Cloud Computing Report: Infrastructure, Services, and Usage Mechanisms

Verified

Added on  2023/04/20

|18
|945
|412
Report
AI Summary
This report provides a comprehensive introduction to cloud computing, exploring its foundational aspects and various service models. It begins by defining cloud infrastructure as a complete solution for organizational operations, detailing services like data storage and software development kits. The report then delves into the logical network perimeter, emphasizing its role in securing IT resources and providing secure access. A case study on DTGOV illustrates practical applications, highlighting the use of routers, DMZ, and firewalls. The discussion extends to virtual servers and cloud storage devices, explaining their virtualization capabilities and pay-per-use mechanisms. Technical interfaces, including network, object, and database storage interfaces, are also examined. Furthermore, the report covers cloud usage-monitor mechanisms, discussing monitoring and resource agents, along with resource replication and the Platform-as-a-Service (PaaS) model. The content is supported by multiple references to enhance understanding.
Document Page
Cloud Computing
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 2
Introduction
Cloud infrastructure is a complete solution of
all the problems. It provides all the solutions,
which are related to the organization's
operations (Schouten, 2014).
Cloud infrastructure mechanism provides
different services, such as data storage,
software development kit, and many others.
Document Page
student name and number 3
Logical network perimeter
Virtual private network provides a different
network environment to the organization for
security purpose
Different purposes of logical network
1. it secure their IT-sources from unauthorized
access
2. It provides secure access t internal and external
sources (Dinh, Lee, Niyato, & Wang, 2013).
3. It isolate IT resources of an organization, such
as servers, data storage and bandwidth for cloud
consumers.
Document Page
student name and number 4
Logical network perimeter (2)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 5
Case study (DTGOV)
DTGOV requires many resources to manage
their operations which are as mention below:
1. Routers : it connects external network from
internal network and forward data packets to the
desired node (Garg, Versteeg, & Buyya, 2013).
2. DMZ : it is a secure zone for creating virtual
network hosting for proxy servers of company.
3. Firewalls : it is used to provide , controlling,
isolation of traffic, monitoring and filter network
traffic.
Document Page
student name and number 6
Document Page
student name and number 7
Victual Servers
Virtual servers provide virtualization to
emulates a physical server s issues
It is a best way to remove physical server
problem for an organization (Krutz, & Vines,
2010).
Cloud-based server is provide it for resources
sharing in between different clients
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
student name and number 8
Victual Servers (2)
Document Page
student name and number 9
Cloud-Storage Devices Mechanism
Data storage is an important service of
cloud(Mahalle, Yong, Tao, & Shen, 2018).
it provide a virtual storage to save and
secure data.
These devices have facility to be virtualized
This services is based on the pay-per-use
mechnishm (Rittinghouse, & Ransome, 2016).
Document Page
student name and number 10
Cloud storage level
Objects
Files
Datasets
Blocks
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 11
Technical Interfaces
Network storage interface: provides virtual
data storage
Object storage interface: provide instance of
stored data
Database storage interface
1. Relational data storage
2. Non-relational data storage
Document Page
student name and number 12
Document Page
student name and number 13
Cloud Usage-monitor Mechanism
Software is used to manage all the
processing and usages of different sources of
cloud
It has a record of all the activities in the
cloud, such as usage time, amount of data,
and many others
Provide a analysis report to monitor
suspicious activities in the network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
student name and number 14
Format of agents
Monitoring agent – this agent is used for
monitoring different activities (Sen, 2014).
Resource agent – all the IT resources are
managed by resource agent such as initiating,
vertical scaling, resuming services
Polling agent – this agent is responsible for
uptime and downtime of IT resources
Document Page
student name and number 15
Resource replication & Ready-made environment
It is a concept that makes multiple instances
of the same IT resources
Platform-as-a-Service (PaaS)- it is a platform
that have all the IT resources, which are
required by the user, such as software
development kit (Zhang, Wuwong, Li, &
Zhang, 2010).
Document Page
student name and number 16
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
student name and number 17
References
Schouten, E. (2014). Cloud computing defined: Characteristics & service levels.
Retrieved September 11, 2018, from
https://www.ibm.com/blogs/cloud-computing/2014/01/31/cloud-computing-defined-
characteristics-service-levels/
Dinh, H., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing:
architecture, applications, and approaches. Wireless communications and mobile
computing, 13(18), 1587-1611.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud
computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Krutz, R., & Vines, R. D. (2010). Cloud security: A comprehensive guide to secure
cloud computing. . London: Wiley Publishing.
Mahalle, A., Yong, J., Tao, X., & Shen, J. (2018). Data Privacy and System Security for
Banking and Financial Services Industry based on Cloud Computing Infrastructure.
IEEE Explore, 407-413.
Rittinghouse, J., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. . Florida: CRC press.
Sen, J. (2014). Security and privacy issues in cloud computing. In J. Sen, In
Architectures and protocols for secure information technology infrastructures (pp. 1-
45). USA: IGI Global.
Zhang, X., Wuwong, N., Li, H., & Zhang, X. (2010). Information security risk
management framework for the cloud computing environments. In Computer and
Information Technology (CIT) (pp. 1328-1334). IEEE.
Document Page
student name and number 18
Any Question ???
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]