Describe the other storage options that are available

Assignment Help Computer Network Security
Reference no: EM133711683

Lab 1

For these tasks you should refer to, and follow, relevant instructions in the official "What is Amazon Relational Database Service (Amazon RDS)?" website from this week's Required Resources.

TASKS: Creating a MySQL Amazon RDS Instance and Setting Up a Read Replica for Horizontal Scaling

1. Log on to AWS Academy using your AWS Academy account and click on the AWS Console button.

2. Launch a new Amazon RDS DB Instance and select MySQL Community Edition instance as the database engine.

3. Under Templates, select Free Tier. This set of options is appropriate for permissions for AWS Academy accounts.

4. Review the DB Instance storage. Describe the other storage options that are available. Which options give enhanced fault tolerance? Use the default options for Instance Class and Storage.

5. Set the DB Instance identifier and database name to MySQL-MDSC-MCYB6210-<YourName> and configure the master username and password.

6. Validate the configuration settings and launch the DB Instance.

7. Return to the list of the Amazon RDS instances. You will see the status of your Amazon RDS database as Creating. It may take up to 20 minutes to create your new Amazon RDS instance.

8. When its status is Available, proceed to the next step.

9. Select the instance and issue a Create Read Replica command from the list of actions. What other actions exist? What do those actions represent?

10. Configure the name of the read replica and any other settings. Read replicas of the primary database allow horizontal scaling to improve database performance. What does this mean?

11. Create the replica.

12. Wait for the replica to be created, which can typically take several minutes.

13. When it is complete, delete both the original and Read Replica databases by clicking the checkboxes next to them, clicking the Instance Actions drop-down box, and then clicking Delete.

Lab 2

TASK: Creating and Configuring an AWS VPC

Log on to AWS Academy using your AWS starter account and click on the AWS Console button. The account used must have administrator or power user privileges.

Select the Amazon VPC icon to launch the Amazon VPC Dashboard.

Create an Amazon VPC with a CIDR block equal to 192.168.0.0/ 16, a name tag of VPC_MDSC-MCYB6210_<YourName> and default tenancy.

What other setup options exist at this stage?

Using the AWS VPC you have just created, create a subnet with a CIDR block equal to 192.168.10.0/24 and a name tag of Subnet1_MDSC-MCYB6210_<YourName>. Use a specific Availability Zone for this subnet.

Create an Amazon EC2 key pair in the same region as your custom Amazon VPC.

Create an IGW with a name tag of IGW1_MDSC-MCYB6210_<YourName> and attach it to your custom AWS VPC.
Add a route to the main route table for your custom AWS VPC that directs internet traffic (0.0.0.0/ 0) to the IGW.

Launch a t2. micro Amazon Linux AMI as an Amazon EC2 instance into the public subnet of your custom AWS VPC, give it a name tag of INST1_MDSC-MCYB6210_<YourName>, and select the newly created key pair for secure access to the instance.

In a similar manner to that used in the task list for Week 3, securely access the Amazon EC2 instance in the public subnet via SSH with the newly created key pair.

To verify the SSH connection, navigate through the directories on the instance to which you have connected.
Close the SSH connection and log out of AWS.

Reference no: EM133711683

Questions Cloud

Positive signs of pregnancy role of hormones in pregnancy : Presumptive, probable, positive signs of pregnancy Role of hormones in pregnancy, particularly estrogen, progesterone, oxytocin, HCG, relaxin Vena cava
Diet and lifestyle management : Diet and Lifestyle Management: Addressing the patient's eating habits, particularly their reported "sweet tooth," is essential.
Research critiques and evidence-based practice proposal : Research Critiques and Evidence-Based Practice Proposal The present investigation focuses on the perspectives of medical professionals
Describe how stereotyping puerto ricans as similar to other : Describe how stereotyping Puerto Ricans as similar to other Hispanic Americans can lead the nurse to errors in patient care.
Describe the other storage options that are available : Describe the other storage options that are available. Which options give enhanced fault tolerance? Use the default options for Instance Class and Storage
Design a womens health brochure by choosing one of female : Design a women's health brochure by choosing one of the female reproductive disorders covered in this module.
Create an infographic for lower respiratory system disorder : Create an infographic for a lower respiratory system disorder. Risk factors associated with the common lower respiratory system disorder.
Health promotion and prevention teaching plan : Health Promotion/Prevention teaching plan including three objectives and related content on how to fight increasing homelessness in a community.
What would medical assistant observe in the patient : What would medical assistant observe in the patient who is in respiratory distress? Which vital sign does the author state is most simple and most neglected?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd