SBM4104 IT Infrastructure
VerifiedAdded on 2023/01/19
|15
|3106
|22
AI Summary
The report describes the backbone devices and logical network design for the development of a new branch in Sydney city centre for Care Australia. It focuses on improving communication and business performance through the sharing of information and files.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SBM4104 IT INFRASTRUCTURE
SBM4104 IT Infrastructure
Name of the Student
Name of the University
Author’s Note
SBM4104 IT Infrastructure
Name of the Student
Name of the University
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
SBM4104 IT INFRASTRUCTURE
Table of Contents
Introduction................................................................................................................................2
Geographical Scope...................................................................................................................2
Logical Design...........................................................................................................................4
IP address and Subnet mask.......................................................................................................4
Cloud Providers..........................................................................................................................6
Techniques supporting virtualization and cloud computing......................................................8
Dynamic Scaling Using Cloud computing...............................................................................10
Summary..................................................................................................................................12
References................................................................................................................................13
SBM4104 IT INFRASTRUCTURE
Table of Contents
Introduction................................................................................................................................2
Geographical Scope...................................................................................................................2
Logical Design...........................................................................................................................4
IP address and Subnet mask.......................................................................................................4
Cloud Providers..........................................................................................................................6
Techniques supporting virtualization and cloud computing......................................................8
Dynamic Scaling Using Cloud computing...............................................................................10
Summary..................................................................................................................................12
References................................................................................................................................13
2
SBM4104 IT INFRASTRUCTURE
Introduction
The report is prepared for Care Australia that have the mission of working around the
world for saving lives, defeating poverty and achieving social justice. They focus on putting
girls and women’s in the centre for providing them equal rights and opportunities and ending
poverty. The organization have the need to open a new branch in Sydney city centre and the
report describes about the back bone devices and logical network design for the development
of the network and connect it with the main and emergency location for sharing of
information and files and improve their communication and business performance.
Geographical Scope
Currently the organization work over a large geographical area such as Asia-Pacific,
Middle East, Africa and emergency location for accomplishment of the mission and vision.
For interconnecting their different areas of operation leased line and trans link fiber
connection. Fibre optics cables are the main backbone of their connection and the following
network diagram is created for visualizing the geographical scope of the network.
SBM4104 IT INFRASTRUCTURE
Introduction
The report is prepared for Care Australia that have the mission of working around the
world for saving lives, defeating poverty and achieving social justice. They focus on putting
girls and women’s in the centre for providing them equal rights and opportunities and ending
poverty. The organization have the need to open a new branch in Sydney city centre and the
report describes about the back bone devices and logical network design for the development
of the network and connect it with the main and emergency location for sharing of
information and files and improve their communication and business performance.
Geographical Scope
Currently the organization work over a large geographical area such as Asia-Pacific,
Middle East, Africa and emergency location for accomplishment of the mission and vision.
For interconnecting their different areas of operation leased line and trans link fiber
connection. Fibre optics cables are the main backbone of their connection and the following
network diagram is created for visualizing the geographical scope of the network.
3
SBM4104 IT INFRASTRUCTURE
Each of the local area network is connected with the internet and it uses VPN client
software for transmitting the data packets over the distributed network. An analysis is made
on the current network usage by segmenting the network, users and applications. The
network is segmented into smaller lan for each of the location and a local server is used for
connecting the internet of the branch with the other branch via the internet. SSL connection is
used for securely transmitting data packets and keep the organizational information secured
from external agents. The Lan is sub divided into multiple VLAN depending on the number
of department and users working under on that branch. The users are also managed according
to their needs of bandwidth and assigned to a high speed VLAN for improving their
performance.
SBM4104 IT INFRASTRUCTURE
Each of the local area network is connected with the internet and it uses VPN client
software for transmitting the data packets over the distributed network. An analysis is made
on the current network usage by segmenting the network, users and applications. The
network is segmented into smaller lan for each of the location and a local server is used for
connecting the internet of the branch with the other branch via the internet. SSL connection is
used for securely transmitting data packets and keep the organizational information secured
from external agents. The Lan is sub divided into multiple VLAN depending on the number
of department and users working under on that branch. The users are also managed according
to their needs of bandwidth and assigned to a high speed VLAN for improving their
performance.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
SBM4104 IT INFRASTRUCTURE
Logical Design
The design is created following the three-layer hierarchical model and redundant links
are used for connecting the distribution layer devices such that the data traffic can reach the
destination address using different path and no data is lost. A firewall is used in the core layer
for management of the incoming and outgoing of data packets in the network and increasing
the security of the network framework.
IP address and Subnet mask
Major Network: 192.168.16.0/20
Available IP addresses in major network: 4094
Number of IP addresses needed: 1200
Available IP addresses in allocated subnets: 2032
About 50% of available major network address space is used
About 59% of subnetted network address space is used
SBM4104 IT INFRASTRUCTURE
Logical Design
The design is created following the three-layer hierarchical model and redundant links
are used for connecting the distribution layer devices such that the data traffic can reach the
destination address using different path and no data is lost. A firewall is used in the core layer
for management of the incoming and outgoing of data packets in the network and increasing
the security of the network framework.
IP address and Subnet mask
Major Network: 192.168.16.0/20
Available IP addresses in major network: 4094
Number of IP addresses needed: 1200
Available IP addresses in allocated subnets: 2032
About 50% of available major network address space is used
About 59% of subnetted network address space is used
5
SBM4104 IT INFRASTRUCTURE
Subn
et
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignable
Range
Broadcast
Floor
1
150 254 192.168.1
6.0
/24 255.255.25
5.0
192.168.16.1
-
192.168.16.2
54
192.168.16.2
55
Floor
2
150 254 192.168.1
7.0
/24 255.255.25
5.0
192.168.17.1
-
192.168.17.2
54
192.168.17.2
55
Floor
3
150 254 192.168.1
8.0
/24 255.255.25
5.0
192.168.18.1
-
192.168.18.2
54
192.168.18.2
55
Floor
4
150 254 192.168.1
9.0
/24 255.255.25
5.0
192.168.19.1
-
192.168.19.2
54
192.168.19.2
55
Floor
5
150 254 192.168.2
0.0
/24 255.255.25
5.0
192.168.20.1
-
192.168.20.2
192.168.20.2
55
SBM4104 IT INFRASTRUCTURE
Subn
et
Name
Neede
d Size
Allocat
ed Size
Address Mas
k
Dec Mask Assignable
Range
Broadcast
Floor
1
150 254 192.168.1
6.0
/24 255.255.25
5.0
192.168.16.1
-
192.168.16.2
54
192.168.16.2
55
Floor
2
150 254 192.168.1
7.0
/24 255.255.25
5.0
192.168.17.1
-
192.168.17.2
54
192.168.17.2
55
Floor
3
150 254 192.168.1
8.0
/24 255.255.25
5.0
192.168.18.1
-
192.168.18.2
54
192.168.18.2
55
Floor
4
150 254 192.168.1
9.0
/24 255.255.25
5.0
192.168.19.1
-
192.168.19.2
54
192.168.19.2
55
Floor
5
150 254 192.168.2
0.0
/24 255.255.25
5.0
192.168.20.1
-
192.168.20.2
192.168.20.2
55
6
SBM4104 IT INFRASTRUCTURE
54
Floor
6
150 254 192.168.2
1.0
/24 255.255.25
5.0
192.168.21.1
-
192.168.21.2
54
192.168.21.2
55
Floor
7
150 254 192.168.2
2.0
/24 255.255.25
5.0
192.168.22.1
-
192.168.22.2
54
192.168.22.2
55
Floor
8
150 254 192.168.2
3.0
/24 255.255.25
5.0
192.168.23.1
-
192.168.23.2
54
192.168.23.2
55
Cloud Providers
Microsoft’s Office 365 Business Essentials: Office 365, offered by Microsoft, is an
effective application for hosting email and web servers. The organization Standards Australia
can utilize the enterprise oriented plans offered in Office 365 to access the cloud hosted
versions of MS office server platforms on a SaaS (Software as a Service) basis. It includes
Exchange Online, which is a hosted version of the traditional Microsoft Exchange Server or
Outlook Web. The company can opt for an Office 365 subscription and avail the joint cloud
services featuring Office suites, email hosting, file sharing and many other facilities (Wilson,
2016). Office 365 email subscription will save significant amount of time by means of
eliminating hardware or software maintenance as well as avoiding costly downtimes. In
SBM4104 IT INFRASTRUCTURE
54
Floor
6
150 254 192.168.2
1.0
/24 255.255.25
5.0
192.168.21.1
-
192.168.21.2
54
192.168.21.2
55
Floor
7
150 254 192.168.2
2.0
/24 255.255.25
5.0
192.168.22.1
-
192.168.22.2
54
192.168.22.2
55
Floor
8
150 254 192.168.2
3.0
/24 255.255.25
5.0
192.168.23.1
-
192.168.23.2
54
192.168.23.2
55
Cloud Providers
Microsoft’s Office 365 Business Essentials: Office 365, offered by Microsoft, is an
effective application for hosting email and web servers. The organization Standards Australia
can utilize the enterprise oriented plans offered in Office 365 to access the cloud hosted
versions of MS office server platforms on a SaaS (Software as a Service) basis. It includes
Exchange Online, which is a hosted version of the traditional Microsoft Exchange Server or
Outlook Web. The company can opt for an Office 365 subscription and avail the joint cloud
services featuring Office suites, email hosting, file sharing and many other facilities (Wilson,
2016). Office 365 email subscription will save significant amount of time by means of
eliminating hardware or software maintenance as well as avoiding costly downtimes. In
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
SBM4104 IT INFRASTRUCTURE
addition to that, this cloud based powerful email package supports 15 MB of attachments and
50 GB of storage per user. Moreover, it offers 1 TB online storage with respect to the One
Drive account. The organization can further benefit from the third party solution with their
seamlessly integrated email solution, which naturally guarantees more efficiency and rapid
application loading saving lot of time and energy for the employees (Mark Grysiuk, 2018).
Furthermore, it will provide the company with the ability to easily scale as well as update the
applications using its automated and standardized functionalities. Along with that, the
company no more needs to worry about additional security and compliance with the Office
365 subscription to an effective and secure cloud based email solution.
Amazon’s WorkMail: Amazon offers managed, secure business calendar and email
hosting services with support for existing mobile and desktop email client applications. The
organization can utilize this cloud based solution to access their contacts, emails and
calendars in a seamless fashion using the client application of their choice (Android email
apps, native Ios, Microsoft Outlook or any other application supporting the IMAP protocol),
or even through a web browser directly (Nadon, 2017). If the company integrates Amazon
WorkMail with its existing corporate directory, it would enable them to meet the important
compliance requirements. This cloud email service is managed, secure, availability,
accessibility and cost efficiency. It will enable the employees of Standards Australia to easily
synchronize emails, calendars and contacts with Android, iOS or even Windows Phone.
Moreover, with the security and compliance features of Amazon WorkMail, integration with
different clients and devices is possible. For example, it synchronizes with the existing MS
Active Directory in order to enable users to access the mailboxes through the already existing
credentials. Apart from that, it also encompasses enterprise grade security where all of the
organization’s data is automatically encrypted (Nadon, 2017). Along with that, the company
will be able to retain full control over the locality of its data by means of selecting the AWS
SBM4104 IT INFRASTRUCTURE
addition to that, this cloud based powerful email package supports 15 MB of attachments and
50 GB of storage per user. Moreover, it offers 1 TB online storage with respect to the One
Drive account. The organization can further benefit from the third party solution with their
seamlessly integrated email solution, which naturally guarantees more efficiency and rapid
application loading saving lot of time and energy for the employees (Mark Grysiuk, 2018).
Furthermore, it will provide the company with the ability to easily scale as well as update the
applications using its automated and standardized functionalities. Along with that, the
company no more needs to worry about additional security and compliance with the Office
365 subscription to an effective and secure cloud based email solution.
Amazon’s WorkMail: Amazon offers managed, secure business calendar and email
hosting services with support for existing mobile and desktop email client applications. The
organization can utilize this cloud based solution to access their contacts, emails and
calendars in a seamless fashion using the client application of their choice (Android email
apps, native Ios, Microsoft Outlook or any other application supporting the IMAP protocol),
or even through a web browser directly (Nadon, 2017). If the company integrates Amazon
WorkMail with its existing corporate directory, it would enable them to meet the important
compliance requirements. This cloud email service is managed, secure, availability,
accessibility and cost efficiency. It will enable the employees of Standards Australia to easily
synchronize emails, calendars and contacts with Android, iOS or even Windows Phone.
Moreover, with the security and compliance features of Amazon WorkMail, integration with
different clients and devices is possible. For example, it synchronizes with the existing MS
Active Directory in order to enable users to access the mailboxes through the already existing
credentials. Apart from that, it also encompasses enterprise grade security where all of the
organization’s data is automatically encrypted (Nadon, 2017). Along with that, the company
will be able to retain full control over the locality of its data by means of selecting the AWS
8
SBM4104 IT INFRASTRUCTURE
(Amazon Web Services) region where the data will be stored. Therefore, by implementing
Amazon WorkMail, Standards Australia will be able to manage its corporate email
infrastructure in an effective and efficient manner and at the same time, eliminate the need for
making upfront investments in terms of license and on-premises email server provisioning.
Techniques supporting virtualization and cloud computing
Service virtualization in cloud computing enables the developers to continue the
development of applications even when one or more components are missing. This
virtualization technique enables integrated and rapid testing that helps the developers to meet
deadlines and deliver the application in a timely and efficient manner (Kumar and Kushwaha,
2018).
There are different techniques of using service virtualization in supporting and
implementing cloud platforms. Virtualization of the cloud platforms enables long term cost
reduction, high scalability, disaster recovery, as well as the ability to test operating systems,
kernels and software applications in a safe manner (Kumar and Kushwaha, 2018). The
techniques of server virtualization are discussed below:
Application virtualization: Users will have remote access to a specific application
through a server. This particular server is responsible for storing all the personal information
of the application along with its other characteristics. It can still run through internet on a
local workstation. This particular virtualization abstracts the application layer by
distinguishing it from the operating system (OS) (Jain and Choudhary, 2016). This
virtualization approach enables the users in overcoming the issues related to the application’s
incompatibility with respect to the faults such as bags, existing hardware etc.
Network virtualization: This technique combines the available resources in a
particular network by dividing the bandwidth into separate channels where each of them are
SBM4104 IT INFRASTRUCTURE
(Amazon Web Services) region where the data will be stored. Therefore, by implementing
Amazon WorkMail, Standards Australia will be able to manage its corporate email
infrastructure in an effective and efficient manner and at the same time, eliminate the need for
making upfront investments in terms of license and on-premises email server provisioning.
Techniques supporting virtualization and cloud computing
Service virtualization in cloud computing enables the developers to continue the
development of applications even when one or more components are missing. This
virtualization technique enables integrated and rapid testing that helps the developers to meet
deadlines and deliver the application in a timely and efficient manner (Kumar and Kushwaha,
2018).
There are different techniques of using service virtualization in supporting and
implementing cloud platforms. Virtualization of the cloud platforms enables long term cost
reduction, high scalability, disaster recovery, as well as the ability to test operating systems,
kernels and software applications in a safe manner (Kumar and Kushwaha, 2018). The
techniques of server virtualization are discussed below:
Application virtualization: Users will have remote access to a specific application
through a server. This particular server is responsible for storing all the personal information
of the application along with its other characteristics. It can still run through internet on a
local workstation. This particular virtualization abstracts the application layer by
distinguishing it from the operating system (OS) (Jain and Choudhary, 2016). This
virtualization approach enables the users in overcoming the issues related to the application’s
incompatibility with respect to the faults such as bags, existing hardware etc.
Network virtualization: This technique combines the available resources in a
particular network by dividing the bandwidth into separate channels where each of them are
9
SBM4104 IT INFRASTRUCTURE
significantly distinguished. These bandwidths can be assigned to a device or server in real
time. On top of a single physical network, it will co-exist, that facilitates the creation and
provision of virtual networks including firewalls, routers, load balancer, logical switches,
workload security and VPN or Virtual Private Network.
Storage virtualization: This virtualization technique is hassle free and cost effective
where all the data pertaining to the company can be transferred from multiple physical hard
drives into one virtual storage. In this technique, a central console is created for operating the
storage in order to simplify the overall management process (Hao et al., 2015). This
technique manipulates the storage in the cloud most commonly for backup, recovery and
archiving of data. It hides the real and physical architecture containing the storage
complexity. In other words, the storage virtualization technique implements a single storage
device that multiple servers can utilize.
Desktop virtualization: This virtualization technique allows the operating system of
the user to be stored remotely on a server situated in the data centre. This approach enables
the users to access the desktop virtually irrespective of the location of the user’s machine.
Users may have virtual desktops to access a particular operating system. The desktop
virtualization technique provides several benefits including portability, user mobility, and
easy management of software patches, updates and installation. This technique involves a
modern strategy that is largely implemented in the modern business world in order to transfer
data from one system to the other.
Dynamic Scaling Using Cloud computing
The use of the cloud computing has been helping in different ways to the
organization. Scalability has been a critical success of every organization working in the web
servers. Scalability has been an ability for an application for expanding for meeting enterprise
SBM4104 IT INFRASTRUCTURE
significantly distinguished. These bandwidths can be assigned to a device or server in real
time. On top of a single physical network, it will co-exist, that facilitates the creation and
provision of virtual networks including firewalls, routers, load balancer, logical switches,
workload security and VPN or Virtual Private Network.
Storage virtualization: This virtualization technique is hassle free and cost effective
where all the data pertaining to the company can be transferred from multiple physical hard
drives into one virtual storage. In this technique, a central console is created for operating the
storage in order to simplify the overall management process (Hao et al., 2015). This
technique manipulates the storage in the cloud most commonly for backup, recovery and
archiving of data. It hides the real and physical architecture containing the storage
complexity. In other words, the storage virtualization technique implements a single storage
device that multiple servers can utilize.
Desktop virtualization: This virtualization technique allows the operating system of
the user to be stored remotely on a server situated in the data centre. This approach enables
the users to access the desktop virtually irrespective of the location of the user’s machine.
Users may have virtual desktops to access a particular operating system. The desktop
virtualization technique provides several benefits including portability, user mobility, and
easy management of software patches, updates and installation. This technique involves a
modern strategy that is largely implemented in the modern business world in order to transfer
data from one system to the other.
Dynamic Scaling Using Cloud computing
The use of the cloud computing has been helping in different ways to the
organization. Scalability has been a critical success of every organization working in the web
servers. Scalability has been an ability for an application for expanding for meeting enterprise
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
SBM4104 IT INFRASTRUCTURE
business expectations and requirements (Lehrig, Eikerling and Becker 2015). Scalable
applications have been operating at growing stage and utilize resources with time for
providing enhanced services to customers. The main problem with internet application has
been inability of planning ahead prediction of amount of user accessing. Therefore, cloud
computing has been the solution to this issue with web application Cloud computing has been
associated with providing various type of services to the users (Coutinho et al. 2015). It also
routes these requests towards web servers that has been hosting identical web applications.
The web applications have been implemented in Apache HTTP servers installed in Virtual
machines. For controlling actions of provisioning web server virtual machines, a dynamic
scaling algorithm related to relevant threshold and scaling indicator have been used. This
scaling indicator have different active sessions in every application.
The utilize of load balancer including Apache HTTP load balancer have been
allowing HTTP request for routing web servers and host web applications. The service
monitor subsystem has been responsible for gathering scaling indicators for web applications
and calculate their moving age. This technique manipulates the storage in the cloud most
commonly for backup, recovery and archiving of data. It hides the real and physical
architecture containing the storage complexity (Aljawarneh and Yassein 2016). A agent for
monitoring has been installed in each web applications for tracking number of active
sessions. Scale up or down of an event have been triggered for instructing provisioning
subsystem for starting and shutting down server virtual machine in cloud. This technique
manipulates the storage in the cloud most commonly for backup, recovery and archiving of
data. It hides the real and physical architecture containing the storage complexity. Automated
scaling feature have been including some vendors and rules and policies for expressing deal
with user and virtual machine. There have been more abstract frameworks that convey
automation.
SBM4104 IT INFRASTRUCTURE
business expectations and requirements (Lehrig, Eikerling and Becker 2015). Scalable
applications have been operating at growing stage and utilize resources with time for
providing enhanced services to customers. The main problem with internet application has
been inability of planning ahead prediction of amount of user accessing. Therefore, cloud
computing has been the solution to this issue with web application Cloud computing has been
associated with providing various type of services to the users (Coutinho et al. 2015). It also
routes these requests towards web servers that has been hosting identical web applications.
The web applications have been implemented in Apache HTTP servers installed in Virtual
machines. For controlling actions of provisioning web server virtual machines, a dynamic
scaling algorithm related to relevant threshold and scaling indicator have been used. This
scaling indicator have different active sessions in every application.
The utilize of load balancer including Apache HTTP load balancer have been
allowing HTTP request for routing web servers and host web applications. The service
monitor subsystem has been responsible for gathering scaling indicators for web applications
and calculate their moving age. This technique manipulates the storage in the cloud most
commonly for backup, recovery and archiving of data. It hides the real and physical
architecture containing the storage complexity (Aljawarneh and Yassein 2016). A agent for
monitoring has been installed in each web applications for tracking number of active
sessions. Scale up or down of an event have been triggered for instructing provisioning
subsystem for starting and shutting down server virtual machine in cloud. This technique
manipulates the storage in the cloud most commonly for backup, recovery and archiving of
data. It hides the real and physical architecture containing the storage complexity. Automated
scaling feature have been including some vendors and rules and policies for expressing deal
with user and virtual machine. There have been more abstract frameworks that convey
automation.
11
SBM4104 IT INFRASTRUCTURE
Scaling algorithm has been installed in service monitor subsystem and used for
triggering scale up and down in the provisioning subsystem over virtual machine. The
algorithm determines recent web applications instances having active sessions above or
below threshold numbers. Vertical scaling has been diminishing server for increasing the
capacity of existing infrastructure by adding extra resources. It synchronizes with the existing
MS Active Directory in order to enable users to access the mailboxes through the already
existing credentials. Apart from that, it also encompasses enterprise grade security where all
of the organization’s data is automatically encrypted There is no code and infrastructure
changing done in vertical scaling (Chang, Kuo and Ramachandran 2016). In case of vertical
scaling, there us a scope of changing infrastructure and coding. Horizontal scaling include
services for being independent and spate servers can be called. In other words, the storage
virtualization technique implements a single storage device that multiple servers can utilize.
Cloud providers have been providing auto scaling that can even further help in managing
human resources. The use of cloud computing has been helping in mainlining a keen
approach in the development if the organization in the market. The use of different services
of cloud computing has been helping in creating a specific approach to the development of
the company. The load balancing factor p the cloud computing has been helping in scaling up
the services and infrastructure of the system. The delay with peak users have been depended
in the resource consumption for balancing the work load available on unused resources. The
organization can further benefit from the third party solution with their seamlessly integrated
email solution, which naturally guarantees more efficiency and rapid application loading
saving lot of time and energy for the employees. The testing of scaling up applications can be
done using the cloud environment. There are various cloud services including IaaS cloud
have been dealing with the single virtual machine management.
SBM4104 IT INFRASTRUCTURE
Scaling algorithm has been installed in service monitor subsystem and used for
triggering scale up and down in the provisioning subsystem over virtual machine. The
algorithm determines recent web applications instances having active sessions above or
below threshold numbers. Vertical scaling has been diminishing server for increasing the
capacity of existing infrastructure by adding extra resources. It synchronizes with the existing
MS Active Directory in order to enable users to access the mailboxes through the already
existing credentials. Apart from that, it also encompasses enterprise grade security where all
of the organization’s data is automatically encrypted There is no code and infrastructure
changing done in vertical scaling (Chang, Kuo and Ramachandran 2016). In case of vertical
scaling, there us a scope of changing infrastructure and coding. Horizontal scaling include
services for being independent and spate servers can be called. In other words, the storage
virtualization technique implements a single storage device that multiple servers can utilize.
Cloud providers have been providing auto scaling that can even further help in managing
human resources. The use of cloud computing has been helping in mainlining a keen
approach in the development if the organization in the market. The use of different services
of cloud computing has been helping in creating a specific approach to the development of
the company. The load balancing factor p the cloud computing has been helping in scaling up
the services and infrastructure of the system. The delay with peak users have been depended
in the resource consumption for balancing the work load available on unused resources. The
organization can further benefit from the third party solution with their seamlessly integrated
email solution, which naturally guarantees more efficiency and rapid application loading
saving lot of time and energy for the employees. The testing of scaling up applications can be
done using the cloud environment. There are various cloud services including IaaS cloud
have been dealing with the single virtual machine management.
12
SBM4104 IT INFRASTRUCTURE
Summary
From the above report it can be summarized that the cloud computing can be adopted
by the organization for sharing of files and information between the branches and increase the
flexibility of the proposed network. For the development of the report an analysis is made on
the current structure of the organization and building plan for the development of the new
network solution. An analysis is also made on the number of users using the network for the
development of the IP addressing plan. A proposal for cloud service that can be adopted by
the organization for hosting email web is given in the report. The techniques of virtualization
and supporting implementation cloud is also discussed. The support of cloud computing for
dynamic scalability is also given that would help the organization to increase the flexibility of
the proposed network framework.
SBM4104 IT INFRASTRUCTURE
Summary
From the above report it can be summarized that the cloud computing can be adopted
by the organization for sharing of files and information between the branches and increase the
flexibility of the proposed network. For the development of the report an analysis is made on
the current structure of the organization and building plan for the development of the new
network solution. An analysis is also made on the number of users using the network for the
development of the IP addressing plan. A proposal for cloud service that can be adopted by
the organization for hosting email web is given in the report. The techniques of virtualization
and supporting implementation cloud is also discussed. The support of cloud computing for
dynamic scalability is also given that would help the organization to increase the flexibility of
the proposed network framework.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
SBM4104 IT INFRASTRUCTURE
References
Aljawarneh, S.A. and Yassein, M.O.B., 2016. A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies
(IJIIT), 12(2), pp.12-24.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-
41.
Coutinho, E.F., de Carvalho Sousa, F.R., Rego, P.A.L., Gomes, D.G. and de Souza, J.N.,
2015. Elasticity in cloud computing: a survey. annals of telecommunications-annales des
télécommunications, 70(7-8), pp.289-309.
Hao, F., Lakshman, T.V., Mukherjee, S. and Song, H., Alcatel-Lucent SAS, 2015. Providing
cloud-based services using dynamic network virtualization. U.S. Patent 9,210,065.
Jain, N. and Choudhary, S., 2016, March. Overview of virtualization in cloud computing.
In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-4). IEEE.
Kumar, S. and Kushwaha, A.S., 2018, August. Virtualization Backbone of Cloud Computing-
Analysis. In 2018 4th International Conference on Computing Sciences (ICCS) (pp. 35-39).
IEEE.
Lehrig, S., Eikerling, H. and Becker, S., 2015, May. Scalability, elasticity, and efficiency in
cloud computing: A systematic literature review of definitions and metrics. In Proceedings of
the 11th International ACM SIGSOFT Conference on Quality of Software Architectures (pp.
83-92). ACM.
Mark Grysiuk CRM, C.I.P., 2018. Out Of The Box: Why Organizations Are Jumping To
Office 365/ SharePoint Online. Information Management, 52(5), pp.20-27.
SBM4104 IT INFRASTRUCTURE
References
Aljawarneh, S.A. and Yassein, M.O.B., 2016. A conceptual security framework for cloud
computing issues. International Journal of Intelligent Information Technologies
(IJIIT), 12(2), pp.12-24.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework:
A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-
41.
Coutinho, E.F., de Carvalho Sousa, F.R., Rego, P.A.L., Gomes, D.G. and de Souza, J.N.,
2015. Elasticity in cloud computing: a survey. annals of telecommunications-annales des
télécommunications, 70(7-8), pp.289-309.
Hao, F., Lakshman, T.V., Mukherjee, S. and Song, H., Alcatel-Lucent SAS, 2015. Providing
cloud-based services using dynamic network virtualization. U.S. Patent 9,210,065.
Jain, N. and Choudhary, S., 2016, March. Overview of virtualization in cloud computing.
In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-4). IEEE.
Kumar, S. and Kushwaha, A.S., 2018, August. Virtualization Backbone of Cloud Computing-
Analysis. In 2018 4th International Conference on Computing Sciences (ICCS) (pp. 35-39).
IEEE.
Lehrig, S., Eikerling, H. and Becker, S., 2015, May. Scalability, elasticity, and efficiency in
cloud computing: A systematic literature review of definitions and metrics. In Proceedings of
the 11th International ACM SIGSOFT Conference on Quality of Software Architectures (pp.
83-92). ACM.
Mark Grysiuk CRM, C.I.P., 2018. Out Of The Box: Why Organizations Are Jumping To
Office 365/ SharePoint Online. Information Management, 52(5), pp.20-27.
14
SBM4104 IT INFRASTRUCTURE
Nadon, J., 2017. AWS Enterprise Applications. In Website Hosting and Migration with
Amazon Web Services (pp. 235-249). Apress, Berkeley, CA.
Nadon, J., 2017. Website Hosting and Migration with Amazon Web Services: A Practical
Guide to Moving Your Website to AWS. Apress.
Wilson, K., 2016. Essential Office 365. Elluminet Press.
SBM4104 IT INFRASTRUCTURE
Nadon, J., 2017. AWS Enterprise Applications. In Website Hosting and Migration with
Amazon Web Services (pp. 235-249). Apress, Berkeley, CA.
Nadon, J., 2017. Website Hosting and Migration with Amazon Web Services: A Practical
Guide to Moving Your Website to AWS. Apress.
Wilson, K., 2016. Essential Office 365. Elluminet Press.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.