Current Trends and Projects in Computer Networks and Security
Week 1 – Virtualization
- Log in to your newly created AWS account and take a screen capture of the AWS Management Console (Dashboard) and embed it below.
- Provide a detailed overview of the steps required to install the Ubuntu server operating system on the virtual machine. The steps may be listed in bullet points or complete sentences. Use as much space as required.
- What are the benefits of virtualization in a cloud environment? Discuss a minimum of three benefits in detail.
- Based on your experience, what was the most challenging aspect of installing the Ubuntu server operating systems in the virtual environment?
- Launch the terminal and update the Ubuntu Server using sudo apt-get update and sudo apt-get upgrade. Perform a screen capture after having each command successfully run. Next, describe in depth what the update and upgrade commands are doing (explain why it is important to run these commands, how often should these commands be run, where do the commands pull the updates).
- After successfully installing the Ubuntu Server operating systems, login via an SSH client. Instructions are provided by Amazon on how to do so. When connected, run the following commands to obtain information about the host and network settings:
Next, perform a screen capture of each of the results and embed it below.
- Note the difference between IP addresses—specifically, when you perform the ifconfig or ipconfig on your personal system, versus the ifconfig command within the virtual machine command prompt. Describe the network settings of each system. Why are the IP addresses different? Are the IP addresses private or public? What is the difference between a public and private IP address? Explain in detail.
- The CTO is fascinated at how easy it was for you to launch the Ubuntu virtual machine. She is now curious about the overall costs of doing so for all developers within the organization. The developers within the organization receive a new laptop or desktop each year per the refresh cycle. Specifically, she has tasked you to provide an estimate of yearly costs using AWS versus the organization refreshing developer laptops and desktops, given the following information and constraints.
Organizational Costs for Existing Equipment:
● 35 laptops are refreshed yearly at an average cost of $1,200 per machine.
○ These laptops have a 90W power supply, but run at 37W.
● 65 desktops (and peripherals) are refreshed yearly at an average cost of $1,600 per machine.
○ These desktops have a 650W power supply, but run at 220W.
● Due to the unique development environment, the laptops and desktops are not powered off. The average electricity cost for the organization is $0.15 KWH. Thus, each laptop costs $48.60 to run for a year, and each desktop costs $289.50 to run for a year.
● Consider all of the aforementioned expenses the organization incurs when making your recommendation, and be sure to show your work.
Amazon AWS Costs for Hosting the Virtual Desktop
● The organization would need to replace all of the developer laptops and desktops with an AWS Linux virtual machine.
● Using the AWS Dashboard Calculator, calculate the cost to meet the organizational needs given the aforementioned details.
After performing the necessary calculations based on the organizational requirements,
perform a cost-benefit analysis and provide your recommendation. Make sure to
summarize your findings and justify your solution.
- Virtualization allows us to place the functionality of many servers into a single host while maintaining configurable levels of separation between all virtual machines. How do you believe virtualization could help in data center consolidation? What would you be leery about during and after any transition?
- Does virtualization increase the cybersecurity posture of the organization? If so, describe how and why. If not, describe how and why not.
- There are various virtualization options: bare-metal (type 1) in which the hypervisors run directly on the hardware as their own operating systems, and user-space (type 2) hypervisors that run within the conventional operating systems. Which of these options is more secure? Describe the vulnerabilities you believe exist in either type 1, type 2, or both configurations. Given that, what do you believe can be done to mitigate these vulnerabilities?
- Confirm that you have stopped and terminated your AWS Linux server instance. To confirm, simply type your name below.