Ask a question from expert

Ask now

(Doc) Cloud Computing: An Overview

13 Pages3840 Words143 Views
   

Added on  2021-06-16

(Doc) Cloud Computing: An Overview

   Added on 2021-06-16

BookmarkShareRelated Documents
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopaDalis ConsultantsActivity Based Working
(Doc) Cloud Computing: An Overview_1
Dalis ConsultantsTable of ContentsIntroduction...........................................................................................................................................2High-level System Description..............................................................................................................2Logical Representation of the Major Systems.......................................................................................2Network Topology Diagram..................................................................................................................3Use of Cloud Computing.......................................................................................................................4Approach to Internet Connectivity........................................................................................................5Hardware Procurement Policy...............................................................................................................6Purpose..............................................................................................................................................6Scope.................................................................................................................................................6Guidelines..........................................................................................................................................6List of Hardware to be procured........................................................................................................7Roles & Responsibilities....................................................................................................................8Software Applications Policy................................................................................................................8Purpose..............................................................................................................................................8Scope.................................................................................................................................................8Guidelines..........................................................................................................................................8List of Software Applications to be purchased..................................................................................9Roles & Responsibilities....................................................................................................................9Security Strategy.................................................................................................................................10Administrative Controls...................................................................................................................10Logical or Technical Controls.........................................................................................................10Physical Security Controls...............................................................................................................11References...........................................................................................................................................121
(Doc) Cloud Computing: An Overview_2
Dalis ConsultantsIntroductionDalis Consultants is a Wellington based small multi-media consultancy and is owned byDave & Lisa Evans. The company was set up in the year 2010 to provide consultancy to thesmall and medium scale companies for improvement in the online digital presence. With theexpansion of the business operations, it is now becoming difficult to manage the currenthuman and non-human resources. The company has recently won a contract with a majortourism agency and there will be four new staff members required to be engaged for theproject. The company has therefore decided to move to the town and the company will meetthe new opportunities through Activity Based Working (ABW) strategy. High-level System Description The high-level system will be based on the cloud architecture and network. There will be dataservers present on the cloud that will be synced with the virtual network. Gateway will beused to connect to the on-premises network of Dalis Consultants which will comprise of thevirtual machines. Each of these virtual machines network will be connected to the router andthese routers will be connected with a switch. The switch and the gateways will connect andcommunicate with each other to establish a connection between cloud and on-premisesnetwork. The virtual machines present on the on-premises network will include the hardwareas Laptops, Computer Systems, Personal Digital Assistants (PDAs), and Printers. The operating systems that will be deployed on the laptops and computer systems in DalisConsultants site will include Windows, Macintosh, Linus, and UNIX. There will be business applications as development tools, design tools, testing tools, Big Datatools, database engines, and implementation tools. Logical Representation of the Major SystemsThe database servers that will be used for the system will be Microsoft SQL Server, MySQL,and NoSQL databases, such as MongoDB. Apple Filing Protocol (APF) and Network FileSystem (NFS) are the file servers that will be involved in the system. Microsoft ExchangeServer is the exchange mail server that will be utilised in this case. The firewalls that will beused in this case will be packet filtering firewalls and application level gateways. Networking peripherals, such as routers, switches, and gateways will be involved. 2
(Doc) Cloud Computing: An Overview_3
Dalis ConsultantsNetwork Topology DiagramThe network architecture and diagram has been shown below. There are various cloudmodels that have been developed, such as Software as a Service (SaaS), Platform as a Service(PaaS), and Infrastructure as a Service (IaaS). The model that will be used in this case will beSoftware as a Service (SaaS) (Kulkarni, 2012). There will be data servers present on thecloud that will be synced with the virtual network. Gateway will be used to connect to the on-premises network of Dalis Consultants which will comprise of the virtual machines. Each ofthese virtual machines network will be connected to the router and these routers will beconnected with a switch. The switch and the gateways will connect and communicate witheach other to establish a connection between cloud and on-premises network. The virtualmachines present on the on-premises network will include the hardware as Laptops,Computer Systems, Personal Digital Assistants (PDAs), and Printers. 3
(Doc) Cloud Computing: An Overview_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing Virtualizations
|15
|1547
|81

Virtual Machine Configuration
|7
|991
|236

Advantages and Disadvantages of On-Premise, Azure, and AWS Systems
|15
|1530
|65

Network Review for SEC 6040: Web and Data Security
|5
|753
|488

Project Report on IT Infrastructure in an Organization
|22
|5978
|247

VIRTUAL PRIVATE NETWORK
|10
|1797
|334