10 Data Centre Cloud Infrastructure Assignment Sample

Executive Summary

This report discusses various aspects of virtualization and cloud computing. It discussed various layers, implementation and security of cloud computation. Alongside this, it also discussed a case study of an encrypting file company named CFL. This CFL conducts their business on USA, UK and Spain. This Report would give an insight of various strategies to implement cloud computing on current infrastructure.

Introduction

The CFL or Crypto File Logic is one of the leading brands in the United State, United Kingdom and Spain in the field of secure encryption service. They provide these encryption services to the PII data of the government and governmental organization This Small office has a minimum workforce which is around 30 employees, in addition to this they also have minimum computational power. This report would shed light on how this company should expand itself with the help of cloud resources.

Discussion of various related topics

Virtualization:  As the name suggests virtualization is the process where a physical existence of the IT hardware transforms into a software version of it. For example, the server can be implemented virtually to where the company that owns that virtualized server does not need an extra server rack to increase the size (Aldribi et al., 2020). There is a various advantage if virtualization especially for those company who has access to minimum resources for their IT company. One of the main benefits of virtualization is it ensures less expense than its physical counterpart. Apart from this, virtualization also increases computational power, which leads the higher productivity. There are various types of virtualization. Those are

Get Assignment Help from Industry Expert Writers (1)

“OS Virtualization or Virtual Machines, Application-Server Virtualization, Application Virtualization, Administrative Virtualization, Network Virtualization, Hardware Virtualization, Storage Virtualization.”

Hypervisor:

A hypervisor is a process or software that helps administrators to localize operating systems for various users. This hypervisor hides the common physical resources such as hardware like ram and resources and shares them with various guest users. It also allows multiple user operating systems (also referred to as Virtual Machines) to run on a single host simultaneously. It may get collide with virtualization as they both provide some virtual presence of software or hardware. The main difference with virtualization is that hypervisor only works on a single host to share a single resource with the various users (Shukur et al., 2020). On the other hand, virtualization means the transformation of physical hardware into compatible software. To put it simply, the hypervisor is a process that makes virtualization possible.

Features of Hypervisor

Mainly there are two features for the application of Hypervisor in operating any system through virtual platforms. The following features have been listed below.

Partitioning

Get Assignment Help from Industry Expert Writers (1)

By enabling, different independent software the same hardware is run in an effective way is termed partitioning (Muttillo et al. 2019). In this process, large databases are divided into small parts to run the program in a fast and easy way.

Resource Distribution

Another main feature of Hypervisor is to manage many virtual machines independently by distributing resources like network bandwidth and memory of machines. Hence, multiple guests of systems are easily run by a single hosting platform in real-time.

Data Centre:

one of the most important parts of cloud computing is a data centre that is mainly a physical object that stores data and computes them to perform any critical application. In this part, servers, switches, routers and storage systems are connected to perform any specific role of virtual machine operation. On a short note, the data centre is a physical organization or firm that uses its physical premises for critical computation and storage of various data. As per the notion, the data centre should design and should follow a network of computers and storage components. Some of the key components of the design of a data centre are switches, routers, storage systems, firewalls, application delivery controllers and servers. There are typically four types of a data centre: “Data centre for Enterprise, Data Centre for Managed Services, Collocation Data Centre, and Cloud Data Centre.” The main benefit of the data centre is that it helps companies to store, communicate, and compute efficiently without worrying about individual computer resources.

Virtual Data Centre:

As the name suggests, the virtual data centre is the virtual version of the physical data centre. It is implemented by IaaS conversely referred to as Infrastructure as a Service. This IaaS provides essential cloud computing services such as computing, store and networking resources in return for subscription or money (Members, 2019). The virtual data centre provides various IT components and infrastructure that can get implemented additionally to the existing infrastructure of the company. The company can also replace the existing infrastructure with virtual infrastructure. It helps the company to reduce expense capital, work force, space and power consumption by paying on the contrary of physical data centre infrastructure. Virtual Data Centre can easily adjust to any environment or allocation of resources. With the help of this tool, control and prediction of any event can be done to manage any resources (Yang et al. 2021). Due to the change based on the Iaas category, this virtual system can quickly access the information on cloud platforms. Resources are managed by different Virtual data centres like cloud connectors and VMware to change in any environmental system in open sources.

Virtual Data Centre:

The cloud generally refers to cloud computing, where the various computational functions is being provided by the cloud computing service (Vojnak et al., 2019). The computing functions provided are servers, databases, software, storage, networking, analytics and the internet. This all-computational service happens over the internet. Cloud computing provides high performing computational power at a cheap rate than physical computer power. It is helpful for a smaller company that wants to expand its IT infrastructure quickly.

VMware solution for virtualization

Before talking about VMware, a refocus is needed upon the virtualization again. Virtualization enables administrators to translate physical hardware into software alternatives and shares its power among various users (Aldossary, 2017). VMware has some key properties that can be useful to implement virtualization. It has a property of partitioning that helps multiple users to run multiple operating systems on a single physical machine. Apart from that, VMware also provides lucid resource allocation between multiple virtual machines. Alongside this, VMware isolates each user operating system so that there would be minimal security breaches via shared resources. There are mainly three effective solutions for virtualization made by VMware in IT projects. These three areas of the IT project have been shown below.

Hybrid cloud

Many companies access their data through the application of the Hybrid cloud provided by VMware (Celesti et al. 2019). This needs additional costs to operate data access from the data centre.

Private cloud

VMware accesses the information from the data centre to a single private cloud system by the elements of the function of the service provider.

End-user computing

In cloud systems, End user computing is associated with the creation of working applications by non-programmers for the creation of software applications. With the help of VMware, solutions for the creation of applications are determined for integrating end-users into a single platform for making a cloud-computing environment.

Discussion and analysis

The report is basically upon The File Encrypting Company named Crypto File Logic. After analyzing various topics and components of cloud infrastructure, it has become easy to make an advisory plan for this company. One of the first steps towards cloud infrastructure implementation is to create a basic outline on how to achieve it (Kim et al., 2018). As this company enforces encryption of files via block chain they must migrate to the cloud. Before migrating to the cloud, CFL must need to points out block chain participants and components (such as a number of peers, borderers, Certificate authorities and all). After that, depending upon the block chain design, the company must create a quit number of Certificate authorities, peers ordered and all. By doing extensive research it is preferable to use the Kubernetes orchestration platform that offers Kubernetes cloud service. Many cloud providers provides inbuilt Block chain platform that is beneficial for CFL. After completing all necessary steps, they must launch the platform for users (Varghese and Buyya, 2018). After the deployment of the block chain, they should add various users, CAs, Admins, and MSPs, peers, channels and orderers to make it fully functional. The user will get the taste of an isolated environment that is disconnected from other users. It is achieved by the hypervisor. The cloud would serve as a virtual data centre to store and compute big chunks of data. The physical layer would not be accessible to CFL employees as it would be far from the control (Basu et al 2018). CFL can either purchase cloud from various big companies or they can build a cloud on their own. For a quicker period, it is preferable to buy clouds from big tech giants and launch their block chain network on the internet.

Conclusion

The CFL Company is reputed in major first world countries like the United States, the United Kingdom and Spain. Hence as per government requirement they need to implement cloud for their block chain-backed file security system. It is recommended to purchase cloud services provided by the various reputed companies instead of implementing them on their own. It is hectic and time-consuming to make a cloud infrastructure by them. Even before this, they must plan out various key components of the block chain and initialize those components in the server. The cloud provided user isolation would be enough for better security. In Addition to this, the inbuilt loose data coupling would be highly beneficial for CFL Company as the encryption data provided by the company is shared with various users and components.

Reference:

Aldossary, F., 2017. Health observation system using cloud computing. International Journal of MC Square Scientific Research, 9(4), pp.08-16.

Aldribi, A., Traore, I., Moa, B. and Nwamuo, O., 2020. Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. Computers & Security, 88, p.101646.

Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S. and Sarkar, P., 2018, January. Cloud computing security challenges & solutions-A survey. In 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 347-356). IEEE.

Bolodurina, I. and Parfenov, D., 2017, June. Methods and algorithms optimization of adaptive traffic control in the virtual data center. In 2017 International Siberian Conference on Control and Communications (SIBCON) (pp. 1-5). IEEE.

Celesti, A., Fazio, M., Galletta, A., Carnevale, L., Wan, J. and Villari, M., 2019. An approach for the secure management of hybrid cloud–edge environments. Future Generation Computer Systems90, pp.1-19.

Kim, I.K., Hwang, J., Wang, W. and Humphrey, M., 2018, June. Orchestra: Guaranteeing Performance SLAs for Cloud Applications by Avoiding Resource Storms. In 2018 17th International Symposium on Parallel and Distributed Computing (ISPDC) (pp. 53-60). IEEE.

Members, B.D.C., 2019. Database resources of the BIG data center in 2019. Nucleic Acids Research, 47(Database issue), p.D8.

Muttillo, V., Tiberi, L., Pomante, L. and Serri, P., 2019. Benchmarking Analysis and Characterization of Hypervisors for Space Multicore Systems. Journal of Aerospace Information Systems16(11), pp.500-511.

Shukur, H., Zeebaree, S., Zebari, R., Zeebaree, D., Ahmed, O. and Salih, A., 2020. Cloud computing virtualization of resources allocation for distributed systems. Journal of Applied Science and Technology Trends, 1(3), pp.98-105.

Varghese, B. and Buyya, R., 2018. Next generation cloud computing: New trends and research directions. Future Generation Computer Systems, 79, pp.849-861.

Vojnak, D.T., Ðorđević, B.S., Timčenko, V.V. and Štrbac, S.M., 2019, November. Performance Comparison of the type-2 hypervisor VirtualBox and VMWare Workstation. In 2019 27th Telecommunications Forum (TELFOR) (pp. 1-4). IEEE.

Wang, D., Bai, B., Lei, K., Zhao, W., Yang, Y. and Han, Z., 2019. Enhancing information security via physical layer approaches in heterogeneous IoT with multiple access mobile edge computing in smart city. IEEE Access, 7, pp.54508-54521.

Yang, Y., Guo, S., Liu, G. and Yi, L., 2021. Fine granularity resource allocation of virtual data center with consideration of virtual switches. Journal of Network and Computer Applications175, p.102916.

………………………………………………………………………………………………………………………..

Know more about UniqueSubmission’s other writing services:

Assignment Writing Help

Essay Writing Help

Dissertation Writing Help

Case Studies Writing Help

MYOB Perdisco Assignment Help

Presentation Assignment Help

Proofreading & Editing Help

Leave a Comment