NETWORKING AND SCOM Networking and Operations Manager SCOM Name
VerifiedAdded on 2023/04/07
|26
|3845
|192
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORKING AND SCOM
Networking and Operations Manager SCOM
Name of the Student
Name of the University
Author Note
Networking and Operations Manager SCOM
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
NETWORKING AND SCOM
Question 1: Operations Manager architecture
1. Operations Manager architecture and system centre components
System Centre Operations Manager refer to the monitoring and reporting tools that
performs checking statuses of the different objects that presently exist in the environment.
Operations manager itself is one of the several components of System Centre Operations
Manager (SCOM) which enables one to monitor the devices, operations and services for
multiple computers through a single console (Tang & Todo, 2013). Other components of
system centre are configuration manager, virtual machine manager, operations manager,
data protection manager, orchestrator, service manager, endpoint protection and app
controller. The operations manager components include management server, gateway
server, console, collector, operations console, operational data, warehouse, ACS database
and reporting server.
2. User profiles in securing access to Operations Manager
The different user profiles which can effectively secure accesses to operations
manager are the following:
Administrator: Have all the privileges that are found in Operations Manager. It must be
noted that only active directory security groups are to be added to Administrator roles.
Advanced Operator: Include privileges specifically chosen for users requiring access to
limited adjustments towards monitoring configuration along with privileges of the
Operator
Application Monitoring Operator: Include privileges selected for users who require access
for Application Diagnostics (Kumar, Raheja & Sodhi, 2013). Application Monitoring
NETWORKING AND SCOM
Question 1: Operations Manager architecture
1. Operations Manager architecture and system centre components
System Centre Operations Manager refer to the monitoring and reporting tools that
performs checking statuses of the different objects that presently exist in the environment.
Operations manager itself is one of the several components of System Centre Operations
Manager (SCOM) which enables one to monitor the devices, operations and services for
multiple computers through a single console (Tang & Todo, 2013). Other components of
system centre are configuration manager, virtual machine manager, operations manager,
data protection manager, orchestrator, service manager, endpoint protection and app
controller. The operations manager components include management server, gateway
server, console, collector, operations console, operational data, warehouse, ACS database
and reporting server.
2. User profiles in securing access to Operations Manager
The different user profiles which can effectively secure accesses to operations
manager are the following:
Administrator: Have all the privileges that are found in Operations Manager. It must be
noted that only active directory security groups are to be added to Administrator roles.
Advanced Operator: Include privileges specifically chosen for users requiring access to
limited adjustments towards monitoring configuration along with privileges of the
Operator
Application Monitoring Operator: Include privileges selected for users who require access
for Application Diagnostics (Kumar, Raheja & Sodhi, 2013). Application Monitoring
2
NETWORKING AND SCOM
Operator is responsible for granting members the ability to view Application Monitoring
events in web console of Application Diagnostics.
Author: Include privileges selected for authoring of configurations for monitoring
purposes. They grant members the abilities to create, delete and edit monitoring
configurations like rules, tasks, views and monitors for specific or group of targets in
configured scope.
Operator: Include privileges selected for users requiring access to views, tasks and alerts.
Responsible for granting members abilities of accessing views, interacting with alerts and
running tasks as per the configured scopes.
Read-only Operator: Include privileges chosen for users that require read-only access for
views and alerts. Responsible for granting members abilities of accessing views and
viewing alerts as per the configured scopes.
Report Operator: Include privileges chosen for users that need to access Reports.
Responsible for granting members, the abilities of viewing reports as per configured
scopes.
Report Security Administrator: Enables integrating user roles of Operations Manager with
security of SQL Server Reporting Services (SSRS) (Shiau, & Hsiao, 2013).
Question 2: Operations Manager Agent
1. Purpose of Agents in Operations Manager
Agents in System Centre Operations Manager are services that are installed in
computers that look for proactively collecting information for reporting and analysis and
configuration data, measure health states of monitored objects like SQL databases or
logical disks as also executing tasks on demand in response to conditions or by the
NETWORKING AND SCOM
Operator is responsible for granting members the ability to view Application Monitoring
events in web console of Application Diagnostics.
Author: Include privileges selected for authoring of configurations for monitoring
purposes. They grant members the abilities to create, delete and edit monitoring
configurations like rules, tasks, views and monitors for specific or group of targets in
configured scope.
Operator: Include privileges selected for users requiring access to views, tasks and alerts.
Responsible for granting members abilities of accessing views, interacting with alerts and
running tasks as per the configured scopes.
Read-only Operator: Include privileges chosen for users that require read-only access for
views and alerts. Responsible for granting members abilities of accessing views and
viewing alerts as per the configured scopes.
Report Operator: Include privileges chosen for users that need to access Reports.
Responsible for granting members, the abilities of viewing reports as per configured
scopes.
Report Security Administrator: Enables integrating user roles of Operations Manager with
security of SQL Server Reporting Services (SSRS) (Shiau, & Hsiao, 2013).
Question 2: Operations Manager Agent
1. Purpose of Agents in Operations Manager
Agents in System Centre Operations Manager are services that are installed in
computers that look for proactively collecting information for reporting and analysis and
configuration data, measure health states of monitored objects like SQL databases or
logical disks as also executing tasks on demand in response to conditions or by the
3
NETWORKING AND SCOM
operator. Operations Manager is allowed to monitor Linux, UNIX and Windows
operating systems with components of IT services installed like a website or Active
Directory domain controller.
2. Methods for deploying agents in Operations Manager
One of the following three methods are used to deploy System Centre Operations
Manager Agents. Mostly a combination of the below methods are used for installing
the different sets of computers as required.
Discovery of multiple agents followed by installation from Operations
console - Being the most common installation form, here a management
server should be connecting the computer using RPC while either Action
Account of Management Server or other credentials provided should have
administrative access on target computer
Included with installation image – A manual order of installation for a given
base image which is used for preparing other computers. Here, integration of
Active Directory might be utilized for automatically assigning a given
computer to a specific management server upon initial start-up.
Manual installation – Used only when the concerned agent is not installable
by any of the above methods. One example is when RPC or remote procedure
calls are not available due to a firewall (Adamson, & Williams, 2016). The
setup is either deployed using existing software distribution tools or run
manually on agents.
3. Use of Operations console in deploying Agents
Agents, installed using Discovery Wizard are manageable from Operations
console like updating agent versions, application of patches as well as configuration
NETWORKING AND SCOM
operator. Operations Manager is allowed to monitor Linux, UNIX and Windows
operating systems with components of IT services installed like a website or Active
Directory domain controller.
2. Methods for deploying agents in Operations Manager
One of the following three methods are used to deploy System Centre Operations
Manager Agents. Mostly a combination of the below methods are used for installing
the different sets of computers as required.
Discovery of multiple agents followed by installation from Operations
console - Being the most common installation form, here a management
server should be connecting the computer using RPC while either Action
Account of Management Server or other credentials provided should have
administrative access on target computer
Included with installation image – A manual order of installation for a given
base image which is used for preparing other computers. Here, integration of
Active Directory might be utilized for automatically assigning a given
computer to a specific management server upon initial start-up.
Manual installation – Used only when the concerned agent is not installable
by any of the above methods. One example is when RPC or remote procedure
calls are not available due to a firewall (Adamson, & Williams, 2016). The
setup is either deployed using existing software distribution tools or run
manually on agents.
3. Use of Operations console in deploying Agents
Agents, installed using Discovery Wizard are manageable from Operations
console like updating agent versions, application of patches as well as configuration
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
NETWORKING AND SCOM
of the management server which the agent is reporting to. For agents installed from
Operations console, integration of active directory is disabled but enabled for
manually installed agents by MOMAgent.msi.
Question 3: Management Pack templates in custom monitoring
The management pack templates helps in building custom user monitor types to
perform custom monitoring. To create custom application monitors in SCOM is usually time
consuming and pain staking task. Third party monitors for monitoring of SCOM servers
provide easy to use monitors that are custom made to monitor any home grown application.
With the help of WMI, SNMP, JMX and VMware protocols, performance metrics can be
automatically discovered as well as monitored (Shabaitah, 2014). Baseline values for
receiving custom alerts and performance counters can be easily set. Built in feature like
AppInsight of leading custom application monitors like SolarWinds Server and Application
Monitor can help users in monitoring of several troubleshooting processes of SQL Server, IIS
and Microsoft Exchange like –
Exchanging mail queues, storage issues, mailbox database growth, critical processes,
events and services.
Contention of resources in SQL Server as also status, capacity and inefficient
database queries
Response time, Resource consumption, website availability and application pools
running in IIS
For the role of authoring in Operations Manager, a host of management pack templates exist
that act as ways to build functionalities. They can be
.Net Application Performance monitoring
OLE DB Data Source
NETWORKING AND SCOM
of the management server which the agent is reporting to. For agents installed from
Operations console, integration of active directory is disabled but enabled for
manually installed agents by MOMAgent.msi.
Question 3: Management Pack templates in custom monitoring
The management pack templates helps in building custom user monitor types to
perform custom monitoring. To create custom application monitors in SCOM is usually time
consuming and pain staking task. Third party monitors for monitoring of SCOM servers
provide easy to use monitors that are custom made to monitor any home grown application.
With the help of WMI, SNMP, JMX and VMware protocols, performance metrics can be
automatically discovered as well as monitored (Shabaitah, 2014). Baseline values for
receiving custom alerts and performance counters can be easily set. Built in feature like
AppInsight of leading custom application monitors like SolarWinds Server and Application
Monitor can help users in monitoring of several troubleshooting processes of SQL Server, IIS
and Microsoft Exchange like –
Exchanging mail queues, storage issues, mailbox database growth, critical processes,
events and services.
Contention of resources in SQL Server as also status, capacity and inefficient
database queries
Response time, Resource consumption, website availability and application pools
running in IIS
For the role of authoring in Operations Manager, a host of management pack templates exist
that act as ways to build functionalities. They can be
.Net Application Performance monitoring
OLE DB Data Source
5
NETWORKING AND SCOM
Power Consumption
Process Monitoring
SQL Azure
TCP Port
TFS Work Item Synchronization
UNIX/Linux Log File Monitoring
UNIX/Linux Process Monitoring
Visual Studio Web Test Monitoring
Web Application Availability Monitoring
Web Application Transaction Monitoring
Windows Azure Application
Windows Service
Question 4: Infrastructure of Operations Manager
For monitoring cloud-based applications, SCOM monitoring tools do not just provide
the capability of viewing all available on premises machines, they also help in viewing all the
virtual machines along with all of the cloud infrastructure (Nedelcu, 2015). The Operations
Manager infrastructure includes
Operations Manager
Private Cloud
Content Data Network
The Operations Monitor enables monitoring of health states of both the private cloud and
content data network and depends on where the service or application is running.
According to Ellis, (2015), for this process to run successfully, Azure Management
Pack requires the following configurations:
NETWORKING AND SCOM
Power Consumption
Process Monitoring
SQL Azure
TCP Port
TFS Work Item Synchronization
UNIX/Linux Log File Monitoring
UNIX/Linux Process Monitoring
Visual Studio Web Test Monitoring
Web Application Availability Monitoring
Web Application Transaction Monitoring
Windows Azure Application
Windows Service
Question 4: Infrastructure of Operations Manager
For monitoring cloud-based applications, SCOM monitoring tools do not just provide
the capability of viewing all available on premises machines, they also help in viewing all the
virtual machines along with all of the cloud infrastructure (Nedelcu, 2015). The Operations
Manager infrastructure includes
Operations Manager
Private Cloud
Content Data Network
The Operations Monitor enables monitoring of health states of both the private cloud and
content data network and depends on where the service or application is running.
According to Ellis, (2015), for this process to run successfully, Azure Management
Pack requires the following configurations:
6
NETWORKING AND SCOM
Operating System: Windows Server 2008 R2 SP1, Windows Server 2008 Service Pack 2 –
Operations Manager 2012 SP1 or later environment must be installed.
Internet Connection: At the minimum one system in the pool of servers must have Internet
access so communications with Microsoft Azure can occur.
Windows Azure Diagnostics: Must be ensured that this is enabled.
Forward Diagnostic Data: Configuration of Windows Azure Diagnostics should be conducted
for forwarding diagnostic data towards Windows Azure storage.
After successful configuring of the Azure Management Pack, System Centre
Management Packs needs to be installed. Running the file “System Centre Management Pack
for Windows Azure.msi” will save the respective management packs to the SCOM server.
The two different management pack to be imported are:
1. Microsoft.SystemCentre.WindowsAzure.mpb
2. Microsoft.SystemCentre.WindowsAzure.SLA.mpb
Question 5: Network Infrastructure and monitoring methods
1. As there is no management pack for implementing what is monitored, one of it has to be
created through the procedure of selecting the option of “Management Pack File”.
2. Under the console of the operations, the “Authoring” workspace is to be selected.
3. Then from the “Distributed Applications”, the new distributed application is to be created.
4. From the Name box, the name of the distributed application is to be created.
5. Under the Template option, the template to select the starting point of the distribution is to
be selected.
6. After that from the management pack created initially is to be selected and entered.
NETWORKING AND SCOM
Operating System: Windows Server 2008 R2 SP1, Windows Server 2008 Service Pack 2 –
Operations Manager 2012 SP1 or later environment must be installed.
Internet Connection: At the minimum one system in the pool of servers must have Internet
access so communications with Microsoft Azure can occur.
Windows Azure Diagnostics: Must be ensured that this is enabled.
Forward Diagnostic Data: Configuration of Windows Azure Diagnostics should be conducted
for forwarding diagnostic data towards Windows Azure storage.
After successful configuring of the Azure Management Pack, System Centre
Management Packs needs to be installed. Running the file “System Centre Management Pack
for Windows Azure.msi” will save the respective management packs to the SCOM server.
The two different management pack to be imported are:
1. Microsoft.SystemCentre.WindowsAzure.mpb
2. Microsoft.SystemCentre.WindowsAzure.SLA.mpb
Question 5: Network Infrastructure and monitoring methods
1. As there is no management pack for implementing what is monitored, one of it has to be
created through the procedure of selecting the option of “Management Pack File”.
2. Under the console of the operations, the “Authoring” workspace is to be selected.
3. Then from the “Distributed Applications”, the new distributed application is to be created.
4. From the Name box, the name of the distributed application is to be created.
5. Under the Template option, the template to select the starting point of the distribution is to
be selected.
6. After that from the management pack created initially is to be selected and entered.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
NETWORKING AND SCOM
Question 6: Application Performance Monitoring (APM)
The application performance of monitoring APM has been striving in detecting and
diagnosing the performance of applications:
The tools of monitoring application performances are helpful to provide administrators with
the information needed to seek, isolate and resolve the issues. This can adversely affect the
performance of the application. The tools of APM can track the performance in due time
(Willnecker et al., 2015). Further, it is helpful for IT professionals to know the impact that
various dependencies. This includes that the systems are able to depend properly on the
functions having on the performance of the application. Moreover, the IT professional can
utilize the metrics of performances. This can be gathered by the APOM tool from a specific
application and numerous applications over a similar network. Thus, one determines the ideal
reason behind the issue. Apart from this, the information collected by the APM tool involves
the usage of the CPU, demands of demands, bandwidth consumption and data throughput.
NETWORKING AND SCOM
Question 6: Application Performance Monitoring (APM)
The application performance of monitoring APM has been striving in detecting and
diagnosing the performance of applications:
The tools of monitoring application performances are helpful to provide administrators with
the information needed to seek, isolate and resolve the issues. This can adversely affect the
performance of the application. The tools of APM can track the performance in due time
(Willnecker et al., 2015). Further, it is helpful for IT professionals to know the impact that
various dependencies. This includes that the systems are able to depend properly on the
functions having on the performance of the application. Moreover, the IT professional can
utilize the metrics of performances. This can be gathered by the APOM tool from a specific
application and numerous applications over a similar network. Thus, one determines the ideal
reason behind the issue. Apart from this, the information collected by the APM tool involves
the usage of the CPU, demands of demands, bandwidth consumption and data throughput.
8
NETWORKING AND SCOM
It must be reminded that the maximum of the tools of APM has included the capability to
assimilate the data coming from various disparate controlling silos. Further, they can be
correlated through various log files, statistics of hardware and throughputs of network usage
reports. Further, the data is generally shown on the dashboard making that simpler for the
professionals of IT in reading the logs of data. This is helpful to same them in performing the
error-prone and memory dependent manual correlations and examinations.
Again, the APM tools have been quantifying and gathering data from every aspect playing
roles to the performance of the application. In this foundation, the tools of application
performance monitoring have been applied has been hosting platform, memory demands,
mining information and process usages, speeds of reading or writing disks. In this way they
can track the uses of a processor, comprising of various operations every second of the
performances of the CPU servers. As the usage of memory is higher, the issues with
application performance rise. Thus, the APM can monitor the amount of short-term data
stored by CPU (Vlahogianni, Karlaftis & Golias, 2014).
NETWORKING AND SCOM
It must be reminded that the maximum of the tools of APM has included the capability to
assimilate the data coming from various disparate controlling silos. Further, they can be
correlated through various log files, statistics of hardware and throughputs of network usage
reports. Further, the data is generally shown on the dashboard making that simpler for the
professionals of IT in reading the logs of data. This is helpful to same them in performing the
error-prone and memory dependent manual correlations and examinations.
Again, the APM tools have been quantifying and gathering data from every aspect playing
roles to the performance of the application. In this foundation, the tools of application
performance monitoring have been applied has been hosting platform, memory demands,
mining information and process usages, speeds of reading or writing disks. In this way they
can track the uses of a processor, comprising of various operations every second of the
performances of the CPU servers. As the usage of memory is higher, the issues with
application performance rise. Thus, the APM can monitor the amount of short-term data
stored by CPU (Vlahogianni, Karlaftis & Golias, 2014).
9
NETWORKING AND SCOM
Question 7: Application Performance in Operations Manager
1. Server-side monitoring:
First of all, the app metrics can be used. There are various tools where the app metrics and
servers can call the APM (Ahmed et al., 2016). They reveal various requests that the
application gets and potentiality what URLs are slow. As they have never been coding the
level of profiling, they are unable to reveal the reason. Then there is code level; of
performances. This includes the Dynatrace, AppDynamics, New Relic, and Stackify Retrace.
They are based on transaction tracing and code profiling. Further, network-based monitoring
can be deployed. The Extrahop has been using APM as per the capability of measuring the
performance of an application on the basis of network traffic (Mousa et al., 2015). Thus,
there is an overall product category known as NPM focussing in this kind of solutions.
NETWORKING AND SCOM
Question 7: Application Performance in Operations Manager
1. Server-side monitoring:
First of all, the app metrics can be used. There are various tools where the app metrics and
servers can call the APM (Ahmed et al., 2016). They reveal various requests that the
application gets and potentiality what URLs are slow. As they have never been coding the
level of profiling, they are unable to reveal the reason. Then there is code level; of
performances. This includes the Dynatrace, AppDynamics, New Relic, and Stackify Retrace.
They are based on transaction tracing and code profiling. Further, network-based monitoring
can be deployed. The Extrahop has been using APM as per the capability of measuring the
performance of an application on the basis of network traffic (Mousa et al., 2015). Thus,
there is an overall product category known as NPM focussing in this kind of solutions.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
NETWORKING AND SCOM
NETWORKING AND SCOM
11
NETWORKING AND SCOM
Monitoring Windows Server 2012
2. Update the environment:
This can be done with customizing the default behaviours by adjusting the settings of
configuration. They are dependent on the agents, customizing settings in various locations
(Hernantes, Gallardo & Serrano, 2015). They have been the configuration of various files,
environment variables, and additional agent-specific scopes.
Question 8: Understanding service manager configuration
1. For creating the new group, the “Library” and Groups” are to be selected. After creating
the group wizards. In the description text box the description of the group. Within the
management pack, it is to be assured that the unsealed one is chosen. Further, over the
NETWORKING AND SCOM
Monitoring Windows Server 2012
2. Update the environment:
This can be done with customizing the default behaviours by adjusting the settings of
configuration. They are dependent on the agents, customizing settings in various locations
(Hernantes, Gallardo & Serrano, 2015). They have been the configuration of various files,
environment variables, and additional agent-specific scopes.
Question 8: Understanding service manager configuration
1. For creating the new group, the “Library” and Groups” are to be selected. After creating
the group wizards. In the description text box the description of the group. Within the
management pack, it is to be assured that the unsealed one is chosen. Further, over the
12
NETWORKING AND SCOM
dynamic member page, dynamic members are to be created. On the subgroups page, the add
option is to be created. Then a particular group is to be selected that is needed as the
subgroup of the group. Under the ‘excluded members’ page, particular configuration items
are to be selected that is needed to be excluded from the group. Lastly, from the completion
page, it is to be assured that the proper confirmation message is received.
2. It includes the steps of typing the name under the box of Queue name. Under the
management pack list, the unsealed management pack is the place where the new queue
definition is to be stored. Within the criteria that are used for filtering the work items for that
queue, the items meeting the particular criteria is included in the queue. For instance, the
classification category for the available properties sector is to be selected. Under the list, the
criteria are to be added and on the summary page the queue is to be selected and from the
completion page, it is to be closed.
NETWORKING AND SCOM
dynamic member page, dynamic members are to be created. On the subgroups page, the add
option is to be created. Then a particular group is to be selected that is needed as the
subgroup of the group. Under the ‘excluded members’ page, particular configuration items
are to be selected that is needed to be excluded from the group. Lastly, from the completion
page, it is to be assured that the proper confirmation message is received.
2. It includes the steps of typing the name under the box of Queue name. Under the
management pack list, the unsealed management pack is the place where the new queue
definition is to be stored. Within the criteria that are used for filtering the work items for that
queue, the items meeting the particular criteria is included in the queue. For instance, the
classification category for the available properties sector is to be selected. Under the list, the
criteria are to be added and on the summary page the queue is to be selected and from the
completion page, it is to be closed.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
NETWORKING AND SCOM
Question 9: Overview of problem management and System Centre
NETWORKING AND SCOM
Question 9: Overview of problem management and System Centre
14
NETWORKING AND SCOM
NETWORKING AND SCOM
15
NETWORKING AND SCOM
NETWORKING AND SCOM
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16
NETWORKING AND SCOM
1. Under the creating alert resolution state, from the operations console the option
administration is to be clicked. Then the options named “settings”, “alerts”, “alert resolution
states” and “add alert resolution state” are to be selected.
2. Regarding deploying integration pack, the implementation of IP to the client and action
server is to be selected. After selecting the integration pack and name of the runbook servers
are to be selected. Then, the extra additional runbook servers and the machined running the
specific run book are to be added continuously. Under the installation options, the various
NETWORKING AND SCOM
1. Under the creating alert resolution state, from the operations console the option
administration is to be clicked. Then the options named “settings”, “alerts”, “alert resolution
states” and “add alert resolution state” are to be selected.
2. Regarding deploying integration pack, the implementation of IP to the client and action
server is to be selected. After selecting the integration pack and name of the runbook servers
are to be selected. Then, the extra additional runbook servers and the machined running the
specific run book are to be added continuously. Under the installation options, the various
17
NETWORKING AND SCOM
settings are to be configured. For choosing the time of deployment the integration pack the
schedule installation is to be selected. Further, every running runbook are to be stopped prior
to installing the pack of integration. The integration packs are to be installed instead of
stopping the running the runbooks for integration pack instead of stopping the running of
runbooks. Lastly, as the integration packs are implemented, the log entries dialogue box has
been displaying the message of confirmation.
Question 10:
NETWORKING AND SCOM
settings are to be configured. For choosing the time of deployment the integration pack the
schedule installation is to be selected. Further, every running runbook are to be stopped prior
to installing the pack of integration. The integration packs are to be installed instead of
stopping the running the runbooks for integration pack instead of stopping the running of
runbooks. Lastly, as the integration packs are implemented, the log entries dialogue box has
been displaying the message of confirmation.
Question 10:
18
NETWORKING AND SCOM
1. Benefits from secure hybrid cloud solution:
The hybrid cloud empowers the business in securing even the costliest data (Garrison et al.,
2015). But the most important benefits come from providing standardised security in cloud
storage which is a competitive advantage.
2. Risks and issue in deploying hybrid cloud:
The issues are with poor execution of network, protocols of security and management (Chou,
2015). However, the greatest barrier is the seamless hybrid cloud is of placing significant
strains on internal as well as external networks difficulties in securing communications
between clouds.
3. Explaining how security features are vital in the hybrid cloud:
They are vital for personal users and business. They need to understand what data is secured
and safe and the business comprises of legal obligations for keeping the client data safe
(Arockiam & Monikandan, 2013). However, some of the areas consist of more security and
privacy rules regarding data storage.
NETWORKING AND SCOM
1. Benefits from secure hybrid cloud solution:
The hybrid cloud empowers the business in securing even the costliest data (Garrison et al.,
2015). But the most important benefits come from providing standardised security in cloud
storage which is a competitive advantage.
2. Risks and issue in deploying hybrid cloud:
The issues are with poor execution of network, protocols of security and management (Chou,
2015). However, the greatest barrier is the seamless hybrid cloud is of placing significant
strains on internal as well as external networks difficulties in securing communications
between clouds.
3. Explaining how security features are vital in the hybrid cloud:
They are vital for personal users and business. They need to understand what data is secured
and safe and the business comprises of legal obligations for keeping the client data safe
(Arockiam & Monikandan, 2013). However, some of the areas consist of more security and
privacy rules regarding data storage.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
NETWORKING AND SCOM
Question 11: Cloud Bursting and its impact
The model of deploying applications by which an application is run privately in data
centre or cloud which can burst to public cloud when spikes in computing capacity demands
are observed is called cloud bursting (Xu, Pang & Fu, 2013). The advantage of this hybrid
deployment of cloud is that additional compute resources are only paid by the company when
they are actually needed (Guo et al., 2014). Cloud bursting is recommended by experts for
gaining higher performances in a non-critical application dealing with information which is
non-sensitive in nature. Deployment of applications can first be done locally and then burst
into cloud when the demand peaks or they can be transferred into the public cloud for freeing
up of local resources to serve critical business applications. The cloud bursting concepts work
best for those applications which do not depend on infrastructures for complex application
delivery infrastructure or in integrating with other components, applications and internal
systems of the data centre.
Figure 1: Bursting Web Traffic
NETWORKING AND SCOM
Question 11: Cloud Bursting and its impact
The model of deploying applications by which an application is run privately in data
centre or cloud which can burst to public cloud when spikes in computing capacity demands
are observed is called cloud bursting (Xu, Pang & Fu, 2013). The advantage of this hybrid
deployment of cloud is that additional compute resources are only paid by the company when
they are actually needed (Guo et al., 2014). Cloud bursting is recommended by experts for
gaining higher performances in a non-critical application dealing with information which is
non-sensitive in nature. Deployment of applications can first be done locally and then burst
into cloud when the demand peaks or they can be transferred into the public cloud for freeing
up of local resources to serve critical business applications. The cloud bursting concepts work
best for those applications which do not depend on infrastructures for complex application
delivery infrastructure or in integrating with other components, applications and internal
systems of the data centre.
Figure 1: Bursting Web Traffic
20
NETWORKING AND SCOM
(Source: natishalom.typepad.com)
For any organization, before considering cloud bursting it is extremely
important to consider security aspects along with regulatory compliances.
Figure 2: Cloud bursting architecture
(Source: rightscale.com)
The above cloud bursting architecture ensures that bandwidth and communication
latencies between two different clouds are neither negatively affecting the user’s experience
nor the application (Huedo et al., 2017).
Three main cloud bursting challenges can be:
1. Create and manage configurations for different clouds
2. Create and manage low latency communication path between clouds
3. Secure communications between clouds
NETWORKING AND SCOM
(Source: natishalom.typepad.com)
For any organization, before considering cloud bursting it is extremely
important to consider security aspects along with regulatory compliances.
Figure 2: Cloud bursting architecture
(Source: rightscale.com)
The above cloud bursting architecture ensures that bandwidth and communication
latencies between two different clouds are neither negatively affecting the user’s experience
nor the application (Huedo et al., 2017).
Three main cloud bursting challenges can be:
1. Create and manage configurations for different clouds
2. Create and manage low latency communication path between clouds
3. Secure communications between clouds
21
NETWORKING AND SCOM
Other related issues lingering with cloud computing come from potential incompatibilities
among the different set of environments as also limited availability concerning management
tools. Service providers of cloud computing along with virtualization vendors have worked
on tools for sending workloads in cloud for managing the hybrid environments however they
mostly require all the associated environments to be derived from the same underlying
platform (Azodolmolky, Wieder & Yahyapour, 2013). Apart from that cloud bursting is
observed to place significant strains on internal as well as external networks leaving very
little headroom for supporting highly dynamic workflows.
Regardless, this remains the journey that most of today’s enterprises face as they
confront the rising service driven economy and the harsh realities of digital transformation.
Data users, today have very little patience for service interruptions, latency or other technical
excuses that are preventing them from getting what is desired but still traditional data centre
infrastructures are no longer flexible enough to support the additional functionalities although
cloud is not always representing the most budget friendly solution and a seamless,
comprehensive, distributed architecture still remains work in progress.
Question 12: Key Advantages of reliably connecting cloud across the public
internet
As of Slawinski, (2017), five of the key advantages of connecting cloud across the
public internet can be the following:
New Capabilities
Big Data tools and techniques like analytics tools, massively scalable NoSQL and data
warehousing are changing the shape of businesses worldwide (Assunção et al., 2015). As a
result, several companies have been successful in gaining competitive advantage.
NETWORKING AND SCOM
Other related issues lingering with cloud computing come from potential incompatibilities
among the different set of environments as also limited availability concerning management
tools. Service providers of cloud computing along with virtualization vendors have worked
on tools for sending workloads in cloud for managing the hybrid environments however they
mostly require all the associated environments to be derived from the same underlying
platform (Azodolmolky, Wieder & Yahyapour, 2013). Apart from that cloud bursting is
observed to place significant strains on internal as well as external networks leaving very
little headroom for supporting highly dynamic workflows.
Regardless, this remains the journey that most of today’s enterprises face as they
confront the rising service driven economy and the harsh realities of digital transformation.
Data users, today have very little patience for service interruptions, latency or other technical
excuses that are preventing them from getting what is desired but still traditional data centre
infrastructures are no longer flexible enough to support the additional functionalities although
cloud is not always representing the most budget friendly solution and a seamless,
comprehensive, distributed architecture still remains work in progress.
Question 12: Key Advantages of reliably connecting cloud across the public
internet
As of Slawinski, (2017), five of the key advantages of connecting cloud across the
public internet can be the following:
New Capabilities
Big Data tools and techniques like analytics tools, massively scalable NoSQL and data
warehousing are changing the shape of businesses worldwide (Assunção et al., 2015). As a
result, several companies have been successful in gaining competitive advantage.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22
NETWORKING AND SCOM
Machine learning is helping in major breakthroughs in vision, voice, speech enablement as
the world enters the early days of practical implementation of this technology in daily lives.
Near Future, Hybrid Cloud
Adoption of multiple cloud providers – A fail safe solution as there is always another
provider to rely upon if needed providing the businesses greater than 1 hedge regarding SLA
and pricing (Dib, Parlavantzas & Morin, 2014). Mix of on-prem and cloud resources are also
available.
Regulation, compliance and security characteristics prefer storing data in data centres
Analytic Affinity of the Cloud
Running thousands of processing cores on thousands of jobs (actuarial, financial, genomic,
scientific)
On demand running of processing cores
Enable processing cores and jobs with lines of code or scripts or using existing CM
infrastructure
When finished, few more lines of code can be executed to do a tear down if wanted
Relentless ability of repeating the process
Processing power destined to propel Cloud Computing
High core count applications like –
Computationally intensive read-heavy workloads
Batch and burst usage model for long running simulations
Risk analysis through hedge funds, portfolio management, actuarial, credit
Logarithmic analysis
NETWORKING AND SCOM
Machine learning is helping in major breakthroughs in vision, voice, speech enablement as
the world enters the early days of practical implementation of this technology in daily lives.
Near Future, Hybrid Cloud
Adoption of multiple cloud providers – A fail safe solution as there is always another
provider to rely upon if needed providing the businesses greater than 1 hedge regarding SLA
and pricing (Dib, Parlavantzas & Morin, 2014). Mix of on-prem and cloud resources are also
available.
Regulation, compliance and security characteristics prefer storing data in data centres
Analytic Affinity of the Cloud
Running thousands of processing cores on thousands of jobs (actuarial, financial, genomic,
scientific)
On demand running of processing cores
Enable processing cores and jobs with lines of code or scripts or using existing CM
infrastructure
When finished, few more lines of code can be executed to do a tear down if wanted
Relentless ability of repeating the process
Processing power destined to propel Cloud Computing
High core count applications like –
Computationally intensive read-heavy workloads
Batch and burst usage model for long running simulations
Risk analysis through hedge funds, portfolio management, actuarial, credit
Logarithmic analysis
23
NETWORKING AND SCOM
References
Adamson, A., & Williams, N. (2016). Remote Procedure Call (RPC) Security Version 3 (No.
RFC 7861).
Ahmed, T. M., Bezemer, C. P., Chen, T. H., Hassan, A. E., & Shang, W. (2016, May).
Studying the effectiveness of application performance management (APM) tools for
detecting performance regressions for web applications: an experience report. In
Proceedings of the 13th International Conference on Mining Software Repositories
(pp. 1-12). ACM.
Arockiam, L., & Monikandan, S. (2013). Data security and privacy in cloud storage using
hybrid symmetric encryption algorithm. International Journal of Advanced Research
in Computer and Communication Engineering, 2(8), 3064-3070.
Assunção, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., & Buyya, R. (2015). Big Data
computing and clouds: Trends and future directions. Journal of Parallel and
Distributed Computing, 79, 3-15.
Azodolmolky, S., Wieder, P., & Yahyapour, R. (2013). Cloud computing networking:
Challenges and opportunities for innovations. IEEE Communications Magazine,
51(7), 54-62.
Chou, D. C. (2015). Cloud computing risk and audit issues. Computer Standards &
Interfaces, 42, 137-142.
Dib, D., Parlavantzas, N., & Morin, C. (2014, May). SLA-based profit optimization in cloud
bursting PaaS. In 2014 14th IEEE/ACM International Symposium on Cluster, Cloud
and Grid Computing (pp. 141-150). IEEE.
Ellis, G. (2015). Microsoft Azure IaaS Essentials. Packt Publishing Ltd.
NETWORKING AND SCOM
References
Adamson, A., & Williams, N. (2016). Remote Procedure Call (RPC) Security Version 3 (No.
RFC 7861).
Ahmed, T. M., Bezemer, C. P., Chen, T. H., Hassan, A. E., & Shang, W. (2016, May).
Studying the effectiveness of application performance management (APM) tools for
detecting performance regressions for web applications: an experience report. In
Proceedings of the 13th International Conference on Mining Software Repositories
(pp. 1-12). ACM.
Arockiam, L., & Monikandan, S. (2013). Data security and privacy in cloud storage using
hybrid symmetric encryption algorithm. International Journal of Advanced Research
in Computer and Communication Engineering, 2(8), 3064-3070.
Assunção, M. D., Calheiros, R. N., Bianchi, S., Netto, M. A., & Buyya, R. (2015). Big Data
computing and clouds: Trends and future directions. Journal of Parallel and
Distributed Computing, 79, 3-15.
Azodolmolky, S., Wieder, P., & Yahyapour, R. (2013). Cloud computing networking:
Challenges and opportunities for innovations. IEEE Communications Magazine,
51(7), 54-62.
Chou, D. C. (2015). Cloud computing risk and audit issues. Computer Standards &
Interfaces, 42, 137-142.
Dib, D., Parlavantzas, N., & Morin, C. (2014, May). SLA-based profit optimization in cloud
bursting PaaS. In 2014 14th IEEE/ACM International Symposium on Cluster, Cloud
and Grid Computing (pp. 141-150). IEEE.
Ellis, G. (2015). Microsoft Azure IaaS Essentials. Packt Publishing Ltd.
24
NETWORKING AND SCOM
Garrison, Gary, Robin L. Wakefield, and Sanghyun Kim. "The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations." International Journal of Information Management 35, no.
4 (2015): 377-393.
Guo, T., Sharma, U., Shenoy, P., Wood, T., & Sahu, S. (2014). Cost-aware cloud bursting for
enterprise applications. ACM Transactions on Internet Technology (TOIT), 13(3), 10.
Hernantes, J., Gallardo, G., & Serrano, N. (2015). IT infrastructure-monitoring tools. IEEE
Software, 32(4), 88-93.
Huedo, E., Montero, R. S., Moreno, R., Llorente, I. M., Levin, A., & Massonet, P. (2017).
Interoperable federated cloud networking. IEEE Internet Computing, 21(5), 54-59.
Kumar, V., Raheja, E. G., & Sodhi, M. J. (2013). Cloud computing. International Journal of
Computing and Technology, 4, 5-7.
Mihai, G. (2015). Recommendation system based on association rules for distributed e-
learning management systems. ACTA Universitatis Cibiniensis, 67(1), 99-104.
Mousa, M., Abdulaal, M., Boyles, S., & Claudel, C. (2015, June). Wireless sensor network-
based urban traffic monitoring using inertial reference data. In 2015 International
Conference on Distributed Computing in Sensor Systems (pp. 206-207). IEEE.
Nedelcu, B., Stefanet, M. E., Tamasescu, I. F., Tintoiu, S. E., & Vezeanu, A. (2015). Cloud
Computing and its Challenges and Benefits in the Bank System. Database Systems
Journal, 5(1), 45-58.
Peura, P. (2018). Robotic Process Automation Concept for Service Management.
Shabaitah, A. R. (2014). Server-Based Desktop Virtualization.
NETWORKING AND SCOM
Garrison, Gary, Robin L. Wakefield, and Sanghyun Kim. "The effects of IT capabilities and
delivery model on cloud computing success and firm performance for cloud supported
processes and operations." International Journal of Information Management 35, no.
4 (2015): 377-393.
Guo, T., Sharma, U., Shenoy, P., Wood, T., & Sahu, S. (2014). Cost-aware cloud bursting for
enterprise applications. ACM Transactions on Internet Technology (TOIT), 13(3), 10.
Hernantes, J., Gallardo, G., & Serrano, N. (2015). IT infrastructure-monitoring tools. IEEE
Software, 32(4), 88-93.
Huedo, E., Montero, R. S., Moreno, R., Llorente, I. M., Levin, A., & Massonet, P. (2017).
Interoperable federated cloud networking. IEEE Internet Computing, 21(5), 54-59.
Kumar, V., Raheja, E. G., & Sodhi, M. J. (2013). Cloud computing. International Journal of
Computing and Technology, 4, 5-7.
Mihai, G. (2015). Recommendation system based on association rules for distributed e-
learning management systems. ACTA Universitatis Cibiniensis, 67(1), 99-104.
Mousa, M., Abdulaal, M., Boyles, S., & Claudel, C. (2015, June). Wireless sensor network-
based urban traffic monitoring using inertial reference data. In 2015 International
Conference on Distributed Computing in Sensor Systems (pp. 206-207). IEEE.
Nedelcu, B., Stefanet, M. E., Tamasescu, I. F., Tintoiu, S. E., & Vezeanu, A. (2015). Cloud
Computing and its Challenges and Benefits in the Bank System. Database Systems
Journal, 5(1), 45-58.
Peura, P. (2018). Robotic Process Automation Concept for Service Management.
Shabaitah, A. R. (2014). Server-Based Desktop Virtualization.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
25
NETWORKING AND SCOM
Shiau, W. L., & Hsiao, C. M. (2013). A unified framework of the cloud computing service
model. Journal of Electronic Science and Technology, 11(2), 150-160.
Slawinski, K. (2017). Machines Learn to Sift Big Biodata. Genetic Engineering &
Biotechnology News, 37(10), 1-14.
Tang, X., & Todo, Y. (2013). A study of service desk setup in implementing IT service
management in enterprises.
Vlahogianni, E. I., Karlaftis, M. G., & Golias, J. C. (2014). Short-term traffic forecasting:
Where we are and where we’re going. Transportation Research Part C: Emerging
Technologies, 43, 3-19.
Willnecker, F., Brunnert, A., Gottesheim, W., & Krcmar, H. (2015, January). Using
dynatrace monitoring data for generating performance models of java ee applications.
In Proceedings of the 6th ACM/SPEC International Conference on Performance
Engineering (pp. 103-104). ACM.
Xu, G., Pang, J., & Fu, X. (2013). A load balancing model based on cloud partitioning for the
public cloud. Tsinghua Science and Technology, 18(1), 34-39.
https://natishalom.typepad.com/nati_shaloms_blog/2012/05/making-cloud-bursting-a-
practical-reality.html
https://www.rightscale.com/blog/cloud-management-best-practices/overcoming-
cloudbursting-challenges
NETWORKING AND SCOM
Shiau, W. L., & Hsiao, C. M. (2013). A unified framework of the cloud computing service
model. Journal of Electronic Science and Technology, 11(2), 150-160.
Slawinski, K. (2017). Machines Learn to Sift Big Biodata. Genetic Engineering &
Biotechnology News, 37(10), 1-14.
Tang, X., & Todo, Y. (2013). A study of service desk setup in implementing IT service
management in enterprises.
Vlahogianni, E. I., Karlaftis, M. G., & Golias, J. C. (2014). Short-term traffic forecasting:
Where we are and where we’re going. Transportation Research Part C: Emerging
Technologies, 43, 3-19.
Willnecker, F., Brunnert, A., Gottesheim, W., & Krcmar, H. (2015, January). Using
dynatrace monitoring data for generating performance models of java ee applications.
In Proceedings of the 6th ACM/SPEC International Conference on Performance
Engineering (pp. 103-104). ACM.
Xu, G., Pang, J., & Fu, X. (2013). A load balancing model based on cloud partitioning for the
public cloud. Tsinghua Science and Technology, 18(1), 34-39.
https://natishalom.typepad.com/nati_shaloms_blog/2012/05/making-cloud-bursting-a-
practical-reality.html
https://www.rightscale.com/blog/cloud-management-best-practices/overcoming-
cloudbursting-challenges
1 out of 26
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.