Server Development and Maintenance
VerifiedAdded on 2023/01/20
|23
|4781
|28
AI Summary
This article discusses server development and maintenance, including SAAS, PAAS, and IAAS cloud models. It explores the requirements for small, medium, and large businesses and covers topics such as infrastructure, colocation, virtualization, and data centers. The article also provides insights into maintenance tasks like backup and explores the differences between VPS options. Overall, it offers a comprehensive overview of server development and maintenance in the context of modern businesses.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: SERVER DEVELOPMENT AND MAINTENANCE
SERVER DEVELOPMENT AND MAINTENANCE
Name of the Student
Name of the University
Author Note
SERVER DEVELOPMENT AND MAINTENANCE
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
SERVER DEVELOPMENT AND MAINTENANCE
Introduction Summary
SmartWat is one of the manufacturing company which is situated in UK and has its head office in
Midlands. The manufacturing unit of this new organization is located in China where numerous
smart devices are manufactures. The branches of this organization exists in the New York, London,
Beijing and Birmingham as well. As the company is entirely new it is going through the initial
phase of setting up its network infrastructure, databases, e-mail and file sharing facilities. It is
assumed that the company would be requiring shared application as well along with the folders,
files, printers, e-mail services and the CRM software. It is also assumed that the IoT devices would
be used which would be operating in an environment which is very secure. The entire workforce of
the organization would be using different smart as well as mobile devices for the purpose of
conducting its business as usual (BAU) activities.
SAAS, PAAS AND IAAS
In this context, three cloud models will be discussed that is SAAS, PAAS and IAAS. Along with
that an description is provided which describes in details that How a small business, medium
business (for medium business talk ‘smartwat’ as mentioned in the assignment introduction) and
large business use (SAAS, PAAS, IAAS) differently to each other. This discussion provides a
comprehensive overview of how these cloud models are being applied in industrial context and
what makes these cloud models so popular and which cloud model has market advantages
compared to others in terms of features offered.
SAAS:
-define it
Software as a Service (SaaS), which is also known as on-demand software, basically works on
traditional software distribution model with only difference being it is offered through internet
SERVER DEVELOPMENT AND MAINTENANCE
Introduction Summary
SmartWat is one of the manufacturing company which is situated in UK and has its head office in
Midlands. The manufacturing unit of this new organization is located in China where numerous
smart devices are manufactures. The branches of this organization exists in the New York, London,
Beijing and Birmingham as well. As the company is entirely new it is going through the initial
phase of setting up its network infrastructure, databases, e-mail and file sharing facilities. It is
assumed that the company would be requiring shared application as well along with the folders,
files, printers, e-mail services and the CRM software. It is also assumed that the IoT devices would
be used which would be operating in an environment which is very secure. The entire workforce of
the organization would be using different smart as well as mobile devices for the purpose of
conducting its business as usual (BAU) activities.
SAAS, PAAS AND IAAS
In this context, three cloud models will be discussed that is SAAS, PAAS and IAAS. Along with
that an description is provided which describes in details that How a small business, medium
business (for medium business talk ‘smartwat’ as mentioned in the assignment introduction) and
large business use (SAAS, PAAS, IAAS) differently to each other. This discussion provides a
comprehensive overview of how these cloud models are being applied in industrial context and
what makes these cloud models so popular and which cloud model has market advantages
compared to others in terms of features offered.
SAAS:
-define it
Software as a Service (SaaS), which is also known as on-demand software, basically works on
traditional software distribution model with only difference being it is offered through internet
2
SERVER DEVELOPMENT AND MAINTENANCE
(Abdel-Basset, Mohamed, and Chang, 2018). This model makes it possible to access the required
software purchased in the software package offered by the cloud vendor from anywhere anytime.
-talk about it
Some of the important characteristics of SAAS cloud model are the following:
Clients are charged on rental basis for the software they rent. They are not owner of any of
the software required for business applications.
The software that are used by the client are installed on remote server which is owned by the
cloud vendor. It is not installed on the client machine.
As software is not installed on the client machine, there is no requirement for hardware and
infrastructure required for installing software. Only high speed internet connection is
required for accessing the software rented for the business purpose.
Client does not need to care about data backup and software maintenance including software
security as these services are managed by the cloud vendor.
-USE CASE studies as an example
Netflix, a leading online content provider globally, has integrated Amazon Web Services with their
streaming services. According to the company this has made it possible for the company for
managing their extensive traffic from various devices for accessing the contents offered on the
platform. The robust infrastructure support that is required for this service is provided by the
hosting infrastructure that is offered by Amazon hosting services. The company also claims that it
has helped them to improve their productivity and helped them to make their micro service
architecture that is required for their services. According to Netflix, due to the infrastructure support
and software services offered by AWS has made it possible for the company in deploying thousands
SERVER DEVELOPMENT AND MAINTENANCE
(Abdel-Basset, Mohamed, and Chang, 2018). This model makes it possible to access the required
software purchased in the software package offered by the cloud vendor from anywhere anytime.
-talk about it
Some of the important characteristics of SAAS cloud model are the following:
Clients are charged on rental basis for the software they rent. They are not owner of any of
the software required for business applications.
The software that are used by the client are installed on remote server which is owned by the
cloud vendor. It is not installed on the client machine.
As software is not installed on the client machine, there is no requirement for hardware and
infrastructure required for installing software. Only high speed internet connection is
required for accessing the software rented for the business purpose.
Client does not need to care about data backup and software maintenance including software
security as these services are managed by the cloud vendor.
-USE CASE studies as an example
Netflix, a leading online content provider globally, has integrated Amazon Web Services with their
streaming services. According to the company this has made it possible for the company for
managing their extensive traffic from various devices for accessing the contents offered on the
platform. The robust infrastructure support that is required for this service is provided by the
hosting infrastructure that is offered by Amazon hosting services. The company also claims that it
has helped them to improve their productivity and helped them to make their micro service
architecture that is required for their services. According to Netflix, due to the infrastructure support
and software services offered by AWS has made it possible for the company in deploying thousands
3
SERVER DEVELOPMENT AND MAINTENANCE
of servers that host terabytes of data, and this has provided users option for streaming Netflix shows
and movies on the web, tablets, or mobile devices and that too from anywhere around the world,
one of the reasons that makes this company a market leader in online entertainment industry
globally.
PAAS:
-define it
It is a cloud model that provides support for required hardware along with software tools that are
required for developing applications (Rittinghouse and Ransome, 2017). These tools are provided
by the third party cloud vendor. -talk about it
Some of the important characteristics of SAAS cloud model are the following:
Once tools are delivered, cloud service provider has no additional service to offer to the
clients. Once the tools are provided, it is now responsibility of the client to properly manage
the tolls and develop application on their own (Botta et al., 2016). Hence, PAAS is not well
suited for most of the client and their business requirements.
Once tools are purchased, client needs to invest for acquiring appropriate resources for their
application development which include support of developers. Along with that no assistance
is provided to the clients for application maintenance. Hence managing application and
maintain it properly depends on the client.
-USE CASE studies as an example
iCloud by apple is one of the biggest company that is developed with PAAS offered by google. It
offers remote access to the files, media and documents saved in the cloud platform. as the company
does not wants to have only developed applications hosted on cloud, the company being the market
leader in smartphone marker, wants have their own dedicated and customized application that is
SERVER DEVELOPMENT AND MAINTENANCE
of servers that host terabytes of data, and this has provided users option for streaming Netflix shows
and movies on the web, tablets, or mobile devices and that too from anywhere around the world,
one of the reasons that makes this company a market leader in online entertainment industry
globally.
PAAS:
-define it
It is a cloud model that provides support for required hardware along with software tools that are
required for developing applications (Rittinghouse and Ransome, 2017). These tools are provided
by the third party cloud vendor. -talk about it
Some of the important characteristics of SAAS cloud model are the following:
Once tools are delivered, cloud service provider has no additional service to offer to the
clients. Once the tools are provided, it is now responsibility of the client to properly manage
the tolls and develop application on their own (Botta et al., 2016). Hence, PAAS is not well
suited for most of the client and their business requirements.
Once tools are purchased, client needs to invest for acquiring appropriate resources for their
application development which include support of developers. Along with that no assistance
is provided to the clients for application maintenance. Hence managing application and
maintain it properly depends on the client.
-USE CASE studies as an example
iCloud by apple is one of the biggest company that is developed with PAAS offered by google. It
offers remote access to the files, media and documents saved in the cloud platform. as the company
does not wants to have only developed applications hosted on cloud, the company being the market
leader in smartphone marker, wants have their own dedicated and customized application that is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4
SERVER DEVELOPMENT AND MAINTENANCE
developed by their own experts and engineering team. They have only singed google to offer them
required hardware and software too, for their developers.
IAAS:
-define it
The IaaS is the Infrastructure as a Service which is actually an online service which provides some
high level of APIs that is used for dereferencing various types of low level details (Hashem et al.,
2015). This low level infrastructure includes computing resources, data partitioning, security,
scaling and location. It is one of the four types of cloud services that is managed over internet. -talk
about it (Chen et al., 2016). This low level infrastructure includes computing resources, data
partitioning, security, scaling and location. It is one of the four types of cloud services that is
managed over internet
-USE CASE studies as an example
Microsoft Azure is one of the most important organization which uses this IaaS service.
Define and apply how servers are used in businesses and your chosen business
A sever is a type of computer that is capable of delivering information to another computer
provided that the target computer is linked with the host computer through a network (Almorsy,
Grundy and Müller, 2016).
Servers are often used for running high end applications for which complex infrastructure is
required and these applications are known as server applications. In order to have data management
at centralised level, servers are often deployed (Gai et al., 2016). It is also considered for file
sharing. In organizations and business it is often required to manage shared resources like storage
and printers and for this kind of applications servers are deployed. Along with that servers are also
considered for applications like managing user identity and login details of the users.
SERVER DEVELOPMENT AND MAINTENANCE
developed by their own experts and engineering team. They have only singed google to offer them
required hardware and software too, for their developers.
IAAS:
-define it
The IaaS is the Infrastructure as a Service which is actually an online service which provides some
high level of APIs that is used for dereferencing various types of low level details (Hashem et al.,
2015). This low level infrastructure includes computing resources, data partitioning, security,
scaling and location. It is one of the four types of cloud services that is managed over internet. -talk
about it (Chen et al., 2016). This low level infrastructure includes computing resources, data
partitioning, security, scaling and location. It is one of the four types of cloud services that is
managed over internet
-USE CASE studies as an example
Microsoft Azure is one of the most important organization which uses this IaaS service.
Define and apply how servers are used in businesses and your chosen business
A sever is a type of computer that is capable of delivering information to another computer
provided that the target computer is linked with the host computer through a network (Almorsy,
Grundy and Müller, 2016).
Servers are often used for running high end applications for which complex infrastructure is
required and these applications are known as server applications. In order to have data management
at centralised level, servers are often deployed (Gai et al., 2016). It is also considered for file
sharing. In organizations and business it is often required to manage shared resources like storage
and printers and for this kind of applications servers are deployed. Along with that servers are also
considered for applications like managing user identity and login details of the users.
5
SERVER DEVELOPMENT AND MAINTENANCE
Having backup for important business data is a major requirement for any business. This backup not
only include organisational data, but it also considers backup for client data (Marinescu, 2017).
Now for a medium to large business, there are huge amount of client as well as organisational data
and hence it is not possible to manage this service manually and hence automation is required (Ali,
Khan and Vasilakos, 2015). Servers provide option for automatic data backup. Along with, servers
are also deployed for remote access to files and applications require for managing application and
services required for managing business.
Securing network is another major requirement for any business as it ensures data security (Stergiou
et al., 2018). Now in order to ensure that additional security suits are required which include
firewalls, intrusion detection, user access management, and software updates. It is not possible to
integrate these features and services with the network without support for server and hence servers
are considered in business (Li et al., 2015).
Explore the evolution of computing
-when did it start
-how did it start
-Mention the internet-who invented it & when did it come out etc.
-Nomad computing, cloud computing, distributed computing, cluster computing
Differences between VPS-shared VPS & Dedicated VPS
Explore & Justify- Cost Benefit Analysis
-What server is needed for small, medium and large organisation
Server requirements for small business:
1. Windows Small Business Server 2003 Standard Edition:
SERVER DEVELOPMENT AND MAINTENANCE
Having backup for important business data is a major requirement for any business. This backup not
only include organisational data, but it also considers backup for client data (Marinescu, 2017).
Now for a medium to large business, there are huge amount of client as well as organisational data
and hence it is not possible to manage this service manually and hence automation is required (Ali,
Khan and Vasilakos, 2015). Servers provide option for automatic data backup. Along with, servers
are also deployed for remote access to files and applications require for managing application and
services required for managing business.
Securing network is another major requirement for any business as it ensures data security (Stergiou
et al., 2018). Now in order to ensure that additional security suits are required which include
firewalls, intrusion detection, user access management, and software updates. It is not possible to
integrate these features and services with the network without support for server and hence servers
are considered in business (Li et al., 2015).
Explore the evolution of computing
-when did it start
-how did it start
-Mention the internet-who invented it & when did it come out etc.
-Nomad computing, cloud computing, distributed computing, cluster computing
Differences between VPS-shared VPS & Dedicated VPS
Explore & Justify- Cost Benefit Analysis
-What server is needed for small, medium and large organisation
Server requirements for small business:
1. Windows Small Business Server 2003 Standard Edition:
6
SERVER DEVELOPMENT AND MAINTENANCE
A Pentium II 300-megahertz (MHz)-or-compatible processor
256 megabytes (MB) of random access memory (RAM)
4 gigabytes (GB) of available hard disk space
A CD-ROM or a DVD-ROM drive
A network adapter from the Microsoft Windows Server 2003 Hardware Compatibility List
(HCL)
A video graphics adapter from the Windows Server 2003 HCL that can support 256 colors
and a resolution of 800 by 600 dots per inch (dpi)
A dedicated Class 1 fax modem for fax service
2. Windows Small Business Server 2003 Premium Edition:
A Pentium II 300-MHz-or-compatible processor
256 MB of RAM
5 GB of available hard disk space
A CD-ROM or a DVD-ROM drive
A network adapter from the Windows Server 2003 HCL
A video graphics adapter that can support 256 colors and a resolution of 800 by 600 dpi
from the Windows Server 2003 HCL
A dedicated Class 1 fax modem for fax services
SERVER DEVELOPMENT AND MAINTENANCE
A Pentium II 300-megahertz (MHz)-or-compatible processor
256 megabytes (MB) of random access memory (RAM)
4 gigabytes (GB) of available hard disk space
A CD-ROM or a DVD-ROM drive
A network adapter from the Microsoft Windows Server 2003 Hardware Compatibility List
(HCL)
A video graphics adapter from the Windows Server 2003 HCL that can support 256 colors
and a resolution of 800 by 600 dots per inch (dpi)
A dedicated Class 1 fax modem for fax service
2. Windows Small Business Server 2003 Premium Edition:
A Pentium II 300-MHz-or-compatible processor
256 MB of RAM
5 GB of available hard disk space
A CD-ROM or a DVD-ROM drive
A network adapter from the Windows Server 2003 HCL
A video graphics adapter that can support 256 colors and a resolution of 800 by 600 dpi
from the Windows Server 2003 HCL
A dedicated Class 1 fax modem for fax services
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7
SERVER DEVELOPMENT AND MAINTENANCE
-Price difference between different options
Server editions Price
Windows Small Business Server 2003
Standard Edition
Windows Small Business Server 2003
Premium Edition
Server requirements for medium business with price details:
Service type Description Estimated Cost
Storage File Storage, General
Purpose V2, LRS
Redundancy, 32 TB
Capacity, 1 Put or Create
Container operations, 1
List operations, 1 Other
operations, 0 Additional
Sync servers
$2,162.72
Azure SQL
Database
Managed Instance,
vCore Purchase Model,
General Purpose Tier,
Gen 4, 1 8 vCore
instance(s), 3 year
reserved, 32 GB Storage,
0 GB Backup Storage
$1,059.82
Virtual Network 100 GB data transfer $2.00
SERVER DEVELOPMENT AND MAINTENANCE
-Price difference between different options
Server editions Price
Windows Small Business Server 2003
Standard Edition
Windows Small Business Server 2003
Premium Edition
Server requirements for medium business with price details:
Service type Description Estimated Cost
Storage File Storage, General
Purpose V2, LRS
Redundancy, 32 TB
Capacity, 1 Put or Create
Container operations, 1
List operations, 1 Other
operations, 0 Additional
Sync servers
$2,162.72
Azure SQL
Database
Managed Instance,
vCore Purchase Model,
General Purpose Tier,
Gen 4, 1 8 vCore
instance(s), 3 year
reserved, 32 GB Storage,
0 GB Backup Storage
$1,059.82
Virtual Network 100 GB data transfer $2.00
8
SERVER DEVELOPMENT AND MAINTENANCE
from Australia Southeast
region to Australia
Southeast region
Bandwidth Zone 2: Asia Pacific,
Japan, Australia, 500 GB
$59.40
Azure Firewall 1 Logical firewall units x
730 Hours, 0 GB
Inbound data transfer, 0
GB Outbound data
transfer
$912.50
App Service Standard Tier; 4 S3 (4
Core(s), 7 GB RAM, 50
GB Storage) x 1 Months;
Windows OS
$1,471.68
Support Support $100.00
Licensing Program Microsoft Online Services Program
(MOSP)
Monthly Total $5,768.12
Annual Total $69,217.43
Server requirements for large business with price details:
SERVER DEVELOPMENT AND MAINTENANCE
from Australia Southeast
region to Australia
Southeast region
Bandwidth Zone 2: Asia Pacific,
Japan, Australia, 500 GB
$59.40
Azure Firewall 1 Logical firewall units x
730 Hours, 0 GB
Inbound data transfer, 0
GB Outbound data
transfer
$912.50
App Service Standard Tier; 4 S3 (4
Core(s), 7 GB RAM, 50
GB Storage) x 1 Months;
Windows OS
$1,471.68
Support Support $100.00
Licensing Program Microsoft Online Services Program
(MOSP)
Monthly Total $5,768.12
Annual Total $69,217.43
Server requirements for large business with price details:
9
SERVER DEVELOPMENT AND MAINTENANCE
Server type Quanti
ty
Requirements Device name
and model
Price
per unit
Total
price
Web Server 2 Minimum requirements
for each server:
8 core
8GB RAM
1TB HDD 12Gb
NIC Dual Port 1Gb
Windows Server
2016 Standard
PowerEdge T30 Mini
To+1862wer Server
$629.00 $1258.0
Database Server 2 Minimum requirements
for each server:
12 core
32GB RAM
2TB HDD 12Gb
NIC Dual Port 10Gb
Windows Server
2016 Standard
Microsoft SQL
Server 2017
Standard
Microsoft SQL
Server 2017
Standard
$931 $1862
SERVER DEVELOPMENT AND MAINTENANCE
Server type Quanti
ty
Requirements Device name
and model
Price
per unit
Total
price
Web Server 2 Minimum requirements
for each server:
8 core
8GB RAM
1TB HDD 12Gb
NIC Dual Port 1Gb
Windows Server
2016 Standard
PowerEdge T30 Mini
To+1862wer Server
$629.00 $1258.0
Database Server 2 Minimum requirements
for each server:
12 core
32GB RAM
2TB HDD 12Gb
NIC Dual Port 10Gb
Windows Server
2016 Standard
Microsoft SQL
Server 2017
Standard
Microsoft SQL
Server 2017
Standard
$931 $1862
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10
SERVER DEVELOPMENT AND MAINTENANCE
Define infrastructure and colocation
A colocation (colo) is a data center facility. It allows business deploy servers with renting through
server space acquired through renting. Along with the server space, business can rent other required
computing hardware if needed.
Azure
Azure is considered in comparison to AWS because:
Wide ranges of services
Low cost
Superior maintenance
Enhanced consumer support
Virtualisation & Abstraction
Virtualization is a process which helps to abstract hardware, software and infrastructure required for
any computing application.
Data Centres
A data center (or datacenter) is a collection of networked computers along with computing storage
that businesses or other organizations considers for storing, processing and retrieving data.
VPN
A VPN, or virtual private network, is a network tunnel that is established between computing
devices device and the internet
Cloud Computing
SAAS: software as a service and in this model client are provided access to cloud applications
SERVER DEVELOPMENT AND MAINTENANCE
Define infrastructure and colocation
A colocation (colo) is a data center facility. It allows business deploy servers with renting through
server space acquired through renting. Along with the server space, business can rent other required
computing hardware if needed.
Azure
Azure is considered in comparison to AWS because:
Wide ranges of services
Low cost
Superior maintenance
Enhanced consumer support
Virtualisation & Abstraction
Virtualization is a process which helps to abstract hardware, software and infrastructure required for
any computing application.
Data Centres
A data center (or datacenter) is a collection of networked computers along with computing storage
that businesses or other organizations considers for storing, processing and retrieving data.
VPN
A VPN, or virtual private network, is a network tunnel that is established between computing
devices device and the internet
Cloud Computing
SAAS: software as a service and in this model client are provided access to cloud applications
11
SERVER DEVELOPMENT AND MAINTENANCE
PAAS: platform as a service and in this cloud model platform support is provided for application
development
IAAS: infrastructure as a service and in this cloud model infrastructure support is provided for
application development
Explore maintenance such as:
-Backup
In the context of information technology a backup is considered as process of smoothing backing
up. This actually refers to copying of some kind of computer data that is currently in a secondary
storage copied to another kind of secondary storage (Jalali et al., 2016).
-Redundancy
The redundancy is considered as critical component duplication of a system, aiming increasing
reliability of the system. Redundancy mainly occurs in form of a backup for improving actual
performance of the system (Chang, Kuo and Ramachandran, 2016).
-Upgrades
The upgrade is considered as the process of replacing some data or products with some newer
version of same kind of data or product. Upgrade mainly consists hardware replacement or changes
in the software firmware for a better and improved performance (Sen, 2015).
-Repair
In the process of maintenance the repair means restoring something faulty and damaged parts.
Repair can lead to upgrading also if a part becomes non-reparable (Etro, 2015).
And how it is affected by virtualisation
SERVER DEVELOPMENT AND MAINTENANCE
PAAS: platform as a service and in this cloud model platform support is provided for application
development
IAAS: infrastructure as a service and in this cloud model infrastructure support is provided for
application development
Explore maintenance such as:
-Backup
In the context of information technology a backup is considered as process of smoothing backing
up. This actually refers to copying of some kind of computer data that is currently in a secondary
storage copied to another kind of secondary storage (Jalali et al., 2016).
-Redundancy
The redundancy is considered as critical component duplication of a system, aiming increasing
reliability of the system. Redundancy mainly occurs in form of a backup for improving actual
performance of the system (Chang, Kuo and Ramachandran, 2016).
-Upgrades
The upgrade is considered as the process of replacing some data or products with some newer
version of same kind of data or product. Upgrade mainly consists hardware replacement or changes
in the software firmware for a better and improved performance (Sen, 2015).
-Repair
In the process of maintenance the repair means restoring something faulty and damaged parts.
Repair can lead to upgrading also if a part becomes non-reparable (Etro, 2015).
And how it is affected by virtualisation
12
SERVER DEVELOPMENT AND MAINTENANCE
In this case virtualization actually avoids the maintenance of server. Thus this is having a positive
impact over the maintenance factor.
Mean-time repair- mean time before failure
The mean time to repair is average time for troubleshooting and repair failed equipment and it is
returned to normal condition of operating.
RAIDS
RAID is actually a data storage and virtualization technology.
Security, monitoring, backup and restore
Microsoft Azure is a typical type of cloud computing service that is created by the Microsoft for
testing, building and for providing service for managing the data centres.
-Azure monitoring features
The azure monitor is a particular platform monitoring the azure resources. This azure monitor
includes log analytics, insight of application and flexibility to data.
Server options
Although Linux server is cheap and easier to use, windows server offers wide range of services and
also provides extensive support for server deployment (Deng et al., 2016). Hence this server is
chosen.
What is the difference between server hardware and non-server hardware?
A server hardware is physical entity that incorporates required hardware for developing server (Li
et al., 2017).
SERVER DEVELOPMENT AND MAINTENANCE
In this case virtualization actually avoids the maintenance of server. Thus this is having a positive
impact over the maintenance factor.
Mean-time repair- mean time before failure
The mean time to repair is average time for troubleshooting and repair failed equipment and it is
returned to normal condition of operating.
RAIDS
RAID is actually a data storage and virtualization technology.
Security, monitoring, backup and restore
Microsoft Azure is a typical type of cloud computing service that is created by the Microsoft for
testing, building and for providing service for managing the data centres.
-Azure monitoring features
The azure monitor is a particular platform monitoring the azure resources. This azure monitor
includes log analytics, insight of application and flexibility to data.
Server options
Although Linux server is cheap and easier to use, windows server offers wide range of services and
also provides extensive support for server deployment (Deng et al., 2016). Hence this server is
chosen.
What is the difference between server hardware and non-server hardware?
A server hardware is physical entity that incorporates required hardware for developing server (Li
et al., 2017).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13
SERVER DEVELOPMENT AND MAINTENANCE
A non-server hardware is simulation of entire required hardware platform required for server
deployment.
Networking topologies, connection methods, internet backups
There are four types of network topologies available (Mastelic et al., 2015)
a) Mesh Topology:
In mesh topology, every device is connected to another device and this connection is done through
specific channel.
b) Star Topology:
In star topology, all the devices are connected with each other and this connection is made through a
single cable which is known as a single hub. This hub is also referred to as the central node and
every other nodes that are present in the network has connection with this node.
SERVER DEVELOPMENT AND MAINTENANCE
A non-server hardware is simulation of entire required hardware platform required for server
deployment.
Networking topologies, connection methods, internet backups
There are four types of network topologies available (Mastelic et al., 2015)
a) Mesh Topology:
In mesh topology, every device is connected to another device and this connection is done through
specific channel.
b) Star Topology:
In star topology, all the devices are connected with each other and this connection is made through a
single cable which is known as a single hub. This hub is also referred to as the central node and
every other nodes that are present in the network has connection with this node.
14
SERVER DEVELOPMENT AND MAINTENANCE
c) Bus Topology:
Bus topology refers to a specific network type and one of the popular network topologies where
each and every computer along with the network device is connected to single cable. It transmits the
data from one end to another in single direction. No bi-directional feature is in bus topology.
It provides facility for data transmission of data between nodes, but this transmission is supported in
one direction. Hence data transmission in both the direction is not supported which means that data
from central node to other node is supported but data from other nodes to the central node is not
supported which is a drawback of this kind of network connection topology.
SERVER DEVELOPMENT AND MAINTENANCE
c) Bus Topology:
Bus topology refers to a specific network type and one of the popular network topologies where
each and every computer along with the network device is connected to single cable. It transmits the
data from one end to another in single direction. No bi-directional feature is in bus topology.
It provides facility for data transmission of data between nodes, but this transmission is supported in
one direction. Hence data transmission in both the direction is not supported which means that data
from central node to other node is supported but data from other nodes to the central node is not
supported which is a drawback of this kind of network connection topology.
15
SERVER DEVELOPMENT AND MAINTENANCE
d) Ring Topology:
In this topology, a ring is formed that connects devices and connection of a devices is only made
with two nodes that are neighbouring node of the device. Connection to other nodes that are not
neighbouring node is not allowed. Even if it is a neighbouring node, connection to more than two
node is not allowed.
SERVER DEVELOPMENT AND MAINTENANCE
d) Ring Topology:
In this topology, a ring is formed that connects devices and connection of a devices is only made
with two nodes that are neighbouring node of the device. Connection to other nodes that are not
neighbouring node is not allowed. Even if it is a neighbouring node, connection to more than two
node is not allowed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
16
SERVER DEVELOPMENT AND MAINTENANCE
Define and explore operating system services for desktop, client and servers
- DHCP: The Dynamic Host Configuration Protocol (DHCP) is a network management
protocol deployed on UDP/IP networks and communication between devices of different
networks through DHCP servers.
- Databases: a structured set of data that is stored in a computer which facilities access to data
in various process.
- File sharing:
- It is an process of storing documents and files and access it remotely
- -Active directory:
- Active Directory (AD) is a directory service that is developed and offered by Microsoft
and it is integrated with the Windows domain networks
- -Group policies
- It is a feature that is integrated with operating system of the Microsoft Windows NT
family that allows for establishing central management and allows to configure operating
systems, applications, and users' settings in an Active Directory environment
Define and explore active directory FSMO
- -ACL:
ACLs or the Access Control Lists is considered to be the set of rules which are commonly
used for the purpose of filtering the network traffic. This are generally used upon the
network devices along with the packet filtering capabilities such as the routers and the
firewall. ACLs are generally seen to be applied on the interfaces based upon the packets
SERVER DEVELOPMENT AND MAINTENANCE
Define and explore operating system services for desktop, client and servers
- DHCP: The Dynamic Host Configuration Protocol (DHCP) is a network management
protocol deployed on UDP/IP networks and communication between devices of different
networks through DHCP servers.
- Databases: a structured set of data that is stored in a computer which facilities access to data
in various process.
- File sharing:
- It is an process of storing documents and files and access it remotely
- -Active directory:
- Active Directory (AD) is a directory service that is developed and offered by Microsoft
and it is integrated with the Windows domain networks
- -Group policies
- It is a feature that is integrated with operating system of the Microsoft Windows NT
family that allows for establishing central management and allows to configure operating
systems, applications, and users' settings in an Active Directory environment
Define and explore active directory FSMO
- -ACL:
ACLs or the Access Control Lists is considered to be the set of rules which are commonly
used for the purpose of filtering the network traffic. This are generally used upon the
network devices along with the packet filtering capabilities such as the routers and the
firewall. ACLs are generally seen to be applied on the interfaces based upon the packets
17
SERVER DEVELOPMENT AND MAINTENANCE
which are leaving or entering the interface. One example of how the ACLs are used has
been depicted in the network topology provided below:
Considering the fact that the S1 is associated with holding important documents which are
only to be made available for the management of the company. So it is possible to configure
an access list in the R1 for the purpose of enabling the access to the S1only to those users
belonging to the management network and would also responsible for blocking of any other
traffic which goes to the S1. This in turn would be associated with ensuring the fact that
only the authorized users are capable of accessing the sensitive files present in S1.
- SSL
SSL or the Secure Sockets Layer is considered to be the standard security technology used
for the purpose of establishment of a link which would be encrypted and would be existing
between the web server and the browser. The link would be associated with ensuring the fact
the data which is passed in between the web server and the browser remains private and
integral. SSL is one of the industry standard which is used by numerous websites so as to
protect any kind of online transaction with the customers.
- Proxys
- VPN
SERVER DEVELOPMENT AND MAINTENANCE
which are leaving or entering the interface. One example of how the ACLs are used has
been depicted in the network topology provided below:
Considering the fact that the S1 is associated with holding important documents which are
only to be made available for the management of the company. So it is possible to configure
an access list in the R1 for the purpose of enabling the access to the S1only to those users
belonging to the management network and would also responsible for blocking of any other
traffic which goes to the S1. This in turn would be associated with ensuring the fact that
only the authorized users are capable of accessing the sensitive files present in S1.
- SSL
SSL or the Secure Sockets Layer is considered to be the standard security technology used
for the purpose of establishment of a link which would be encrypted and would be existing
between the web server and the browser. The link would be associated with ensuring the fact
the data which is passed in between the web server and the browser remains private and
integral. SSL is one of the industry standard which is used by numerous websites so as to
protect any kind of online transaction with the customers.
- Proxys
- VPN
18
SERVER DEVELOPMENT AND MAINTENANCE
VPN or the Virtual Private Network is the secure tunnel which is seen to be existing
between the device and the internet. VPNs are generally used for the purpose of protecting
the online traffic from any kind of snooping, interference or censorship. VPN is associated
with extending the private network all across the public network and is associated with
enabling the users in sending and receiving of the data all across the shared or the public
network, which seems like a direct connection between the computing devices and the
private network.
- Software defined networking
Software Define Networking or the SDN generally refers to an architecture which aims at
making the network much more agile as well as flexible. SDN is having the goal of
improving the network control by means of enabling the enterprises and the service
providers in making quick response to the changes taking place in the requirements of the
business.
- Clustered computing:
Cluster computing or the High-performance computing framework generally refers to the
form of computing which includes a bunch of computers which are connected to one another
by means of LAN so as to make sure that they behave like a single machine. A computer
cluster is associated with helping in the process of solving the complex operations in an
efficient way by means of faster processing speed, better integration of the data than a single
computer and they are only used for the applications which are seen to be mission critical.
- Big data/AI
Big data generally refers to the field which is associated with treating the ways of analysing,
along with the systematic extraction of the information from or is associated with dealing with
data sets which are seen to be very large in size or are complex in nature that they cannot be
dealt with by making use of the additional data-processing application software.
SERVER DEVELOPMENT AND MAINTENANCE
VPN or the Virtual Private Network is the secure tunnel which is seen to be existing
between the device and the internet. VPNs are generally used for the purpose of protecting
the online traffic from any kind of snooping, interference or censorship. VPN is associated
with extending the private network all across the public network and is associated with
enabling the users in sending and receiving of the data all across the shared or the public
network, which seems like a direct connection between the computing devices and the
private network.
- Software defined networking
Software Define Networking or the SDN generally refers to an architecture which aims at
making the network much more agile as well as flexible. SDN is having the goal of
improving the network control by means of enabling the enterprises and the service
providers in making quick response to the changes taking place in the requirements of the
business.
- Clustered computing:
Cluster computing or the High-performance computing framework generally refers to the
form of computing which includes a bunch of computers which are connected to one another
by means of LAN so as to make sure that they behave like a single machine. A computer
cluster is associated with helping in the process of solving the complex operations in an
efficient way by means of faster processing speed, better integration of the data than a single
computer and they are only used for the applications which are seen to be mission critical.
- Big data/AI
Big data generally refers to the field which is associated with treating the ways of analysing,
along with the systematic extraction of the information from or is associated with dealing with
data sets which are seen to be very large in size or are complex in nature that they cannot be
dealt with by making use of the additional data-processing application software.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
19
SERVER DEVELOPMENT AND MAINTENANCE
Artificial intelligence is also known as the machine intelligence which is considered to be the
intelligence which is demonstrated by the machines in contrast to the natural intelligence which
are displayed by the humans as well as by human beings.
SERVER DEVELOPMENT AND MAINTENANCE
Artificial intelligence is also known as the machine intelligence which is considered to be the
intelligence which is demonstrated by the machines in contrast to the natural intelligence which
are displayed by the humans as well as by human beings.
20
SERVER DEVELOPMENT AND MAINTENANCE
Conclusion
For small and medium companies SAAS is recommended where access to the software is not
restricted to any particular device, it is possible to access the software from any kind of device,
provided required configuration is supported by that particular device. Hence this offers flexibility
and ease of access for software application required by the organization.
For large organizations, IAAS or PAAS might be an alternate option as in large organizations,
resource allocation and cost for application development is not an issue. However, they also might
consider SAAS as well as various large organizations are also considering SAAS cloud services. In
PAAS, once the application is developed, this application needs to be hosted on the web and
support for hosting application is not included in this cloud mode. One important thing here is that,
if data breach happens due to lack of security integration, it is not responsibility of the cloud vendor
as they were only contracted for infrastructure support, hence they are liable for security flaws in
the application developed with application development tools provided by the cloud vendor. Hence
popularity for the SAAS service model is increasing as well.
References
Abdel-Basset, M., Mohamed, M. and Chang, V., 2018. NMCDA: A framework for evaluating cloud
computing services. Future Generation Computer Systems, 86, pp.12-29.
Rittinghouse, J.W. and Ransome, J.F., 2017. Cloud computing: implementation, management, and
security. CRC press.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future generation computer systems, 56, pp.684-700.
SERVER DEVELOPMENT AND MAINTENANCE
Conclusion
For small and medium companies SAAS is recommended where access to the software is not
restricted to any particular device, it is possible to access the software from any kind of device,
provided required configuration is supported by that particular device. Hence this offers flexibility
and ease of access for software application required by the organization.
For large organizations, IAAS or PAAS might be an alternate option as in large organizations,
resource allocation and cost for application development is not an issue. However, they also might
consider SAAS as well as various large organizations are also considering SAAS cloud services. In
PAAS, once the application is developed, this application needs to be hosted on the web and
support for hosting application is not included in this cloud mode. One important thing here is that,
if data breach happens due to lack of security integration, it is not responsibility of the cloud vendor
as they were only contracted for infrastructure support, hence they are liable for security flaws in
the application developed with application development tools provided by the cloud vendor. Hence
popularity for the SAAS service model is increasing as well.
References
Abdel-Basset, M., Mohamed, M. and Chang, V., 2018. NMCDA: A framework for evaluating cloud
computing services. Future Generation Computer Systems, 86, pp.12-29.
Rittinghouse, J.W. and Ransome, J.F., 2017. Cloud computing: implementation, management, and
security. CRC press.
Botta, A., De Donato, W., Persico, V. and Pescapé, A., 2016. Integration of cloud computing and
internet of things: a survey. Future generation computer systems, 56, pp.684-700.
21
SERVER DEVELOPMENT AND MAINTENANCE
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of
“big data” on cloud computing: Review and open research issues. Information systems, 47, pp.98-
115.
Chen, X., Jiao, L., Li, W. and Fu, X., 2016. Efficient multi-user computation offloading for mobile-
edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), pp.2795-2808.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Gai, K., Qiu, M., Zhao, H., Tao, L. and Zong, Z., 2016. Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, pp.46-54.
Marinescu, D.C., 2017. Cloud computing: theory and practice. Morgan Kaufmann.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud
computing. Future Generation Computer Systems, 78, pp.964-975.
Li, J., Li, J., Chen, X., Jia, C. and Lou, W., 2015. Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), pp.425-437.
Jalali, F., Hinton, K., Ayre, R., Alpcan, T. and Tucker, R.S., 2016. Fog computing may help to save
energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), pp.1728-
1739.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
SERVER DEVELOPMENT AND MAINTENANCE
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of
“big data” on cloud computing: Review and open research issues. Information systems, 47, pp.98-
115.
Chen, X., Jiao, L., Li, W. and Fu, X., 2016. Efficient multi-user computation offloading for mobile-
edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), pp.2795-2808.
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Gai, K., Qiu, M., Zhao, H., Tao, L. and Zong, Z., 2016. Dynamic energy-aware cloudlet-based
mobile cloud computing model for green computing. Journal of Network and Computer
Applications, 59, pp.46-54.
Marinescu, D.C., 2017. Cloud computing: theory and practice. Morgan Kaufmann.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and
challenges. Information sciences, 305, pp.357-383.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud
computing. Future Generation Computer Systems, 78, pp.964-975.
Li, J., Li, J., Chen, X., Jia, C. and Lou, W., 2015. Identity-based encryption with outsourced
revocation in cloud computing. Ieee Transactions on computers, 64(2), pp.425-437.
Jalali, F., Hinton, K., Ayre, R., Alpcan, T. and Tucker, R.S., 2016. Fog computing may help to save
energy in cloud computing. IEEE Journal on Selected Areas in Communications, 34(5), pp.1728-
1739.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A
security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
22
SERVER DEVELOPMENT AND MAINTENANCE
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Deng, R., Lu, R., Lai, C., Luan, T.H. and Liang, H., 2016. Optimal workload allocation in fog-
cloud computing toward balanced delay and power consumption. IEEE Internet of Things
Journal, 3(6), pp.1171-1181.
Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M. and Chen, K., 2017. Multi-key privacy-
preserving deep learning in cloud computing. Future Generation Computer Systems, 74, pp.76-85.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J.M. and Vasilakos, A.V., 2015.
Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), p.33.
In I eml;
SERVER DEVELOPMENT AND MAINTENANCE
Sen, J., 2015. Security and privacy issues in cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 1585-1630). IGI Global.
Etro, F., 2015. The economics of cloud computing. In Cloud Technology: Concepts,
Methodologies, Tools, and Applications (pp. 2135-2148). IGI Global.
Deng, R., Lu, R., Lai, C., Luan, T.H. and Liang, H., 2016. Optimal workload allocation in fog-
cloud computing toward balanced delay and power consumption. IEEE Internet of Things
Journal, 3(6), pp.1171-1181.
Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M. and Chen, K., 2017. Multi-key privacy-
preserving deep learning in cloud computing. Future Generation Computer Systems, 74, pp.76-85.
Mastelic, T., Oleksiak, A., Claussen, H., Brandic, I., Pierson, J.M. and Vasilakos, A.V., 2015.
Cloud computing: Survey on energy efficiency. Acm computing surveys (csur), 47(2), p.33.
In I eml;
1 out of 23
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.