Wednesday, May 6, 2020
Department of Spatial Information
Questions: The Department of Spatial Information (DSI) has considered your assessment of the deployment model, risk management aSLA guidelines assessmentnd security issues for the Online Spatial Delivery System (OSDS). They have decided that they need an additional assessment on the technical management and the SLA. You have been assigned the task of providing DSI Executive Management with an assessment of the management requirements and the provisions of the SLA for the chosen cloud vendor. You are to:1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjans operational checklists for DSIs OSDS. This section should be no more than two to three pages in length. 2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length. 3. Use Erls SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.Provide a covering one to two page executive summary of these two assessments to DSI Executive Management and summarise the major opportunities and risks that have been identified in your assessments. Answers: Discuss the requirements for: Remote administration This system is able to provide tools and the user interfaces which is based on the configuration and administration of the cloud based services. This can establish a proper access for the administration and setup, configuration, maintenance as well as proper monitoring. The systems is set for the facilitation of control which is easily able to establishing the access of the administration and other management features. (Choudhary et al., 2015). The remote management includes the resource, SLA and the proper billing system. The remote administration is able to handle the cloud development and the customisation of all the online portals which provide the different consumers of the cloud to handle the administrative control. These are able to handle the usage and the administration portal which controls the cloud based IT resources to provide a better usage of the reports. The self-service portal is for handling the cloud consumers to handle the up-to-date services as well as the IT resources. The features are depending upon handling the levels of the accessing control which is granted by the different cloud providers. This depends on the configuration of the cloud service setup as well as the monitoring of the QoS and SLA management. A proper planning and assessment of the IT resource provides a proper capacity planning by the different remote administration system. (Jiang et al., 2015). This will invest in the reuse of the console to another cloud provider. Resource management The resource management is helping to coordinate all the IT resourced to perform the actions by the cloud system and the providers. The infrastructure has been to handle the server of the hardware which is treated from the underlying commercial product which is set under a range of the virtualised IT resource. This is set to handle the different servers to create and manage the different instances of the hypervisor. This includes the management of the data of the virtualised IT resources as well as the allocation and the coordination of different mechanisms. These are mainly to enforce the usage and the security policies through the entire lifecycle. (Shiau et al., 2015). SLA management. SLA management is based on the deployment of system with the proper storage and the retrieval of the data based on the different metrics and parameters. The SLA is based on collecting the data metrics which is monitored for the individual cloud services along with the aligned SLA. The cloud consumer is able to handle the access of the different administration portal which is able to provide a better resource under the native user interface by the VIM. This is based on the user of the native of the user-interface which provides a performance of the internal resource management. (Choudhary et al., 2015). The SLA management is set for the range to pertain and collect the reports as well as the runtime notifications of the data. Application resilience, backup and disaster recovery The application resilience needs to hold a higher of the requirements. AWS is able to provide a proper infrastructure building which will help in handling and meeting the different requirements effectively. The HA is mainly to use the different zones, auto balancing of the load, monitoring and the recovery. This ensures that there is a proper identification of the single points of the failure which are depending on the availability of the applications and the other risks profiles. The Amazon checklist try to provide a higher leverage availability based on the running of the multiple amazon instances with the static IP address for the different static remapping. A complete storage of the objects in Amazon is for the distribution of content as well as for the environment and other version management. (Calheiros et al., 2015). The applications disaster recovery or the backup is tied under the recovery point with certain time objectives which are able to handle the physical proximity between the disaster recovery sites. There has been an effective DR strategy which includes the different components that will be able to recover the tests which have been performed to make sure that all the applications could be easily recovered as needed. The higher level has been effective DR strategy which includes the redundancy and the globalised management of the traffic with monitoring and the recovery of the region-to-region. This is able to store the data through the additional instances for the multiple AWS regions. There has been a complete use of the Amazon Route for the different DNS based regions which are leveraged over the asynchronous data replication technology. The cloud disaster recovery is mainly to settle the backup and the restore strategy which involves the criteria to store and handle the cloud computi ng with proper security measures. DR is able to easily recover the data with the implementation of the man-made catastrophe features. (Puthal et al., 2015). Certain benefits have been set which allow all the smaller enterprises to implement the recovery plans with the charge on the model and the capacity, bandwidth and seat. The system is able to provide the infrastructure a better approach for holding the hardware, and the network resources in order to support the system. The cloud computation is based on the products and the services which will be able to help the companies in handling the usage based costs as well as the data recovery through the reduction of the needs for the different data centre spaces. The clouds are accessed through the internet, bandwidth and the other requirements which move the data into the cloud with the proper analysis of the accessibility. SLA guidelines assessment SLA guidelines are set for the computation of the services which are based on the Quality of Service parameter. This is based on handling the User/Broker management with the service requests and the resource service provision. The SAL management includes the enhanced level of the customer satisfaction which helps the providers to completely focus on the requirements to be set in a particular direction. There have been improved service quality and the relationship which monitors the service level objects along with delivering the utility components through the implementation of a proper infrastructural platform. Considering the utility requirements SLA is able to manage the workloads, resource or the service providers. These are based on handling the resource allocation with the proper discovery, negotiation, pricing, scheduling, monitoring, dispatching and the other accounting practices. (Bansal et al., 2015). The discovery is mainly responsibility to satisfy the requirements of the user with the focus on handling the supply and the demands of the computing resource patterns. The monitoring of the resource is enforced through the evaluation of the SLA violation along with the accounting mechanism like the computing services, storage service as well as the other service demands. SLA is able to easily evaluate the designs relating to the ICT risks management strategy which directs to handle the different purpose restrictions and the other factors. There have been variability periods which are set under the scope of different services for the consumers. The creation phase is mainly to focus on the service providers who match all the requirements of the service with the operation and the removal phases to handle the configurations of the information system. SLA has been able to properly define the disaster service providers along with locating the resources to satisfy the consumers and their requirements. The resources have been completely owned and operated with the different administrative policies through a scalability, dynamic change and the autonomous administration. There have been establishment of the agreement which is able to include the different aspects of the adaptive IT infrastructure with the computing system as well as the software failures. The SLA is based on providing a proper automation of the service providers which focus on the risks assessments and management. (Bansal et al., 2015). The major goal has been to provide the end users and the providers a supportive dynamic change which defines the possible negotiations. SLA in the cloud computing is able to provide a proper architecture to the SaaS layer with the user level applications, core middleware and the system level resources. The SLA based scheduling is based on maximising the profits of the service providers along with holding the support of the dependent services. The SLA management is able to provide the reliable services with the monitoring of all the violations which are set to support the one-dimensional patterns. Executive summary SLA management has been able to hold the software-as-a-service provider to minimise the costs as well as enlarging the marketing share which is able to accept the user requests with the minimisation of the SLA violations. The infrastructure needs to work on the administration control as well as the scheduling of the components which is able to easily allocate the resources. The cloud computing is important through the SaaS in DSI OSDS as there are no additional costs of the hardware or the setup costs which requires the subscription of the user. (Meena et al., 2016). There is a usage based on scalability as well as the cross device compatibility which can easily be accessed through the internet enabled devices. The applications are completely accessible from any resource and can be customised depending upon the accounting, invoicing and the sales. The business works on performing the tasks of the required software with a particular username and the password. This is able to handle th e access of the software in OSDS as well as holding the situations through the on-demand self-service, resource pooling and the rapid elasticity. The focus of the resource management has been through the measured device pattern which is able to access the standardised platforms through a proper setup and focus over the system requirements and the needs. The applications of SaaS are mainly able to handle the flexible payments with the higher scalability options to access services depending upon the demands of the people. The system is able to properly access the service level agreements along with holding the application programming interface. The SaaS technology applications are based on handling the Salesforce, Sap as well the billing. The enterprise level solutions are set to take hold of the different web based solutions with the increased scaling support. The cloud computing is based on handling the different features which are based on setting a complete understanding to assess the stations and work on the accelerating revolution within the IT system. Reference Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing.Journal of network and computer applications,34(1), 1-11. Choudhary, V., Zhang, Z. (2015). Research NotePatching the Cloud: The Impact of SaaS on Patching Strategy and the Timing of Software Release.Information Systems Research,26(4), 845-858. Jiang, W., Ding, D., Chen, Y., Cao, W., Liang, Y. (2015). Design of SaaS Layer Cloud Platform for Rapid Design of Series Products. Shiau, W. L., Chau, P. Y. (2015). Understanding behavioral intention to use a cloud computing classroom: A multiple model comparison approach.Information Management. Choudhary, S., Kurmi, A., Dubey, A. (2015). Monitoring Cloud Resources Based on SAAS Community using Cloud Bee Live Cloud Service. Calheiros, R. N., Masoumi, E., Ranjan, R., Buyya, R. (2015). Workload prediction using ARIMA model and its impact on cloud applications QoS.Cloud Computing, IEEE Transactions on,3(4), 449-458. Puthal, D., Sahoo, B. P. S., Mishra, S., Swain, S. (2015, January). Cloud computing features, issues, and challenges: a big picture. InComputational Intelligence and Networks (CINE), 2015 International Conference on(pp. 116-123). IEEE. Bansal, P., Sharma, D. M. (2015). DESIGNING ISSUES FOR E-LEARNING MODULES IN CLOUD PLATFORM.International Journal of Information Technology Computer Sciences Perspectives,2(3), 653-656. Meena, M., Bharadi, V. A. (2016). Hybrid Wavelet Based CBIR System Using Software as a Service (SaaS) Model on Public Cloud.Procedia Computer Science,79, 278-286.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.