Analysis of DTGOV's Cloud Computing Remote Server Administration

Verified

Added on  2023/04/03

|5
|934
|280
Report
AI Summary
This report analyzes the major requirements that DTGOV should consider for conducting remote server administration, resource management, and SLA management for their proposed IaaS and PaaS instances. DTGOV aims for operational optimization and cost-effectiveness by moving infrastructure to the cloud, updating Active Directory, and adopting a Microservices model. The report highlights key requirements, including centralized remote server administration with self-service portals, SLA management for resolving service issues and ensuring audit compliance, and resource management for virtual infrastructure creation. It also discusses Morad and Dalbhajan’s operational checklists (enterprise operation, basic operational, and auditing security) to ensure effective cloud architecture implementation and organizational security.
Document Page
Running head: CLOUD COMPUTING
Cloud Computing Question 5
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
CLOUD COMPUTING
Question 5
Discussion of Major Requirements that DTGOV would require to consider for conducting
Remote Server Administration, Resource Management and SLA Management for the
proposed IaaS and PaaS Instances
DTGOV has the core objective of achieving increased levels of operational
optimization and cost effectiveness (Garg, Versteeg & Buyya, 2013). They have planned to
retain one of their three data centres for better storage of data. All the infrastructures are
being moved to the cloud after updating Active Directory and data storage infrastructure. The
current web software architecture is being entailed for taking advantages of scalability and
flexibility to supply data to their customers or employees by moving to Microservices model
(Rittinghouse & Ransome, 2016). The maintenance cost of ICT infrastructure is required to
be reduced and new cloud based infrastructure can be managed without much complexities.
Hybrid cloud methodology is needed to be designed and operated, hence the risks and
security issues are needed to be accessed.
There are few distinctive and important requirements, which DTGOV should consider
while conducting remote server administration, SLA management and resource management
for the proposed instances of infrastructure as a service and platform as a service (Fernando,
Loke & Rahayu, 2013).
i) Requirement for Remote Server Administration: This particular system helps to
provide appropriate tools and mechanism to properly create the system (Arora, Parashar &
Transforming, 2013). Hence, it is quite helpful in proper configuration of system, hence
enabling the administrator of DTGOV to analyse their cloud based IT resources. The system
of remote server administration would provide a proper platform for successful establishment
of every management feature, which is needed to manage the features of underlying systems
Document Page
2
CLOUD COMPUTING
(Fernando, Loke & Rahayu, 2013). Since, DTGOV would be opting for hybrid cloud, the
major requirements for remote server administration include centralization of administration
control with self service portal as well as usage of tools. Moreover, the respective consumers
of cloud would have the ability of carrying out further effective control of every standardized
API, which is required for helping them in successful creation of interest (Carlin & Curran,
2013).
ii) Requirement for SLA Management: A proper requirement of SLA management is
important for successful development of the system, which could be utilized for resolving the
issues, associated to service development and even helps in perfect service acquiring
(Whaiduzzaman et al., 2014). It is also helpful in the provision of service level agreements,
which are important to properly coordinate the services so that all service level issues are
well eradicated and major requirements of success are considered. The major parameters are
also provisioned, hence there is a distinctive recognition of minimum levels needed to specify
the provider’s systems. It is extremely important to manage the systems and increase security
levels to a high level so that a proper auditing of services is possible (Rittinghouse &
Ransome, 2016). An audit compliance is also created in this process of SLA management.
iii) Requirement for Resource Management: This particular mechanism of resource
management is required for proper coordination of IT resources, needed to properly create the
major responses for checking performances of cloud computing provider (Rittinghouse &
Ransome, 2016). Since, DTGOV is implementing hybrid cloud in their business, resource
management would be quite helpful for them to properly develop the system architecture that
involves managerial virtual infrastructures. Hence, such virtual infrastructures are being
created to an expedient underlying managerial range of their existing physical servers. For
PaaS and IaaS, resource management would be able to help in successful creation of multiple
physical server (Garg, Versteeg & Buyya, 2013). A proper creation of server is required with
Document Page
3
CLOUD COMPUTING
VIM and hence usage is even created by allocating virtual servers. Security policies are
needed to be created after involving organizational information technology resources.
iv) Morad and Dalbhajan’s Operational Checklist: The operational checklist of
Morad and Dalbhajan comprises of three distinctive types of checklist, which could be
helpful for providing support to several assessment requirements (Carlin & Curran, 2013).
These three types of checklist involve enterprise operation checklist, basic operational
checklist and finally auditing security checklist. All of these three checklists are required for
implementing the cloud architectures in an effective manner (Whaiduzzaman et al., 2014).
All of these three checklists are required for properly executing the systems and hence
maintaining organizational security to a higher level for proper consideration of systems and
maintaining high security (Arora, Parashar & Transforming, 2013). A proper execution of
system maintenance is required for cloud architecture implementation and a subsequent
sequence is needed to help the company in creation of the system development. The
application resilience is helpful for classification of effects, created for the users.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
CLOUD COMPUTING
References
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing
using encryption algorithms. International journal of engineering research and
applications, 3(4), 1922-1926.
Carlin, S., & Curran, K. (2013). Cloud computing security. In Pervasive and Ubiquitous
Technology Innovations for Ambient Intelligence Environments (pp. 12-17). IGI
Global.
Fernando, N., Loke, S. W., & Rahayu, W. (2013). Mobile cloud computing: A
survey. Future generation computer systems, 29(1), 84-106.
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing
services. Future Generation Computer Systems, 29(4), 1012-1023.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation,
management, and security. CRC press.
Whaiduzzaman, M., Sookhak, M., Gani, A., & Buyya, R. (2014). A survey on vehicular
cloud computing. Journal of Network and Computer applications, 40, 325-344.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]