Describe about cloud computing.
Cloud management system is used to manage the cloud infrastructure. It is also called CIMI (Cloud Infrastructure Management Interface). CIMI started in the year 2010 and soon in the year 2014 it got internationally standardized. There are different models of cloud infrastructure management like IaaS (Infrastructure as a service), SaaS (Software as a service) and PaaS (Platform as a service). The specification would provide the protocol for interacting with the cloud service provider and the consumer. The primary resources of the IaaS are a machine, network and storage and they are managed in such a manner that the customer specification and requirement are fulfilled (Li et al., 2012). There should be provision for upgrading their infrastructure accruing to the client/customer need.
The company using cloud computing can use the server according to their needs using the capabilities of the computer. It can automatically stop access to its server and storage without using any human resource (Masud & Huang, 2012).
The files and documents can be obtained using a wide variety of devices from any global location.(e.g. mobile, tablet, laptop, desktop and workstations).
The data stored in cloud storage can be accessed by multiple users irrespective of the location
Cloud computing provides elasticity to its users such as a further expansion of storage space is possible on demand.
Cloud system optimizes the resource automatically and controls the bandwidth, storage, and process for each user account.
It is the term that the computer storage manufacturing companies use and the storage service providers use it to describe that the data stored in their database is available at any moment such as during disaster the data is accessible to the user. When the data is kept in a distributed system they are interlinked with a high-speed connection such as optical fibre connection is used. Data redundancy is to make the data availability greater i.e. the data is duplicated and stored in several backup storage devices into segments and accessed when needed. The storage devices are independent of each other and thus there is flexibility to add more storage options. Two simple methods are used for data availability; Storage Area Network or SAN and Network attached Storage or NAS.
It is the property of a product or system, to work with other products or systems, understanding interfaces completely without any restrictions to access it. The distributed computing system uses data synchronization between the different system in various clouds and the internal systems to synchronies them. The connection between the clouds is difficult so there may be latency for synchronization between the clouds. If a new system is added to the system, it is also synchronized and is interoperable. The interoperability uses much communication protocol and it should share a standard process of data and model. For different platforms, a protocol is used to discover its service and exchange information between them (Dinh et al., 2013).
In general, the conceivable stockpiling are easy to locate for the global clients but it offers the administration of distributed computing. The administration of distributed computing is accomplished by the convention of HTTP. To increase the security for the information HTTPS and SSH are mostly used. These use the secure version by encrypting the data that is transferred using this protocol. HTTPS stands for Hypertext transfer protocol and it works in the transport layer of the OSI model. Earlier HTTPS was used in payment gateway sites, emails and for other sensitive websites but now it has widespread and utilized in all types of websites for protecting the authenticity of the page. SSH also called secure shell is an encrypted protocol that allows the user to operate remotely (Jain & Paul, 2013). It has replaced its predecessor telnet with its improved encryption feature.
The evolution of computers has helped business companies to automate their business process and have an advantage over the global market.
Cloud computing in infrastructure management can have an enormous effect on a various range of industries.
Cloud = Internet-based access to low cost computing and applications + Internet-based data access and exchange
Characteristics of a cloud based infrastructure:
Characteristics = Internet Accessibility + On-Demand Self-Service + Pooled Resources + Usage-Based Billing + Elastic Capacity (Opengroup.org, 2016).
According to Ficco et al. (2012) the access to the resources of the different cloud based service providers is provided through a Service Level Agreement (SLA). Cloud based service providers maximise their Quality of Service by balancing their infrastructure and not violating the SLA. The assessment of various risk factors on cloud computing is the goal of this assignment. The method that is used in the framework is used by the consumers and service providers to identify the risk that is deployed during the operation. There are various models in risk management through which the risks can be identified and a solution can be implemented on that risk factor. The effect of the risk on the architecture or design is also executed by risk management. The assessment of the risk has an impact on the cloud computing toolkit.
With a proactive system, IT managers can identify most of the problems that causes slowdowns and outages, eliminating much of the downtime associated with a reactive approach. When such thing occurs, the time to repair is shorter because of troubleshooting. Problems are resolved faster, with less effect on both users and ITs. Overall, IT is in a much better position to deliver on its SLAs while still driving innovation (Zheng et al., 2013). It is a contract between the service provider and the customer. The SLA is used to standardise the service provided by the service provider. As an example, an ISP (Internet Service Provider) and an organisation have a service level agreement between them. If the ISP fails to provide internet service to the organisation, the organisation complains the ISP and the mean time between failure, mean time to recovery and mean time to repair is calculated. If it is greater than the time mentioned in the agreement, the organisation may take legal action against the ISP to pay fine.
Cloud computing can be used for managing the infrastructure of an organisation. It has several benefits for the organization (Jadeja & Modi, 2012):
Virtualization can help the company to reach a high level of abstraction. The infrastructure cost can be reduced with the use of distributed computing; it removes the limitations and the acceleration is increased for the growth of the company. Virtualization is done in a model and has high level security. It can also be increased or decreased according to the needs this feature is called the scalability (Zissis & Lekkas, 2012). The most important benefit of cloud based infrastructure management is lower infrastructure expense. There is no need of maintenance of the servers for the hardware and networking component and it can be upgraded at a nominal cost.
As the efficiency is greater the quality of service that the cloud based management provides is also higher. The Iaas service provider provides infrastructure for backup of data during any disaster. The organisation have not to give focus to the servers and hiring staffs for managing the server and networks are not required they can concentrate on the growth of their profession.
The primary goal of proactive management is to prevent problems from occurring at the top level.
The virtual machines used in the distributed computing has the provision of adaptive security, only the emails and the payment gateway service can be secured using HTTPS and SSH and rest of the traffic can be accessed using HTTP (Younis et al., 2013).
SLA’s are of different forms like Customer Based, Service Based and Multilevel Based.
The online storage system is cost effective regarding traditional storage systems. The installation cost of a local storage server is much more, and maintenance cost is also taken into account. To access the server remotely VPN (Virtual Private Network) is required (Border et al., 2015). More employees are needed to manage the server, and thus, cloud based is storage is the best solution to be used for business. The cost is one third of the expense of instaling a local storage server with much more features added to it (Wu et al., 2012).
It is the best suited online storage system for ABC, Inc. Google drive is created by Google for file storage. It allows its user to store data remotely to a cloud based storage space provided by Google; it gives 30 GB of free storage to Google app users and unlimited free storage to students using it for education with the Association of 5 members. With the subscription of extra storage, the storage space can be expanded. If the account is not renewed at the time, a seven-day grace period is given and then the space storage returns to the default free storage. Other files can be accessed but no files can be uploaded to the server. There is an option for downgrading the plan . Also, the storage space can be shrunk if not used by the user. Google Drive also supports third party applications and that can be opened in the drive without instaling any third party software package or application. Google drive can be used offline, and it offers a 15GB of free storage much more than its competitors. Google has announced to increase its security for its users. Thus, it is the best choice for an organisation to use (Simmhan et al., 2013).
Account Governance and Billing
Access Management and Security
Asset Management
Backup and Disaster Management
Configuration and Change Management
7. Conclusion:
A short review about cloud computing can be viewed from this article. Cloud computing is a new emerging technology that provides both the service provider and the consumer to outcome benefits. The user can have unlimited service with a small investment and infrastructure. Multiple cloud management services are used to provide the user all the service. This article has its primary focus on the utility of cloud technology on infrastructure management. From the study of infrastructure management is has been found that Iaas delivers infrastructure management and it creates a virtual environment that has the flexibility of increasing or decreasing according to the consumer needs. Cost effectiveness is also a factor of distributed cloud computing that empowers classes that are running in remote areas. The different providers pool the resources on a single reservoir, with ease of use. Cloud computing is growing rapidly since it is more user-friendly and users can have access to their files from anywhere in the world. Companies using cloud storage need to pay the amount for space they have used thus reducing their energy consumption up to 70% making their company green and eco-friendly. Cloud storage has several advantages the data stored in cloud servers are natural disaster proof and have a high level of security, and the storage can be expanded according to the needs.
References:
Border, J., Dillon, D., & Pardee, P. (2015). U.S. Patent No. 8,976,798. Washington, DC: U.S. Patent and Trademark Office.
Cloud Computing for Business : What is Cloud?. (2016). Opengroup.org.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), 1587-1611.
Ficco, M., Rak, M., & Di Martino, B. (2012, November). An intrusion detection framework for supporting SLA assessment in cloud computing. InComputational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on (pp. 244-249).
Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Jadeja, Y., & Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880).
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. Communications Magazine, IEEE,51(11), 24-31.
Li, J., Qiu, M., Ming, Z., Quan, G., Qin, X., & Gu, Z. (2012). Online optimization for scheduling preemptable tasks on IaaS cloud systems.Journal of Parallel and Distributed Computing, 72(5), 666-677.
Simmhan, Y., Aman, S., Kumbhare, A., Liu, R., Stevens, S., Zhou, Q., & Prasanna, V. (2013). Cloud-based software platform for data-driven smart grid management.
Wu, L., Garg, S. K., & Buyya, R. (2012). SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments. Journal of Computer and System Sciences, 78(5), 1280-1299.
Younis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep.
Zheng, J., Ng, T. S., Sripanidkulchai, K., & Liu, Z. (2013). Pacer: A progress management system for live virtual machine migration in cloud computing.Network and Service Management, IEEE Transactions on, 10(4), 369-382.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download