Questions:
The Department of Spatial Information (DSI) has considered your assessment of the deployment model, risk management and security issues for the Online Spatial Delivery System (OSDS). They have decided that they need an additional assessment on the technical management and the SLA.
You have been assigned the task of providing DSI Executive Management with an assessment of the management requirements and the provisions of the SLA for the chosen cloud vendor. You are to:
1. Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjan’s operational checklists for DSI’s OSDS. This section should be no more than two to three pages in length.
2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS. This section should be no more than two to three pages in length.
3. Use Erl’s SLA guidelinesto assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
4. Provide a covering one to two page executive summary of these two assessmentsto DSI Executive Management and summarise the major opportunities and risks that have been identified in your assessments.
The study comprises of the demonstration and analysis of the remote administration, SLA and resource management. The study also holds the requirements of SLA, resource management, and remote administration. The requirements of each entity are very crucial to setup the cloud computing specifically. The provider installs a portal for establishing a remote administration (Li et al., 2014).
Service Level Agreement or SLA refers to the agreement which comprises of the information that both the provider agreed upon in terms of providing service, integrity, and loyalty (Garg, Versteeg&Buyya, 2013).
Hardware, software, deployment model together refers to the resources of a cloud computing service. On the basis of this resources, the flexibility and capability of the consumer’s system are calculated (Schiffman et al., 2013).
The basic responsibility of remote administration is to provide approved services. The consumer gets the service not directly through the cloud system rather the installed portal provides the cloud services to the client organization. So from the above statements, it is clear that the remote administration gets installed in between the cloud service and the customer (Erl, Puttini&Mahmood, 2013). The primary underlying work of the remote administration is to provide agreed SLA services and resources. The usage and administration portal are the main keys to managing the resource. In addition, those portals are also coming under the category of requirements. Deployment, delivery, remote administration system’s interface and the granted level of access control are the things that are required for establishing the remote administration system (Schiffman et al., 2013).
2.1 Requirements:
The requirement for successfully installing the remote administration system are described in the following points.
The Service Level Agreement is stored as a document which holds the terms and condition that both the provider and client approved while signing the service initiation (Garg, Versteeg&Buyya, 2013). It will also provide the opportunity to DSI to change the provider if it feels not satisfied with the provided service. Also, DSI can claim damage. The data identified with accessibility, security, compactness of the information, exercises of deciding the issues, intervention debate procedure and a great deal more will be recorded through the SLA or administration level understanding (Gill, 2015).
3.1 The Service Level Agreement Requirements:
What information and activity are exactly required for creating service level agreement are as following.
From the above statements the concept of resources that are used in the cloud services has already been clarified. Now the management is all about increasing or reducing the resources as per the need of the client organization’s current business (Sookhak et al., 2015). Suppose, the workload of DSI is very high, and it needs more storage then the provider will allocate more storage hardware to DSI cloud service.
4.1 Resource Management Requirement:
For string, the data as a backup the DSI will go for the RAID 10. It is obvious that being a government department, and the data loss will be a huge issue. So, in any case, DSI must protect its data. In addition, the performance factor is also very crucial in this case. So from the requirements, it is clear that the RAID 1+0 will be the best option for DSI to store its data as backup. RAID 10 has incorporated both the concept mirroring and stripping (Shen&Shu, 2014). Through mirroring, it saves all the gathered into a separate section so that is the running disk gets damaged then the data stored in the separate disk can be used for retrieving or repeating the storage process. The stripping is the process through which the storage and the retrieving process get quicker (Tadros et al., 2013). In terms of redundancy, the RAID 10 is also very flexible. DSI will need at least fifty storage disks for storing the department’s data. The data in the RAID 10 will be stored in chunks and retrieved as a whole (Shen&Shu, 2014).
The continuous development of IT resources into the physical location is called as the Resilience Computing. The resources of the information technology that DSI will use will be pre-configured (Jhawar&Piuri, 2013). The resources are pre-configured as the activities of the running tasks may be allocated to another redundant IT resources. All the concern regarding the resilience gets involved in the project at the time of planning and scheduling. The resilience also describes the capacity of the system which refers to individual entities of the system. The entities have a connection with the provider’s or third party disaster and disaster recovery deliberations (Jhawar&Piuri, 2013). As the data must also need to be stored for backup and disaster considerations.
The disaster recovery planning will be conducted in five consecutive phases.
Information Safety needs: The essentials of DSI will be accumulated at this stage. The gathered information will be key in choosing the segments that will empower cloud based data security. The need of protection is essential because the data will travel from DSI to Cloud server through the internet (Aldrich, 2012).
Choosing the cloud provider: The provider has been already chosen.
Calculating the required capital: The cost of the activities will be given to the organization gave either by month to month enrollment, the measure of VMs, web transmission limit, and storage space (Sahebjamnia, Torabi&Mansouri, 2015). At the cost estimation time, DSI and provider will focus I the periods were DSI will need to increase and reduce resources.
Developing bandwidth management plan: In this movement, the organization of the web information exchange limit regarding the OSDS requirements will be finished (Chandra et al., 2013). The more the transmission capacity, the more the solid and recovering procedure will be.
Logistics necessity identification: For performing hard and fast failovers to the cloud DSI will consider a couple of logistics necessities while doing the logistical masterminding. The requirements are powerful registry synchronization and cloud based list organizations (Sahebjamnia, Torabi&Mansouri, 2015).
Cloud service level provider and DSI’s service level agreement comprise of various information some have been discussed earlier, and some are stated here. First, the adequate and exact recognition and definition regarding particular constraints that are to be used in the cloud system of DSI. Second, the architecture of the DSI’s cloud system (Garg, Versteeg&Buyya, 2013). The architecture will be the base of the whole system, all the processes, and transaction of information will be carried out based on the designed architecture. Third, defining the privileges regarding retrieving the information from the server. Fourth, creating and defining the rights for administrating the component (Latif et al., 2014). Fifth, the steps to be taken against provider or consumer if they break any regulation. Sixth, the information that both of them agreed upon regarding quality, availability, and integrity (Garg, Versteeg&Buyya, 2013).
The use of the Erl’s SLA guidelines have done in the following way.
Customer based SLA: The provider makes a concurrence with the clients bunch (Colman-Meixner et al. 2015). This affirmation is done between the supplier and additionally fund office for the administrations, taken as an example, money framework, finance framework and additionally a charging framework.
Service based SLA: It is conformity for every one of the customers utilizing the administrations that are given by the administration suppliers.
Corporate level SLA: It covers every one of the SLA issues that are precise to each of the clients through the association (Newcombe et al. 2015).
Customer level SLA: It covers every one of the SLA issues that are precise to each of the clients through the association (Newcombe et al. 2015).
Service level SLA: It covers every one of the SLA issues that are particular to the administrations, for example, client bunches (Janiesch and Niemann, 2012). Observing, and in addition providing details regarding the cloud execution, depends on the experience of the end client capacity with a specific end goal to expend the assets.
9. Conclusion:
From the above study, I can be concluded that the concentration of DSI must be on choosing the resources as per their system. The remote administration is the key to managing the various system’s authorization to the resources. Resilience refers to the need of the resources regarding the organization’s cloud system. SLA will be the key to keeping both the provider and consumer loyal to each other. The data recovery is also important as the information of DSI will be stored in the cloud and it may get removed or corrupted. In that case, data recovery come into use. As DSI will be using the RAID 10, the data will be more secure and the performance of data storing, and recovery will get increased. The disaster and data recovery are not much different from each other but in disaster recovery, DSI will get more safety regarding the information. The adaptability is just the shrouded thought under fortification and catastrophe recovery supplier’s structures limit.
References:
Aldrich, D. P. (2012). Building resilience: Social capital in post-disaster recovery. University of Chicago Press.
Azevedo, L. G., Diirr, T., Baião, F., & Santoro, F. (2014). A Business Model for Managing SOA Initiatives. iSys-Revista Brasileira de Sistemas de Informação, 7(1), 4-33.
Chandra, A., Williams, M., Plough, A., Stayton, A., Wells, K. B., Horta, M., & Tang, J. (2013). Getting actionable about community resilience: the Los Angeles county community disaster resilience project. American journal of public health, 103(7), 1181-1189.
Colman-Meixner, C., Develder, C., Tornatore, M., & Mukherjee, B. (2015). A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications.
Erl, T., Puttini, R., &Mahmood, Z. (2013). Cloud computing: concepts, technology, & architecture. Pearson Education.
Garg, S. K., Versteeg, S., &Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.
Gill, S. S. (2015). Autonomic Cloud Computing: Research Perspective. arXiv preprint arXiv:1507.01546.
Janiesch, C., & Niemann, M. (2012). Supporting USDL by a Governance Framework. In Handbook of Service Description (pp. 415-444). Springer US.
Jhawar, R., &Piuri, V. (2013). Fault tolerance and resilience in cloud computing environments. Computer and Information Security Handbook,, 125-141.
Kruse, D. F. (2014). The repack challenge. In Journal of Physics: Conference Series (Vol. 513, No. 4, p. 042028). IOP Publishing.
Latif, R., Abbas, H., Assar, S., & Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. In Future Information Technology (pp. 285-295). Springer Berlin Heidelberg.
Li, T., Keahey, K., Sankaran, R., Beckman, P., &Raicu, I. (2014). A cloud-based interactive data infrastructure for sensor networks. IEEE/ACM Supercomputing/SC, 14, 14-15.
Newcombe, C., Rath, T., Zhang, F., Munteanu, B., Brooker, M., & Deardeuff, M. (2015). How Amazon web services uses formal methods.Communications of the ACM, 58(4), 66-73.
Sahebjamnia, N., Torabi, S. A., &Mansouri, S. A. (2015). Integrated business continuity and disaster recovery planning: Towards organizational resilience. European Journal of Operational Research, 242(1), 261-273.
Schiffman, J., Sun, Y., Vijayakumar, H., & Jaeger, T. (2013). Cloud verifier: Verifiable auditing service for iaas clouds. In Services (SERVICES), 2013 IEEE Ninth World Congress on (pp. 239-246). IEEE.
Shen, Z., &Shu, J. (2014). Hv code: An all-around mds code to improve efficiency and reliability of raid-6 systems. In Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on (pp. 550-561). IEEE.
Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., & Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Computing Surveys (CSUR), 47(4), 65.
Stankovski, V., Taherizadeh, S., Taylor, I., Jones, A., Mastroianni, C., Becker, B., &Suhartanto, H. (2015). Towards an Environment Supporting Resilience, High-Availability, Reproducibility and Reliability for Cloud Applications. In 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) (pp. 383-386). IEEE.
Tadros, G., Salama, R. A., Kingston, P., Mustafa, N., Johnson, E., Pannell, R., & Hashmi, M. (2013). Impact of an integrated rapid response psychiatric liaison team on quality improvement and cost savings: the Birmingham RAID model. The Psychiatrist Online, 37(1), 4-10.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download