An analysis is made on the current infrastructure of VICAT for the development of the server infrastructure and configuration of the centralized management system for the organization. The current server infrastructure of the organization uses separate servers for storing the backup, email and storage. There are different problems faced due to the use of the physical server in the current business process and it is identified. The physical server is dependent on the hardware and if there is a need to migrate the content of the server there is an issue that the content of the server is dependent on the hardware platform of the physical server. There is a need to virtualize the server platform for creating an independency of the hardware and increase the portability of the data residing in the physical server. In the current server architecture there are different problems such as distribution of the loads on the server is not possible and this can be done by virtualizing the server and moving the resources to another server for increasing the availability of the data and reduce the cost of implementation of a new physical server in the network.
The server infrastructure is created for the organization for supporting the current framework and it consists of a physical and virtual resources for supporting the storage and flowing of the data packets in the network. The existing serevr
An alternative virtualization scenario can be created for the mitigation of the problem currently faced in the physical server environment. A centralized infrastructure is created within the data centre and it can be decentralized for distributing the resources in the different data centre. The different subsystem are included in the servers such as the servers, storage subsystem and the other network device. The infrastructure of the data centre should have the proper security measures proper authentication mechanism should be used for the development of the data centre. For the development of the data centre a formalized process of data centre should be analysed for the optimization and maintaining the infrastructure and include the different components for the development of the data centre. A detailed expertise is required for the configuration of the server and optimization of the system with the integration of the system with the current business process of the organization. With the implementation of the virtualization of the server the disaster recovery can be handled and the servers can be uploaded to the cloud platform for backing up the data and management of the different operation of the business. It can be used for performing different operation and different services should be configured for the development of the network.
For the development of the server infrastructure it is important to deal with the design the server architecture after analysis of the goals and objectives of the organization. Different factors should be considered such as selection of the various components, hardware, software and thee technology used for the development of the server framework. The traditional process of the development of the server requires lots of manual effort and optimization of the storage and the other components of the server. Modular approach can be used for the hardware and virtualization and making the management process easy. There are other approaches such as use of hyper v for the virtualization of the resources. Determination of the number of virtual machine that should run on the server and determination of the core speed and the number of cores required for meeting the current demand of the users is important for the development of the server.
The following resources are required for the virtualization of the server and given below:
Authorised personnel should be informed about the new strategy that is selected for the implementation of the virtualization server for the VICAT ICT system. Stakeholder meetings should be arranged for discussing the strategy for the development of the server virtualization. The risk associated with centralized storage should be analysed for the adoption of the server configuration and providing the service following the guidelines. There are different alternative scenario that are analysed and different comparison should be used for the development of the network environment and approval of the client. A checklist should be added for the software and the hardware platform and analysing the reliability and security of the server platform for the development of the server infrastructure.
Server oriented architecture should be used for the development of the application component and using the communication protocol. There are different basic principle that should be followed such as independent vendor, product and different technology. There are different functionality that are used for accessing the remote resources and updating it independently for retrieving the information. The service should have the four properties such as:
The concept should defines according to the orientation of the service and coupling between the services. The business goals, strategic goals, intrinsic inter-operability, shared service, flexibility and evolutionary refinement should be defined for the coordination between the activities.
There are different technology that should be used for the needs and the resource should be defined for development of the virtual framework. There are different networking principle for the development of the service. The service provider should be identified for the development of the web service and analysis of the price for offering different service. The different category of service and the agreement should be created for analysis of the requirement of the service. The service broker, service registry and the service repository should be analysed for the identification of the activity. The entries in the registry should be defined and the needs of the consumer should be identified for the development of the server infrastructure. The approaches for the implementation of the virtualization. The cost of the processor, memory, hard disk should be analysed for the identification of the legacy and enabling the service.
For the development of the server is important to create the logical steps and is given below:
Task Name |
Server Virtualization for VICAT |
Initiation phase |
Development of business case |
Cost-benefit analysis |
Developing project charter |
Appointing project team members |
Milestone 1: Completion of project initiation phase |
Planning phase |
Developing plan for the project |
Developing the project resource plan |
Developing financial plan |
Developing the risk management plan |
Developing the quality plan for the project |
Procurement plan for the project |
Developing proper communication plan for the project |
Milestone 2:Completion of project planning phase |
Analysing requirements of the projects |
IP address scheme development |
Proper subnetting |
Identification of network device |
Types of network cables |
Identification of the software |
Identification of the server |
Milestone 3:Completion of requirement analysis |
Designating phase |
Designating the logical network for the project |
Designating the physical network for the project |
Milestone 4: Completion of designing phase of the project |
Implementation phase of the project |
Installation of the network device |
IP allocation |
Deployment of the network cable plan |
Connecting the device |
Deploying server |
Milestone 5: Completion of project implementation phase |
Project testing phase |
Testing the network speed |
Testing congestion |
Testing performance |
Milestone 6: Completion of project testing phase |
Project closure phase |
Reviewing the project |
Stakeholder sign off |
Project documentation |
The current hardware configuration of the server should be analysed for reviewing the hardware requirement that should be used for the development of the current server framework. The security characteristics of the server should be considered for the development of the server. The updates that should be made on the hardware should be identified for the development of the server and the current configuration of the server is given below:
Hardware
Processor – 64 bit Dual core processor with 2.5 Ghz for a minimum core
RAM – 8 Gb for the use of evaluation and developer purpose
Hard Disk – Minimum 80 Gb for the installation and the more size is required for the use of production and more disk space is required for the management of the day to day activity.
The current application software that are installed in the server for the management of the daily activity of the user connected with the network are give below:
Software
Operating system – Windows Server 2012 R2
Antivirus – Quick heal antivirus
Database – Oracle 10g
Web server – Apache Tomcat
The hardware that are required for the server should be available and combined to develop the server framework. The server is configured such that it can be virtualized for balancing the load and serve the different needs of the user. The following list is created for the development of the server framework and virtualization of the server to meet the growing demands of the organization.
Processor – 64 bit Quad core processor with 2.5 Ghz for a minimum core
RAM – 24 Gb for the use of evaluation and developer purpose
Hard Disk – Minimum 80 Gb for the installation and the more size is required for the use of production and more disk space is required for the management of the day to day activity.
For the development of the network framework Windows Server 2012 r2 is used as the operating system. The hyper v settings should be configured for the creation of the virtual machine and it is used for abstracting is physical hardware and creating a multiple virtualized environment. Multiple Virtual machines can be supported and can be managed as a standalone computers. Different virtual architecture can be used for the creation of the virtual disk and configured according to the business needs of the organization. A license should be required for the installation of the windows server and it can support upto 2048 number of PCs.
Additional tools and third party software can be used for the configuration of the service that are required for running different business operation. Additional tools such as active directory, IIS, DHCP, File server, print server, etc. can be used depending upon the requirement. There are additional third party software such as antivirus, apache, etc. can be used for the management of the security of the server. There are other network policy and active directory certificate service that are used for the management of the multiple roles and service.
There are different flaws in the operating system and the application software that can be exploited to reach the resources and gaining the access of the network. The operating system should be updated for reducing the security issues and configuring the server to meet the needs of the organization. Roles and responsibility of the network administrator and the testing team should be analysed for the development of the network framework. For ensuring maximum security of the server antivirus software should be installed in the server such that the third party software should be used for the development of the ICT system.
For the configuration of the server different features should be enabled for the windows server 2012 R2 server manager. The hard drive should be virtualized and partitioned into parent and child for storing the information in the file server. It should be configured with printer server for the management of the printing queue and management of the printing job of the organization. It should also be configured with hyper v for the management of the virtual machine and allocating the physical resources of the server. The implementation of the hyper v helps in allocation of roles and responsibility of the user for the management of the workstation products. Hyper v licencing should be used for the identification of the limitation and scalability of the network framework.
The main scope identified for the development of the network framework and the hyper v server should be configured using the simple script and configuration of the interface. Latest hardware should be used for the virtualization of the hardware and the BIOS of the system should support the virtualization technology for the management of the roles and service. Virtual switches should be used for the management of the network adapter and migration of the alternative. Hyper v manager should be used for the management of the multiple virtual servers and exercising a full control on the centralized server management.
The configuration of the server should be tested for the management of the technical requirement and integration of the different components. The modules and the features installed in the server should be configured with the system compliance and specified requirement should be followed for the development of the server. An integration testing should be used for the integration of the applicable hardware system and detection of the inconsistency between the assemblages and software units. The system should be tested as a whole according to the functional requirement specification document and a system test design document should be created for the analysis of the behaviour of the customers. The bounds that are defined as the hardware and the software needs should be analysed for the identification of the requirement specification. There are different types of test that should be performed on the system such as:
The following document should be followed for the development of the test plan.
Test phase |
Duration |
Resources |
Date |
Status |
Unit testing |
5 days |
System Tester [1] |
19/06/2018 |
Completed |
Functional test |
4 days |
Functional tester |
Pending |
|
Load test |
5 days |
Load tester |
Pending |
|
Volume test |
3 days |
Volume tester |
Pending |
|
Usability test |
2 days |
System analyst |
Pending |
|
Compatibility test |
7 days |
System analyst |
Pending |
|
Conformance test |
6 days |
System tester [2] |
Pending |
|
Regression test |
4 days |
System tester [1] |
Pending |
|
Stress test |
3 days |
Load tester |
Pending |
|
Vulnerability test |
5 days |
Penetration tester |
Pending |
For development of the system testing the testing should be conducted for the integration of the system and evaluation of the system compliance defining the specific requirement of the organization. The testing of the system is considered as the scope of the black box testing and it does not requires any knowledge about the design of the network. The system testing is performed on the server and the software system for the detection of the inconsistency with the software unit. The system testing has different types of limitation such as detection of the limitation of the defects as a whole. For testing the whole system the entire system is used for the identification of the software product for the verification of the identity of the errors in the configuration of the software. A testing environment should be created for testing the virtualization of the server framework. Different types of testing environment should be created for meeting the different needs of the consumers and different strategy such as virtualization of the server platform for the development of the network solution for the hotel. The different roles should be installed in the server such as active directory domain service, DNS and DHCP service for accessing the internet and the local area network. Virtual computers should be created for testing the client server framework and it should be created with different processor and hardware configuration. There are different utilities that are used by the VMWare workstation, Microsoft Virtual Computer and Sun Virtual Box that can be used for testing the real life computing environment. The virtual printers are used for the redirection of the printing session and additional devices such as scanner, printer and other usb devices can be used for the development of the sustainable ICT system.
The errors in the reporting of the software should be considered for the documentation of the errors identified during the test. The errors should be documented such that it can be used for troubleshooting the problems in the configuration. The errors should be used for debugging the problems and configure the server aligning the needs of the network. The windows error reporting technology should be used for capturing the crash data and gathering information about the different service about the real life problem of the customer. The actual codes needs to be debugged WER is used for collecting the data points and diagnosis of the error for increasing the efficiency of the configuration. The crash analyser is used for finding the issues causing crash of application and prioritize the problem. It can be used as a tool by the developer for reducing the effort and time for the development of the virtual server framework for the hotel and serve the needs of the user using the system. The unauthorised access of the server can be found from the log files and it can be used as an administrative tool for the management of the failover cluster and enabling different option for mitigation of the problem.
References
Huh, Jun-Ho, and Kyungryong Seo. “Design and test bed experiments of server operation system using virtualization technology.” Human-centric Computing and Information Sciences 6.1 (2016): 1.
Mohammadi, Reza, Seyyed Yahya Nabavi, and Seyyed Mohsen Emam. “Analysis of FTP and Web Server Performance In Open Source Server Virtualization.” International Journal of Computer Science Issues (IJCSI) 13.5 (2016): 159.
Okita, Hideki, Keitaro Uehara, and Yoshiko Yasuda. “Proposal and Evaluation of Data-Model Translation for Server-Virtualization Environment to Improve Virtual-Network Configuration Management.” Advanced Applied Informatics (IIAI-AAI), 2016 5th IIAI International Congress on. IEEE, 2016.
Yang, Hwan-Seok, Dong-Hwi Lee, and Seung-Jae Yoo. “A study on stable web server system using virtualization technology against attacks.” Multimedia Tools and Applications 74.16 (2015): 6381-6390.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download