp file to your local computer. You will
need this file when you connect to your instance using the Remote Desktop Connect app.

Result:
Thus To create and access VM instances and demonstrate various components such as EC2,
S3, Simple DB, DynamoDB using AWS is executed successfully.

22TK0050/ B.Tech-CSE(ICB)
Aim:
The aim of this case study is to provide a comprehensive understanding of fog computing,
including its implementation strategies and real-world applications. By examining various use
cases and deployment scenarios, this study aims to elucidate the role of fog computing in
extending cloud capabilities to the edge of the network, enhancing latency-sensitive applications,
and enabling efficient data processing and analytics in distributed environments.

Procedure:
Literature Review:
• Conduct a review of academic papers, industry reports, and technical documentation to
gather insights into the concepts, architectures, and principles of fog computing.
• Explore foundational research papers, standards documents (e.g., IEEE 1934), and
whitepapers from industry leaders (e.g., Cisco, Intel) to understand the evolution and
significance of fog computing.

Conceptual Framework:
• Define the fundamental principles and components of fog computing, including edge
devices, fog nodes, fog layers, and connectivity protocols.
• Examine the architectural differences between fog computing and traditional cloud
computing models, highlighting advantages such as reduced latency, improved bandwidth
utilization, and enhanced privacy and security.

Use Case Identification:


• Identify and analyze real-world use cases and applications where fog computing is
deployed to address specific challenges and requirements.
• Explore diverse industry sectors such as manufacturing, healthcare, transportation, smart
cities, and IoT (Internet of Things) to uncover potential fog computing applications and
benefits.

Case Study Selection:


• Select representative case studies from different domains and industries to illustrate the
versatility and effectiveness of fog computing solutions.
• Consider criteria such as scalability, performance, resource constraints, data sensitivity, and
regulatory compliance when choosing case studies.
Case Study Analysis:
• Analyze each selected case study in detail, focusing on the implementation architecture,
deployment strategy, key technologies employed, and outcomes achieved.
• Evaluate the impact of fog computing on improving operational efficiency, reducing
latency, enabling real-time decision-making, and enhancing user experiences.

22TK0050/ B.Tech-CSE(ICB)
Lessons Learned:
• Synthesize insights and lessons learned from the case studies to derive best practices and
recommendations for fog computing implementation and adoption.
• Identify common challenges, pitfalls, and trade-offs associated with fog computing
deployments and propose strategies for mitigating risks and maximizing benefits.

Future Directions:
• Discuss emerging trends and future directions in fog computing research and development,
such as edge AI (Artificial Intelligence), 5G integration, blockchain integration, and
federated fog architectures.
• Highlight potential opportunities for innovation and collaboration in advancing fog
computing technologies and applications across various domains.

Technical Specifications:
• Include technical specifications of fog computing architectures, such as hardware
requirements, communication protocols, and software frameworks.

Cost-Benefit Analysis:
• Assess the cost-effectiveness and ROI (Return on Investment) of fog computing solutions
compared to traditional cloud-based approaches.

Regulatory Compliance:
• Discuss implications of fog computing on data privacy, security, and regulatory
compliance, considering regional and industry-specific requirements.

Case Study Presentation:


• Present case studies using visual aids such as diagrams, charts, and graphs to illustrate
architectural designs, data flows, and performance metrics.
Stakeholder Engagement:
• Engage with stakeholders including researchers, industry experts, and end-users to gather
diverse perspectives and insights on fog computing implementation and applications.

Result:
Thus the Case Study on Fog Computing: Implementation and Applications is studied.

22TK0050/ B.Tech-CSE(ICB)
MINI PROJECT

A) Install a C compiler in the virtual machine to execute a factorial-of-a-number


program.
B) Install a C compiler in the virtual machine to execute a GCD-of-two-numbers
program
C) Install a C compiler in the virtual machine to execute a number-palindrome
program.
D) Efficient Load Balancing on Virtual Machines Using the Round Robin
Algorithm

22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Factorial program in C Language.

PROCEDURE:
1.Launch the virtual box and open the virtual machine .
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.

Sample Program: //Factorial

#include<stdio.h>
void main()
{
int n,fact=1;
int i=1;
printf("Enter a positive integer:");
scanf("%d",&n);
if(n==0)
{
fact=1;
}
else
{
while(i<=n)
{
fact*=i;
i++;
}
printf("The factorial of %d is %d ",n,fact);
}
}

22TK0050/ B.Tech-CSE(ICB)
4. Compile and Run the C Program
cc fact.c
./a.out

22TK0050/ B.Tech-CSE(ICB)
Output:

Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.

22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a GCD program in C Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine.
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
Sample Program: //GCD

#include <stdio.h>
#include<conio.h>
int gcd(int a, int b) {
return b == 0 ? a : gcd(b, a % b);
}
int main() {
int a, b;
printf("Enter two numbers: ");
scanf("%d %d", &a, &b);
printf("GCD is %d\n", gcd(a, b));
return 0;
}
4. Compile and Run the C Program
cc gcd.c
./a.out

22TK0050/ B.Tech-CSE(ICB)
Output:

Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.

22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Number Palindrome program in C
Language.

PROCEDURE:
1.Launch the virtual box and open the virtual machine.
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.

Sample Program: //palindrome.c

#include <stdio.h>

int main() {
int num, reversed = 0, original, remainder;

printf("Enter a number: ");


scanf("%d", &num);

original = num;

while (num != 0) {
remainder = num % 10;
reversed = reversed * 10 + remainder;
num /= 10;
}

if (original == reversed)
printf("The number is a palindrome.\n");
else
printf("The number is not a palindrome.\n");

return 0;
}
4. Compile and Run the C Program
cc palindrome.c
./a.out

22TK0050/ B.Tech-CSE(ICB)
Output:

Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.

22TK0050/ B.Tech-CSE(ICB)
AIM:
To Install a C Compiler on the Virtual Machine and execute a Load Balancing algorithm round
robin program in C Language.
PROCEDURE:
1.Launch the virtual box and open the virtual machine .
2. Run the following command in the virtual machine terminal.
$ sudo apt-get update
$ sudo apt-get install gcc
• It will install all the necessary packages for gcc complier.
3. Type the C program in the text editor and save the file with .c extention.
Sample Program: //LoadBalancing.c
#include <stdio.h>

int main() {
const char* servers[] = {"Server1", "Server2", "Server3"};
int serverCount = sizeof(servers) / sizeof(servers[0]);
int currentIndex = 0;
for (int i = 0; i < 10; i++) {
printf("Request %d: Routed to %s\n", i + 1, servers[currentIndex]);
currentIndex = (currentIndex + 1) % serverCount;
}
return 0;}

4. Compile and Run the C Program


cc LoadBalancing.c
./a.out

22TK0050/ B.Tech-CSE(ICB)
Output:

Result:
Thus the C program was successfully executed on the Virtual machine and the output is
verified.

22TK0050/ B.Tech-CSE(ICB)

You might also like