Sie sind auf Seite 1von 53

MINOR PROJECT REPORT

Walmart Warehouse Application

Submitted in partial fulfilment of the


Requirements for the award of
Degree of
Bachelor of Technology
In
Computer Science & Engineering
Submitted By:
Shivam Gupta
Reg. No- 10315210160

Sumit Kumar Rai


10315210178

Deepak Kumar
10315210193

SUBMITTED TO:
Mr. Vaibhav Sharma
(Associate professor)

Department of Computer Science & Engineering


SRM UNIVERSITY DELHI-NCR, SONIPAT

1
HARYANA-131029
CANDIDATE’S DECLARATION
I hereby certify that the work which is being presented in the project entitled “ Walmart
Warehouse Application ” in partial fulfilment of the requirement for the award of the
degree of Bachelor of Technology in Computer Science & Engineering and submitted
in the Department of Computer Science & Engineering of SRM University, Delhi-
NCR, Sonepat, Haryana, (India) is an authentic record of my own work carried out
under the supervision of Mr. Vaibhav Sharma. The matter presented in this project
has not been submitted for the award of any other degree of this or any other Institute /
University.

(Signature of the candidate)


Shivam Gupta
(Reg. No.10315210160)

(Signature of the candidate)


Sumit Kumar Rai
(Reg. No.10315210178)

(Signature of the candidate)


Deepak Kumar
(Reg. No.10315210193)

This is to certify that the above statement made by the candidate is correct to the best of
my knowledge.

Mr. Vaibhav Sharma


(Associate Professor)

The B. Tech. project viva-vice examination of the students has been held
on.........................................................................................................

2
Internal Examiner External Examiner

ABSTRACT

Why are so many businesses moving to the cloud? It‘s because cloud computing
increases efficiency, helps improve cash flow and offers many more benefits.
Cloud Computing is one of the upcoming Internet based technology. It is been
considered as the next generation computing model for its advantages. It is the latest
computational model after distributed computing, parallel processing and grid
computing. This project presents the enhancement of cloud computing technology,
platforms, its advantages, Force.com platform and the “Warehouse” App developed
using CLOUD and Force.com platform. Also, The Force.com platform is the world's
first Platform as a Service (PaaS), enabling developers to create and deliver any kind of
business application in the cloud, entirely on-demand and without software.
Cloud Computing is a concept and Salesforce is its Implementation .We have worked
upon Salesforce Developer Edition which provides access to the Force.com platform
and API. It allows developers to extend the Salesforce system, integrate with other
applications, and develop new tools and applications. Developer Edition provides
access to many of the features available with Enterprise Edition. We have implemented
a Warehouse Application on which we have applied various workflows and
formulation rules, validations on the tabs and objects.
The objective of this application is to develop and deploy an application in the
Salesforce environment. This application project must satisfy all type of users and
should enable all cloud computing capabilities.
It's a breakthrough new concept that is making companies radically more successful by
letting them translate their ideas into deployed applications in record time.

3
ACKNOWLEDGEMENT

The Industrial Seminar report on “Walmart Warehouse Application Using Salesforce”


is outcome of guidance, moral support and devotion bestowed on me throughout my
work.
For this I acknowledge and express my profound sense of gratitude and thanks to
everybody who have been a source of inspiration during the summer training.
We wish to extend my sincere gratitude to Mr. Vaibhav Sharma for having given us
opportunity to complete this project successfully.
With great pleasure we extend our heart-felt gratitude.

Shivam Gupta
Registration no- 10315210160

Sumit Kumar Rai


Registration no- 10315210178

Deepak Kumar
Registration no-10315210193

4
CERTIFICATE

This is to certify that a project report on “Minor Project” submitted by Shivam Gupta (Reg. No.
10315210160), Sumit Kumar Rai (Reg. No. 10315210178), Deepak Kumar (Reg. No.
10315210193), to the Department of CSE, in the partial fulfillment of the requirement for the degree of
Bachelor of Technology in Computer Science and Engineering by SRM University Delhi-NCR,

Sonepat, Haryana, (India). In my opinion, this work fulfils the requirement for which it has been
submitted. This project has not been submitted to any other University or Institution for any other
degree.

Mr. Vaibhav Sharma


(Associate Professor)
Dr. Ajay Sharma
HOD CSE (UG)

5
TABLE OF CONTENTS

Contents Page No.

Chapter 1 Introduction 10-15


1.1 Introduction to Organization 10-11
1.2 Introduction to Project 11-12
1.3 Project Category 12
1.4 Objectives 13
1.5 Problem Formulation 13
1.6 Identification/Reorganization of Need 14
1.7 Existing System 14
1.8 Proposed System 15
1.9 Unique Features of the System 15
Chapter 2. Requirement Analysis and System Specification 16-21
2.1 Feasibility study 16
2.2 Software Requirement Specification 17-18
2.3 Validation 18-19
Chapter 3. System Design 22-28

3.1 Design Approach 22-23


3.2Detail Design 23-24
3.3 System Design using various Structured analysis 24-27
3.4 User Interface Design 27
3.5 Database Design 27-28
3.6 Methodology 28
Chapter 4. Implementation, Testing and Maintenance 29-37
4.1 Introduction to Tools and Technologies 29-30
4.2 Project Scheduling 31-33

6
4.3 Testing Techniques and Test Plans 33-37
Chapter 5. Results and Discussions 38-49
5.1 User Interface Representation 38
5.2 Snapshots of system with brief detail of each 38-45
5.3 Backend Representation 45-49
Chapter 6. Conclusion and Future Scope 50

References/Bibliography

7
CHAPTER 1

INTRODUCTION

1.1 Introduction to Organization


Ducat is a leading name in the computer training industry. We are known for churning
out globally competent professionals who are miles ahead of others in skill set,
knowledge and ability to deliver. We have a wide bouquet of IT courses that are
industry centric and job oriented. These courses have enabled many fresher’s find
lucrative jobs and the experienced professionals advance in their career. Most of our
students have proved to be productive in their endeavours from the very beginning
with little or no training.
Ducat knows when students approach an institute they expect more value than the
books on technology can offer. Hence our IT courses are designed and delivered by
consultants working in the specific technologies. The students get the triple benefit of
in-depth understanding of the technology, its practical application in real time
scenarios and opportunity to work in live projects. Time and again we arrange for guest
lectures by industry tech experts to give insights on various trends and guidance on real
life project.

Figure 1.1: Ducat Logo

8
Ducat courses are for individuals as well as for corporate. We also undertake
customization of the courses to training milestones of the organizations. We are also in
software development, instructor led campus workshops and placement services. We
conduct placement assistance workshops frequently to prepare our students to face job
interviews and also provide placement assistance. We make them industry ready and
offers would automatically knock their door.
Ducat offers a wide spectrum of technical courses and application courses designed to
suit every skill level, as well as the ability to consult directly with organizations to
tailor made learning plans for any number of employees. The institute products and
services have a wide appeal and are applicable those in varied positions including
network administrators, systems analysts, systems architects, test engineers, software
developers, help desk staff, IT managers, senior executives, administrative assistants
and business professionals.
Ducat is India's leading IT-Education provider, equips learners with actionable
knowledge, getting the right learning to the right people at the right time With DUCAT,
you can accelerate and certify the skills of a globally dispersed staff with standardized
course materials through every stage of the IT learning curve. DUCAT is proud to
contribute the part as the architects of creating IT Professionals for the world. This is
an outcome of the various facets that give the DUCAT its characteristic value the
faculty, enterprising students, academic affiliations, facilities and industry partnership.

1.2 Introduction to Project


 The new way of building and running applications are enabled by the world of
cloud computing, where we can access applications, over the Internet as
utilities, rather than as pieces of software running on your desktop or in the
server room. This model is already quite common for consumer apps like email
and photo sharing, and for certain business applications, like customer
relationship management (CRM).
 The Force.com platform is the world's first Platform as a Service (PaaS),
enabling developers to create and deliver any kind of business application in
the cloud, entirely on-demand and without software. It's a breakthrough new

9
concept that is making companies radically more successful by letting them
translate their ideas into deployed applications in record time.
 Building and running business applications with traditional software has always
been too complex, slow, and expensive. A new model, called cloud computing,
has emerged over the last decade to address this problem. Applications that run
in the cloud are delivered as a service so companies no longer have to buy and
maintain hardware and software to run them.
 Salesforce.com pioneered this model with applications business over the last
decade. More recently, Force.com have opened up the infrastructure and made
it available for anyone building any business application and running it on the
servers using the Force Platform.
 The Force Platform allows you to store structured data, implement business
logic with workflow rules, approval processes and custom code, support Web
browsers, integrate with other applications, do reporting and analytics and scale
up or down—all with sub second response time, high availability, and security
you need to run your mission critical business apps.

1.3 Project Category


This is an application project for understanding and demonstrating cloud
computing capabilities using Force.com. I use Sales Force features to achieve the goal.
The objective of this application is to develop and deploy an application in the
sales force environment.
This application project must satisfy all type of users and should enable all
cloud computing capabilities.
It is assumed that this application will be developed in the following
environment:
 Force.com environment
 Visualforce as the developing language

10
1.4 Objectives
Why are so many businesses moving to the cloud? It‘s because cloud computing
increases efficiency, helps improve cash flow and offers many more benefits.
Following are the objectives of Cloud computing:-
1. Reduce spending on technology infrastructure:-Cloud computing services
are typically pay as you go, so there‘s no need for capital expenditure at all.
And because cloud computing is much faster to deploy, businesses have
minimal project start-up costs and predictable on going operating expenses.
2. Flexibility:-The second a company needs more bandwidth than usual, a cloud-
based service can instantly meet the demand because of the vast capacity of the
service‘s remote servers. It is the responsibility of cloud service provider.
3. Disaster recovery: - When companies start relying on cloud-based services,
they no longer need complex disaster recovery plans. Cloud computing
providers take care of most issues, and they do it faster. Even when your hard
disk crash all your data is out there on the cloud.
4. Automatic software updates: - Instead of purchasing license of expensive
software and applications the instant software updates are provided by Cloud-
service providers.
5. Companies no longer have to worry about paying for upgraded and new
version of any software.
6. Security:-Cloud service providers keep the data of any organization
transparent Security is the primary objective of cloud computing. Companies
can spend more time in growing business instead of when they no longer have
to worry about security issues.
7. Improve accessibility: - You have access anytime, anywhere, all you need is a
fast internet connection. One can access data from anywhere he wants.
8. Less personnel training is needed:-It takes fewer people to do more work on
a cloud, with a minimal learning curve on hardware and software issues.
9. Reduce capital costs:-There‘s no need to spend big money on hardware,
software or licensing fees.

11
1.5 Problem Formulation
 As organizations seek to move up the intelligence value chain, it becomes
clearer everyday that their previous strategies for delivering information are
becoming inadequate. What was once “good enough” for reporting and
analytics has now been legislated into a more robust and controlled
environment. Businesses simply cannot be run on spreadsheets anymore.
Official reporting data that touches many hands is quickly becoming a thing of
the past.
 Enter (or re-enter as the case may be) the data warehouse. What was once
primarily considered an IT centered project, now has the eye of the business.
With the passing of legislation like the Sarbanes-Oxley Act, corporate
executives must feel comfortable that the financial (and other public) reports
that their teams prepare and that they sign are accurate. Many of the failed data
warehouse projects of the past lacked true commitment on the part of the
business. The fact is it is nearly impossible for a data warehouse to be
successful without active participation from the data owners, i.e. the business,
on a daily basis.
 The focus of this paper is getting from here to there. It includes the creation of a
warehouse equivalent to warehouse like BIG BAZAAR and EASYDAY and
the creation of the merchandises, associated line items and the invoices
generated for each merchandise and line item being sold by that warehouse.
Each and every transaction taking place in the warehouse, is known to the
respective HR of that executive via Gmail alerts through validation rules put on
the conditions like exceeding of the stock of a particular merchandise of that
warehouse.

1.6 Identification/Reorganization of Need


 How successful a cloud provider is in growing its business depends on its
ability to dispel Customer concerns about data security and privacy.

12
 In less than a decade, cloud computing has grown from an intriguing niche
to a mainstream market segment. Future expectations are high; with
Morgan Stanley projecting Amazon Web Services will hit the $24 billion
revenue mark in 2022.
 Of course, how successful any single provider is in growing its cloud
business depends on its ability to help dispel the cloud security worries that
still side line some on-demand deployments.

1.7 Existing System


 As users of the Internet, we're all familiar with the fascinating, innovative,
creative, and sometimes silly ways in which it has changed how we work
and play. From social networking sites to wikis to blogs, and more, it’s
exciting to watch the innovations taking place that are changing the ways
we communicate and collaborate.
 While these changes have certainly impacted how we work with content, a
similar set of Internet-driven ideas and technologies is changing how we
build and work with business applications.
 While yesterday's business applications required thousands, if not millions,
of dollars and sometimes years of professional services help to set up and
customize, the technologies offered by the Internet today make it much
easier to create, configure, and use business applications of all kinds.
Indeed, the power of the Internet has given us the ability to solve new
kinds of business problems that, because of complexity or cost, had
previously remained out of reach.
 Just as the changes that moved publishing technology from paper to bits
made it possible for us to have information about anything in the whole
world right at our fingertips, the changes in application technology make it
similarly possible to imagine a robust, enterprise-class application for
almost any business need. Sound pretty good? Then you're probably
wondering: “What's the magic that makes this possible?”

13
 These new ways of building and running applications are enabled by the
world of cloud computing, where you access applications, or apps, over the
Internet as utilities, rather than as pieces of software running on your
desktop or in the server room. This model is already quite common for
consumer apps like email and photo sharing, and for certain business
applications, like customer relationship management (CRM).

1.8 Proposed System


 Since there are lot of problems available with the existing system a new
technology is used in this project called as cloud computing. The proposed
system in this project is to develop an application in the cloud computing
environment and have to deploy it and to launch the application in cloud.
 The cloud environment used in this project is called as Salesforce environment.
A simple application is developed in the cloud environment and deployed in the
same environment using the tools provided there it. The application is launched
as a site inside the cloud. The security provided by the platform provider
(Salesforce) is used in this application.

1.9 Unique Feature of the System


Cloud Computing Platform as a Service: Cloud computing applications branch out
well beyond CRM. Salesforce.com customers are building more apps, and building
better apps. All with less cost and less hassle, thanks to the Force.com cloud
computing platform. Developers everywhere are using Force.com for :
 Business application development,
 Creating cloud computing applications like enterprise resource planning (ERP),
human resource management (HRM),
 Supply chain management (SCM).
The Force.com cloud computing platform is the fastest way to get from idea to app. It’s
about more innovation and less infrastructure. It’s about running your business in the
cloud.

14
CHAPTER 2

Requirement Analysis and System Specification

2.1 Feasibility Study


A feasibility study is an evaluation of a proposal designed to determine the difficulty
in carrying out a designated task. Generally, a feasibility study precedes technical
development and project implementation. In other words, a feasibility study is an
evaluation or analysis of the potential impact of a proposed project.
Economic feasibility: Economic analysis is the most frequently used method for
evaluating the effectiveness of a new system. More commonly known as cost/benefit
analysis, the procedure is to determine the benefits and savings that are expected from
a candidate system and compare them with costs. If benefits outweigh costs, then the
decision is made to design and implement the system. An entrepreneur must accurately
weigh the cost versus benefits before taking an action.

Cost Based Study: It is important to identify cost and benefit factors, which can be
categorized as follows: 1. Development costs; and 2. Operating costs. This application
needs less amount of cost in both development and operating state.

Time Based Study: This is an analysis of the time required to achieve a return on
investments. This application takes less time to execute and to use.

15
Operational feasibility :Is a measure of how well a proposed system solves the
problems, and takes advantage of the opportunities identified during scope definition
and how it satisfies the requirements identified in the requirements analysis phase of
system development. The proposed system solves all the problems in the existing
system in the basis of time, cost, risk, Etc,.

Technology and system feasibility: The assessment is based on an outline design of


system requirements in terms of Input, Processes, Output, Fields, Programs, and
Procedures. This can be quantified in terms of volumes of data, trends, frequency of
updating, etc. in order to estimate whether the new system will perform adequately or
not. Technological feasibility is carried out to determine whether the company has the
capability, in terms of software, hardware, personnel and expertise, to handle the
completion of the project.

2.2 Software Requirement Specification Document


Data Requirements Cloud database usage patterns are evolving, and business
adoption of these technologies accelerates that evolution. Initially, cloud databases
serviced consumer applications. Theseearly applications put a priority on read access,
because the ratio of reads to writes was veryhigh. Delivering high-performance read
access was the primary purchase criteria.
Functional Requirements There are following functional requirements.
1. Understand the cloud environment provided by SalesForce.com
2. Learning VISUALFORCE
3. Developing an application using Visual force in the SalesForce.Com
Environment
4. Deploying the application
5. Providing the User accounts
6. Accessing the application from user accounts and should work with the
applications clearly.

Performance Requirements The performance will be fully based on the Internet


connection. The user may not worry about their local system. The local system will be
only used as a terminal.

16
Dependability Requirements The first approach employed to classify services is by
looking at the different dependability requirements the user may has for different
services. At this stage, it is instrumental to divide users into two groups, business users
and domestic users. We confine our attention on the business users first and domestic
users will be dealt with later. For business users, different services have different
dependability requirements depending upon the criticality of the service to user’s core
business. The services are decided to be divided into four different groups depending
upon their criticality to the user’s core business.
Maintainability Requirements Following are the maintainability requirement of e-
Notice mobile application:
1. Application extendibility: The application should be easy to extend. The code
should be written in a way that it favours implementation of new functions. It is
requires in order for future functions to be implemented easily to the
application.
2. Application testability: Test environments should be built for the application
to allow testing of the applications different functions.
Security Requirements
1. All the security issues will be provided by the service provider itself (SALE
FORCE.COM).
2. No users are allowed to enter and view the details without proper authentication
(password protection).

Look and Feel Requirement


Regarding look and feel, our client is straight forward. They believe in simplicity. So
these are their requirements:
1. Simple and Attractive: The user interface should be simple and attractive with
lightly colour. It should give relaxing effect on looking at its GUI. No bright
colors should be used while designing the UI of this application.
2. Easy to Use: The application should be easy to use. If any user is doing
something wrong, he/she should be informed correctly, what is going wrong
behind the scene? There should be proper instructions for the user to use this
application.

17
2.3Validation
Any application is useless without validation. There should be a way to validate the
user input first before sending the user request to the server. Following are the
validations implemented in proposed system:
1. User Password Validation: The application should check the user and
password fields before sending any request to the server. It should check
whether the fields are filled or not. if fields are not filled up, user should be
instructed to fill up the fields before moving further. in this way, there will be
less traffic on the server.
2. Validations during Registration: There are a lot of validations that needs to
be implemented in the application. They are as follow:
1. First and Last Name of User: The first and last name of user should be not
null. Also first letter of first and last name should be in uppercase.
2. Username: The username can contain only alphabets, digits, underscore
and hyphen. It should be at least characters long and maximum of 15
characters.
3. Password: The password must contains one digit from 0-9, one lowercase
character, one uppercase character, one special symbols in the list ”#$%”
and length of password must be at least 6 characters and maximum of 20.
4. Email: The application must validate and email address entered by the user
before sending request to the server.
5. Mobile Number: The mobile number should be of only ten digits. No
more, no less than that.
3. Validating During Posting Notices: The application should validate the order
details fields before place any order. It should check whether title and
description fields are filled or not. If not, it should tell the user to fill up the
required fields while posting the notice.
4. Reset Password Validation: The application should check that user has
entered the username or email in the given filed before pressing the reset
password button.

18
Features of force.com database

Easy to use: With Force.com, there’s nothing to manage — salesforce.com takes care
of everything for you. There’s no software to install, update, and patch. No waiting on
someone else when you want to provision databases. No worries about database
backup and disaster recovery. No complex documentation set with thousands of pages
and parameters to tune for performance or elasticity. There’s even automatic indexing.
Whether you have 1 database or 1,000 databases, all you need to focus on is building
great apps.
Trustworthy: Force.com is built with the security and privacy of customer
information in mind. Salesforce.com’s infrastructure and corporate workplace meet all
of the highest industry standards, including sas 70 type ii, systrust, and iso 27001
certifications.
Modern: Force.com is more than just another database system — it’s jam-packed with
next generation features that make building and maintaining highly functional, secure,
social, and mobile apps a snap.
1. Force.com users, profiles, roles, groups, and rowlevel sharing rules help
you build secure apps without the need to code, test, and maintain your
own complicated security logic.
2. With Force.com, it’s easy to implement common application logic
without writing complicated and errorprone code. Such features include
declarative, pointandclick configuration for work flows,
encrypted/masked fields, validation rules, formula fields, rollup
summary fields, and crossobject validation rules.
3. Force.com is "social" because it includes the Salesforce Chatter API, a
builtin data model apps can leverage to become instantly social and
collaborative.
4. Force.com’s REST APIs, OAuth implementation for user
authentication/authorization, data feeds, custom Web services,
embedded security model, and other features make it a perfect fit for
easily building secure, scalable mobile apps, either native or HTML5.

19
Open: Force.com’s full complement of open APIs lets you build and integrate
applications using the approach of your choice. REST and SOAP based APIs are
standards based APIs that make Force.com open to whatever programming language
you want to use. Using various APIs, your applications can do many things such as
createreadupdatedelete (CRUD) business data, load a large number of records
asynchronously, and take advantage of the Chatter API to provide collaboration and
social networking capabilities to any application.
Powerful:Most modern apps use serverside logic to centralize complex business logic
and enforce complex data integrity rules. Apex, with syntax much like Java, is
Force.com’s procedural language that you can use to create serverside logic for an
application. For example, Apex lets you create stored procedures that modify the
database within the context of ACID transactions, and expose them as a custom Web
services API (restful or SOAP) for your apps. You can also use Apex to build database
triggers, routines that automatically fire (execute) when apps modify records in your
database.

20
CHAPTER 3
RESULT AND DISCUSSIONS

3.1 User Interface Requirement


As experts in cloud migration, we securely encrypt and copy your data from your
system computer to our own off-site secure and encrypted data storage center. We also
offer hybrid cloud storage, which uses your local and our off-site resources to safely
hold your data. Whether you need more storage or are looking for effective solutions
for information sharing and collaboration, we work with you to assess the best cloud
solutions for your business. Our expertise includes:

1. Rapid deployment to the cloud


2. Office 365 implementation and migration
3. Microsoft SharePoint implementation
4. Hyper-V
5. System integration and process integration
6. Workflow automation support
7. Business continuity and disaster planning
8. Reputation-based technologies

3.2 Snapshot of Recruitment app


Register at Salesforce: Salesforce provides a register page for registration. User need
to enter basic information and a username and password, after registration you are
allow to enter into applications domain. Now you are able to install Salesforce apps
from App exchange. Although you can browse the application from
appexchange.salesforce.com.

Login to Salesforce: After Registration user can login to Salesforce application


environment by providing username and password. The Login Page as follows

21
22
23
24
25
26
27
28
29
30
CHAPTER 4
CONCLUSION AND FUTURE SCOPE

4.1 Future Scope


As this is the combination of existing and non existing warehouse it has huge scope. It
fulfils the requirement of every organization. This is a common platform both for the
clients and HR to check the merchandises and the lineitems being sold within time.

4.2 Conclusion
• The essence of Creating a Warehouse Application can be summed up as "the
philosophy of attracting as many clients and vendors as possible by getting in
touch with each and every happenings going on at the backend of the
Warehouse ".
• After all, a satisfied workforce is a stable workforce which also ensures that
shopping complexes like BIG BAZAAR,WALMART and EASYDAY have
credible and reliable performance.
• In a bid to underscore this subtle point, the project examines the various
processes and nuances one of the most critical activities of a Huge Warehouse.

31
1. AMAZON WEB SERVICES
(AWS)
1.1 AWS HISTORY
 Conceptualized in 2002, But came into being in 2006
with two IaaS offerings EC2 and S3 which were also
used to support Amazon.com’s Infrastructure.
 AWS grew up after Amazon’s discovery started
reselling their core infrastructure services i.e. EC2 and
S3.

1.2 AWS GLOBAL INFRASTRUCTURE


 The AWS Cloud spans 50 Availability Zones within
18 geographic Regions around the world, with
announced plans for 12 more Availability Zones
and four more Regions in Bahrain, Hong Kong
SAR, Sweden, and a second AWS GovCloud
Region in the US.
 Regions: Grouping of AWS DCs within a specific
region. Designed to be independent of other
regions.
 Availability Zone: Individual DC within an AWS
region. Region has multiple DC or AZ.

32
 Availability zones are DCs and henceforth Do not
share any Single Point of Failure Apart from
proximal geographical location.
 Best Practice Tip: Deploy EC2 Instances in multiple
AZs in a Region to get HA/DR or Deploy in Multiple
Regions to ensure more resiliency.
 The AWS Cloud infrastructure is built around
Regions and Availability Zones (“AZs”).

Availability Zones consist of one or more discrete data


centers, each with redundant power, networking and
connectivity, housed in separate facilities. These
Availability Zones offer you the ability to operate production
applications and databases which are more highly
available, fault tolerant and scalable than would be
possible from a single data center. The AWS Cloud spans
50 Availability Zones within 18 geographic Regions around
the world.

1.2.1 AWS Regions:


1. US East (N. Virginia)
2. US East (Ohio)

33
3. US West (N. California)
4. US West (Oregon)
5. Asia Pacific (Mumbai)
6. Asia Pacific (Seoul)
7. Asia Pacific (Singapore)
8. Asia Pacific (Sydney)
9. Asia Pacific (Tokyo)
10. Canada (Central)
11. EU (Frankfurt)
12. EU (Ireland)
13. EU (London)
14. EU (Paris)
15. South America (São Paulo)
1.2.2 AWS Availability Zones:
1. US East:
N. Virginia (6), Ohio (3)
2. US West:
N. California (3), Oregon (3)
3. Asia Pacific:
Mumbai (2), Seoul (2), Singapore (2), Sydney (3),
Tokyo (3)
4. Canada:
Central (2)
5. China:
Beijing (2), Ningxia (2)
6. Europe:
Frankfurt (3), Ireland (3), London (3), Paris (3)
7. South America:
São Paulo (3)
8. AWS GovCloud (US-West) (2)

34
2. AWS
RESOURCES/SERVICES
Compute

 EC2
 Lightsail
 Elastic Container Service
 Lambda
 Batch
 Elastic Beanstalk

Storage

 S3
 EFS
 Glacier
 Storage Gateway

Database

 RDS
 DynamoDB
 ElastiCache
 Amazon Redshift

Migration

 AWS Migration Hub


 Application Discovery Service
35
 Database Migration Service
 Server Migration Service
 Snowball

Networking & Content Delivery

 VPC
 CloudFront
 Route 53
 API Gateway
 Direct Connect

Developer Tools
 CodeStar
 CodeCommit
 CodeBuild
 CodeDeploy
 CodePipeline
 Cloud9
 X-Ray

Management Tools
 CloudWatch
 AWS Auto Scaling
 CloudFormation
 CloudTrail
 Config
 OpsWorks
 Service Catalog
 Systems Manager
 Trusted Advisor
 Managed Services

Media Services
 Elastic Transcoder
36
 Kinesis Video Streams
 MediaConvert
 MediaLive
 MediaPackage
 MediaStore
 MediaTailor

Machine Learning
 Amazon SageMaker
 Amazon Comprehend
 AWS DeepLens
 Amazon Lex
 Machine Learning
 Amazon Polly
 Rekognition
 Amazon Transcribe
 Amazon Translate

Analytics
 Athena
 EMR
 CloudSearch
 Elasticsearch Service
 Kinesis
 QuickSight
 Data Pipeline
 AWS Glue

Security, Identity & Compliance


 IAM
 Cognito
 GuardDuty
 Inspector

37
 Amazon Macie
 AWS Single Sign-On
 Certificate Manager
 CloudHSM
 Directory Service
 WAF & Shield
 Artifact

Mobile Services

 Mobile Hub
 AWS AppSync
 Device Farm
 Mobile Analytics

AR & VR

 Amazon Sumerian

Application Integration

 Step Functions
 Amazon MQ
 Simple Notification Service
 Simple Queue Service
 SWF

Customer Engagement
 Amazon Connect
 Pinpoint
 Simple Email Service

38
Business Productivity
 Alexa for Business
 Amazon Chime
 WorkDocs
 WorkMail

Desktop & App Streaming


 WorkSpaces

3. AWS EC2
 EC2 – Elastic Cloud Compute.
 EC2 are virtual machines on AWS Cloud Platform.
 Can be deployed with Linux/Windows/Mac OS or with
a customized OS of your choice.
 OS and Application Licenses can be provided by AWS
and costs added on billing (License cost is also
converted into Pay-as-You-Go).
 BYOL - Can be Brought by user (Bring Your Own
License).

3.1 EC2 PURCHASING OPTIONS


 There are Four Payment scenarios for EC2
Instances –
 On-Demand Instances
 Reserved Instances

39
 Spot Instances
 Dedicated Hosts

3.1.1 On-Demand EC2 Instance:


 Primary and most used purchasing options
 Pay for compute capacity by the hour with no long-term
commitments or upfront payments.
 Increase or decrease your compute capacity depending
on your demand and only pay the specified hourly rate
for the instances.
 During periods of high demand and On demand instance
acquisition might fail , to overcome this challenge use
reserved instances.

3.1.2 Reserved EC2 Instance:


 Reserved Instances are commitment by the user to
deploy ‘x’ computation power in an AWS Region.
 Commitment is done by paying a sum of amount (25 –
100%) for a fixed period of time the user wants to
commit to usage (1 – 3 years).
 More money you pay up-front, more discounts are given
to you.
3.1.2.1 Flexibility in Reserved Instances:
 Reserved Instances can be transferred from One AZ to
another in a Region.
 Modify the Instance type of your reservation to another
type in the same family at no additional costs.

40
 Each instance type offers different compute, memory,
and storage capabilities and are grouped in instance
families based on these capabilities.
 Small Instance reservation can be added up to create a
reserved instance of the total capacity equivalent to total
size of the added instances.

3.1.3 Spot EC2 Instance:


 Spot instances provide the ability for customers to
purchase compute capacity with no upfront commitment
and at hourly rates usually lower than the On-Demand
rate.
 Spot instances allow you to specify the maximum hourly
price that you are willing to pay to run a particular
instance type.
 The Spot Price fluctuates based on supply and demand
for instances, but customers will never pay more than
the maximum price they have specified.

EC2 START/STOP/TERMINATE
 Start: Start an EC2 Instance when it has been
stopped, only started instances incur charges for
Compute/Memory/Network.
 Stop: Stop an EC2 Instance to stop
Compute/Memory/Network Charges, But Storage
charges are still incurred even on stopped EC2
Instances.

41
 To completely stop getting charges terminate the EC2
Instance and delete the EBS volumes attached to it.

4. AWS BILLING AND


SERVICE COSTS

 AWS Billing and Cost management is the service that


is used to pay AWS bill, monitor usage and budget
your costs.
 Use budgets to track your AWS costs.
 Use AWS Cloudwatch to create billing alerts when
your AWS spend exceeds the specified thresholds.
 Use AWS Billing and Cost management to publish
your AWS billing reports directly to an AWS S3 bucket
in CSV format at daily interval.
 Setup multiple AWS accounts that reflect your
organisation’s structure.
 Let’s suppose one account for the entire company
and accounts for each employee, you can have an
account for the entire company with IAM users for
each employee, or you can have an account for the
entire company, accounts for each organization in the
company.
 Use consolidated billing feature to consolidate
multiple linked accounts under one payer account.

42
5. SECURITY ON AWS

 Major Roadblock/inhibitor for going to Cloud is


security , Security breaches are mostly on on-
premises or hosting providers.
 Difficult to build DC with security more than
AWS/azure - because they have best finances to use
 Best automation tools
 Best equipments
 Best engineers
 Best Cover from physical intrusion
 Major Roadblock/inhibitor for going to Cloud is
security , Security breaches are mostly on on-
premises or hosting providers.
 Difficult to build DC with security more than
AWS/azure - because they have best finances to use
 Best automation tools
 Best equipments

43
 Best engineers
 Best Cover from physical intrusion

 One way to look for general DC security is


discouraging attackers , i.e. make the proposition of
hacking a value deficit scenario and cutting out
breach risks to maximum
 Physical Access - Secret locations of AWS Data
Center , also difficult to pinpoint which application will
be running On which DC or vice versa and there is
controlled physical access - Biometric checks,Video
surveillance 24 x 7.
 Hardware refresh cycle is on a best practice period -
for avoiding component failure and give up to date
advanced hardware.
 Storage is decommissioned physically rather than a
normal format etc.
 Isolation levels are multiple - from storage to network
to Host (Compute).

8.1 SHARED SECURITY RESPONSIBILITY

AWS Responsibility Our Responsibility


Virtual Host Security AWS account Security (MFA)
Storage Security Operating System
Network Security Application & Database Specific
(IaaS)
Data Center Security Data Encryption
Database Security Authentication

44
Network Integrity

8.2 EC2 SECURITY GROUP


 Default Security Group: Default rules to allow inbound
traffic from instances in the same security group.
 Default rules to allow all outbound traffic
 Default deny all inbound traffic
 Assign upto 5 Security Groups to an Instance
 Non-default security groups do not have automatic rules
to allow traffic between instances in the same security
group.

 Consideration: Responses to allowed inbound traffic are


allowed to flow outbound regardless of outbound rules
(stateful) and same applies to outbound traffic.
 Instances can be assigned and reassigned to new
security groups.

45
6. SIMPLE STORAGE SERVICE
(S3)
 Companies today need the ability to simply and
securely collect, store, and analyze their data at a
massive scale. Amazon S3 is object storage built to
store and retrieve any amount of data from anywhere
– web sites and mobile apps, corporate applications,
and data from IoT sensors or devices.
 It is designed to deliver 99.999999999% durability,
and stores data for millions of applications used by
market leaders in every industry.
 S3 provides comprehensive security and compliance
capabilities that meet even the most stringent
regulatory requirements. It gives customers flexibility

46
in the way they manage data for cost optimization,
access control, and compliance.
 S3 allows you to run powerful analytics directly on
your data at rest in S3.
 Amazon S3 is the most supported cloud storage
service available, with integration from the largest
community of third-party solutions, systems integrator
partners, and other AWS services.
 Buckets are made in S3. Buckets are like folders
which contain files in it.
 We can make 100 buckets in S3 and the size of each
object or file in a bucket can be a maximum of 5TB.
 Each bucket must have a unique name, globally.
6.1 BENEFITS OF S3
 Unmatched Durability, Availability, & Scalability
 Most Comprehensive Security & Compliance
Capabilities
 Flexible Management
 Most Supported By Partners, Vendors, & Aws
Services
 Easy, Flexible Data Transfer

6.2 WHO USE S3?


 Netflix delivers billions of hours of content to
customers around the world from Amazon S3. S3 also
serves as the data lake for their Big Data analytics
solution.

47
 Zillow increases machine-learning calculation
performance and scalability, and delivers near-real-
time home-valuation data to customers using Amazon
S3.

7. HOST A STATIC WEBSITE


 Static sites are the most basic type
of website and are the easiest to create. Unlike
dynamic websites, they do not require
any Web programming or database design.
 A static site can be built by simply creating a few
HTML pages and publishing them to a Web server.
 In this project, a system is launched virtually (Using
EC2 and VPC) and some data is stored in S3.

48
 That kind of data is stored in S3 which do not need
any processing. Static websites do not need any
processing so we can easily store our data. Eg.
Tutorial websites.
 If you want to access the web site then the link is,
https://s3.ap-south-
1.amazonaws.com/shradha0205/index.html
1.1 My Static WebSite (from PC):

49
50
1.2 My Static WebSite (from Phone):

51
Since I’ve a unique bucket name, here shradha0205, I can
create 100 buckets. Whenever we upload objects and
make them public then we can access then using the URL.
If you want to launch a website on the internet then either
you have to launch the website with the URL provided by
S3 or buy a domain name (eg. From GoDaddy) and launch
your website.
We buy domain names because they are easy to
remember and search. Instead of typing the whole URL we
just need to search for the domain name. And, thus, this is
the reason why each domain name has to be unique
because the URL behind that Domain name is unique.

52
53

Das könnte Ihnen auch gefallen