Cloud

Cloud Management

 

 

Letter of Transmittal

Get Assignment Help from Industry Expert Writers (1)

June 7, 2017

XYZ
Associate Professor
Department of ___________
University Name__________

Subject: Letter of Transmittal

Dear Sir,

With due respect I, the undersigned student of ________ batch has reported on “Cloud/Network Management”.

Though I am in learning curve, this report has enabled us to gain insight into the core fact regarding the importance of advancement of the network system within the organization. So it becomes as an extremely challenging and interesting experience. Thank you for your supportive consideration for formulating an idea. Without your inspiration, this report would have been an incomplete one.

Get Assignment Help from Industry Expert Writers (1)

Lastly I would be thankful once again if you please give your judicious advice on effort.

Yours’ sincerely,

______________

______________

Executive Summary

This research paper is based on cloud computing. It has supported towards giving deep understanding regarding the cloud management. This paper has discussed various parameters which enable towards the implementation of the cloud solutions in an effective manner.

This paper has supported towards giving the detailed understanding regarding the cloud solutions on the basis of secondary data analysis.

In this paper, researcher has discussed regarding the parameters which needs to be focused while applying the cloud solutions. Moreover, it has supported to understand the importance of network system while giving concern towards up gradation of the system time-to-time.

This study has supported to understand that IT management is important for the organization as it supports towards growth of the organization and for the fast pace growth it is essential to give consideration towards utilizing modern and latest system. However, it is also essential to give consideration towards the affectivity of the system by analyzing them on various perspectives.

Proper training, change management and utilizing various other strategies are the essential task which needs to be taken into consideration. Additionally, there is a need of giving focus towards type of virtualization according to the cloud solution need for a particular organization. Additionally, there is a need of utilizing proper management approach which enables towards managing the cloud solutions in an effective manner.

Introduction

This paper will discuss the cloud management. It is identified that management has identified that transferring towards cloud solution will be the best option. So, in this research paper, researcher has discussed about the alternative IT support and training.

Furthermore this study discusses virtualization and cloud network. Additionally, it has also discussed the policy based network management. This paper will support to understand the parameters which need to be focused while implementing the cloud solution within the organization.

Alternative IT Support and Training

Management has reviewed different alternative of cloud solution. While evaluating the different options, it is identified that public cloud solution has the possibility of being locked into a provider.

Moreover, organization will get loss of control over the data and there is also a possibility of modifying the business processes to be in line with the provider. Due to which public cloud solution can create restrictions towards the organization’s future plans. However, in the contrary it is identified that private cloud solution is the better option however,

the initial cost is higher but it will enable the management to increase the flexibility towards fulfilling the organizational future needs. Additionally, to improve the organizational process, it is essential to give concern towards latest and advanced networking system.

Due to this reason, management is focused to select the more modern management solution for the IT department which will support to better manage the operations of the new cloud solutions.

After some external consultations, organization has decided to implement SDN (Software Defined Networks) or PBM (Policy Based Management) as these two alternatives are the best options according to the organizational requirement (Huang, et al., 2013).

The organization has shown growth at a fairly fast rate and has moved through various IT solutions over the years. Moreover, all the solutions applied by the firm were in house designed which has supported towards meeting the organizational challenge.

Due to this reason, there is a short lived design which forced towards redesign the solutions time to time and the need of continuous improvement in the system takes place. So, new system gets implemented by the huge support for the employees of the IT department which increase the IT budget too (Cérin, et al., 2013).

So, it is analysed that the proposed change is a major change which will take place in the organization especially in the context of IT infrastructure. Utilizing the private cloud solutions will increase the company cost but it will support towards offering the flexibility to the IT solutions which will enable the firm to increase the productivity while improving the networking system.

So, firm will focus towards increasing the opportunity of the firm. Moreover, to implement the latest IT solutions, there is a need of increasing the concern towards training of the employees as it will support the organization to develop the skills in the employees to handle the system in an effective manner (Ferry, et al., 2013).

It is identified that current IT support mechanism not become able to satisfy the need of the present help desk as well as the instructions on the web pages does not deliver the expected results. So the need of amendment in the IT system has taken place. There is a need of scheduling the training program which will support the employees to understand the functioning of the new networking system.

So, it is essential to change the current IT system to offer better experience to the consumers. There is a need of focusing towards various alternative strategies for offering the help services to the users which will enable them to adopt the new designs easily.

Providing proper training to the employees is an essential task to make the employees familiar with the new system and it also enables the employees to accept the changes easily. Moreover, Andrikopoulos, et al. (2014)stated that increasing info-graphics, utilizing user-friendly techniques, etc. remains highly assistive for the firm to attract the users to use the system with more interest and supports to develop curiosity.

In like manner, there is a need of employing the Kotter’schange management model as this model enables the employees to accept the change through the intrinsic force rather than forcing the employees to accept change (Wu, Lan, & Lee, 2013).

Additionally, thereis a need of focusing towards the strategy to accomplish the project in a timely manner in a budget friendly manner. Management needs to check the quotations of different service provider which will support the firm to select the best option.

Virtualization and Cloud

Building a cloud storage and adoption of virtual service type solution supports towards offering the best of both world. There are basically different types of virtualization; they are OS virtualization, application-server virtualization, application virtualization, administrative virtualization, network virtualization, hardware virtualization and storage virtualization. Different virtualization has their different advantages as well as disadvantages (Wan, et al., 2014).

OS virtualization is the most common form of virtualization and it supports to put a second instance or multiple instances of an operating system, for instance Windows in the context of a single machine. So, its advantage is that it supports towards empowering the businesses for the purpose of reducing the number of physical hardware which are required to run the software in an effective manner.

It also supports towards to save the energy which supports towards decreasing the cost. Moreover, it supports to decrease the cost over cabling, hardware, rack space, and much more, while offering various applications (Corradi, Fanelli, & Foschini, 2014).

However, it has various disadvantages too such as no work off-line capability, not supported by all OS, imaging disadvantage, booting solution causes issue, etc. The advantage of application-server virtualization is that is offers large presence in the virtualization space.

Moreover, it offers advanced load balancing facility as it spreads applications across servers, as well as the servers across applications too (Taleb, 2014). Additionally, it supports the IT department to balance the workload in the context of specific software.

It also enables the firm to load balancing which makes the management easier of servers and applications.It gives consideration towards greater network security by only giving visibility to one server in public while the rest remains hidden behind the reverse proxy network security appliance.

However, its disadvantage is that it increases the company cost moreover it needs software licensing considerations and have a need of explicit training.

On the other hand, application virtualization has the ability to use the RAM and CPU for the purpose of running the programs while storing them centrally on a server, for instance through Microsoft Terminal Services and cloud-based software.

It also offers software security updates. However, it has same disadvantages as the application-server virtualization has (Moniruzzaman, Nafi, &Hossain, 2014). At the same time, administrative virtualization is the virtualization system which mostly used in data centers.

The disadvantage of this virtualization is that it offers the management for a particular group. For instance, it can be used for certain groups to read the specific servers, infrastructure, application files, and rules (Pahl, &Xiong, 2013). Moreover, it only offers the facility of read only and the user cannot change them.

Additionally, network virtualization supports to virtually manage the IPs while supporting to accomplish the task through utilizing various tools such as routing tables, NICs, switches, and VLAN tags.It needs less time, less effort, speed up the work and improve recovery times (Modi,et al., 2013).

However, its disadvantage is that it offers zero trust policy moreover there is complexity in this virtualization system. Hardware virtualization is similar to OS virtualization which enables to eliminate the need of putting multiple software instances by putting them on a single machine.

For this purpose, chunks of a machine are partitioned off to perform specific tasks. However, physical failures are the major disadvantage (Ryan, 2013). Moreover, the need of memory and processing power is higher in this virtualization.

Additionally, it requires complex troubleshooting which can be only done by the expertise and experience technical staff. However, in storage virtualization the servers arenotremain aware about where their data is stored exactly. So, they work like bees in a hive.

Policy Based Network Management

To manage the new service solution, there are two options available. These options are PBM and SDN. Both the approach has their advantages.

SDN is a rising architecture which is dynamic in nature and supports towards offering manageable, cost-effective system while giving consideration towards adaptability. So, it offers the benefit of making the process smoother.

This approach is the best option for the high-bandwidth and dynamic nature applications (Pahl, &Xiong, 2013). It enables to decouple the network control while forwarding the functions and network controlling to make the system directly programmable.

Service-Development Network System

(Source: Pahl, &Xiong, 2013)

The OpenFlow protocol is the foundational approach for building the SDN solutions effectively. It supports the organization by offering the benefits of directly programmable, agile, centrally managed, programmatically configured, open standards-based and vendor-neutral.

All these features enable the IT staff to decrease the time on managing the system and make the cloud solution easier to handle (Moniruzzaman, Nafi, &Hossain, 2014). It offers physical separation of the network control plane which supports towards controlling the several devices on a control plane in an effective manner.

PBM is the combination of rules and services which supports to define the rules and the criteria for the resource access as well as usage. Policy-based system is a promising solution system which can be implemented in large-scale firms.

This system is adaptive and dynamic in nature and accepts the change according to the environmental response to or according to the changing application requirements (Taleb, 2014). PBM supports to modify the policy rules which are interpreted by the distributed entities,

without recoding or stopping the system which supports to run the organizational process in an effective manner. Its dynamic adaptability feature increases the flexibility for the organization in the context of future change management according to the firm requirement. It also supports to manage the increasingly complex computing systems.

Additionally, Modi, et al. (2013) stated that PBM is a managerial paradigm which enables to separate the governing rules and the behavior of a system from its functionality. It offers the benefit to the organization by reducing the maintenance costs of information as well as communication systems while giving concern towards flexibility and runtime adaptability.

At present PBM is highly in trend due to offering multitude of management architectures and paradigms. It also includes the features of SLA-driven, business-driven, autonomous, adaptive, and self-management.

The policy-based technology supports to relieve the suffering of managing to the large computer systems. It supports to free the manager from monitoring the equipment as well as the systems directly which enables towards the supply of a systematic method for the purpose of establishing, revising, and distributing the policies.

Policy-based technology supports to set a criterion that enables to determine the choice of the actions in the context of individual system. It supports to easily alter the system whenever required while supporting the IT staff to change or add some new policies instead of re-coding.

It enables the firm to make the best use of the resources by offering flexibility in the distribution of the resources. It supports to make the system less dependent while making the system more intelligent. It remains highly assistive towards the management of the wireless network. However, there is a need of improvement in the policy-based management (Pahl, &Xiong, 2013).

Policy Based Management System

Conclusion & Recommendations

From the above study, it can be concluded that network system plays vital role within the organization. However, it is necessary for the firm to amend the system according to the changing market needs. In this context, cloud solution plays vital role.

While applying the cloud solution, firm needs to focus towards the options available for cloud solution, strategies which need to apply, type of virtualization which will remain assistive towards fulfilling the need of cloud solutions while giving concern towards the different approaches.

Firm needs to evaluate all these parameters on the basis of advantages and disadvantages in the context of the organization and according to that there is a need of selecting the best options which support the firm to apply the cloud solution in the best manner while giving concern towards various factors. It supports the firm to achieve the success in the effective implementation of networking solution within the organization.

 References

Andrikopoulos, V., Darsow, A., Karastoyanova, D., &Leymann, F. (2014).CloudDSF–the cloud decision support framework for application migration.In European Conference on Service-Oriented and Cloud Computing (pp. 1-16).Springer Berlin Heidelberg.

Cérin, C., Coti, C., Delort, P., Diaz, F., Gagnaire, M., Gaumer, Q., …&Shiozaki, K. (2013). Downtime statistics of current cloud solutions. International Working Group on Cloud Computing Resiliency, Tech. Rep.

Corradi, A., Fanelli, M., & Foschini, L. (2014). VM consolidation: A real case based on OpenStack Cloud. Future Generation Computer Systems32, 118-127.

Ferry, N., Rossini, A., Chauvel, F., Morin, B., & Solberg, A. (2013).Towards model-driven provisioning, deployment, monitoring, and adaptation of multi-cloud systems.In Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on (pp. 887-894).IEEE.

Huang, Q., Yang, C., Liu, K., Xia, J., Xu, C., Li, J., …& Li, Z. (2013). Evaluating open-source cloud computing solutions for geosciences. Computers & Geosciences59, 41-52.

Modi, C., Patel, D., Borisaniya, B., Patel, A., &Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing63(2), 561-592.

Moniruzzaman, A. B. M., Nafi, K. W., &Hossain, S. A. (2014).An experimental study of load balancing of OpenNebula open-source cloud computing platform. In Informatics, Electronics & Vision (ICIEV), 2014 International Conference on (pp. 1-6). IEEE.

Pahl, C., &Xiong, H. (2013).Migration to PaaS clouds-migration process and architectural concerns. In Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA), 2013 IEEE 7th International Symposium on the (pp. 86-91). IEEE.

Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software86(9), 2263-2268.

Taleb, T. (2014). Toward carrier cloud: Potential, challenges, and solutions. IEEE Wireless Communications21(3), 80-91.

Wan, J., Zhang, D., Zhao, S., Yang, L., &Lloret, J. (2014). Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions. IEEE Communications Magazine52(8), 106-113.

Wu, W. W., Lan, L. W., & Lee, Y. T. (2013). Factors hindering acceptance of using cloud services in university: a case study. The Electronic Library31(1), 84-98.

Leave a Comment