1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjan’s operational checklists for DSI’s OSDS. This section should be no more than two to three pages in length.
2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length.
3. Use Erl’s SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
4. Provide a covering one to two page executive summary of these two assessments to DSI Executive Management and summarise the major opportunities and risks that have been identified in your assessments.
The concept of cloud computing implies the remote servers networks that is hosted on the internet to manage and store processing of data and information rather than a personal computer or from a local server. In this report, the researcher has discussed different aspects of cloud computing sorely related to the Department of spatial information which generally includes Service Level Agreement (SLA) between two intermediaries in which one is a service provider and another one is a customer. In the first few stanzas the researcher has explained the concept of resource management, remote administration and in the next few stanzas the concept of SLA and disaster recovery and backup has been described.
Resource Management
Resource Management is a process that manages the physical resources like bandwidth of networks, cores of CPU and fragmentation of disk space (Zissis & Lekkas, 2012). It comprises of control panel where the administrator can access by the help of remote from any parts of the world. The computer system within the same network may transfer the data via Wi-Fi connectivity or wireless connection (Lee and Zomaya, 2012). This technology is a very standard in almost all multinational organization for resources of hardware management.
Remote Administration
It generally refers to a process of controlling a computer from a remote location. The common software applications that requires remote administration is often used when it founds impractical (Xiao & Xiao, 2013). The department of Spatial Information must have the control over another system administrator; and the software that is used for accessing the remote areas is commonly used by all other companies. That, inbuilt software is crucially requires for accessing the remote administration system (Jadeja & Modi, 2012).
SLA Management
It is a contract between end user and the service provider; that generally defines the level of service. Its concept is totally output based where and its main purpose is what customer will receive (Zissis & Lekkas, 2012). The task of SLA management is to decide the customer requirements as per norms. It needs an expert that concerns service to match the customer requirements. Clearly, it states that what type of service that will be imposed on the Department of Spatial Information (Hashizume et al., 2013). It is generally managed by the SLA management and the concept of DSI is to be provided for betterment of supplier service requirements.
Morad and Dalbhanjan’s Operational Checklists for DSI’s OSDS |
The use of access management identity is to provide user specific rather than to share credentials or establishing AWS infrastructure request. |
Appropriate use of operating system user access of accounts credentials by not sharing the private key pairs of all system administrators. |
Use separate EBS volumes for application and operating system for management and manipulating of several database administrators. |
Full testing of an AWS application of hosting which generally includes the performance testing and priority. |
Testing of patching and security process by using the AWS operating systems by customizing the AMI’s. |
Data Back-up and disaster recovery
Data Back-up implies making a duplicate copy of the original one to avoid mismanagement of data and information whereas disaster recovery involves a set of policies to activate the continuation or recovery of crucial technology system and infrastructure. In this scenario, the consideration of Resilience, Data Back-up and Data Recovery has been considered (Zissis & Lekkas, 2012). The department of spatial information requires choosing of right vendor to make an adequate data recovery plans. The company management has to ensure that the allocated tools and techniques are well tested for the organizational management (Xu, 2012). This can be done to avoid any future consequences between DSI and the service provider. Generally, the concept are adopted and implemented to deal with several types of issues (Wang et al., 2012). The researcher has considered the concept of data back-up and disaster recovery by allocating the following assumptions provided below: Minimizing the risk: The DSI has to choose the right supplier who is experienced and well tested; so that they can work for an organizational management to provide lesser risk (Lee & Zomaya, 2012). Security of data: The useful data and information can be retrieved by following the process of disaster recovery process. It is also important to ensure that the data and the information in DSI must be shared by government and public domains (Zissis & Lekkas, 2012).
Application Resilience
It refers to ability of an application to react the issues in one of the necessary components and provide the best possible services. Now-a-days, it has become a very important part of an organizational management to adopt software applications across multiple infrastructures technology (Xiao & Xiao, 2013). The department of spatial information must concentrate the process of resilience during the implementation of clod based infrastructural solutions in the model of OSDS. It generally works when there are no power interruptions. Through several administration systems the concept of application resilience is obtained (Xu, 2012). When the planning of the project is adopted the application resiliency is proposed and it establishes a connection between the data center for better emergency plan and disaster recovery plan. Its main work is to provide the appropriate web solutions that s basically developed internally in an organizational management (Jadeja & Modi, 2012).
The concept of service level agreement generally implies the communication between service provider and the department of spatial information. The organizational management is looking to adopt the cloud based model that is generally done via IAAS cloud method. The application of service level agreement must be clear and comprehensive for both the service provider and the client (Zissis & Lekkas, 2012). For instance, if any new terminologies that are implemented that must be added to the application of service level agreement. In many areas of cloud based application the client uses the end user interface and the concept of API which includes communication and other adoption services (Hashizume et al., 2013). The guidelines of service level agreements need to be defined and must be kept updated. With the adoption of cloud computing services in many multinational companies it has been an efficient system for all organizational management (Xiao & Xiao, 2013). In this scenario, the consideration of Resilience, Data Back-up and Data Recovery has been considered. Its main work is to provide the appropriate web solutions that s basically developed internally in an organizational management. The main use of service level agreement is to access the service from any parts of the region in the same cloud service network; that increases the quality services for managing and manipulating the methodology of an organizational enterprise (Zissis & Lekkas, 2012).
Conclusion
The entire topic has been concluded with the broad concept of cloud computing with an overview of service level agreements, application resilience, and data recovery and disaster management system. The researcher has maintained and manipulated the requirements of remote administration and resource management. The researcher has also taken the ease of Erl’s for the base of service level agreement of an organizational management mentioned above.
References
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 1-13.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE.
Lee, Y. C., & Zomaya, A. Y. (2012). Energy efficient utilization of resources in cloud computing systems. The Journal of Supercomputing, 60(2), 268-280.
Moreno-Vozmediano, R., Montero, R. S., & Llorente, I. M. (2013). Key challenges in cloud computing: Enabling the future internet of services. Internet Computing, IEEE, 17(4), 18-25.
Wang, C., Wang, Q., Ren, K., Cao, N., & Lou, W. (2012). Toward secure and dependable storage services in cloud computing. Services Computing, IEEE Transactions on, 5(2), 220-232.
Xiao, Z., & Xiao, Y. (2013). Security and privacy in cloud computing. Communications Surveys & Tutorials, IEEE, 15(2), 843-859.
Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics and computer-integrated manufacturing, 28(1), 75-86.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download