Cloud Computeing Micro
Cloud Computeing Micro
the following are some of the operations that can be performed with cloud
computing.
-Storage, backup, and recovery of data
-Delivery of software on recovery of data
-development of new applications and services
-Streaming videos and audio.
Types of Cloud
There are the following 5 types of cloud that you can deploy according to the
organization's needs-
o Public Cloud
o Private Cloud
o Hybrid Cloud
o Community Cloud
o Multi Cloud
1. Public Cloud
Public clouds are managed by third parties which provide cloud services
over the internet to the public, these services are available as pay-as-you-go
billing models.
They offer solutions for minimizing IT infrastructure costs and become a
good option for handling peak loads on the local infrastructure. Public clouds are
the go-to option for small enterprises, which can start their businesses without
large upfront investments by completely relying on public infrastructure for their
IT needs. The fundamental characteristics of public clouds are multitenancy.
Examples: Amazon EC2, IBM, Azure, GCP
2. Private cloud
Private clouds are distributed systems that work on private infrastructure
and provide the users with dynamic provisioning of computing resources. Instead
of a pay-as-you-go model in private clouds, there could be other schemes that
manage the usage of the cloud and proportionally billing of the different
departments or sections of an enterprise. Private cloud providers are HP Data
Centers, Ubuntu, Elastic-Private cloud, Microsoft, etc.
Examples: VMware vCloud Suite, OpenStack, Cisco Secure Cloud, Dell Cloud
Solutions, HP Helion Eucalyptus
3. Hybrid cloud
A hybrid cloud is a heterogeneous distributed system formed by combining
facilities of the public cloud and private cloud. For this reason, they are also
called heterogeneous clouds.
A major drawback of private deployments is the inability to scale on-
demand and efficiently address peak loads. Here public clouds are needed.
Hence, a hybrid cloud takes advantage of both public and private clouds.
Examples: AWS Outposts, Azure Stack, Google Anthos, IBM Cloud Satellite,
Oracle Cloud at Customer
4. Community Cloud
Community clouds are distributed systems created by integrating the
services of different clouds to address the specific needs of an industry, a
community, or a business sector. But sharing responsibilities among the
organizations is difficult.
In the community cloud, the infrastructure is shared between organizations
that have shared concerns or tasks. An organization or a third party may manage
the cloud.
Examples: CloudSigma, Nextcloud, Synology C2, OwnCloud, Stratoscale
5. Multicloud
Multicloud is the use of multiple cloud computing services from different
providers, which allows organizations to use the best-suited services for their
specific needs and avoid vendor lock-in.
This allows organizations to take advantage of the different features and
capabilities offered by different cloud providers.
Examples: Cloud Foundry, Kubernetes, Apache Mesos, Red Hat OpenShift,
Docker Swarm
2. Backend : Backend refers to the cloud itself which is used by the service
provider. It contains the resources as well as manages the resources and
provides security mechanisms.
Application – Application in backend refers to a software or platform to
which client accesses. Means it provides the service in backend as per the
client requirement.
Service – Service in backend refers to the major three types of cloud based
services like SaaS, PaaS and IaaS. Also manages which type of service the
user accesses.
Runtime Cloud- Runtime cloud in backend provides the execution and
Runtime platform/environment to the Virtual machine.
Storage – Storage in backend provides flexible and scalable storage service
and management of stored data.
Infrastructure – Cloud Infrastructure in backend refers to the hardware and
software components of cloud like it includes servers, storage, network
devices, virtualization software etc.
Management – Management in backend refers to management of backend
components like application, service, runtime cloud, storage, infrastructure,
and other security mechanisms etc.
Security – Security in backend refers to implementation of different security
mechanisms in the backend for secure cloud resources, systems, files, and
infrastructure to end-users.
Internet – Internet connection acts as the medium or a bridge between
frontend and backend and establishes the interaction and communication
between frontend and backend.
Database– Database in backend refers to provide database for storing
structured data, such as SQL and NOSQL databases. Example of Databases
services include Amazon RDS, Microsoft Azure SQL database and Google
CLoud SQL.
Networking– Networking in backend services that provide networking
infrastructure for application in the cloud, such as load balancing, DNS and
virtual private networks.
Analytics– Analytics in backend service that provides analytics capabilities
for data in the cloud, such as warehousing, business intelligence
Benefits of Cloud Computing Architecture:
Makes overall cloud computing system simpler. Improves data processing
requirements. Helps in providing high security. Makes it more modularized.
Results in better disaster recovery. Gives good user accessibility. Reduces IT
operating costs. Provides high level reliability, Scalability
3. What cloud infrastructure model explain in detail.?
1. Hypervisor :
Hypervisor is a firmware or a low level program which is a key to enable
virtualization. It is used to divide and allocate cloud resources between several
customers. As it monitors and manages cloud services/resources that’s why
hypervisor is called as VMM (Virtual Machine Monitor) or (Virtual Machine
Manager).
2. Management Software :
Management software helps in maintaining and configuring the infrastructure.
Cloud management software monitors and optimizes resources, data,
applications and services.
3. Deployment Software :
Deployment software helps in deploying and integrating the application on the
cloud. So, typically it helps in building a virtual computing environment.
4. Network :
It is one of the key component of cloud infrastructure which is responsible for
connecting cloud services over the internet. For the transmission of data and
resources externally and internally network is must required.
5. Server
Server which represents the computing portion of the cloud infrastructure is
responsible for managing and delivering cloud services for various services and
partners, maintaining security etc.
6. Storage :
Storage represents the storage facility which is provided to different
organizations for storing and managing data. It provides a facility of extracting
another resource if one of the resource fails as it keeps many copies of storage.
1. High Performance :
The systems offer better and enhanced performance than that of mainframe
computer networks.
2. Easy to manage :
Cluster Computing is manageable and easy to implement.
3. Scalable :
Resources can be added to the clusters accordingly.
4. Expandability :
Computer clusters can be expanded easily by adding additional computers to the
network. Cluster computing is capable of combining several additional
resources or the networks to the existing computer system.
5. Availability :
The other nodes will be active when one node gets failed and will function as a
proxy for the failed node. This makes sure for enhanced availability.
6. Flexibility :
It can be upgraded to the superior specification or additional nodes can be added.
Q.Discuss in detail CIA triad ?
The CIA Triad Confidentiality, integrity and availability, also known as the
CIA triad, is a model designed to guide policies for information security within
an organization. The model is also sometimes refer ed to as the AIC triad
(availability, integrity and confidentiality) to avoid confusion with the Central
Intel igence Agency. Although elements of the triad are three of the most
foundational and crucial cybersecurity needs, experts believe the CIA triad ne
ds an upgrade to stay ef ective. In this context, confidentiality is a set of rules
that limits ac ess to information, integrity is the assurance that the information
is trustworthy and ac urate, and availability is a guarantee of reliable ac ess to
the information by authorized people. Confidentiality, integrity, availability
Confidentiality
Sometimes safeguarding data confidentiality involves special training for those
privy to sensitive documents. Training can help familiarize authorized people
with risk factors and how to guard against them. Further aspects of training may
include strong passwords and password-related best practices and information
about social engineering methods to prevent users from bending data-handling
rules with good intentions and potential y disastrous results. A good example of
methods used to ensure confidentiality is requiring an ac ount number or routing
number when banking online. Data encryption is another common method of
ensuring confidentiality
Integrity
These measures include file permissions and user ac ess controls. Version
control may be used to prevent er oneous changes or ac idental deletion by
authorized users from becoming a problem. In addition, organizations must put
in some means to detect any changes in data that might oc ur as a result of non-
human-caused events such as an electromagnetic pulse (EMP) or server crash.
Data might include checksums, even cryptographic checksums, for verification
of integrity. Backups or redundancies must be available to restore the af ected
data to its cor ect state. Furthermore, digital signatures can be used to provide
ef ective nonrepudiation measures, meaning evidence of logins, messages sent,
electronic document viewing and sending cannot be denied
Availability
This is best ensured by rigorously maintaining al hardware, performing
hardware repairs immediately when needed and maintaining a properly
functioning operating system (OS) environment that is free of software
conflicts. It's also important to keep cur ent with al necessary system upgrades.
Providing adequate communication bandwidth and preventing the oc ur ence
of bot lenecks are equal y important tactics. Redundancy, failover, RAID -
even high-availability clusters - can mitigate serious consequences when
hardware issues do occur.
8) Write the advantages and disadvantages of Cloud Computing?
Advantages of Cloud Computing
Cost Reduction:
The major reason companies shift towards cloud computing is that it takes
lower costs. The business does not need to build its own IT infrastructure or
purchase hardware or equipment.
Better Collaboration:
Cloud computing allows people to access cloud data from any device, from
anywhere, from any time as long as they have an internet connection.
Backup and Restore Data:
As the data is stored in the cloud, it is a lot easier to get the backup and
recovery of that data with just a few clicks; otherwise, manually, it is a very time-
consuming process on-premise.
Security
Due to different security reasons, cloud providers have designed very high-
security cloud features so that you can allow what data is accessible to which
person groups.
Pay as you go:
Cloud computing allows you flexibility because you have to pay only for
what you use as a service.
Boundless storage capacity:
No storage capacity is predefined, so you can increase or decrease storage
capacity according to your needs at any time.
Accessibility:
Cloud computing allows you to quickly and easily store, access, and
manipulate information on the cloud.
Mobility
Cloud computing allows easy access to all cloud data via mobile through
the internet.
Quicker Deployments:
Cloud computing allows us to deploy our services to the cloud more
quickly and with fewer clicks. As compared to setting up all the configurations
on the normal deployments.
Automatic Software Integrations:
Cloud computing allows you to set automation of software updates and
upgrades. So as soon as a newer version of any software is released, it will
automatically integrate into the services you are using.
Disadvantages of Cloud Computing
Internet Connectivity:
In cloud computing, data (files, images, video, audio, etc.) is stored in the
cloud. So to access the data, an internet connection is required. In the absence of
the internet, we can't access it.
Downtime:
We can't access the data if there is downtime (internet loss at the cloud
provider's end). Other than this, downtime also includes cloud providers that may
face power loss, service maintenance, etc.
Vendor lock-in:
When transferring all the data from one cloud provider to another, there
can be many issues, such as the different cloud providers using different
platforms, hosting, and running of the applications on the different platforms that
can result in configuration and complexities issues.
Limited Bandwidth:
As the Cloud provider provides limited bandwidth to all its users, you have
to pay significantly higher costs if your organization surpasses that limit.
Security:
Even though the cloud providers are storing information very securely, we
still don't have to forget that data is vulnerable to cyber-attacks when stored in the
cloud.
Performance Variation:
As the server is hosted on a cloud provider, which also provides services to
other businesses, any cyberattack on shared resources may slow down your
services.
Lack of support staff:
Some cloud companies do not provide proper support to their clients; then,
you have to only depend on FAQs or online help.
Limited Control and Flexibility:
The cloud infrastructure is completely owned, managed, and monitored by
the cloud providers. So businesses using cloud computing have limited control
over their data, applications, and services. It makes it hard for companies to have
the level of control they want over the different services they use.
Technical issues:
Due to frequent version releases of some applications, you have to constantly
upgrade your systems to meet a market need; in between these updates, there is a
chance that you may be stuck on some technical problems.
7) Write a short note
1. Microsoft Azure
Microsoft Azure was launched in 2010 as Windows Azure, and later in 2014, it
was renamed, Microsoft Azure. It was launched years after the release of AWS
and Google cloud but still, it is the fastest-growing cloud and giving tough
competition to AWS and other cloud service providers. There is a five-year
partnership between Microsoft and Disney. In this partnership, the new method
will be developed to move production content to the cloud. Azure has 54 data
centers regions across the world available in 140 countries. Azure offers
hundreds of services including AI + Machine Learning, Analytics, Blockchain,
Compute, Containers, Databases, Developer Tools, DevOps, Identity,
Integration, Internet of Things, Management, Media, Microsoft Azure
Stack, Migration, Mixed Reality, Mobile, Networking, Security, Storage,
Web, and Windows Virtual Des
2. Google Services
Google cloud is another set of solutions for users to get the benefit of cloud
services. If you are serious about latency to build performance-oriented
applications then Google cloud is the best choice because it includes GCP & G
Suite. According to Gardner, the public cloud services market is forecast to
grow 17% in 2020 to $266.4 billion, up from $227.8 billion in 2019. Google
cloud has a firm grip over the banking and finance sector. eBay, Snapdeal, and
HSBC are some major clients of Google. In July 2019 VMWare also announced
a partnership with Google cloud which is the biggest collaboration of last year.
As of Q1 2020, Google Cloud Platform is available in 22 regions, 61 zones and
200+ countries. It offers a variety of products and services including AI and
Machine Learning, API Management, Compute, Containers, Data Analytics,
Databases, Developer Tools, Healthcare and Life Sciences, Hybrid and Multi-
cloud, Internet of Things, Management Tools, Media and Gaming, Migration,
Networking, Security and Identity, Serverless Computing, and Storage. Google
products are also offered in the cloud, including G Suite, Google Maps
Platform, Google Hardware, Google Identity, Chrome Enterprise, Android
Enterprise, Apigee, Firebase, and Orbitera.
3. IBM Cloud
Developed by IBM, this cloud service offers another set of solutions to the
users to deploy their applications on the cloud. It offers IaaS, SaaS, and PaaS
services via public, private, hybrid and multi-cloud models. IBM generated 5.3
billion dollars of revenues according to Q3 2019 which is 6.4 percent higher
than the previous quarter. IBM cloud offers approximately 170 products and
services to meet the customer’s business demands. IBM’s best bets come in the
form of the Internet of Things, Cognitive Computing and Blockchain. Recently
IBM has Red Hat, for the delivery of hybrid solutions efficiently. The cloud
service is helping home appliance manufacturers, retailers, and medical supply
businesses. Computer Network, Storage, Cloud Packs, Management, Security,
Database, Analytics, AI, IoT, Mobile, Dev Tools, Blockchain, Integration,
Migration, Private Cloud, and VMware are some services offered by IBM cloud
Host Machine: The machine on which the virtual machine is going to be built is
known as Host Machine. Guest Machine: The virtual machine is referred to as
a Guest Machine.
Virtualization Tool:-
1.Vagrant:-Vagrant is an open source virtualization tool which developed
by Hash crop and written in Ruby, but it can be used in
projects written in other programming languages such as PHP, Python, Java,
C#, and JavaScript. This tool which works on command-line that provides a
framework and configuration format for
creating, managing and distributing virtualized development environments.
2.Microsoft Hyper-V:-
Microsoft released Hyper-V in 2016. Hyper-V is virtualization software that, well,
virtualizes software. It can not only virtualize operating systems but also entire
hardware components, such as hard drives and network switches. Unlike
other virtualization tools, Hyper-V is not limited to the user’s device. You can
use it for server virtualization, too.
3. .RedHat Virtualization:-
This system was developed by Red Hat Software. It is written in Java. Its first
version was released in June 2010. Red Hat Enterprise Virtualization, or RHEV,
provides a RHEL-based centralized management server with a web-based
interface for managing virtual machines (VMs) called the RHEV Manager.
4. .VMware Workstation:- With the help of this system, you can run
multiple OS. This system is for Linux or Windows OS users. This system is
specially developed for IT professionals and developers. It will help
developers to develop the software to be compatible for multiple
OS/platform
Q12)Discuss cloud computing risk? Explain cloud server risk provider.
ANS: Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity, etc. But
there are also security risks in cloud computing. Some most common
Security Risks of Cloud Computing are given below-
Data Loss:-Data loss is the most common cloud security risks of cloud
computing. It is also known as data leakage. Data loss is the process in which
data is being deleted, corrupted, and unreadable by a user, software, or
application. Hacked Interfaces and Insecure
APIs:-As we all know, cloud computing is completely depends on Internet, so it
is compulsory to protect interfaces and APIs that are used by external users.
APIs are the easiest way to communicate with most of the cloud services.
Data Breach:-Data Breach is the process in which the confidential data is
viewed, accessed, or stolen by the third party without any authorization, so
organization's data is hacked by the hackers.
Q9)explain in detail virtualization for data center automation?
ANS: Data centre virtualization is the process of creating a virtual server—
sometimes called a software defined data centre (SDCC)—from
traditional, physical servers. The process abstracts physical hardware by
mimicking its
processors, operating system, and other resources with help from a hypervisor.
Data centres have grown rapidly in recent years, and all major IT companies are
pouring their resources into building new data centres. In addition, Google,
Yahoo!, Amazon, Microsoft, HP, Apple, and IBM are all in the game. All these
companies have invested billions of dollars in data-center construction and
automation.
1. Server Consolidation in Data Centres In data centers, a large number
of heterogeneous workloads can run on servers at various times. These
heterogeneous workloads can be roughly divided into two categories: chatty
workloads and non inter-active workloads. Chatty workloads may burst at some
point and return to a silent state at some other point. A web video service is an
example of this, whereby a lot of people use it at night and few people use it
during the day. Noninteractive workloads do not require people’s efforts to
make progress after they are submitted.
2. Virtual Storage Management The term “storage virtualization” was
widely used before the renaissance of system virtualization. Yet the term
has a
different meaning in a system virtualization environment. Previously, storage
virtualization was largely used to describe the aggregation and repartitioning of
disks at very coarse time scales for use by physical machines. In system
virtualization, virtual storage includes the storage managed by VMMs and
guest OSes. Generally, the data stored in this environment can be classified
into two categories: VM images and application data.
3. Cloud OS for Virtualized Data Centers Data centers must be virtualized to
serve as cloud providers. Table 3.6 summarizes four virtual infrastructure
(VI) managers and OSes. These VI managers and OSes are specially tailored
for
virtualizing data centers which often own a large number of servers in clusters.
Nimbus, Eucalyptus, and Open Nebula are all open source software available
to the general public. Only vSphere 4 is a proprietary OS for cloud resource
virtualization and management over data centers.
4. Trust Management in Virtualized Data Centers A VMM changes the
computer architecture. It provides a layer of software between the operating
systems and system hardware to create one or more VMs on a single physical
platform. A VM entirely encapsulates the state of the guest operating system
running inside it. Encapsulated machine state can be copied and shared over
the network and removed like a normal file, which proposes a challenge to
VM security
Q1.what is virtual machine?
ANS: A virtual machine (VM) is a virtual environment that
functions as a virtual computer system with its own CPU,
memory, network interface, and storage, created on a physical
hardware system
Q2 what cloud scale?
ANS: Cloud scalability in cloud computing refers to the ability to
increase or decrease IT resources as needed to meet changing
demand.
Scalability is one of the hallmarks of the cloud and the primary
driver of its exploding popularity with businesses
Q3what is cloud security objective?
ANS: Cloud security aims to protect more than just the
perimeter, bringing security all the way down to the data. Some
of the most
common measures include: Identity and access management
(IAM) to help provision access to resources in cloud
environments.
Q4 what is application design?
ANS: Application and system design refers to the software and
logic that is running on the endpoint, the gateway, in the
network, and within the data center (DC) or cloud where the
service information is ultimately stored and managed.
Q5 what is cloud access control ?
ANS: Cloud Codes Access Control in cloud security lets
companies formulate policies to restrict access through specific
IP addresses, browsers, devices, and during specified time
shifts. Here's an in-depth view of our Access Control in cloud
computing solution.
Q6 define machine image design?
ANS: A machine image is a Compute Engine resource that stores
all the configuration, metadata, permissions, and data from
multiple disks of a virtual machine (VM) instance. You can use a
machine image in many system maintenance, backup and
recovery, and instance cloning scenarios.
2. Autonomic Computing
Autonomic computing refers to systems designed to manage themselves
automatically with minimal human intervention. Inspired by the human nervous
system, autonomic computing aims to create systems that are self-managing.
Characteristics of Autonomic Computing:
Self-Configuration: Automatically configures resources in response to
changing conditions.
Self-Healing: Detects and recovers from faults without human
intervention.
Self-Optimization: Continuously monitors and adjusts resources for
optimal performance.
Self-Protection: Identifies and mitigates security risks and unauthorized
access.
Examples of Applications:
Cloud computing platforms (e.g., AWS, Azure) that scale resources
automatically based on demand.
Databases that optimize query performance dynamically.
Network management systems that detect and fix connectivity issues
without manual input.
Q What is AWS ? Explain in detail.
Amazon Web Services (AWS) is a comprehensive and widely used cloud
computing platform developed by Amazon. It provides a wide range of cloud
services that allow businesses, developers, and individuals to build, deploy, and
scale applications and infrastructure without the need for on-premises
hardware.
Key Components of AWS
AWS offers a broad spectrum of services, grouped into the following categories:
1. Compute Services
AWS provides on-demand computing power for running applications and
managing workloads. Key services include:
o Amazon EC2 (Elastic Compute Cloud): Virtual servers (instances) for
running applications.
o AWS Lambda: Serverless computing that allows you to run code in
response to events without managing servers.
o Elastic Beanstalk: An easy-to-use service for deploying and
managing applications in the cloud.
2. Storage Services
AWS offers scalable and secure storage options:
o Amazon S3 (Simple Storage Service): Object storage for storing and
retrieving large amounts of data.
o Amazon EBS (Elastic Block Store): Persistent block storage for EC2
instances.
o Amazon Glacier: Low-cost storage for data archiving and long-term
backup.
3. Database Services
AWS provides managed database services:
o Amazon RDS (Relational Database Service): Managed relational
databases like MySQL, PostgreSQL, Oracle, and SQL Server.
o Amazon DynamoDB: A fast, scalable NoSQL database service.
o Amazon Redshift: A data warehouse for analytics and business
intelligence.
4. Networking and Content Delivery
AWS ensures connectivity and faster delivery:
o Amazon VPC (Virtual Private Cloud): Isolated networks within AWS
for secure deployment.
o Elastic Load Balancing (ELB): Distributes incoming traffic across
multiple instances.
o Amazon CloudFront: Content delivery network (CDN) for delivering
content globally with low latency.
5. Security and Identity
AWS provides tools to secure your applications:
o AWS IAM (Identity and Access Management): Manages user access
and permissions.
o AWS Shield: DDoS protection service.
o AWS WAF (Web Application Firewall): Protects web applications
from threats.
6. Machine Learning and AI
AWS offers advanced machine learning and AI services:
o Amazon SageMaker: A platform for building, training, and
deploying machine learning models.
o Amazon Rekognition: Image and video analysis.
o Amazon Polly: Converts text into lifelike speech.
7. DevOps and Developer Tools
AWS supports development and deployment workflows:
o AWS CodePipeline: Automates continuous integration and delivery.
o AWS CodeBuild: A fully managed build service.
o AWS CloudFormation: Enables infrastructure as code (IaC).
8. Analytics
AWS provides tools for data processing and analysis:
o Amazon EMR (Elastic MapReduce): Processes large data sets using
tools like Apache Spark and Hadoop.
o Amazon Kinesis: Real-time data streaming.
o Amazon QuickSight: Business intelligence and analytics
visualization.
Advantages of AWS
1. Scalability:
AWS allows users to scale resources up or down based on demand,
ensuring cost efficiency and optimal performance.
2. Cost-Effectiveness:
With pay-as-you-go pricing, users only pay for the resources they use,
avoiding upfront infrastructure costs.
3. Global Reach:
AWS operates data centers in multiple regions worldwide, enabling
applications to serve users with low latency.
4. Reliability:
AWS offers high availability and fault tolerance through its distributed
infrastructure and tools like backups and disaster recovery.
5. Security:
AWS complies with numerous security standards and certifications,
ensuring robust security features.
Use Cases of AWS
1. Web Hosting:
Host websites and web applications with services like Amazon EC2, S3,
and CloudFront.
2. Big Data Analytics:
Analyze large datasets using Amazon EMR, Redshift, and Athena.
3. Machine Learning and AI:
Build intelligent applications with AWS SageMaker, Rekognition, and Polly.
4. IoT Applications:
Develop IoT solutions with AWS IoT Core and related services.5)
5. Backup and Disaster Recovery:
Use Amazon S3 and Glacier for secure data backup and archiving.
6. Gaming:
Power game servers and enable multiplayer games with AWS GameLift
and EC2.
Public IP Address:
Definition:
A public IP address is assigned to a device by an Internet Service Provider
(ISP) and is globally unique. It allows devices to communicate directly over
the internet.
Visibility:
Public IP addresses are visible to external networks and can be accessed
from anywhere on the internet.
Use Case:
Used by devices or servers that need to communicate directly over the
internet, such as web servers, email servers, or any device meant to be
accessible to external users.
Examples:
Public IP addresses look similar to private ones but fall outside the
reserved ranges for private IPs (e.g., 203.0.113.0 or 8.8.8.8).
Private IP Address:
Definition:
A private IP address is used within a private network (such as a home,
office, or corporate network). These addresses are not routable on the
public internet.
Reserved Ranges (defined by RFC 1918):
o 10.0.0.0 to 10.255.255.255
o 172.16.0.0 to 172.31.255.255
o 192.168.0.0 to 192.168.255.255
Visibility:
Private IPs are only visible and usable within their local network.
Use Case:
Used for internal communication between devices in a local network.
Examples include connecting a laptop to a printer or a smart device to a
router.
Examples:
o 192.168.1.1
o 10.0.0.5
Key Differences Between Public and Private IPs:
EMI Calculation:
The formula to calculate EMI is:
2. Security Groups:
A Security Group is a virtual firewall that controls inbound and outbound traffic
for cloud resources (e.g., EC2 instances in AWS). It acts as a rule-based access
control mechanism to secure your cloud environment.
Key Features of Security Groups:
1. Rule-Based:
o Inbound Rules: Define allowed traffic into the resource.
o Outbound Rules: Define allowed traffic leaving the resource.
2. Stateful:
o Changes in inbound rules automatically reflect in the outbound
traffic.
3. Attach to Resources:
o Associated with individual instances or groups of resources.
4. Granular Control:
o Allow/deny traffic based on:
Protocol (TCP, UDP, ICMP).
Port Range (e.g., HTTP: 80, HTTPS: 443).
Source/Destination (IP addresses, CIDR blocks, or other
security groups).
Example of Security Group Rules: