Thursday, December 12, 2019
Virtualisation And Cloud Computing Samples for Students â⬠MyAssignment
Question: Discuss about the Virtualisation And Cloud Computing. Answer: Cloud architectures The board of SoftArc Engineering could assume the most credible approach from the three prominent cloud computing architectures including IaaS, PaaS and SaaS. The selection of IaaS and SaaS as the reasonable options for the company can be validated through a description of the two architectures which would validate their application for accomplishing reasonable outcomes from the revised strategy of the organization. IaaS (Infrastructure as a Service) can be considered suitable on the grounds of its capabilities to provide the essential infrastructure services which could be required in case of the organization for relocation of its Brisbane based data centres facilities (Benmessaoud, et al., 2014). The infrastructure services could be accountable for improved disk space, memory, services and the utilization of network devices which reflect directly on the positive dimension of IaaS. SaaS (Software as a Service) is also associated with the positive implications of increased comprehens iveness of the applications that can be easily accessed by the customers on demand (Bourguiba, et al., 2014). It is also essential to determine the advantages and setbacks of the cloud computing architectures selected for the implementation of the hybrid cloud methodology in SoftArc Engineering. The positive implications associated with the IaaS architecture reflect on the acquisition of consumer competences for the provision of services such as networks, processing, fundamental computing resources and storage. On the contrary, IaaS could be associated with pitfalls such as expensiveness and the responsibility of customers for the varying dimensions of VM Management (Caminero, et al., 2013, August). Furthermore, the concerns of limited control over service and the physical location of the VM could be accounted as profound disadvantages of the IaaS cloud computing architecture. SaaS is associated with the advantage of increasing flexibility of consumer access to applications that could be realized through a wide range of client devises without allowing the privilege to consumers for changing the cloud infrastructure and capabilities of individual applications. Detrimental aspects pertaining to the SaaS reflect on the limited control of customers over data processing in the cloud system and the limitations of control over software parameters (Hintemann, 2015). The risks associated with this new Hybrid Cloud strategy The estimation of potential risks that can be associated with the hybrid cloud strategy could be useful for realizing efficiency in the strategic initiatives. Loss of control is the formidable risk that can be associated with hybrid cloud strategy due to the implications for the management to supervise every part of the technology strategy. Unprecedented software updates and the exclusion of the updates from the control of the enterprise can be assumed as profound risk (Malhotra, Agarwal Jaiswal, 2014). The risk can be addressed by resolving the integration conflicts that occur in case of other programs and critical business applications. Cloud security is a major risk that encompasses the necessary implications for security management, risk management and the improper construction of service level agreements. The risk can be addressed through explicit references to the monitoring of the integrated use of public and private cloud facilities alongside the management of the deployment architectures (Mattmann, et al., 2014). Compliance risks emerge in case of hybrid cloud strategy from the cloud security implications. The compliance requirements are reflective of the adaptation of every aspect of the cloud strategy to the industry precedents. The compliance risks could be addressed by ensuring the flexible and secure flow of information among public and private cloud environments. General Information Security steps and controls The prominent measures which can be implemented for ensuring the information security in the hybrid cloud computing strategy of the organization are reflective of the essential requirement of supervision. First of all, the implementation of effective governance through a prolific interpretation of the compliance and risk estimation processes is applicable measure in case of improvement of the information security in SoftArc Engineerings hybrid cloud strategy. The enforcement of privacy policies in the cloud computing framework can also be implemented for security of data (Parann-Nissany Sheffer, 2016). Management of people and identities on the cloud computing platform can be assumed as viable information security guidance. The information security dimension of the cloud applications has to be evaluated comprehensively in order to obtain an impression of the possible areas where the cloud infrastructure poses threats to the violation of information security privileges. Observation of security controls pertaining to the physical facilities in the cloud infrastructure such as data devices, networks, drives and memory could also be considered as plausible measures for the resolution of information security measures in the hybrid cloud strategy (Salih Edreis, 2016). These dimensions could be appropriately monitored through a comprehensive illustration of the security requisites for the exit process. Recommendation The transition of cloud computing applications in public or private cloud environments could be justified as a viable opportunity to accomplish viable outcomes such as improvement of operations, reduction in costs and the variability of applications as well as their feasibility for the cloud infrastructures. The implications of application resilience could be observed from the observation of certain architectures which account for best native cloud practices alongside the requirement of minimal changes to improve the resiliency of applications. The application resiliency on complex patterns could be addressed through the implementation of efficiency in design, planning and execution activities of the cloud applications. The evaluation of applications for resiliency as well as their compatibility with the cloud native architectural principles could allow the organization to capitalize on the promising aspects of enterprise efficiencies and cloud economics. Loss of data is a major concern for cloud computing infrastructures and hence the requirement of backup and data recovery techniques is imperatively observed in case of the BCP of SoftArc Engineering. SBA (Seed Block Algorithm Architecture), Parity Cloud Service (PCS), Linux Box, HSDRT, Cold/Hot Backup Strategy and the ERGOT ( Efficient Routing Grounding on Taxonomy are some of the promising backup and data recovery tools that can be applied in case of the organization (Swathi, Srikanth Reddy, 2014). These resources are associated with the cognizable advantages such as simple implementation, low cost, application in case of failure detection, privacy, reliability and exact match retrieval which can provide viable insights into the efficiency of the Hybrid cloud environment. Requirements that SoftArc Engineering will need The requirements for the remote server administration, service level agreement management and the resource management implications for the cloud service delivery models can be apprehended from the checklists. The checklists are primary referring to the basic operations and enterprise operations which provide an estimation of the existing features and the required features in the cloud system (Swathi, Srikanth Reddy, 2014). The resource management implications can be profoundly reflective of the requirements of instance and metadata explicitly pertaining to the service. Resource tagging strategy is efficient for the realization of plausible routes to follow and track resources. Another formidable requirement in resource management is vested in the integration of resources in the internal resource management frameworks of the organization (Vaezi Zhang, 2017). The requirements in context of remote server based administration could be observed in the form of capabilities of the system to monitor server images, instrumentation and control of OS credential and the management of changes in OS hardening baselines, firewalls and supervision of intrusive attacks and unauthorized changes. The SLA management requirement that could be included in the BCP of SoftArc Engineering refers to the review of the SLA. The foremost requirement that could be drawn from the SLA management implications refer to the provision of aspects that facilitate the transfer of intellectual property rights pertaining to the data. SQL Server 2012 Database servers to the AWS cloud: Steps to Migrate The steps that can be implemented for the migration of SharePoint instance and SQL Server 2012 Database servers to the AWS cloud can be illustrated as follows. The first step refers to the creation of an AWS account of the organization which does not involve any charges. The next step would include the launching of a network and Active Directory stack through the utilization of a sample template (Swathi, Srikanth Reddy, 2014). The third step is launch of database stack using custom AMI and provisioning the database tier. Then the following step reflects on the launch of app stack using the custom AMI and implements the Windows Server 2008 R2 EC2 that is associated with installation of SharePoint server. Thereafter the launch of the web stack through WFE servers is the next step that is reflective of the use of license key (BYOL), a trial PD key and the trial or test installation. The deployment and configuration of the Elastic Load Balancer (ELB) can used to balance the traffic among the WFE servers. The final step is associated with the configuration of the SharePoint farm in order to obtain a proof of demonstration. Critical points and issues The critical issues that can arise in the migration process could be apprehended from the individual steps. The launch of the data base stack could be associated with the implications of data redundancy that could influence the provisioning of the database tier. The launch of the app stack could be subject to critical issues pertaining to compatibility of the license key and the trial PD key (Swathi, Srikanth Reddy, 2014). Thereafter the critical issue with the migration process is identified in the launching of the web stack implying formidable indications to the utilization of 2 Web Front End servers that could be associated with concerns of documentation of IDs and their input in the template such as VPC ID, Domain Member Security Group ID, the Server Subnet IDs and the Load Balancer Security Group ID. References Benmessaoud, N., Tulloch, M., Williams, C. J., Mudigonda, U. M. (2014).Microsoft System Center-Network Virtualization and Cloud Computing. Pearson Education. Bourguiba, M., Haddadou, K., El Korbi, I., Pujolle, G. (2014). Improving network I/O virtualization for cloud computing.IEEE Transactions on Parallel and Distributed Systems,25(3), 673-681. Caminero, A. C., Hernandez, R., Ros, S., Tobarra, L., Robles-Gomez, A., San Cristobal, E., ... Castro, M. (2013, August). Obtaining university practical competences in engineering by means of virtualization and cloud computing technologies. InTeaching, Assessment and Learning for Engineering (TALE), 2013 IEEE International Conference on(pp. 301-306). IEEE. Hintemann, R. (2015). Consolidation, colocation, virtualization, and cloud computing: the impact of the changing structure of data centers on total electricity demand. InICT Innovations for Sustainability(pp. 125-136). Springer International Publishing. Malhotra, L. A. K. S. H. A. Y., Agarwal, D., Jaiswal, A. (2014). Virtualization in cloud computing.J Inform Tech Softw Eng,4(2), 136. Mattmann, C. A., Waliser, D., Kim, J., Goodale, C., Hart, A., Ramirez, P., ... Loikith, P. (2014). Cloud computing and virtualization within the regional climate model and evaluation system.Earth Science Informatics,7(1), 1-12. Parann-Nissany, G., Sheffer, Y. (2016).U.S. Patent No. 9,380,037. Washington, DC: U.S. Patent and Trademark Office. Salih, B. M., Edreis, H. A. (2016). Comparison between Virtualization and Cloud Computing. Swathi, T., Srikanth, K., Reddy, S. R. (2014). Virtualization in cloud computing.International Journal of Computer Science and Mobile Computing, ISSN, 540-546. Vaezi, M., Zhang, Y. (2017). Virtualization and Cloud Computing. InCloud Mobile Networks(pp. 11-31). Springer International Publishing.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.