$20 Bonus + 25% OFF +
5
%
Cashback
information
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Question:

Discuss the requirements for remote administration, resource management and SLA management. It may be useful to consider Morad and Dalbhanjan’s operational checklists for DSI’s OSDS. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider in relation to OSDS.
 
 

Answer:

Introduction

The researcher introduced the report about cloud computing and discussed various aspects of cloud computing for DSI (Department of Spatial information). The suggested deployment is selected by DSI organization, and further assessment and information are required for technical and SLA management.  In this report, the presented context describes the abilities that need to be met for different organizations.  The document provides a brief idea about the management requirements and the necessity of SLA for the chosen cloud service provider. The overview of the report is to discuss in detail about the assessment of security, deployment model by DSI for OSDS (Online Spatial Delivery System) and risk management. The document also explains why we need the remote administration and SLA management and the recovery and backup plan for OSDS.

1. Requirement for SLA and Resource Management and Remote Administration

The below points are explained in brief about the requirement of the resource and SLA management and remote administration.

1.1 Service Level Agreement Management

The SLA (service level agreement) is an agreement or a document of contract between two firms or company where one is a service provider, and other is client or customer. It defines about what the service provide will provide you and what penalties or fine the service provider will pay the customer in case of any failed case (Wu & Buyya, 2012). The purpose of SLA management is to manage SLA in such a way that the client's needs are well presented in front of the service provider, and they can provide a better service as per the needs. All these are mentioned in detail in the service level agreement. The requirement of service level management is important as it is the selected method for measuring the service performance (Abawajy et al., 2015).

1.2 Resource Management

It is one of the important features of project management that deals with demands of the project resources, financial, distribution, and human. To retain the best talent, improve customer satisfaction, enhance billable utilization and increase profit margin effective resource management is a major aspect for all the DSI service executives those who are looking to enhance and improve the following points that are mentioned above (Manvi & Shyam, 2014). The quality service is much expected by the service provider. Provide a complete control and visibility. Moreover to handle a huge of customers in the most effective manner has some important challenges. The resource management plays a major role in customer satisfaction and total performance enhancement. The resource management has to be effective on both the ends (service provider and end user) (Jhawar et al., 2012).

1.3 Remote Administration

Based on the abilities of the desktops the organization uses the servers using cloud computing.  The remote administration gives the user the power to access the data irrespective of the location. Reboot and shut down another computer over a network. Retrieve streaming data and a network device.  Modify system services and logical groups. The files can be obtained from anywhere in this world using a different range of devices (Ramachandran et al., 2015). The interface of the remote administration system will be decided by the management system. It handles the usage and charter cost fees. It monitors properly whether the quality of SLA and service is met or not. It plans the capacity. It keeps the records of status, usage and its service performance (Falfushinsky et al., 2014).

 

2. Resilience, Backup and Disaster Recovery

2.1 Disaster Recovery

According to Khoshkholghi et al., (2014), the disaster recovery process is a relatively new internal activity, and there are lots of misinformation and hype that is going around. The data recovery plan is divided into five stages, and DSI has to follow those five steps to restore their research data in case of any disaster.

Collecting and evaluate the needs of data protection

Department of spatial information requirement which will be gathered in this stage and the data that has been collect play a key role to facilitate the cloud data protection. Data protection is important to be evaluated properly.

Selecting a cloud service provider

In this stage, DSI needs to choose a right service provider which is already done.

Price estimation

The payment activities will be conducted on either by monthly subscriptions or based on the storage space and bandwidth.

Building bandwidth management plan

The OSDS requirements are considered at this stage for the managing the internet bandwidth.

Determining the Logistic Requirements

Department of spatial information needs to consider various logistic requirements for performing full such as cloud based directory services and active directory synchronization.

2.2 Backup Data

The data backup process is also an internal process or activity of cloud computing. For backing up the data RAID SIX is used to back up all data when to compare to the data recovery tool it is much faster and better. The service provider will install two extra disks than required to provide better support (Chen & Zhao, 2012). It has a high fault tolerance, high drive failure, and the data retaining period is high on an online spatial delivery system (OSDS).   

2.3 Resilience

Resiliency refers to the capability of the storage system, entire data center, network, and server. It still operates when there is power outage or equipment failure or any other kind of interruption. It is there to recover the data as quickly as possible. When the project planning is proposed the resiliency and introduced; and moreover it is linked up to the disaster plan and the with another data center for disaster recovery. The resiliency is obtained through unwanted components or other internal system or by enabling the datacenter (Jhawar & Piuri, 2013).

3.  Service Level Agreement Assessment

As discussed by Morin et al., (2012), the service provider increases their service quality by managing their non-violation and infrastructure through SLA. The SLA gives the authority to access the resources of a various cloud service provider. The assessment goal is to address various risk aspects or factors of the cloud computing (Carlsson & Fullér, 2013). To evaluate the risk factors, there are many different methods and models that can be obtained. The ownership of DSI needs to be confirmed by stored data in the vendors system. In a case of any failure, a solution needs to be implemented. The specific parameter needs to be defined. The SLA is to provide a stable service to the vendor that is selected by the Department of spatial information (Ficco et al., 2012). The risk assessment has a great impact on cloud computing. The effect of the risk in the design and architecture is reviewed by the risk management.  The system infrastructure and security regulation is done.

Conclusion:

The presented report indicates that Department of spatial information needs to be considered all the points that are discussed above. The SLA management, Recovery Management, and Remote administration are critical for DSI, and they need to review it properly and implement it in their organization. The mentioned disaster recovery and data backup are some critical process for cloud computing and need to be addressed properly as well. To have a better experience in cloud computing DSI needs to consider all the points and have to do a critical analysis of any risk factors that might affect the implementation process. The service level agreement is very critical and important, and both DSI, and the service provider needs to review it all together and have to identify if there are any risk and how they can eliminate the risk using better assessment.

 

References

Abawajy, J., Fudzee, M. F., Hassan, M. M., & Alrubaian, M. (2015). Service level agreement management framework for utility-oriented computing platforms. The Journal of Supercomputing, 71(11), 4287-4303.

Carlsson, C., & Fullér, R. (2013). Probabilistic versus possibilistic risk assessment models for optimal service level agreements in grid computing. Information Systems and e-Business Management, 11(1), 13-28.

Falfushinsky, V., Skarla, O., & Tulchinsky, V. (2014). INTEGRATION OF CLOUD COMPUTING PLATFORM TO GRID INFRASTRUCTURE. International Journal of Computing, 12(4), 333-339.

Ficco, M., Rak, M., & Di Martino, B. (2012, November). An intrusion detection framework for supporting SLA assessment in cloud computing. In Computational Aspects of Social Networks (CASoN), 2012 Fourth International Conference on (pp. 244-249). IEEE.

Jhawar, R., & Piuri, V. (2013). Fault tolerance and resilience in cloud computing environments. Computer and Information Security Handbook,, 125-141., March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE.

Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster recovery in cloud computing: A survey. Computer and Information Science, 7(4), 39.

Manvi, S. S., & Shyam, G. K. (2014). Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, 424-440.

Morin, J. H., Aubert, J., & Gateau, B. (2012, January). Towards cloud computing SLA risk management: issues and challenges. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5509-5514). IEEE.

Ramachandran, M., Chang, V., & Li, C. S. (2015, January). The improved cloud computing adoption framework to deliver secure services. In Proceedings of ESaaSA 2015-2nd International Workshop on Emerging Software as a Service and Analytics, In conjuction with the 5th International Conference on Cloud Computing and Services Science-CLOSER 2015 (pp. 73-79). Scitepress.

Wu, L., & Buyya, R. (2012). Service Level Agreement (SLA) in utility computing systems. IGI Global.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Cloud Computing: DSI. Retrieved from https://myassignmenthelp.com/free-samples/cloud-computing-dsi.

"Cloud Computing: DSI." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/cloud-computing-dsi.

My Assignment Help (2017) Cloud Computing: DSI [Online]. Available from: https://myassignmenthelp.com/free-samples/cloud-computing-dsi
[Accessed 22 November 2019].


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest It Write Up Samples

MITS5002-Evidence Based Software Engineering

Download : 0 | Pages : 8

Answer: Introduction This research report is based on describing about the ways in which the areas of software engineering could be benefited on the basis of collection of evidences. These would be extremely helpful for the identification of the potential form of difficulties that would be associated with the kind of approach. It has been researched that the researches in the field of medication have changed the field of study in the sector [...

Read More arrow

THT2112-Interactive Marketing Activities Over The Web

Download : 0 | Pages : 3

Answer: Internal environment Business operating environment are quite broad and categorized depending on the origin of the factor affecting business operation. Internal business environment explains factors that affect business and they originate from within business itself (Bader, 2010). In this case, Rendezvous Hotel Melbourne should be facing operational challenges that arise from within the business. Though it is usually believed internal...

Read More arrow Tags: Australia Malvern Management University of New South Wales 

BUSM4559 Work In Global Society

Download : 0 | Pages : 3
  • Course Code: BUSM4559
  • University: RMIT University
  • Country: Australia

Answers: Different views on technology Answer1&13: It is true as almost all process of operations transforming into new innovated phase and the credit goes to powerful technologies. While, achieving client faith, satisfactory feedbacks and to survive in today’s competitive environment, technologies playing a key role within business operations. Answer2: Technology has an immediate effect on work performance of the employees. ...

Read More arrow

HC1041 IT For Business

Download : 0 | Pages : 8

Answer: Introduction  Nowadays, every business makes the use of information technology for the effective functioning of its operations. Due to lack of needed resources and expertise, some problems are faced by the small businesses in the implementation of approaches related to information technology.  Point of Sale or POS system can be defined as grouping of software and hardware with the view to create a machine that can perform th...

Read More arrow

ITECH1102 Networking And Security 2

Download : 0 | Pages : 6
  • Course Code: ITECH1102
  • University: Federation University
  • Country: Australia

Answer: Introduction Network connectivity in an important aspect in all businesses worldwide. Network connectivity in the process of join networks to one another. It is done with the use of switches, gateways and routers. Network connectivity is done in different topologies. The topologies include linear, hub, star and tree designs. Each topology has its advantages and disadvantages (Shifrin & Keslassy, 2009). Explain the role and functi...

Read More arrow
Next
watch

Save Time & improve Grade

Just share your requirement and get a customized solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,144,711

Orders

4.9/5

Overall Rating

5,048

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1758 Order Completed

99% Response Time

William Martinez

MS in Biology

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2279 Order Completed

97% Response Time

Zachary Perez

PhD in Computer Science and Information System

Washington, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Thank you so much for helping with my assignment, I am very satisfied, I will definitely refer other students to log into your website for any assignments.

flag

User Id: 347074 - 22 Nov 2019

Australia

student rating student rating student rating student rating student rating

I had to return the assignment a few times. It seems that the price is too high to receive half baked responses.

flag

User Id: 342365 - 22 Nov 2019

Australia

student rating student rating student rating student rating student rating

thanks a lot for your support and I got the positive results and thanks for help for each step which I need it. thanks

flag

User Id: 150887 - 22 Nov 2019

Australia

student rating student rating student rating student rating student rating

Thank you for completing my assignment within very short period of time. It was completed within 5 hours. Thank you so much

flag

User Id: 337641 - 22 Nov 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?