0% found this document useful (0 votes)
112 views26 pages

TVK Internship

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views26 pages

TVK Internship

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

SHORTTERM

INTERNSHIP
(On-Site/Virtual)

ANDHRA PRADESH
STATE COUNCIL OF HIGHER EDUCATION
(A STATUTORY BODY OF GOVERNMENT OF ANDHRA PRADESH)
PROGRAM BOOK FOR

SHORT-TERM
INTERNSHIP
(Onsite / Virtual)

Shaik Darga Mastan Vali

Vignan’s Lara Institute of Technology & Science

20FE1A05F4

15/05/2023 01/07/2023

Biztron Softech Private Limited


Hyderebad, Telangana

JNTUK University
2023-2024
An Internship Report on

Cloud Computing-AWS

Submitted in accordance with the requirement for the degree of

BACHELOR OF TECHNOLOGY

In

Computer Science & Engineering

Submitted by:

Shaik Darga Mastan Vali

20FE1A05F4

Under the Faculty Guide ship of

Mr. K. L. V. G. Krishna Murthy (PhD)

Department of Computer Science & Engineering


Please read the detailed Guidelines on Internship hosted on the website of AP State
Council of Higher Education https://apsche.ap.gov.in

1. It is mandatory for all the students to complete 2 months (180 hours) of short- term
internship either physically or virtually.
2. Every student should identify the organization for internship in consultation with the
College Principal/the authorized person nominated by the Principal.
3. Report to the intern organization as per the schedule given by the College. You must
make your own arrangements for transportation to reach the organization.
4. You should maintain punctuality in attending the internship. Daily attendance
is compulsory.
5. You are expected to learn about the organization, policies, procedures, and
processes by interacting with the people working in the organization and by
consulting the supervisor attached to the interns.
6. While you are attending the internship, follow the rules and regulations of the
intern organization.
7. While in the intern organization, always wear your College Identity Card.
8. If your College has a prescribed dress as uniform, wear the uniform daily, as you
attend to your assigned duties.
9. You will be assigned a Faculty Guide from your College. He/She will be creating
a WhatsApp group with your fellow interns. Post your daily activity done and/or
any difficulty you encounter during the internship.
10. Identify five or more learning objectives in consultation with your Faculty Guide.
These learning objectives can address:
a. Data and Information you are expected to collect about the organization
and/or industry.
b. Job Skills you are expected to acquire.
c. Development of professional competencies that lead to future career success.
11. Practice professional communication skills with team members, co-interns, and your
supervisor. This includes expressing thoughts and ideas effectively through oral,
written, and non-verbal communication, and utilizing listening skills.
12. Be aware of the communication culture in your work environment. Follow up and
communicate regularly with your supervisor to provide updates on your progress with
work assignments.

4
13. Never be hesitant to ask questions to make sure you fully understand what you
need to do your work and to contribute to the organization.
14. Be regular in filling up your Program Book. It shall be filled up in your own
handwriting. Add additional sheets wherever necessary.
15. At the end of internship, you shall be evaluated by your Supervisor of the
intern organization.
16. There shall also be evaluation at the end of the internship by the Faculty
Guide and the Principal.
17. Do not meddle with the instruments/equipment you work with.
18. Ensure that you do not cause any disturbance to the regular activities of the intern
organization.
19. Be cordial but not too intimate with the employees of the intern organization and your
fellow interns.
20. You should understand that during the internship programme, you are the ambassador
of your College, and your behavior during the internship programme is of utmost
importance.
21. If you are involved in any discipline related issues, you will be withdrawn from the
internship programme immediately and disciplinary action shall be initiated.
22. Do not forget to keep up your family pride and prestige of your College.

<<@>>

5
Student’s Declaration

I, Shaik Darga Mastan Vali a student of Bachelor of Technology, Reg. No.


20FE1A05F4 of the Department of Computer Science & Engineering, Vignan’s Lara
Institute of Technology & Science, do hereby declare that I have completed the
mandatory internship in Cloud Computing-AWS from 15/5/2023 to 1/7/2023 in Biztron
Softech under the Faculty Guide ship of Mr. K. L. V. G. Krishna Murthy Department
of Computer Science & Engineering, Vignan’s Lara Institute of Technology & Science.

(Signature and Date)

Faculty Guide
Mr. K. L. V. G. Krishna Murthy

Head of the Department

Dr. K. Venkateswara Rao

Principal

Dr. K. Phaneendra Kumar

6
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that this Internship report in Cloud Computing-AWS is a bonafide record
of work carried out by Shaik Darga Mastan Vali (20FE1A05F4) under the guidance and
supervision of Mr. K. L. V. G. Krishna Murthy in practical fulfillment of the academic
requirement in Bachelor of Technology in COMPUTER SCIENCE AND
ENGINEERING of VIGNAN’S LARA INSTITUTE OF TECHNOLOGY &
SCIENCE during the year 2022-2023.

Project Guide Head of the Department

Mr. K. L. V. G. Krishna Murthy Dr. K.Venkateswara Rao

EXTERNAL EXAMINER

7
Certificate from Intern Organization
Acknowledgements

The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.

We are grateful to Mr. K. L. V. G. Krishna Murthy, PhD., Associate professor,


Department of Computer Science and Engineering for guiding through this project and
for encouraging right from the beginning of the project till successful completion of the
project. Every interaction with him was an inspiration.

We thank Dr. K. Venkateswara Rao, PhD., Professor & HOD, Department of


Computer Science and Engineering for support and Valuable suggestions

We also express our thanks to Dr. K. PHANEENDRA KUMAR, Principal, Vignan’s


Lara Institute of Technology & Science for providing the resources to carry out the
project.

We also express our sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH
for providing support and stimulating the environment for developing the project.

We also place our floral gratitude to all other teaching and lab technicians for their
constant support and advice throughout the project.

9
Contents

1 Student Declaration

2 Certificate from Intern Organization

3 Acknowledgements

4 Executive Summary

5 Introduction to AWS Cloud and its Services

6 AWS IAM

7 Networking in AWS – VPC, Linux commands

8 AWS EC2 Instance

9 AWS Load Balancers and Auto Scaling

10 AWS Lambda, S3 and RDS

10
CHAPTER 1: EXECUTIVE SUMMARY

Cloud computing is a growing technology which could change traditional IT systems.


Cloud computing makes it feasible for an organization IT to be more flexible, save costs and
process information and data faster than with traditional IT. The problem though lies in the
riskiness of this new technology.

Cloud computing has recently emerged as a new paradigm for hosting and delivering
services over the Internet Cloud computing is attractive to business owners as it eliminates the
requirement for users to plan for provisioning, and allows enterprises to start from the small and
increase resources only when there is a rise in service demand. However, even though cloud
computing offers huge opportunities to the IT industry, the development of cloud computing
technology is currently in its infancy, with many issues still to be addressed.

Cloud computing has gained a lot of publicity in the current world of IT. Cloud computing
is said to be the next big thing in the computer world after the internet. Cloud computing is the
use of the Internet for the tasks performed on the computer and it is visualized as the next
generation architecture of IT.

11
CHAPTER 2: OVERVIEW OF THE ORGANIZATION

Biztron Software solutions stands out as a leading service provider in the software industry,
recognized for its diverse range of services and commitment to quality. The company has
established a strong presence by offering comprehensive solutions in medical coding, Oracle, Java,
and support services. With a rich pool of domain expertise and state-of-the-art software and
hardware infrastructure, Biztron Softech excels in delivering user-friendly and dynamic technology
solutions tailored to various business needs.

Vision:

At Biztron Softech, the overarching vision is to provide optimal and innovative information
technology solutions within budget constraints. The company aims to achieve this by leveraging
innovation platforms, reusable assets, and expertise across various technologies to deliver
tangible business value to stakeholders.

Team and Infrastructure:

The professionally managed team at Biztron Softech, coupled with modern setups and cutting-
edge software, ensures the creative and high-quality delivery of services. The company is well-
equipped to handle diverse client needs, demonstrating reliability and excellence in the industry.
In essence, Biztron Softech positions itself as a reliable and innovative technology solutions
provider, offering a comprehensive suite of services with a strong focus on customer satisfaction
and business value.

12
CHAPTER 3: INTERNSHIP PART

Amazon Web Services (AWS) is the world’s most comprehensive and broadly
adopted cloud, offering over 200 fully featured services from data centers globally. Millions of
customers—including the fastest-growing startups, largest enterprises, and leading government
agencies—are using AWS to lower costs, become more agile, and innovate faster.

AWS has significantly more services, and more features within those services, than any other
cloud provider–from infrastructure technologies like compute, storage, and databases–to
emerging technologies, such as machine learning and artificial intelligence, data lakes and
analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move
your existing applications to the cloud and build nearly anything you can imagine.

AWS has the largest and most dynamic community, with millions of active customers andtens of
thousands of partners globally. Customers across virtually every industry and of every size,
including startups, enterprises, and public sector organizations, are running every imaginable use
case on AWS. The AWS Partner Network (APN) includes thousands of systems integrators who
specialize in AWS services and tens of thousands of independent software vendors (ISVs) who
adapt their technology to work on AWS.

AWS is architected to be the most flexible and secure cloud computing environment available
today. Our core infrastructure is built to satisfy the security requirements for the military, global
banks, and other high-sensitivity organizations. This is backed by a deep set of cloud security
tools, with over 300 security, compliance, and governance services and features, as well as support
for 143 security standards and compliance certifications.

AWS also has the deepest functionality within those services. For example, AWS offers the widest
variety of databases that are purpose-built for different types of applications so you can choose
the right tool for the job to get the best cost and performance.

13
ACTIVITY LOG FOR THE FIRST WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Architecture of an
Day – 1 Application and types of applications application and types of
software applications

Day - 2 AWS Cloud and its services Cloud importance and its
services

Day – 3 Virtual machines Configuring Virtual


machines

Day – 4 AWS Regions Configuring AWS Regions

Day – 5 AWS Availability Configuring AWS


zones Availability zones

Day –6 Advantages of AWS Cloud Use cases of AWSservices


in development

14
WEEKLY REPORT
WEEK – 1 (From Dt ………..….. to Dt.................... )

Objective of Activity Done:


• Introduction to various AWS services.
• Understanding the fundamentals of cloud architecture.
• Exposure to the core concepts of cloud computing.

Detailed Report:

Amazon Web Services (AWS) is a comprehensive, evolving cloud computing platform


provided by Amazon. It offers a wide range of services, including computing power, storage
options, networking, databases, machine learning, analytics, security, and more. AWS provides
on-demand delivery of IT resources over the internet with pay-as-you-go pricing.

Here are some key components and concepts related to AWS:

• EC2 (Elastic Compute Cloud): EC2 is a web service that provides resizable
compute capacity in the cloud.

• AWS Regions: AWS infrastructure is divided into regions, which are geographically
dispersed data centers around the world.

• Availability Zones (AZs): Each region consists of multiple availability zones, which
are essentially separate data centers within the same region.

• S3 (Simple Storage Service): S3 is a scalable object storage service that allows users
to store and retrieve any amount of data at any time.

• RDS (Relational Database Service): RDS is a managed database service that makes
it easier to set up, operate, and scale a relational database.

• Lambda: AWS Lambda is a serverless computing service that lets you run code
without provisioning or managing servers.

• IAM (Identity and Access Management): IAM is a service that helps you securely
control access to AWS resources.

• VPC (Virtual Private Cloud): VPC is a logically isolated section of the AWS Cloud
where you can launch AWS resources in a virtual network.

15
ACTIVITY LOG FOR THE SECOND WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day – 1 AWS IAM To know about IAM


Service

Day - 2 IAM Users, Policies, Groups, Roles, Configuring AWS IAM


Cross account roles Service

Day – 3 AWS Command line interface (CLI) Accessing AWS through


CLI

Attaching Customer
Day - 4 Creating Customer managed policies managed policies to IAM

Day – 5 IAM Groups Configuring IAM Groups

Day –6 IAM Roles and advantages of roles


Configuring IAM Roles

16
WEEKLY REPORT
WEEK – 2 (From Dt………..….. to Dt .................... )

Objective of Activity Done:


• In-depth exploration of AWS Identity and Access Management (IAM).
• Hands-on experience in managing user access and permissions.
• Understanding the importance of IAM in securing AWS resources.

Detailed Report:
AWS Identity and Access Management (IAM) is a web service that helps you securely
control access to AWS resources. With IAM, you can centrally manage permissions that control
which AWS resources users can access. You use IAM to control who is authenticated (signed in)
and authorized (has permissions) to use resources.

When you create an AWS account, you begin with one sign-in identity that has complete access
to all AWS services and resources in the account. This identity is called the AWS account root
user and is accessed by signing in with the email address and password that you used to create
the account. We strongly recommend that you don't use the root user for your everyday tasks.
Safeguard your root user credentials and use them to perform the tasks that only the root user can
perform.

IAM gives you the following features:

1. Shared access to your AWS account: You can grant other people permission to
administer and use resources in your AWS account without having to share your password
or access key.

2. Granular permissions: You can grant different permissions to different people for
different resources.

3. Secure access to AWS resources for applications that run on Amazon EC2: You can
use IAM features to securely provide credentials for applications that run on EC2
instances.

4. Multi-factor authentication (MFA): You can add two-factor authentication to your


account and to individual users for extra security.

5. Integrated with many AWS services: For a list of AWS services that work with IAM,
see AWS services that work with IAM.

6. Free to use: AWS Identity and Access Management (IAM) and AWS Security Token
Service (AWS STS) are features of your AWS account offered at no additional charge.

17
ACTIVITYLOG FOR THE THIRD WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day – 1 AWS VPC To know about AWS VPC

Finding out the difference


Day - 2 Classfull addressing and Classless
between IP addresses
addressing

Day – 3 Private IP address and Public IP To know secure and


address insecure IP’s

Day – 4 Bits, Segments, Subnets, Internet Brief understanding of


gateway networking

Day – 5 SSH Login, RDP Connection, Various connections to


Root user login the system

Day –6 Package Manager, Baston Configuring Baston host,


host, Secure copy (SCP) SCP

18
WEEKLY REPORT
WEEK – 3 (From Dt………..….. to Dt .................... )

Objective of Activity Done:


• Brief understanding of VPC

• Networking concepts

Detailed Report:

1. Classful Addressing: Classful addressing refers to the traditional method of dividing


IP addresses into classes—Class A, Class B, and Class C. Each class had a fixed portion
for network and host addresses.

2. Classless Addressing: Classless addressing, or Classless Inter-Domain Routing


(CIDR), allows for more flexible allocation of IP addresses.

3. Private IP Address: Private IP addresses are reserved for use within private networks
and are not routable on the public internet.

4. Public IP Address: Public IP addresses are globally routable addresses used on the
internet.

5. RDP (Remote Desktop Protocol): RDP is a proprietary protocol developed by


Microsoft, allowing users to connect to a remote computer over a network connection.

6. Package Manager: A package manager is a tool that automates the process of installing,
updating, configuring, and removing software packages on a system.

7. Root User Login: The root user is the superuser with administrative privileges on Unix-
like systems. Logging in as the root user provides unrestricted access to the entire
system, and caution should be exercised to avoid unintended changes.

8. Subnets, Bits, and Segments:

• Subnets: Subnets are subdivisions of an IP network, allowing for


logical segmentation.

• Bits: In the context of IP addressing, bits refer to the binary digits used to
represent IP addresses.

• Segments: In networking, segments can refer to distinct parts of a network,


often separated by routers or switches.

19
ACTIVITY LOG FOR THE FORTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day – 1 VPC architecture Understanding VPC


architecture

Day – 2 Creation of VPC Configuring VPC

Day – 3 VPC Peering Creating a peering


connection

Day – 4 Transit gateway Configuring transit


gateway

Linux commands:
• Basic Linux commands Understanding Linux
Day – 5 • Advanced Linux based commands for CLI
commands

Day –6 EC-2 Linux system Configuring EC-2 Linux


system

20
WEEKLY REPORT
WEEK – 4 (From Dt………..….. to Dt .................... )

Obejective of Activity Done:


• Comprehension of AWS Virtual Private Cloud (VPC) and networking principles.
• Practical knowledge of setting up and configuring VPCs.
• Proficiency in Linux commands for effective AWS CLI (Command Line Interface) access.

Detailed Report:
Configuring and creating a Virtual Private Cloud (VPC) in AWS involves several steps,
and the process can be done through the AWS Management Console or the AWS Command Line
Interface (CLI). Below, I'll provide an overview of the steps for creating a basic VPC and some
commonly used Linux commands in the AWS CLI:

Creating a Basic VPC using AWS CLI:

1. Create a VPC: aws ec2 create-vpc --cidr-block 10.0 0.0/16

2. Create Subnet: aws ec2 create-subnet --vpc-id <your-vpc-id> --cidr-block 10.0 1.0/24

3. Create Internet Gateway: aws ec2 create-internet-gateway

4. Attach Internet Gateway to VPC: aws ec2 attach-internet-gateway --internet-gateway-id


<your-internet-gateway-id> --vpc-id <your-vpc-id>

5. Create Route Table: aws ec2 create-route-table --vpc-id <your-vpc-id>

6. Create Route in Route Table: aws ec2 create-route --route-table-id <your-route-table-id> -


-destination-cidr-block 0.0.0.0/0 --gateway-id <your-internet-gateway-id>

7. Associate Subnet with Route Table: aws ec2 associate-route-table --subnet-id


<your- subnet-id> --route-table-id <your-route-table-id>

21
ACTIVITY LOG FOR THE FIFTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day – 1 AWS EC2 Service Understanding EC2


service in AWS

Day - 2 Instance categories in AWS Identifying different


Instances.

Day – 3 AMI (Amazon Machine Image) Creation of AMI

Day – 4 Advanced concepts in launching processes of launching


Instance Instance

Day – 5 EBS volume mounting Attaching volumes

Day –6 Custom AMI Configuring custom AMI

22
WEEKLY REPORT
WEEK – 5 (From Dt………..….. to Dt .................... )

Objective of Activity Done:


• Hands-on experience in launching and managing EC2 instances.
• Understanding various instance types and their use cases.
• Exploration of security considerations and best practices for EC2.

Detailed Report:
EC2 stands for Elastic Compute Cloud. EC2 is a virtual machine. Where we can
create and develop our own web server/web applications. We can create our instance by
choosing specific Availability Zone. Amazon Elastic Compute Cloud (EC2) is a web service
provided by Amazon Web Services (AWS) that allows users to rent virtual servers, known as
instances, in the cloud. EC2 instances provide scalable computing capacity, enabling users to
run applications and workloads without the need to invest in physical hardware.

Here is a step-by-step guide to launching and configuring an EC2 instance:

1. Access AWS Management Console: In AWS Management Console, navigate to


the EC2 service.

2. Launch Instance: Click on the "Launch Instance" button.

3. Choose Amazon Machine Image (AMI): Select an AMI that suits your requirements.

4. Choose Instance Type: Select the instance type based on your need.

5. Configure Instance: Configure instance details, such as the number of


instances, network settings, and user data.

6. Configure Security Group: Define security group rules to control inbound and
outbound traffic to the instance.

7. Key Pair: Choose an existing key pair or create a new one. This key pair is used for
SSH access to the instance.

23
ACTIVITY LOG FOR THE SIXTH WEEK

Day Person In-


& Brief description of the daily Charge
Learning Outcome
Activity
Date Signature

Day – 1 AWS Load Balancers Understanding load in


application

Day - 2 Auto scaling in Load balancers Configuring Load balancers

Day – 3 Launch Configuration and Launch Advanced Configurations


Template

Knowing about storage in


Day – 4 AWS S3, SNS AWS and notifications
manager

Day – 5 AWS Lambda, Cloud Watch, Guard Understanding AWS


Lambda

Day –6 AWS Cloud trail, RDS, Architecture Configuring RDS,


Cloud trail

24
WEEKLY REPORT
WEEK – 6 (From Dt………..….. to Dt .................... )

Objective of Activity Done:


• Implementation and configuration of AWS Load Balancers.
• Understanding the concept of Auto Scaling for dynamic resource management.
• Hands-on experience in ensuring high availability and scalability.
• In-depth exploration of Amazon S3 for scalable and durable storage.
• Understanding AWS Lambda for serverless computing.
• Practical knowledge of managing relational databases with Amazon RDS.
• Exposure to additional AWS services, broadening the scope of expertise.
Detailed Report:
A load balancer distributes workloads across multiple compute resources, such as virtual servers.
Using a load balancer increases the availability and fault tolerance of your applications. You can add and
remove compute resources from your load balancer as your needs change, without disrupting the overall
flow of requests to your applications.

Elastic Load Balancing supports the following load balancers: Application Load Balancers, Network
Load Balancers, Gateway Load Balancers, and Classic Load Balancers.

You can configure health checks, which monitor the health of the compute resources, so that the load
balancer sends requests only to the healthy ones. You can also offload the work of encryption and
decryption to your load balancer so that your compute resources can focus on their main work.

Amazon Relational Database Service (Amazon RDS) is a web service that makes it easier to set up,
operate, and scale a relational database in the AWS Cloud. It provides cost-efficient, resizable capacity for
an industry-standard relational database and manages common database administration tasks. AmazonRDS
is responsible for hosting the software components and infrastructure of DB instances and DB cluster. You
are responsible for query tuning, which is the process of adjusting SQL queries to improve performance.

Query performance is highly dependent on database design, data size, data distribution, application
workload, and query patterns, which can vary greatly. Monitoring and tuning are highly individualized
processes that you own for your RDS databases. You can use Amazon RDS Performance Insights and
other tools to identify problematic queries.

25
CHAPTER 5: OUTCOMES DESCRIPTION

In the ever-evolving landscape of information technology, cloud computing has


emerged as a transformative force, and at the forefront of this revolution is Amazon Web Services
(AWS). AWS is a comprehensive and highly scalable cloud platform offered by Amazon, empowering
businesses, organizations, and individuals to harness the power of the cloud to innovate, scale, and
optimize their operations.

Key Features of AWS:

• Global Infrastructure: AWS operates a vast network of data centers strategically located
around the globe. This global infrastructure ensures low-latency access and high availability of
services for users worldwide.

• Wide Range of Services: AWS offers a diverse set of services, covering computing power,
storage, databases, machine learning, analytics, and more. From virtual servers (EC2) to fully
managed databases (RDS), AWS provides solutions for virtually every computing need.

• Scalability: One of the defining features of AWS is its ability to scale resources up or down
based on demand. This elasticity allows businesses to respond dynamically to changing
workloads, ensuring optimal performance and cost efficiency.

• Security and Compliance: AWS places a strong emphasis on security, implementing robust
measures to protect data and applications. The platform adheres to industry-recognized security
standards and certifications, providing a secure environment for sensitive workloads.

• Cost Management: AWS offers a pay-as-you-go pricing model, allowing users to pay only for
the resources they consume. This flexible pricing structure, coupled with various cost
management tools, enables organizations to optimize their spending in the cloud.

• Innovation with Emerging Technologies: AWS continually invests in emerging technologies


such as artificial intelligence (AI), machine learning (ML), and the Internet of Things (IoT). This
enables users to integrate the latest advancements into their applications and services.

26

You might also like