Amazon s3ec2


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Amazon s3ec2

  1. 1. Amazon S3/EC2 Thomas Fankhänel, Dominik Hurtienne, Georg Wicherski Web Technologies – Prof. Dr. Ulrik Schroeder – WS 2010/11 The slides are licensed under a Creative Commons Attribution 3.0 License
  2. 2. Overview <ul><li>AWS (amazon web services) offers over </li></ul><ul><li>20 different web services </li></ul><ul><li>The Amazon Cloud is one of the </li></ul><ul><li>largest clouds on the web </li></ul><ul><li>Founded in 2002 </li></ul><ul><li>Amazon S3 (Amazon S imple S torage S ervice) is a scalable and fast way for data storage </li></ul><ul><li>Amazon EC2 (Amazon E lastic C omputing C loud) provides computing capacity </li></ul><ul><li>Trivia: Wikileaks used AWS to manage traffic spikes during the recent disclosures of secret data </li></ul>Web Technologies
  3. 3. Amazon S3: Basics <ul><li>Amazon account and a credit card is sufficient to use S3 </li></ul><ul><li>Write, read, delete objects from 1 byte up to 5 terabytes </li></ul><ul><li>Objects can be stored in different regions </li></ul><ul><li>(US Standard, US West, EU, Asia Pacific) </li></ul><ul><li>Uses standards-based REST and SOAP interfaces </li></ul>Web Technologies
  4. 4. Amazon S3: Features & Use Cases <ul><li>Multipart Upload </li></ul><ul><li>Common use cases: </li></ul><ul><ul><li>Storage and distribution </li></ul></ul><ul><ul><li>data analysis </li></ul></ul><ul><ul><li>periodic backups </li></ul></ul><ul><li>Grant, restrict access to certain parties </li></ul><ul><li>Various download protocols (HTTP, BitTorrent, ...) </li></ul>Web Technologies
  5. 5. Amazon S3: Basic Operations <ul><li>Manually uploading a file by using the AWS Management Console </li></ul>Web Technologies
  6. 6. Amazon S3: REST <ul><li>Example Authentication Amazon S3 REST Request </li></ul><ul><li>The Authorization Header consists of: </li></ul><ul><li>The AWSAccessKeyID is a 20-character, alphanumeric string that uniquely identifies an AWS accout </li></ul>Web Technologies
  7. 7. Amazon S3: Signature <ul><li>Pseudo grammar for the construction of the Authorization Header </li></ul><ul><li>The SecretAccessKeyID is a 40-character string that should be known only by you and AWS </li></ul>Web Technologies
  8. 8. Amazon S3: REST <ul><li>E xample Object GET </li></ul><ul><li>Example Object PUT </li></ul>Web Technologies
  9. 9. Amazon S3: REST <ul><li>E xample Fetch Access Control </li></ul><ul><li>Example Delete </li></ul><ul><li>Using the alternate x-amz-date methode to specify the date </li></ul>Web Technologies
  10. 10. Amazon S3: REST <ul><li>E xample Upload </li></ul><ul><li>Using the x-amz methodes to add meta-data </li></ul><ul><li>x-amz‘s are automatically sorted </li></ul>Web Technologies
  11. 11. Amazon S3: Pricing Web Technologies
  12. 12. Amazon S3: Summary <ul><li>Easy, reliable way to store data </li></ul><ul><li>Can handle traffic spikes </li></ul><ul><li>Highly scalable </li></ul><ul><li>Fast growing cloud </li></ul>Web Technologies
  13. 13. Amazon EC2 (Elastic Compute Cloud) Web Technologies
  14. 14. Amazon EC2: Why? <ul><li>You ’ re doing business and you: </li></ul><ul><li>Expect high traffic on your website </li></ul><ul><li>Have some computational tasks to do (simulation, math problems, image rendering, video transcoding...) </li></ul><ul><li>Need to perform network load tests, application clustering </li></ul><ul><li>But: </li></ul><ul><li>You do not want to build up your own infrastructure (data centre, broadband internet...) </li></ul><ul><li>You need these services for a short period of time only </li></ul><ul><li>You need it right now!? </li></ul>Web Technologies
  15. 15. Amazon EC2: Overview <ul><li>Every EC2 instance is a (virtual) server: </li></ul><ul><ul><li>Running your choice of operating systems (Windows Server 2003/2008, Solaris, Linux) </li></ul></ul><ul><ul><li>Full super-user access: install and run every software </li></ul></ul><ul><li>As many instances as you need </li></ul><ul><li>Works in conjunction with S3 </li></ul><ul><li>Appliances: community provided image templates or Amazon Machine Images (AMI) </li></ul>Web Technologies
  16. 16. Amazon EC2: Additional features <ul><li>VPC (Virtual Private Cloud) via VPN </li></ul><ul><li>CloudWatch web service to monitor EC2 </li></ul><ul><li>Elastic Block Store: persistent system storage </li></ul><ul><li>High Performance Computing (HPC) Clusters </li></ul><ul><li>External load balancer </li></ul><ul><li>VM Import </li></ul>Web Technologies
  17. 17. Amazon EC2: Limitations <ul><li>No installation support </li></ul><ul><li>No help on specific applications </li></ul><ul><li>No automated backup </li></ul><ul><li>Prohibited: Spam, DOS, illegal file sharing … ! </li></ul>Web Technologies
  18. 18. Amazon EC2: Instance types and pricing Web Technologies
  19. 19. Amazon EC2: Basic Operations <ul><li>Demo of Management Console </li></ul><ul><li>Use EC2 instance to find a password hash (by bruteforce) </li></ul>Web Technologies
  20. 20. Amazon EC2: Summary <ul><li>Advantages </li></ul><ul><ul><li>High virtual server performance </li></ul></ul><ul><ul><li>No hardware or connectivity issues </li></ul></ul><ul><ul><li>SLA: 99.95% (10% refund) </li></ul></ul><ul><ul><li>Just in time appliance deployment </li></ul></ul><ul><ul><li>Number of cpus and memory size adjustable to appl. N eeds </li></ul></ul><ul><li>Disadvantages </li></ul><ul><ul><li>Paravirtualization (XEN): Very fast but guest-system with compatible kernel is required </li></ul></ul><ul><ul><li>Security issues, sensible data? </li></ul></ul>Web Technologies
  21. 21. Literature - Introductio n <ul><li>Books </li></ul><ul><li>Paper </li></ul><ul><li>Tutorials </li></ul><ul><li>Links </li></ul><ul><li>Examples </li></ul><ul><li>Software </li></ul>1 Introduction