It is a short speech script for apresentation inworkshop,I don't need PPT, topic isCloud computing, should present valuable contents which are not included in the lectures and textbook and PPT.The...

1 answer below »
It is a short speech script for apresentation inworkshop,I don't need PPT, topic isCloud computing, should present valuable contents which are not included in the lectures and textbook and PPT.The papers or industry articles which are used to write this speech script are required for submission, and to share the findings in the presentation.
The workshops will be in the form of academic/research forum where you will be required to make presentations.


CRITERIA SHEET:
Insightful and accurate discussion of the main technical results of the paperor industry article, including how the work relates to content covered in lectures. Presentation is well structured. Clear and confident delivery.
The topic came from one of the chapters in this textbook which is for the lectures:Network+ Guide to Networks, 7th Edition, Jill West; Tamara Dean; Jean Andrews, Cengage, ISBN-10: 1-305- 09094-2, ISBN-13: 978-1-305-09094-1

Lecture PPT attached.
Thank you very much.


CCNA 1 Module 11 TCP/IP Transport and Application Layers CP1402 – Internet Fundamentals Cloud Computing and Remote Access Objectives Identify the features and benefits of cloud computing Explain methods for remotely connecting to a network Discuss VPNs (virtual private networks) and the protocols they rely on Describe how user authentication protocols function 2 Objectives Identify the features and benefits of cloud computing Explain methods for remotely connecting to a network Discuss VPNs (virtual private networks) and the protocols they rely on Understand methods of encryption, such as IPsec, SSL/TLS, SFTP, and SSH, that can secure data in storage and in transit Cloud Computing Internet is frequently pictured as a cloud Cloud computing Flexible provision of data storage, applications, and services to multiple clients over a network Cloud computing distinguishing features On-demand service Elastic services and storage Support for multiple platforms Resource pooling and consolidation Metered service 3 Cloud Computing Internet is frequently pictured as a cloud Cloud computing Flexible provision of data storage, applications, and services to multiple clients over a network Cloud computing distinguishing features On-demand service Elastic services and storage Support for multiple platforms Resource pooling and consolidation Metered service 3 Cloud Computing 4 Cloud Computing 4 Cloud Computing Can provide virtual desktops Operating environments hosted virtually Developers can load any kind of software on the servers and test it form afar Cloud services provider can make sure the development servers are secure and regularly backed up Most cloud service providers use virtualization software to supply multiple platforms to multiple users 5 Cloud Computing Can provide virtual desktops Operating environments hosted virtually Developers can load any kind of software on the servers and test it form afar Cloud services provider can make sure the development servers are secure and regularly backed up Most cloud service providers use virtualization software to supply multiple platforms to multiple users 5 Cloud Computing Categories Cloud computing service models are categorized by the types of services provided: IaaS (Infrastructure as a Service) Hardware services and network infrastructure devices PaaS (Platform as a Service) OS, runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs SaaS (Software as a Service) Applications XaaS (Anything as a Service) Any combination of functions 6 Cloud Computing Categories Cloud computing service models are categorized by the types of services provided: IaaS (Infrastructure as a Service) Hardware services and network infrastructure devices PaaS (Platform as a Service) OS, runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs SaaS (Software as a Service) Applications XaaS (Anything as a Service) Any combination of functions 6 Deployment Models Public cloud Service provided over public transmission lines Private cloud Service established on an organization’s own servers in its own data center Community cloud Service shared between multiple organizations Hybrid cloud Combination of the other service models into a single deployment 7 Deployment Models Public cloud Service provided over public transmission lines Private cloud Service established on an organization’s own servers in its own data center Community cloud Service shared between multiple organizations Hybrid cloud Combination of the other service models into a single deployment 7 Quick Review Without looking back, what do the following initialisms mean? IaaS PaaS SaaS XaaS TaaS Cloud Computing Examples Amazon Web Services (AWS) very widely used Dropbox, OneDrive, Google Drive storage and sharing DigitalOcean, Vultr, Rackspace virtual private servers LiquidSky virtual desktop for high performance/gaming 9 Deployment Models Public cloud Service provided over public transmission lines Private cloud Service established on an organization’s own servers in its own data center Community cloud Service shared between multiple organizations Hybrid cloud Combination of the other service models into a single deployment 9 Remote Access Remote access Service that allows a client to connect with and log on to a server, LAN, or WAN in a different geographical location Types of remote access: Point-to-point over a dedicated line Virtual private network (VPN) Remote terminal emulation, also called remote virtual computing 10 Remote Access Remote access Service that allows a client to connect with and log on to a server, LAN, or WAN in a different geographical location Types of remote access: Point-to-point over a dedicated line Virtual private network (VPN) Remote terminal emulation, also called remote virtual computing 10 Remote Access Remote access server (RAS) Accepts remote connections and grants access to network resources Two types of remote access servers: Dedicated devices Example: Cisco’s AS5800 Software running on a server Example: DirectAccess 11 Remote Access Remote access server (RAS) Accepts remote connections and grants access to network resources Two types of remote access servers: Dedicated devices Example: Cisco’s AS5800 Software running on a server Example: DirectAccess 11 Remote Access 12 Remote Access 12 Remote Access 13 Remote Access 13 VPNs (Virtual Private Networks) VPNs Virtual networks logically defined for secure communication over public transmission systems To ensure VPNs can carry all types of data securely Special VPN protocols encapsulate higher-layer protocols in a process known as tunneling VPNs can be classified according to two models: Site-to-site VPN Client-to-site VPN Also called host-to-site VPN or remote-access VPN 14 VPNs (Virtual Private Networks) VPNs Virtual networks logically defined for secure communication over public transmission systems To ensure VPNs can carry all types of data securely Special VPN protocols encapsulate higher-layer protocols in a process known as tunneling VPNs can be classified according to two models: Site-to-site VPN Client-to-site VPN Also called host-to-site VPN or remote-access VPN 14 VPNs (Virtual Private Networks) 15 VPNs (Virtual Private Networks) 15 VPNs (Virtual Private Networks) 16 VPNs (Virtual Private Networks) 16 VPNs (Virtual Private Networks) VPN software embedded in the OS RRAS (Routing and Remote Access Service) Microsoft’s remote access server software and VPN solution Third-party solutions OpenVIN is open source and is available on a variety of platforms Implemented by routers or firewalls Most common implementation of VPNs on UNIX-based networks 17 VPNs (Virtual Private Networks) VPN software embedded in the OS RRAS (Routing and Remote Access Service) Microsoft’s remote access server software and VPN solution Third-party solutions OpenVIN is open source and is available on a variety of platforms Implemented by routers or firewalls Most common implementation of VPNs on UNIX-based networks 17 VPNs (Virtual Private Networks) VPN concentrator Specialized device that authenticates VPN clients, establishes tunnels for VPN connections, and manages encryption for VPN transmissions Also known as an encryption device Two primary encryption techniques used by VPNs: IPsec SSL 18 VPNs (Virtual Private Networks) VPN concentrator Specialized device that authenticates VPN clients, establishes tunnels for VPN connections, and manages encryption for VPN transmissions Also known as an encryption device Two primary encryption techniques used by VPNs: IPsec SSL 18 VPNs (Virtual Private Networks) 19 VPNs (Virtual Private Networks) 19 VPNs (Virtual Private Networks) You can VPN in to JCU: https://www.jcu.edu.au/library/connect/remote-access/making-a-vpn-connection-to-jcu 20 VPNs (Virtual Private Networks) VPN concentrator Specialized device that authenticates VPN clients, establishes tunnels for VPN connections, and manages encryption for VPN transmissions Also known as an encryption device Two primary encryption techniques used by VPNs: IPsec SSL 20 Encryption Techniques, Protocols, and Utilities Encryption Use of mathematical code, called a cipher, to scramble data into a format that can be read only by reversing the cipher Used to keep information private Provides the following assurances: Confidentiality Integrity Availability 21 Encryption Techniques, Protocols, and Utilities Encryption Use of mathematical code, called a cipher, to scramble data into a format that can be read only by reversing the cipher Used to keep information private Provides the following assurances: Confidentiality Integrity Availability 21 Key Encryption Key Random string of characters Woven into original data’s bits Generates unique data block Ciphertext Scrambled data block Brute force attack Attempt to discover key Trying numerous possible character combinations 22 Key Encryption Key Random string of characters Woven into original data’s bits Generates unique data block Ciphertext Scrambled data block Brute force attack Attempt to discover key Trying numerous possible character combinations 22 Key Encryption Private key encryption Data encrypted using single key Known only by sender and receiver Symmetric encryption Same key used during both encryption and decryption 23 Key Encryption Private key encryption Data encrypted using single key Known only by sender and receiver Symmetric encryption Same key used during both encryption and decryption 23 Key Encryption 24 Key Encryption 24 Key Encryption Public key encryption Data encrypted using two keys Private key: user knows Public key: anyone may request Public key server Publicly accessible host Freely provides users’ public keys Key pair Combination of public key and private key Asymmetric encryption Requires two different keys 25 Key Encryption Public key encryption Data encrypted using two keys Private key: user knows Public key: anyone may request Public key server Publicly accessible host Freely provides users’ public keys Key pair Combination of public key and private key Asymmetric encryption Requires two different keys 25 Key Encryption 26 Figure 7-11 Public key encryption begins with the recipient Key Encryption 26 Key Encryption Digital certificate Holds identification information Includes public key CA (certificate authority) Issues, maintains digital certificates Example: Verisign PKI (public key infrastructure) Use of certificate authorities to associate public keys with certain users 27 Key Encryption Digital certificate Holds identification information Includes public key CA (certificate authority) Issues, maintains digital certificates Example: Verisign PKI (public key infrastructure) Use of certificate authorities to associate public keys with certain users 27 Key Encryption 28 Key Encryption 28 Key Encryption 29 Figure 7-13 When the CA that issues a digital certificate is trusted and verified, the Web server’s public key can be trusted Key Encryption 29 Authentication Protocols Authentication Process of verifying user’s credentials to grant user access to secured resources Authentication protocols Rules computers follow to accomplish authentication Several authentication protocol types Vary by encryption scheme: And steps taken to verify credentials 30 Authentication Protocols Authentication Process of verifying user’s credentials to grant user access to secured resources Authentication protocols Rules computers follow to accomplish authentication Several authentication protocol types Vary by encryption scheme: And steps taken to verify credentials 30 RADIUS Environments that support many simultaneous connections should use a centralized service Often used to manage resource access AAA (authentication, authorization, and accounting) Category of protocols that provide service Authenticate a client’s identity Authorize a user for certain privileges on a system Keep an account of the client’s system or network usage 31 RADIUS and TACACS+ Environments that support many simultaneous connections should use a centralized service Often used to manage resource access AAA (authentication, authorization, and accounting) Category of protocols that provide service Authenticate a client’s identity Authorize a user for certain privileges on a system Keep an account of the client’s system or network usage 31 RADIUS RADIUS (Remote Authentication Dial-In User Service) Defined by the IETF Transported over UDP Can operate as application on remote access server Or on dedicated RADIUS server Highly scalable May be used to authenticate wireless connections Can work in conjunction with other network servers 32 RADIUS and TACACS+ RADIUS (Remote Authentication Dial-In User Service) Defined by the IETF Transported over UDP Can operate as application on remote access server Or on dedicated RADIUS server Highly scalable May be used to authenticate wireless connections Can work in conjunction with other network servers 32 RADIUS 33 RADIUS and TACACS+ 33 SSO (Single Sign-On) SSO Form of authentication in
Answered Same DaySep 17, 2020CP1402James Cook University

Answer To: It is a short speech script for apresentation inworkshop,I don't need PPT, topic isCloud computing,...

Amit answered on Sep 29 2020
144 Votes
Full Name :
    
    Student ID :
    
    Subject :
    
    Assignment No :
    
    Due Date :
    
    Lecturer
’s Name :
    
Abstract on cloud computing
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
a)    Abstract    3
b)    References:    4
a) Abstract
In 1990s when the arrival of internet is happened to facilities of every where computing, the drastic changes has been occurred to internet based services. The internet has travelled from parallel environment of computing to distributed environment of computing to grid based environment of computing to cloud environment of computing in recent time. The cloud computing is the most recent emerging area to the CS field. The computing environment in which the computing requirements of any individual or organization...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here