Tuesday, May 5, 2020

The Concept of Cloud Computing

Questions: 1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjans operational checklists for DSIs OSDS. This section should be no more than two to three pages in length. 2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length. 3. Use Erls SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length. 4. Provide a covering one to two page executive summary of these two assessments to DSI Executive Management and summarise the major opportunities and risks that have been identified in your assessments. Answers: Introduction The concept of cloud computing implies the remote servers networks that is hosted on the internet to manage and store processing of data and information rather than a personal computer or from a local server. In this report, the researcher has discussed different aspects of cloud computing sorely related to the Department of spatial information which generally includes Service Level Agreement (SLA) between two intermediaries in which one is a service provider and another one is a customer. In the first few stanzas the researcher has explained the concept of resource management, remote administration and in the next few stanzas the concept of SLA and disaster recovery and backup has been described. 1.0 Requirements of Resource Management, Remote administration and Service Level Agreement (SLA) Management Resource Management Resource Management is a process that manages the physical resources like bandwidth of networks, cores of CPU and fragmentation of disk space (Zissis Lekkas, 2012). It comprises of control panel where the administrator can access by the help of remote from any parts of the world. The computer system within the same network may transfer the data via Wi-Fi connectivity or wireless connection (Lee and Zomaya, 2012). This technology is a very standard in almost all multinational organization for resources of hardware management. Remote Administration It generally refers to a process of controlling a computer from a remote location. The common software applications that requires remote administration is often used when it founds impractical (Xiao Xiao, 2013). The department of Spatial Information must have the control over another system administrator; and the software that is used for accessing the remote areas is commonly used by all other companies. That, inbuilt software is crucially requires for accessing the remote administration system (Jadeja Modi, 2012). SLA Management It is a contract between end user and the service provider; that generally defines the level of service. Its concept is totally output based where and its main purpose is what customer will receive (Zissis Lekkas, 2012). The task of SLA management is to decide the customer requirements as per norms. It needs an expert that concerns service to match the customer requirements. Clearly, it states that what type of service that will be imposed on the Department of Spatial Information (Hashizume et al., 2013). It is generally managed by the SLA management and the concept of DSI is to be provided for betterment of supplier service requirements. 1.1 Morad and Dalbhanjans Operational Checklists for DSIs OSDS Morad and Dalbhanjans Operational Checklists for DSIs OSDS The use of access management identity is to provide user specific rather than to share credentials or establishing AWS infrastructure request. Appropriate use of operating system user access of accounts credentials by not sharing the private key pairs of all system administrators. Use separate EBS volumes for application and operating system for management and manipulating of several database administrators. Full testing of an AWS application of hosting which generally includes the performance testing and priority. Testing of patching and security process by using the AWS operating systems by customizing the AMIs. 2.0 Consideration of Resilience, Data Back-up and Data Recovery Data Back-up and disaster recovery Data Back-up implies making a duplicate copy of the original one to avoid mismanagement of data and information whereas disaster recovery involves a set of policies to activate the continuation or recovery of crucial technology system and infrastructure. In this scenario, the consideration of Resilience, Data Back-up and Data Recovery has been considered (Zissis Lekkas, 2012). The department of spatial information requires choosing of right vendor to make an adequate data recovery plans. The company management has to ensure that the allocated tools and techniques are well tested for the organizational management (Xu, 2012). This can be done to avoid any future consequences between DSI and the service provider. Generally, the concept are adopted and implemented to deal with several types of issues (Wang et al., 2012). The researcher has considered the concept of data back-up and disaster recovery by allocating the following assumptions provided below: Minimizing the risk: The DSI has to choose the right supplier who is experienced and well tested; so that they can work for an organizational management to provide lesser risk (Lee Zomaya, 2012). Security of data: The useful data and information can be retrieved by following the process of disaster recovery process. It is also important to ensure that the data and the information in DSI must be shared by government and public domains (Zissis Lekkas, 2012). Application Resilience It refers to ability of an application to react the issues in one of the necessary components and provide the best possible services. Now-a-days, it has become a very important part of an organizational management to adopt software applications across multiple infrastructures technology (Xiao Xiao, 2013). The department of spatial information must concentrate the process of resilience during the implementation of clod based infrastructural solutions in the model of OSDS. It generally works when there are no power interruptions. Through several administration systems the concept of application resilience is obtained (Xu, 2012). When the planning of the project is adopted the application resiliency is proposed and it establishes a connection between the data center for better emergency plan and disaster recovery plan. Its main work is to provide the appropriate web solutions that s basically developed internally in an organizational management (Jadeja Modi, 2012). 3.0 Erls Service Level agreement (SLA) guidelines The concept of service level agreement generally implies the communication between service provider and the department of spatial information. The organizational management is looking to adopt the cloud based model that is generally done via IAAS cloud method. The application of service level agreement must be clear and comprehensive for both the service provider and the client (Zissis Lekkas, 2012). For instance, if any new terminologies that are implemented that must be added to the application of service level agreement. In many areas of cloud based application the client uses the end user interface and the concept of API which includes communication and other adoption services (Hashizume et al., 2013). The guidelines of service level agreements need to be defined and must be kept updated. With the adoption of cloud computing services in many multinational companies it has been an efficient system for all organizational management (Xiao Xiao, 2013). In this scenario, the conside ration of Resilience, Data Back-up and Data Recovery has been considered. Its main work is to provide the appropriate web solutions that s basically developed internally in an organizational management. The main use of service level agreement is to access the service from any parts of the region in the same cloud service network; that increases the quality services for managing and manipulating the methodology of an organizational enterprise (Zissis Lekkas, 2012). Conclusion The entire topic has been concluded with the broad concept of cloud computing with an overview of service level agreements, application resilience, and data recovery and disaster management system. The researcher has maintained and manipulated the requirements of remote administration and resource management. The researcher has also taken the ease of Erls for the base of service level agreement of an organizational management mentioned above. References Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 1-13. Jadeja, Y., Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE. Lee, Y. C., Zomaya, A. Y. (2012). Energy efficient utilization of resources in cloud computing systems. The Journal of Supercomputing, 60(2), 268-280. Moreno-Vozmediano, R., Montero, R. S., Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services. Internet Computing, IEEE, 17(4), 18-25. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions on, 5(2), 220-232. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing. Communications Surveys Tutorials, IEEE, 15(2), 843-859. Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), 75-86. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.