Creating an amazon elastic block store

Assignment Help Computer Networking
Reference no: EM133705665

TASK: Creating an Amazon Elastic Block Store (Amazon EBS) Volume and Demonstrating its Persistent Nature

Launch a new instance using the Amazon EC2 console, in your default Region/Availability Zone.

Select the Amazon Linux AMI.

Choose the t2.micro instance type.

Launch the instance in the default VPC.

Assign the instance a public IP address (of your choice).

Add an Amazon EBS volume of size 1 GB to the existing root volume, following steps provided in the user guide.

Add a tag to the instance of Key: Name, Value: MDSC-MCYB6210-YourName, and use the Security Group carried from last week.

Launch the instance and, when prompted for a key pair, create a new public-private key pair-MDSC-MCYB6210Key-YourName-wk3.

Go to the Amazon EBS console, find the EBS volume just created, and give it the name ebs_wk3_

While within the EBS console, review the functionality availability for working with snapshots and encrypting EBS volumes.
Terminate the instance that was created using the Amazon EC2 console.

Check the Amazon EBS console once again. Observe that the root volume has been deleted (as it was set by the system to "delete on terminate"). However, the EBS volume is still visible, confirming that it persists beyond the lifetime of the instance, unless EIS (Instance) stores are ephemeral or transient in nature.

Reference no: EM133705665

Questions Cloud

Nurses increased influence and leadership : Opinion leaders identified top barriers to nurses' increased influence and leadership as not being perceived as important decision makers
What valuable points do you believe were most helpful : After reading the topic materials on classroom management, what valuable points do you believe were most helpful for classroom management?
Determine the appropriate inherent risk profiles : Determine the appropriate inherent risk profiles and cybersecurity maturity levels for cybersecurity domains for the organization
How does each proposed technology modality encourage patient : How does each proposed technology modality encourage patient engagement in an ethical, culturally sensitive, and inclusive way?
Creating an amazon elastic block store : Creating an Amazon Elastic Block Store (Amazon EBS) Volume and Demonstrating its Persistent Nature
Explain the concept of a knowledge worker : Explain the concept of a knowledge worker. Define and explain nursing informatics and highlight the role of a nurse leader as a knowledge worker.
How nurse informaticists and data or technology specialists : How nurse informaticists and/or data or technology specialists interact with other professionals within your healthcare organization.
Presenting with dementia-delirium or depression : Reflect on the way the patient presented in the case, including whether the patient might be presenting with dementia, delirium, or depression.
How would you classify this patient on the timi scale : To characterize further risk stratification for this patient, what other investigations could be done? How would you classify this patient on the TIMI scale?

Reviews

Write a Review

Computer Networking Questions & Answers

  At which layer of osi model should you begin troubleshooting

A user complains that he cannot access a particular Web site, although he is able to access other Web sites. At which layer of the OSI model should you begin.

  Discuss about the ciscos ip communication

Prepare a 1 to 2-page paper that discusses how this type of system can be used to and the benefits to the entity that has the system installed.

  Determine which model ups will work well for the server

Use the UPS selector tool at APC's Web site (a well-known UPS vendor). Determine which model UPS will work well for this server, and state your reasons.

  Developing a detailed risk assessment methodology

Developing a detailed risk assessment methodology. You are a senior information technology analyst at your company. Your company has 250 employees. Each employee has his or her own terminal to access the company's network.

  What are the server port numbers for an ftp transfer

Your boss has read about IPv6 and wants to know if the network you oversee is ready for the transition. Prepare a response based on the networking and computer.

  Design an ethernet network to connect a single client pc

Design an Ethernet network to connect a single client PC to a single server.  The two devices are 410 feet apart.  They need to communicate at 800 Mbps.

  What is the difference between a lan and a wan

What is the difference between a LAN and a WAN? What is meant by the terms latency, response time, and jitter, and what tools could you use to measure these?

  Discuss the advantages of some of the current technologies

Discuss the advantages of some of the current technologies described in our reading this week including VoIP, Unified Communications, Virtual Private Networks, Wi-Fi and wireless technologies like RFID and Wireless Sensor Networks

  How will you coordinate with other organizations

How will you coordinate with other organizations with which the networks connected to determine how to handle their IPv4 or IPv6 traffic?

  List the range of normal vlan

List the range of Normal VLANs. What VLANs are reserved in that range? List the Extended VLAN range. What, if any, VLANs are reserved in that range?

  Develop an on-path dns packet injector

The DNS packet injector you are going to develop, named 'dnsinject', will capture the traffic from a network interface in promiscuous mode, and attempt to inject forged responses to selected DNS A requests.

  Wide area network concepts

Point-to-point protocol (PPP) allows for the interconnection of a local area network (LAN) to a wide area network (WAN) connection.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd