TVK Internship
TVK Internship
INTERNSHIP
(On-Site/Virtual)
ANDHRA PRADESH
STATE COUNCIL OF HIGHER EDUCATION
(A STATUTORY BODY OF GOVERNMENT OF ANDHRA PRADESH)
PROGRAM BOOK FOR
SHORT-TERM
INTERNSHIP
(Onsite / Virtual)
20FE1A05F4
15/05/2023 01/07/2023
JNTUK University
2023-2024
An Internship Report on
Cloud Computing-AWS
BACHELOR OF TECHNOLOGY
In
Submitted by:
20FE1A05F4
1. It is mandatory for all the students to complete 2 months (180 hours) of short- term
internship either physically or virtually.
2. Every student should identify the organization for internship in consultation with the
College Principal/the authorized person nominated by the Principal.
3. Report to the intern organization as per the schedule given by the College. You must
make your own arrangements for transportation to reach the organization.
4. You should maintain punctuality in attending the internship. Daily attendance
is compulsory.
5. You are expected to learn about the organization, policies, procedures, and
processes by interacting with the people working in the organization and by
consulting the supervisor attached to the interns.
6. While you are attending the internship, follow the rules and regulations of the
intern organization.
7. While in the intern organization, always wear your College Identity Card.
8. If your College has a prescribed dress as uniform, wear the uniform daily, as you
attend to your assigned duties.
9. You will be assigned a Faculty Guide from your College. He/She will be creating
a WhatsApp group with your fellow interns. Post your daily activity done and/or
any difficulty you encounter during the internship.
10. Identify five or more learning objectives in consultation with your Faculty Guide.
These learning objectives can address:
a. Data and Information you are expected to collect about the organization
and/or industry.
b. Job Skills you are expected to acquire.
c. Development of professional competencies that lead to future career success.
11. Practice professional communication skills with team members, co-interns, and your
supervisor. This includes expressing thoughts and ideas effectively through oral,
written, and non-verbal communication, and utilizing listening skills.
12. Be aware of the communication culture in your work environment. Follow up and
communicate regularly with your supervisor to provide updates on your progress with
work assignments.
4
13. Never be hesitant to ask questions to make sure you fully understand what you
need to do your work and to contribute to the organization.
14. Be regular in filling up your Program Book. It shall be filled up in your own
handwriting. Add additional sheets wherever necessary.
15. At the end of internship, you shall be evaluated by your Supervisor of the
intern organization.
16. There shall also be evaluation at the end of the internship by the Faculty
Guide and the Principal.
17. Do not meddle with the instruments/equipment you work with.
18. Ensure that you do not cause any disturbance to the regular activities of the intern
organization.
19. Be cordial but not too intimate with the employees of the intern organization and your
fellow interns.
20. You should understand that during the internship programme, you are the ambassador
of your College, and your behavior during the internship programme is of utmost
importance.
21. If you are involved in any discipline related issues, you will be withdrawn from the
internship programme immediately and disciplinary action shall be initiated.
22. Do not forget to keep up your family pride and prestige of your College.
<<@>>
5
Student’s Declaration
Faculty Guide
Mr. K. L. V. G. Krishna Murthy
Principal
6
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
CERTIFICATE
This is to certify that this Internship report in Cloud Computing-AWS is a bonafide record
of work carried out by Shaik Darga Mastan Vali (20FE1A05F4) under the guidance and
supervision of Mr. K. L. V. G. Krishna Murthy in practical fulfillment of the academic
requirement in Bachelor of Technology in COMPUTER SCIENCE AND
ENGINEERING of VIGNAN’S LARA INSTITUTE OF TECHNOLOGY &
SCIENCE during the year 2022-2023.
EXTERNAL EXAMINER
7
Certificate from Intern Organization
Acknowledgements
The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.
We also express our sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH
for providing support and stimulating the environment for developing the project.
We also place our floral gratitude to all other teaching and lab technicians for their
constant support and advice throughout the project.
9
Contents
1 Student Declaration
3 Acknowledgements
4 Executive Summary
6 AWS IAM
10
CHAPTER 1: EXECUTIVE SUMMARY
Cloud computing has recently emerged as a new paradigm for hosting and delivering
services over the Internet Cloud computing is attractive to business owners as it eliminates the
requirement for users to plan for provisioning, and allows enterprises to start from the small and
increase resources only when there is a rise in service demand. However, even though cloud
computing offers huge opportunities to the IT industry, the development of cloud computing
technology is currently in its infancy, with many issues still to be addressed.
Cloud computing has gained a lot of publicity in the current world of IT. Cloud computing
is said to be the next big thing in the computer world after the internet. Cloud computing is the
use of the Internet for the tasks performed on the computer and it is visualized as the next
generation architecture of IT.
11
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Biztron Software solutions stands out as a leading service provider in the software industry,
recognized for its diverse range of services and commitment to quality. The company has
established a strong presence by offering comprehensive solutions in medical coding, Oracle, Java,
and support services. With a rich pool of domain expertise and state-of-the-art software and
hardware infrastructure, Biztron Softech excels in delivering user-friendly and dynamic technology
solutions tailored to various business needs.
Vision:
At Biztron Softech, the overarching vision is to provide optimal and innovative information
technology solutions within budget constraints. The company aims to achieve this by leveraging
innovation platforms, reusable assets, and expertise across various technologies to deliver
tangible business value to stakeholders.
The professionally managed team at Biztron Softech, coupled with modern setups and cutting-
edge software, ensures the creative and high-quality delivery of services. The company is well-
equipped to handle diverse client needs, demonstrating reliability and excellence in the industry.
In essence, Biztron Softech positions itself as a reliable and innovative technology solutions
provider, offering a comprehensive suite of services with a strong focus on customer satisfaction
and business value.
12
CHAPTER 3: INTERNSHIP PART
Amazon Web Services (AWS) is the world’s most comprehensive and broadly
adopted cloud, offering over 200 fully featured services from data centers globally. Millions of
customers—including the fastest-growing startups, largest enterprises, and leading government
agencies—are using AWS to lower costs, become more agile, and innovate faster.
AWS has significantly more services, and more features within those services, than any other
cloud provider–from infrastructure technologies like compute, storage, and databases–to
emerging technologies, such as machine learning and artificial intelligence, data lakes and
analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move
your existing applications to the cloud and build nearly anything you can imagine.
AWS has the largest and most dynamic community, with millions of active customers andtens of
thousands of partners globally. Customers across virtually every industry and of every size,
including startups, enterprises, and public sector organizations, are running every imaginable use
case on AWS. The AWS Partner Network (APN) includes thousands of systems integrators who
specialize in AWS services and tens of thousands of independent software vendors (ISVs) who
adapt their technology to work on AWS.
AWS is architected to be the most flexible and secure cloud computing environment available
today. Our core infrastructure is built to satisfy the security requirements for the military, global
banks, and other high-sensitivity organizations. This is backed by a deep set of cloud security
tools, with over 300 security, compliance, and governance services and features, as well as support
for 143 security standards and compliance certifications.
AWS also has the deepest functionality within those services. For example, AWS offers the widest
variety of databases that are purpose-built for different types of applications so you can choose
the right tool for the job to get the best cost and performance.
13
ACTIVITY LOG FOR THE FIRST WEEK
Architecture of an
Day – 1 Application and types of applications application and types of
software applications
Day - 2 AWS Cloud and its services Cloud importance and its
services
14
WEEKLY REPORT
WEEK – 1 (From Dt ………..….. to Dt.................... )
Detailed Report:
• EC2 (Elastic Compute Cloud): EC2 is a web service that provides resizable
compute capacity in the cloud.
• AWS Regions: AWS infrastructure is divided into regions, which are geographically
dispersed data centers around the world.
• Availability Zones (AZs): Each region consists of multiple availability zones, which
are essentially separate data centers within the same region.
• S3 (Simple Storage Service): S3 is a scalable object storage service that allows users
to store and retrieve any amount of data at any time.
• RDS (Relational Database Service): RDS is a managed database service that makes
it easier to set up, operate, and scale a relational database.
• Lambda: AWS Lambda is a serverless computing service that lets you run code
without provisioning or managing servers.
• IAM (Identity and Access Management): IAM is a service that helps you securely
control access to AWS resources.
• VPC (Virtual Private Cloud): VPC is a logically isolated section of the AWS Cloud
where you can launch AWS resources in a virtual network.
15
ACTIVITY LOG FOR THE SECOND WEEK
Attaching Customer
Day - 4 Creating Customer managed policies managed policies to IAM
16
WEEKLY REPORT
WEEK – 2 (From Dt………..….. to Dt .................... )
Detailed Report:
AWS Identity and Access Management (IAM) is a web service that helps you securely
control access to AWS resources. With IAM, you can centrally manage permissions that control
which AWS resources users can access. You use IAM to control who is authenticated (signed in)
and authorized (has permissions) to use resources.
When you create an AWS account, you begin with one sign-in identity that has complete access
to all AWS services and resources in the account. This identity is called the AWS account root
user and is accessed by signing in with the email address and password that you used to create
the account. We strongly recommend that you don't use the root user for your everyday tasks.
Safeguard your root user credentials and use them to perform the tasks that only the root user can
perform.
1. Shared access to your AWS account: You can grant other people permission to
administer and use resources in your AWS account without having to share your password
or access key.
2. Granular permissions: You can grant different permissions to different people for
different resources.
3. Secure access to AWS resources for applications that run on Amazon EC2: You can
use IAM features to securely provide credentials for applications that run on EC2
instances.
5. Integrated with many AWS services: For a list of AWS services that work with IAM,
see AWS services that work with IAM.
6. Free to use: AWS Identity and Access Management (IAM) and AWS Security Token
Service (AWS STS) are features of your AWS account offered at no additional charge.
17
ACTIVITYLOG FOR THE THIRD WEEK
18
WEEKLY REPORT
WEEK – 3 (From Dt………..….. to Dt .................... )
• Networking concepts
Detailed Report:
3. Private IP Address: Private IP addresses are reserved for use within private networks
and are not routable on the public internet.
4. Public IP Address: Public IP addresses are globally routable addresses used on the
internet.
6. Package Manager: A package manager is a tool that automates the process of installing,
updating, configuring, and removing software packages on a system.
7. Root User Login: The root user is the superuser with administrative privileges on Unix-
like systems. Logging in as the root user provides unrestricted access to the entire
system, and caution should be exercised to avoid unintended changes.
• Bits: In the context of IP addressing, bits refer to the binary digits used to
represent IP addresses.
19
ACTIVITY LOG FOR THE FORTH WEEK
Linux commands:
• Basic Linux commands Understanding Linux
Day – 5 • Advanced Linux based commands for CLI
commands
20
WEEKLY REPORT
WEEK – 4 (From Dt………..….. to Dt .................... )
Detailed Report:
Configuring and creating a Virtual Private Cloud (VPC) in AWS involves several steps,
and the process can be done through the AWS Management Console or the AWS Command Line
Interface (CLI). Below, I'll provide an overview of the steps for creating a basic VPC and some
commonly used Linux commands in the AWS CLI:
2. Create Subnet: aws ec2 create-subnet --vpc-id <your-vpc-id> --cidr-block 10.0 1.0/24
21
ACTIVITY LOG FOR THE FIFTH WEEK
22
WEEKLY REPORT
WEEK – 5 (From Dt………..….. to Dt .................... )
Detailed Report:
EC2 stands for Elastic Compute Cloud. EC2 is a virtual machine. Where we can
create and develop our own web server/web applications. We can create our instance by
choosing specific Availability Zone. Amazon Elastic Compute Cloud (EC2) is a web service
provided by Amazon Web Services (AWS) that allows users to rent virtual servers, known as
instances, in the cloud. EC2 instances provide scalable computing capacity, enabling users to
run applications and workloads without the need to invest in physical hardware.
3. Choose Amazon Machine Image (AMI): Select an AMI that suits your requirements.
4. Choose Instance Type: Select the instance type based on your need.
6. Configure Security Group: Define security group rules to control inbound and
outbound traffic to the instance.
7. Key Pair: Choose an existing key pair or create a new one. This key pair is used for
SSH access to the instance.
23
ACTIVITY LOG FOR THE SIXTH WEEK
24
WEEKLY REPORT
WEEK – 6 (From Dt………..….. to Dt .................... )
Elastic Load Balancing supports the following load balancers: Application Load Balancers, Network
Load Balancers, Gateway Load Balancers, and Classic Load Balancers.
You can configure health checks, which monitor the health of the compute resources, so that the load
balancer sends requests only to the healthy ones. You can also offload the work of encryption and
decryption to your load balancer so that your compute resources can focus on their main work.
Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up,
operate, and scale a relational database in the AWS Cloud. It provides cost-efficient, resizable capacity for
an industry-standard relational database and manages common database administration tasks. AmazonRDS
is responsible for hosting the software components and infrastructure of DB instances and DB cluster. You
are responsible for query tuning, which is the process of adjusting SQL queries to improve performance.
Query performance is highly dependent on database design, data size, data distribution, application
workload, and query patterns, which can vary greatly. Monitoring and tuning are highly individualized
processes that you own for your RDS databases. You can use Amazon RDS Performance Insights and
other tools to identify problematic queries.
25
CHAPTER 5: OUTCOMES DESCRIPTION
• Global Infrastructure: AWS operates a vast network of data centers strategically located
around the globe. This global infrastructure ensures low-latency access and high availability of
services for users worldwide.
• Wide Range of Services: AWS offers a diverse set of services, covering computing power,
storage, databases, machine learning, analytics, and more. From virtual servers (EC2) to fully
managed databases (RDS), AWS provides solutions for virtually every computing need.
• Scalability: One of the defining features of AWS is its ability to scale resources up or down
based on demand. This elasticity allows businesses to respond dynamically to changing
workloads, ensuring optimal performance and cost efficiency.
• Security and Compliance: AWS places a strong emphasis on security, implementing robust
measures to protect data and applications. The platform adheres to industry-recognized security
standards and certifications, providing a secure environment for sensitive workloads.
• Cost Management: AWS offers a pay-as-you-go pricing model, allowing users to pay only for
the resources they consume. This flexible pricing structure, coupled with various cost
management tools, enables organizations to optimize their spending in the cloud.
26