This report aims to provide recommendations to the company, MetaSoft, for their migration to cloud computing. A brief discussion of the recommends that should be included in the BCP of the company for the adoption of an approach of Hybrid cloud and Microservices. The issues of recovery, application resilience, and backup, and from disaster in the environment of cloud is discussed in this report. The requirements that should be considered by MetaSoft for conducting resource management, SLA management, and remote server administration for the proposed instances of PaaS and IaaS are stated in this report.
The company MetaSoft Ltd. Is a company of software development that works across New Zealand and Australia. The company is planning on shifting the data centres on the environment of cloud to manage the data more securely. The idea is to exercise the benefits of cloud infrastructure for increasing the flexibility and the availability for the applications of LOB that will carry on executing on the infrastructure of its own. The company is forced to implement the cloud services due to the rise in the demand of the utilisation of the internal resources
The condition of hybrid cloud has always been beneficial for the companies for several reasons. Some of them are business resilience, reinforcement, and disaster recuperation. The common reason for these advantages is to provide the compliance of spanning locally and isolated storages. The storage of hybrid cloud assists in permitting the alternatives. This happens specifically on the chance that an exposed cloud is used excessively for backup. The cloud has a unique ability of providing resiliency and meaning so that the situation when there is a requirement of restoring dependent on the events, which have affected the situation. The resiliency of cloud is understood as the method of readapting to any kind of situation of crisis. This is applicable to the data and the infrastructure (Dasgupta et al., 2013). The infrastructure consists of virtual servers that are designed for accommodating the substantial fluctuations in the power of processing and the volume of data, while allowing ubiquitous utilisation of several devices like tablets, smartphones and computer system. In the case where an employee lost their laptop or the system the resiliency of cloud provides the ability of the applications and the data. The planning for the application resiliency in the environment of cloud can provide unique challenges. The strategies can be related to the people in need of the conventional data centres. The implantation of the cloud environment can often differ.
Every application possesses a unique HA (High Availability) requirements and characteristics. AWS offers numerous building blocks of infrastructure for assisting the organisation for meeting the requirements in a cost efficient method. At the highest level, an efficient HA strategy includes instance duplication, utilisation of several zones of availability among a region, balancing the load, automatic scaling, maintaining, and recovery among a region. The application that are critical, must guarantee a single point for failure that are identified and assessed on the basis of the availability requirements of the application and risk profile. An efficient HA strategy would include testing for HA that will be executed for ensuring the recovery of the applications as per the expectation and not only the recovery of components (Gai et al., 2016). The recommends that should be included in the BCP of the business as per the checklist of Morad and Dalbhanjan are:
Application backup and DR (Disaster Recovery)
Each application has unique requirements of DR (Disaster Recovery) that must be related to the objectives of points of recovery and the time of recovery and geographic requirements that restricts the physical proximity among the primary and the sites of disaster recovery. An efficient strategy of DR should include the type of DR that should be performed for ensuring the expected recovery of the application and not only the recovery of a single component. At the highest level, an efficient DR strategy will include regional duplication, management of global traffic or load balancing, maintaining and recovery among the region-to-region. The following AWS and the techniques that should be implemented by the organisation in the BCP for an effective DR strategy:
The recommends that should be included in the BCP for backup are:
Remote administration is referred as the method or procedural process of leading, controlling of devices of computing from an isolated location. This method includes the utilisation of any kind of software, which are included for developing for suiting the process. These software that permits control from an isolated location are becoming increasingly popular in the modern times (Shiraz et al., 2013).
The several requirements for remote administration are:
Internet connectivity: for remotely controlling any kind of computing device, a connection of internet is required, which can be either LAN (Local Area Network) or TCP/IP. The systems that requires to be measured remotely should be connected through the internet source and the IP address of the system of server should be known for administrating efficiently.
Server software: The remote administration is targeted towards providing administration that is non-malicious. For providing this, the users are required to install or allow server software on the host or the server system. This will allow the user to access the server/host system from some other system using the installed software (Papagianni et al., 2013).
Resource management
The basic requirements of a successful management of resource are:
Software for resource management: These are the tools/instructions that are used for automation and assisting in the processes of allocation of resource. The organisation will gain major benefit for gaining knowledge and understanding the employee numbers with the help of the skills that are necessary. This assists the organisation for ensuring the allocation of the workforce on several projects among the organisation. Software tools assists the companies in effective planning of the resources. Software includes from homegrown applications and spreadsheets to the COTS (commercial-off-the-shelf) products. The spreadsheets requires manual updates of data, so that the teams who start working on the spreadsheets intend to observe for increased powerful software later. Increased powerful software includes partnership, information-sharing, recording, and tools for utilisation that has become time-consuming and bulky in the spreadsheets (Huang & Nicol, 2013). The updates of spreadsheets includes higher risk of error by humans, duplicate work, overwriting of files, multiple versioning, and several more. The most common software for resource planning includes:
Resource levelling: this is the technique where the starting and the finishing data are adjusted on the basis of the constraints of the resource with the intent of balancing the demand of the resources with the accessible supply. The process of resolving the conflict where one kind of resource is required in many tasks at the same time is referred as project planning resource levelling. It is beneficial for balancing the workload of the primary resources during the project and specially at the expense of one of a conventional threefold restraints. When the company is utilising specially designed software of project, the levelling commonly denotes to resolving the conflicts or extra allocation in the project plan by permitting the software for calculating the delays and the automatic upgrading of the tasks. The software of project management levelling needs the delaying of the tasks till the resources are accessible. In some more complicated environments, resources can be allocated in multiple, concurrent projects and thus requiring the method of resource levelling that needs to be executed at the level of the company. Levelling can lead to increased finish date of the project if the affected tasks are in a critical path.
SLA management
SLA or service level agreement means a contract that is subsists among the service provider and end user or clients that denoted the levels and the standards of the service that the client must hope from the service provider. These specifically defines the assets that the customer will receive from the provider of service. SLA might be external or internal provider. The requirements of effective SLA management in the IaaS and Paas instances of the cloud service for the company MetaSoft are:
SLA management of IaaS
SLA management for the PaaS instances
Operational checklist of Morad and Dalbhanjan
ü |
Utilisation of AWS IAM (Identity and Access Management) for providing user specific, and not only shared credentials for creating requests of AWS infrastructure. |
ü |
Separation of the volumes of Amazon EBS for the operating system and database/application wherever suitable. |
ü |
Consistent backup of the instances of Amazon EC2 with the help of the snapshots of Amazon EBS. |
ü |
Constant testing of the recovery process of the volumes of the instances of Amazon EC2 when there is a failure, either with AMIs that are customised, snapshots of Amazon EBS, bootstrapping, or else with the help of the tools of backup and recovery. |
ü |
The constant checking of the process for the purpose of securing, patching, and securing the operating system, customised AMIs, and applications of Amazon EC2. |
ü |
Implementation of the rules of secure security group and the security groups that are nested for creating a hierarchical network topology wherever required. |
ü |
The complete testing of the applications that are AWS-hosted, that includes testing of performance, before going live. |
Conclusion
Hence, it can be concluded that the migration of the MetaSoft company to the cloud storage has to be executed after the analysis of the recommends and the strategies that are provided in this report. The company MetaSoft Ltd. Is a company of software development that works across New Zealand and Australia. The company is planning on shifting the data centres on the environment of cloud to manage the data more securely. The recommends that should be included in the BCP of the business are executing multiple instances of amazon ec2 in several zones of availability, elastic balancing of load for load balancing across several availability zones, auto scaling for automatic recovery of instance or scaling, Metrics of amazon cloudwatch, and Multi-AZ amazon RDS for several availability zone achieved databases.
References
Dasgupta, K., Mandal, B., Dutta, P., Mandal, J. K., & Dam, S. (2013). A genetic algorithm (ga) based load balancing strategy for cloud computing. Procedia Technology, 10, 340-347.
Gai, K., Qiu, M., Zhao, H., Tao, L., & Zong, Z. (2016). Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. Journal of Network and Computer Applications, 59, 46-54.
Huang, J., & Nicol, D. M. (2013). Trust mechanisms for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 2(1), 9.
Jula, A., Sundararajan, E., & Othman, Z. (2014). Cloud computing service composition: A systematic literature review. Expert Systems with Applications, 41(8), 3809-3824.
Li, J., Li, J., Chen, X., Jia, C., & Lou, W. (2015). Identity-based encryption with outsourced revocation in cloud computing. Ieee Transactions on computers, 64(2), 425-437.
Papagianni, C., Leivadeas, A., Papavassiliou, S., Maglaris, V., Cervello-Pastor, C., & Monje, A. (2013). On the optimal allocation of virtual resources in cloud computing networks. IEEE Transactions on Computers, 62(6), 1060-1071.
Shiraz, M., Gani, A., Khokhar, R. H., & Buyya, R. (2013). A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing. IEEE Communications Surveys & Tutorials, 15(3), 1294-1313.
Toosi, A. N., Calheiros, R. N., & Buyya, R. (2014). Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Computing Surveys (CSUR), 47(1), 7
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download