Detailed Report: Configuration and Deployment of Cloud Infrastructure

Verified

Added on  2023/06/03

|25
|7236
|393
Report
AI Summary
This report delves into the configuration and deployment of cloud infrastructure, focusing on Microsoft System Center Operations Manager (SCOM). The report begins by defining SCOM and its role in managing IT infrastructure, emphasizing its importance in large enterprises. It then details the components of SCOM, including management servers, operational databases, data warehouses, and reporting servers, and explains how user roles are designed for data access and monitoring. The report further examines the role of agents in collecting data and monitoring various operating systems, and it describes different methods for installing agents. The report also provides a comparison of SCOM with alternative monitoring tools like Nagios and SolarWinds. Finally, it concludes with a discussion on the importance of operation manager in monitoring systems and applications, highlighting its significance in ensuring the availability and performance of critical services. The report also touches upon the integration of SCOM with other tools, like Service Manager, and the use of management packs for automating auditing processes.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Table of Contents
Answer to Question 1:.........................................................................................................3
Part A...............................................................................................................................3
Part B...............................................................................................................................4
Answer to Question 2:.........................................................................................................5
Part A...............................................................................................................................5
Part B...............................................................................................................................6
Part C...............................................................................................................................6
Answer to Question 3:.........................................................................................................7
Answer to Question 4:.........................................................................................................8
Answer to Question 5:.......................................................................................................11
Answer to Question 6:.......................................................................................................11
Answer to Question 7:.......................................................................................................13
Answer to Question 8:.......................................................................................................13
Answer to Question 9:.......................................................................................................13
Answer to Question 10:.....................................................................................................13
Part A.............................................................................................................................13
Part B.............................................................................................................................15
Part C.............................................................................................................................15
Answer to Question 11:.....................................................................................................16
Document Page
2CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Answer to Question 12:.....................................................................................................17
References..........................................................................................................................20
Document Page
3CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Answer to Question 1:
Part A
SCOM stands for Microsoft system center operation manager can be defined as collection
of system management products (Greene, 2016). It helps in managing various end to end
products and services which are related to IT infrastructure in an enterprise. IT infrastructure
tends to play a key role in business continuity of a given enterprise (Mohammed, 2015). SCOM
aims to provide various kind of important information related to computer health, anti-virus
software and lastly issues related to it. It is considered to be useful in various large enterprise
which comes up with complex and big IT infrastructure. Large enterprise focuses on deployment
of large and complex and SCOM is very beneficial in this case (Bannan, 2016). In large
organization it is not possible to keep a track of each and every single computing sources. So in
this particular scenario SCOM can be beneficial for monitoring a large number of computing
resources. Microsoft system center comes up with sub-unit which is known to be a management
group (Strazdinsy et al., 2017). It comes up with certain number of units like management server,
operational database, database of warehouse and lastly reporting server. Management server is
mainly responsible for proper kind of configuration of the given management group,
communication and lastly administration of agents and database (Ibrahim et al., 2016). A
management group comes up with various kind of server which totally depends on various kind
of server management. It totally depends on size of computing environment. The agents are
needed for collecting data which totally depends on size of computing environment. The agents
are mainly involved in collecting the data and sending proper kind of alert.
A basic SCOM installation comes up with various kind of components (Ellis, 2015). A
management server is needed for handling some essential administration and connecting it with
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
database (Ibrahim et al., 2016). Operational database aims to provide SQL with proper and
current kind of reporting. Data warehouse aims in holding SQL data which is being provided at
the time of long-time holding (Rădulescu, 2014). A report server mainly needs queries the given
database and can easily provide various kind of detail related to delivery to different
administrators. IT department can easily install these particular components which are there on
one server and various server required for scalability.
In system center operation manager, various kind of user can easily make use of method
which is needed to assign the proper kind of rights to an individual (Tradat et al., 2017). It is
mainly done for accessing monitoring of data and carrying out large number of actions. Roles of
users are designed in such a way they can be easily used for accessing and carrying out large
number of activities on the same given group. Operation manager administrator comes up with
proper right which can be used for viewing and monitoring of data in proper way. Roles of users
are created by making use of role wizard (Krstevski, 2014). In this wizard, an individual need to
configure the active directory security group which is assigned by making use of roles. It can be
used for making use groups which are needed for monitoring groups for monitoring the access of
user and specific task. Dashboard and views are required for understanding the roles in each and
given access (Liu, Wang & Ma, 2014).
Part B
An operation manager is well-known enterprise platform for monitoring which is
required for monitoring various kind of infrastructure and workload (Meena, Singh & Bharadi,
2016). User is generally aligned to access and monitor data within the given operation. So
various kind of issues of escalation can easily support for tier or development of application
which is revenant to their given role (Parven & Maimani, 2014). Role-based security aims in
Document Page
5CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
creating a platform which can easily limit the privilege which the user can have on various aspect
of operation manager.
Answer to Question 2:
Part A
In System center operation manager, an agent can be easily stated like service which is
generally installed on system (Dong et al., 2015). It mainly aims in configuration of given data
and collection of information which is needed for analysis. It is required for understanding
various kind of objects like SQL based database or any kind of logical disk. It ultimately helps in
measuring the state of monitoring objects like SQL database or any kind of logical disk. It
ultimately helps in executing various kind of demands which are put forward by operation in the
given response to condition (Zhuang et al., 2015). It ultimately helps the operation manager to
monitor various operating system like windows, Linux and lastly Unix. Various components of
IT service are mainly installed on web or controller of active directory. The operation manager
agents are listed as Microsoft monitoring agent-based service (Ramakrishnan & Kaur, 2017).
Microsoft agent service aims in collecting and execution of task and other kinds of workflow in
the given management of pack. In many cases it is seen that service is unable to establish
communication with the management server. Then the given service may tend to run and collect
queues which are required for collection of data. It emphasizes certain number of events which is
totally based monitoring of given computer (Ramakrishnan & Kaur, 2017). When the total
connection is restored then Microsoft agent service agent can easily set collected data to the
given event of server management.
Document Page
6CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Part B
In SCOM (System center operation manager) there is large number of ways which can be
used for installing agents in client system. The methods are
Discovery Wizard
Group policy
Discovery of schedule
SCCM deployment
Scheduled discoveries
Operations manager command shell
Discovery wizard is considered to be one of the best methods of administration to deploy
any agents which are required like asset in SCOM infrastructure (Li et al., 2015). Discovery
wizards can easily broadcast the subnet for finding some of the best ways in which device agents
are installed easily. It can easily provide the option where various device can easily push the
SCOM agent out of RPC (Goyal, 2014). An individual can easily put the agent out PC by
making use of industry standard software deployment by the help of group policy. By making
use of group policy machines cannot be automatically being approved (Kuijs et al., 2015). An
individual need to add them through manual way until and unless the user has Auto-approve new
kind of manual agents.
Part C
Installation of service manager console on operation manager does not require to be
supported (Farokhi et al., 2016). If anyhow it is installed, then operation manager SDK service is
stopped totally. When a service manager management server and data warehouse then an
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
individual need to have management group. Operation manager is supported by service manager
for establishing connection with other agents. Operation manager does not support any kind of
data source integration (Lu et al., 2015). An individual need to have register data source in the
warehouse which is according to system center version. Service manager is mainly inclusive of
operation manager agent. This particular agent is installed at the time of service manager. After
installation, the user should configure the agent for establishing communication with operation
manager management server (Mason et al., 2015).
Answer to Question 3:
SCOM stands for Microsoft System Center Operation manager is considered to be a part
of Microsoft system center (Niu et al., 2015). It is considered to be a part of enterprise of
management software. SCOM is very much employing, configuring, managing and lastly proper
monitoring of various services and devices. SCOM makes use of various agents which are
installed on each and every system which is required for checking the level of performance. It
helps in retrieving data by various management server (Zhang et al., 2014). Application-based
management packs aim in providing certain number of rules for collection of data. It aims in
reporting some particular kind of application. Management packs allow various SCOM which is
required for managing and proper monitoring of application which is outside the given tool. Both
monitoring and management can be considered to be complex for any kind of manual handling
process. It makes use of certain number of packs which can be used for automating the overall
auditing process (Clemente-Castelló et al.,2017).
Microsoft aims to provide certain number of management packs which allow SCOM that
is required for managing and monitoring of various application (Huang & Du, 2014). The
application can be both inside and outside which is needed for direct control. Proper kind of
Document Page
8CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
monitoring and management which is very much complex for handle in manual way (Dobre,
Viotti & Vukolić, 2014). Third parties also aim to providing SCOM management packs. For
some particular system an individual can have agent of the various kind of device. SCOM aims
in providing proper kind of monitoring for the various kind of machine by making use of proxy
agent which tends to run on another kind of given system (Pluzhnik, Nikulchev & Payain, 2014).
There are large number of alternatives for SCOM alternatives
Nagios: It is considered to be an open source server program for monitoring which is
considered to be very similar to SCOM (Pluzhnik & Nikulchev, 2014). Both the given programs
come with agent-based monitoring which is needed for providing support for Windows and
support for Linux OS. Nagios is known to be an active community which is based on community
which aims in sharing plugin platform for various users.
Sola winds server: It is mainly required for providing support for large number of
application, server and its database (Shyshkina, 2018). It is also helpful in checking the status on
Microsoft application in Azure. Application monitoring in Azure like SQL server can be lacking
in some of the cases like SQL server. It can be easily monitored by the help of SQL server which
lacks in some of the cases. Each of the given monitoring nodes is needed for license which
comes up with some proper cost for large kind of deployments.
Answer to Question 4:
Operation manager is considered to be a part of Microsoft system center is a well-known
software which helps in monitoring, operation and device (Pham et al., 2015). It is mainly done
for many systems which require single console. Business, small and large is totally dependent on
various kind of service and another kind of application which is provided by the given
Document Page
9CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
computing environment (Srinivasan, Quadir & Vijayakumar, 2015). IT department is mainly
responsible for understanding the availability and ensuring the given performance of system. It is
mainly used by various kind of critical service and another kind of application. It mainly
highlights the IT department to understand the need for problem and figuring out the given
problem. It is mainly used by various users for encountering the problems. It is used by various
kind of computing device in the system which is becoming challenging in last few years. With
the increase in the number of computing devices, the challenge is increasing on day by day
interval or basis. Making use of operation manager in the given environment makes it is easier
for various computers to be monitored (Kovachev, Cao & Klamma, 2014). The operation
console helps the user in checking the various aspects like health, performance, availability and
lastly monitoring of various objects in the given environment. It helps the user to analyze and
overcome various kind issues or problem.
Installation of operation manager helps in creating a proper kind of management group.
The management group is known to be basic principle of functionality.
Management server: It is considered to be focal point for administering the management
group along with communication with the given database. When the user opens ups operation
console and establish connection with management group (Wang et al., 2015). Then user can
open up operation console and establish connection with the management server for the given
group. It totally depends on size of computing environment. A management group can easily
contain a single management group or depends on single management server or even multiple
ones.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
The main task of management server is to easily monitor the configuration of
management group. It helps in administration and proper communication with the given database
in the group (Calatrava et al., 2016). The management group tends to contain various
management server which is needed for providing some additional capacity. In some cases, two
or more management server can be used for adding to management group. Management server
can easily become a part of resource pool and work can be easily spread across various members.
Operation database: Operational database in SQL server comes up various kind
configuration of data which is needed by various management group(Greene, 2016). It aims in
storing all kind of all monitored data which needs to be collected and monitored for various
management group. The operational database tends to retain data for short period of time.
Data warehouse database: It is a SQL server database which helps in storing and
monitoring data that can be used for historical purpose(Bannan, 2016). Data is mainly written in
the operation database of the data warehouse databases so that it can easily report the current
data. The given data in warehouse should tend to remain for a long period of time.
Management packs: Workflow of system center management service is totally stated by
management packs (Ibrahim et al., 2016). It defines that information that the given agents can
easily collect and return the management server which is needed for specific technology. As
soon as the operation manager is installed on the agent computer, it can easily send initial
configuration to any of the agent (Ellis, 2015). The initial configuration is all about analyzing the
type of data along with objectives and features.
Service: Monitoring of Microsoft agent helps in collection of information, evaluation of
task and its collection (Ibrahim et al., 2016). The Microsoft monitoring agent service aims to
Document Page
11CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
provide data, executing and many other. In many cases, the service is unable to establish proper
kind of communication with the given management server and finally reporting to the service
(Strazdinsy et al., 2017). It aims in providing service which cannot be sent to server as it aims in
providing communication with server management.
Answer to Question 5:
To be done by Student
Answer to Question 6:
APM stands for Application performance monitoring is a well-known software which has
been designed in such a way that is can provide help to IT administrator. It mainly works for
meeting performance standard along with providing quality of experience (Mohammed, 2015).
Application monitoring performance tool is used for monitoring various tools provided to
administrator. It can easily overcome certain number issues which are related to performance of
application (Rădulescu, 2014). APM tool can be used for monitoring tools which provide the
administrators with proper kind of data. They quickly need to discover and solve problem which
can have negative effect on the application. APM tool can easily track the performance of
various application over the time and has given IT professional to understand the effect of
various dependencies (Tradat et al., 2017). APM is very helpful in monitoring the speed at which
the given transaction can be performed by both end user and system. It aims in providing support
to various network application and providing end to end overview to some of the bottlenecks and
lastly interruption of service.
This mainly requires the use of software tools which is there on single integrated SaaS or
on-premises tool. It is mainly required for analyzing the speed of the network, reliability and
Document Page
12CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
lastly performance (Krstevski, 2014). Various aspects like load testing, synthetic monitoring, and
real-time monitoring can be considered to be root because which is needed for providing to
APM. It can be stated as a component which can be used for analyzing web performance
monitoring. Application monitoring emphasizes on certain number of technical assurance of
APM. Various kind of APM can easily make of certain number of software which can easily
collaborate with operation teams. It can easily manage the progress of the project and can easily
generate proper kind of reports (Liu, Wang & Ma, 2014). Different testers can easily make use of
APM software which is required for increasing the accuracy of any test. It is very important for
understanding conduct on loading test on various components of application.
APM tool is very much beneficial in gathering data on both the sides that is client side
and server side. It can easily gather data from large number of things which plays a key role
understanding the performance of any application (Meena, Singh & Bharadi, 2016). Application
performance monitoring helps in having an understanding with respect to hosting application,
collecting information and lastly utilization of processes (Parven & Maimani, 2014). It can be
also used for tracking utilization of processes which comes up various kind of application which
comes up with number of operation carried out per second on performance on CPU server.
At the level of software, APM tool is very beneficial in tracking rate of error and how it
can lead an application to run into various platform (Dong et al., 2015). In many cases, error can
take place when there is not proper memory for any application to have any easy access.
Application monitoring tool can be considered to be beneficial in understanding the code of
execution (Zhuang et al., 2015). It is mainly used for identifying various bottlenecks which is an
intensive process looked in the given database.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Automated balancing of load in IT application can be helpful in thinking various kind of
thing because it can be easily used for establishing connection with various kind of server which
is required to be used in various application (Ramakrishnan & Kaur, 2017). Automation mainly
deals with proper kind of masking the various problem which various server can easily carry
more amount of load. Tools of APM can be used for ignoring the issues which are encountered
by the help of proper kind of monitoring in all the given server. IT professional is mainly used
for building certain number of APM tool which can provide issues or even in certain zones
where performance can be easily minimized(Li et al., 2015). They are mainly required for giving
priority to various kind of application depending on the nature of business critical.
Answer to Question 7:
To be done by student
Answer to Question 8:
To be done by student
Answer to Question 9:
To be done by student
Answer to Question 10:
Part A
Hybrid cloud can be stated as an environment of cloud computing which makes use of
on-premises, private cloud and lastly third party based application. Public cloud makes use of
two kinds of platform (Ramakrishnan & Kaur, 2017). It can be achieved by moving into private
and public cloud domain which emphasize computing needs and various changes in cost. Hybrid
Document Page
14CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
cloud provides business with much greater amount of flexibility and larger number of option for
deployment.
Hybrid cloud architecture mainly comes up with following availability like
A public IaaS (Infrastructure as a Service) platform like Amazon web services,
Google cloud platform
The construction can be done on private cloud which can be either be on premises
or can be even worked with the help of hosted service provider
An adequate Wide area connectivity is needed for establishing connection
between the two environments.
Hybrid cloud is very much beneficial as it enables a given enterprise for deployment of
on-premises private based cloud(Goyal, 2014). It aims to work for some sensitive or any kind
critical workloads. It is needed for providing some of the third party application which aims to
provide to host fewer application resources. Hybrid cloud is needed for providing some of the
valuable information which is considered to be dynamic or changing the whole the workloads
(Kuijs et al., 2015). A transaction is known to be valuable for various order entry system which
can encounter large number of strikes around the holiday session. Application can easily run on
hybrid cloud platform, but apart from this it can make use of cloud bursting which is required for
having computer additional kind of resources. It can easily emphasize on public cloud when it
looks up for cloud service which is required for proper kind of demand.
The second kind of hybrid cloud is the given use case of processing of big data. Let us
consider the example of organization which makes use of hybrid cloud for retaining accumulated
business (Farokhi et al., 2016). It can then make use of some of the analytical quires in the given
Document Page
15CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
cloud platform which can be used for scaling a Hadoop or other kind of cloud-based cluster. It
mainly requires a proper kind of cluster support which is needed for providing distributing of
various task related to computing. Apart from all this, hybrid cloud provides the enterprise with
some broader mix of various IT services (Lu et al., 2015). A business can easily run on the
mission of critical workload with the given private cloud.
Part B
In the environment of cloud computing, various kind of problems related to it can be
tackled easily (Mason et al., 2015). A huge capital expenditure is not required for modeling some
new kind of service. By the help of hybrid cloud technology, various organization is there in
private cloud along with retaining the ability to increase the workload and carrying out a range of
task (Niu et al., 2015). The last thing is all about making use of spikes for the usage of public
cloud. Hybrid cloud comes up with large number of benefits like cost-effective for organization
as they need to pay for public cloud portion or part.
Hybrid cloud comes up with large number of disadvantages for various organization like:
Although this particular technology is cost saving the initial cost of deployment for
hybrid cloud is much more in comparison to initial setup cost which is incurred in the
matter of public cloud domain (Zhang et al., 2014).
Hybrid cloud is needed for providing security. Apart from all this, there are some
necessary steps which are required to be taken for improving the security of data
(Clemente-Castelló et al.,2017). Most of organization does not provide preference for
storing data at both off-site locations. It will ultimately make the hybrid cloud much more
inaccessible.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Part C
Importance of security feature in hybrid cloud
Effective identifying and providing management control: Proper management of
credential is considered to be important for achieving control and providing protection of data. It
aims in providing support for sign on and allows various kind of credentials to be easily shared
on the cloud and another kind of internal resources (Huang & Du, 2014). By managing some of
credential, there are few aspects which need to be taken into account.
Protecting API: Cloud technology aims to run on certain number of API which gives
application on various server (Dobre, Viotti & Vukolić, 2014). The fact should be taken into
account a proper kind of protection should be there for gaining some of the authorized access
along with proper kind of encryption. It mainly highlights the fact that various credential is
secured in a proper way.
Answer to Question 11:
Cloud bursting can be stated as a quality of service metric which is required for
understanding cloud solution scalability. It helps in measuring some of the software application
and its capability (Pluzhnik, Nikulchev & Payain, 2014). It deals with performance which is
totally based on various kind of cloud-based application capability which are there on hosted
cloud platform.
Various kind of cloud-based application and service vendors aim to provide benchmark
performance ratio (Pluzhnik & Nikulchev, 2014). It is all about leasing the infrastructure and
along leased infrastructure and maximizing the application hosting. In many instances it can be
seen like a well-balanced design. In many cases it is required for providing well-balanced design
Document Page
17CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
which is scalable, flexible and reliable kind of architecture. It is stated like well design, scalable,
flexible which comes up reliable architecture. It can easily handle various kind of network-based
traffic and requirement of computer (Shyshkina, 2018). It comes up with a poor kind of
architecture which aims in altering various kind subject hungry based application.
Cloudburst is mainly of two types that are positive or negative in nature. It ultimately
helps in defining a proper kind of cloud infrastructure which is required for handling the given
traffic and various kind of computing services (Pham et al., 2015). A positive kind of cloudburst
can be stated like a cloud-based application or any kind of application platform. It mainly used
for performing efficiently and managing cloud-based application (Srinivasan, Quadir &
Vijayakumar, 2015). While negative kind of cloudburst can be easily referred to as cloud-based
application or infrastructure which is required for managing the resources in effective way.
Answer to Question 12:
In normal model, on-premises model, application for enterprise application and large
number of IT solution which are provided on centralized server (Kovachev, Cao & Klamma,
2014). Cloud computing comes up with traditional kind storage service which aims to reside in
the data center for various organization. Various kind of end-user like smartphone and another
device like laptop can easily access the data by incorporation of data center by the help of
corporate network that helps in providing internet connection which uninterrupted (Wang et al.,
2015). TCP/IP aims in providing better kind of internet connection along with on-premises
exchange of data over the LAN (Calatrava et al., 2016). It is not referred to as a cloud model and
this particular configuration is required for implementation of various kind of medium and large
size networks.
Document Page
18CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Various organization around the globe by making use of this particular deployment
model which is required for providing access to the network of traffic (Zhang et al., 2014). It can
work from both platforms that are safeguarding the whole network by making use of corporate
based network. It is mainly achieved by making use of firewalls and another kind of monitoring
softwares. The organization can easily assume various kind of aspect like deployment
responsibility, operation and lastly maintaining various kind of resources (Clemente-Castelló et
al.,2017). Different kind of end-user are making use of connected network by the help of internet
which helps in granting proper access to centralized server and various application in the cloud
domain.
Public Wi-Fi using SSL or VPN: Wi-Fi can be stated as a technology which enables
various computers and another associated device for establishing connection internet and
communication through wireless mode (Shyshkina, 2018). An unsecured Wi-Fi can be stated as
any network which does not any kind of login or password in the network. So, SSL or VPN can
be used for securing the Wi-Fi connection.
Direct data connection: Most remote devices like data logger or any utility can be used
for storing information and establishing communication with a centralized data database
(Srinivasan, Quadir & Vijayakumar, 2015). The centralized database system can be used for
collection of data, configuration and lastly proper diagnosis of various function.
Telco managed: Cloud computing has moved into a new region of IT service which aims
to provide various kind of business challenges along with opportunities. It can easily range from
telcos to MSPs (Strazdinsy et al., 2017). A proper kind of cloud infrastructure is focusing on
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
large number of cloud capabilities and the time which is needed by service providers for change
in strategies.
Cloud providers can make use of configuration which is based on deployment of IT
resources which is accessible by both the given parameters like internal and external users
(Huang & Du, 2014). This particular network architecture aims in providing IT-based solution
and various kind cloud service to large number of external user. Most cloud providers aim to
provide internet connection which is much superior in comparison to connectivity for various
kind of external user. Most of cloud provider aims to provide internet-based connectivity which
is taken to superior kind of connectivity for some of individual organization.
In addition to this, bandwidth of data link helps in establishing connection with various
network of ISP and end to end bandwidth. It can be determined by the help of transmission
capacity of the given data links (Dobre, Viotti & Vukolić, 2014). It is mainly used for providing
broadband network topology which is implemented in some of the core networks. It mainly helps
in implementation of some of the core networks which is required for ensuring end to end
connection. This particular kind of bandwidth is needed for providing constant increasing and
various web-based application like compression, prefetching.
Document Page
20CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
References
Bannan, J. (2016). Learn System Center Configuration Manager in a Month of Lunches.
Manning Publications.
Calatrava, A., Romero, E., Moltó, G., Caballer, M., & Alonso, J. M. (2016). Self-managed cost-
efficient virtual elastic clusters on hybrid Cloud infrastructures. Future Generation
Computer Systems, 61, 13-25.
Clemente-Castelló, F. J., Nicolae, B., Rafique, M. M., Mayo, R., & Fernández, J. C. (2017,
May). Evaluation of data locality strategies for hybrid cloud bursting of iterative
Mapreduce. In Cluster, Cloud and Grid Computing (CCGRID), 2017 17th IEEE/ACM
International Symposium on (pp. 181-185). IEEE.
Dobre, D., Viotti, P., & Vukolić, M. (2014, November). Hybris: Robust hybrid cloud storage.
In Proceedings of the ACM Symposium on Cloud Computing (pp. 1-14). ACM.
Dong, Q., He, Q., Chai, H., Wang, Y., & He, S. (2015). PM-IUBC: A P2P and MongoDB based
Intranet User Behavior Control System. Journal of Communications, 10(12).
Ellis, G. (2015). Microsoft Azure IaaS Essentials. Packt Publishing Ltd.
Farokhi, S., Jamshidi, P., Lakew, E. B., Brandic, I., & Elmroth, E. (2016). A hybrid cloud
controller for vertical memory elasticity: A control-theoretic approach. Future Generation
Computer Systems, 65, 57-72.
Goyal, S. (2014). Public vs private vs hybrid vs community-cloud computing: a critical
review. International Journal of Computer Network and Information Security, 6(3), 20.
Document Page
21CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Greene, K. (2016). Getting Started with Microsoft System Center Operations Manager. Packt
Publishing Ltd.
Huang, X., & Du, X. (2014, April). Achieving big data privacy via hybrid cloud. In Computer
Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on (pp.
512-517). IEEE.
Ibrahim, A. A. Z. A., Kliazovich, D., Bouvry, P., & Oleksiak, A. (2016, December). Using
Virtual Desktop Infrastructure to Improve Power Efficiency in Grinfy System. In Cloud
Computing Technology and Science (CloudCom), 2016 IEEE International Conference
on (pp. 85-89). IEEE.
Ibrahim, A. A. Z., Kliazovich, D., Bouvry, P., & Oleksiak, A. (2016, November). Virtual
Desktop Infrastructures: architecture, survey and green aspects proof of concept.
In Green and Sustainable Computing Conference (IGSC0< 2016 Seventh
International (pp. 1-8). IEEE.
Kovachev, D., Cao, Y., & Klamma, R. (2014). Building mobile multimedia services: a hybrid
cloud computing approach. Multimedia tools and applications, 70(2), 977-1005.
Krstevski, V. (2014). Mastering system center configuration manager. Packt Publishing Ltd.
Kuijs, H., Reich, C., Knahl, M., & Clarke, N. (2015). Towards privacy for ambient assisted
living in a hybrid cloud environment. BW-CAR| SINCOM, 41.
Li, J., Li, Y. K., Chen, X., Lee, P. P., & Lou, W. (2015). A hybrid cloud approach for secure
authorized deduplication. IEEE Transactions on Parallel and Distributed Systems, 26(5),
1206-1216.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Liu, Z., Wang, X., & Ma, X. (2014). Building intelligent logistics system based on internet of
things RFID in platform of cloud computing. Journal of Chemical & Pharmaceutical
Research, 6, 772-778.
Lu, P., Sun, Q., Wu, K., & Zhu, Z. (2015). Distributed online hybrid cloud management for
profit-driven multimedia cloud computing. IEEE Transactions on Multimedia, 17(8),
1297-1308.
Mason, S., Fletcher, J. K., Haynes, J. M., Franklin, C., Protat, A., & Jakob, C. (2015). A hybrid
cloud regime methodology used to evaluate Southern Ocean cloud and shortwave
radiation errors in ACCESS. Journal of Climate, 28(15), 6001-6018.
Meena, M., Singh, A. R., & Bharadi, V. A. (2016). Architecture for Software as a Service (SaaS)
Model of CBIR on Hybrid Cloud of Microsoft Azure. Procedia Computer Science, 79,
569-578.
Mohammed, M. A. (2015). Investigating Role of Knowledge Auditing in Profile of the Business
Unit-Information Technology& Computer Center (ITCC) University of
Anbar. International Journal of Enhanced Research in Management & Computer
Applications, 4(3), 10-18.
Niu, Y., Luo, B., Liu, F., Liu, J., & Li, B. (2015, April). When hybrid cloud meets flash crowd:
Towards cost-effective service provisioning. In Computer Communications
(INFOCOM), 2015 IEEE Conference on (pp. 1044-1052). IEEE.
Parven, M., & Maimani, K. (2014). A Comparative Study between the Different Sectors Using
the ERP Software in Jeddah Region-KSA. Life Science Journal, 11(3s).
Document Page
23CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Pham, L. M., Tchana, A., Donsez, D., De Palma, N., Zurczak, V., & Gibello, P. Y. (2015, June).
Roboconf: a hybrid cloud orchestrator to deploy complex applications. In Cloud
Computing (CLOUD), 2015 IEEE 8th International Conference on (pp. 365-372). IEEE.
Pluzhnik, E., & Nikulchev, E. (2014). Use of dynamical systems modeling to hybrid cloud
database. arXiv preprint arXiv:1402.1469.
Pluzhnik, E., Nikulchev, E., & Payain, S. (2014, June). Optimal control of applications for
hybrid cloud services. In Services (SERVICES), 2014 IEEE World Congress on (pp.
458-461). IEEE.
Rădulescu, Ş. A. (2014). A perspective on E-Learning and Cloud Computing. Procedia-Social
and Behavioral Sciences, 141, 1084-1088.
Ramakrishnan, R., & Kaur, A. (2017, April). Technique for detecting early-warning signals of
performance deterioration in large scale software systems. In Proceedings of the 8th
ACM/SPEC on International Conference on Performance Engineering (pp. 213-222).
ACM.
Ramakrishnan, R., & Kaur, A. (2017, April). Technique for detecting early-warning signals of
performance deterioration in large scale software systems. In Proceedings of the 8th
ACM/SPEC on International Conference on Performance Engineering (pp. 213-222).
ACM.
Shyshkina, M. (2018). The hybrid service model of electronic resources access in the cloud-
based learning environment. arXiv preprint arXiv:1807.09264.
Document Page
24CONFIGURATION AND DEPLOYMENT OF CLOUD INFRASTRUCTURE
Srinivasan, A., Quadir, M. A., & Vijayakumar, V. (2015). Era of cloud computing: a new insight
to hybrid cloud. Procedia Computer Science, 50, 42-51.
Strazdinsy, G., Skogeng, P. B., Zhang, H., & Major, P. (2017). Virtual reality using gesture
recognition for deck operation training. IEEE OCEANS 2017-Aberdeen.
Tradat, M., Khalili, S., Sammakia, B., Ibrahim, M., Peddle, T., Calder, A., ... & Alissa, H. (2017,
August). Comparison and Evaluation of Different Monitoring Methods in a Data Center
Environment. In ASME 2017 International Technical Conference and Exhibition on
Packaging and Integration of Electronic and Photonic Microsystems collocated with the
ASME 2017 Conference on Information Storage and Processing Systems (pp.
V001T02A019-V001T02A019). American Society of Mechanical Engineers.
Wang, B., Zheng, Y., Lou, W., & Hou, Y. T. (2015). DDoS attack protection in the era of cloud
computing and software-defined networking. Computer Networks, 81, 308-319.
Zhang, H., Jiang, G., Yoshihira, K., & Chen, H. (2014). Proactive workload management in
hybrid cloud computing. IEEE Transactions on Network and Service Management, 11(1),
90-100.
Zhuang, H., Filali, I., Rahman, R., & Aberer, K. (2015, October). Coshare: A cost-effective data
sharing system for data center networks. In Collaboration and Internet Computing (CIC),
2015 IEEE Conference on (pp. 11-18). IEEE.
chevron_up_icon
1 out of 25
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]