Featured Post
Career Goal Essay Essay
What is an objective? Is it the brilliant goal of oneââ¬â¢s life, or an unmistakable pathway that prompts this yearned trophy? Or on the ...
Tuesday, May 5, 2020
Role of Cloud Computing
Question: Discuss about the role of Cloud Computing. Answer: Introduction The IT resources in the cloud, that are shared between the end users are needed to be managed and allocated in a manner such that every user can get their required resources whenever they need and in a cost efficient manner (Beloglazov et al., 2012). Now to configure, maintain and monitor the resources. All this management issues in cloud systems are maintained by using different mechanisms, such as resource management system, remote administration system, management system of SLA and payment management system. This paper provides a detailed view of spatial information support for emergency conditions like disaster and planning based on cloud technology. To explore the service of cloud technology for sharing the resources, the big data are analyzed and it indicates the spatial data storage. Requirement of remote administration Remote administration of cloud is the mechanism that provides the interface and other tools that are used by the internal and external administrator. The role of the administrator is to configure and manage the cloud architecture and services. Some of the task are like configuring and setting up the services of cloud according to the requirement provided by the customer, managing the cost and usage of the cloud servers, managing the corporate customers, credentials relating authentication and security, monitoring the capacity of the cloud data centers, monitoring SLA document and quality of service etc. Remote administration using VPN The remote administration can be handled using virtual private network, It requires a strong network backbone that supports dual band network. One of the channel is used for sending and receiving the normal data of the user in VPN and the other channel is dedicated sending and receiving the administrative packets. Through VPN the remote branches can be connected to the headquarters or the main branch securely and efficiently. The advantage of using VPN in remote administration is that if the one channel is down the administrator can reach the network through the other channel and solve the problem remotely. Resource management In resource allocation also the cloud plays an important role that ensures the reliability of the cloud management. Some of the strategy that are adopted by the cloud service provider to manage the resources are linear scheduling strategy, pre copy approach, matchmaking and scheduling, just in time resource allocation (Beloglazov et al., 2012). Linear scheduling strategy is an algorithm that mainly focuses on the increase of the selected quality of service parameters. The resources are allocated among the users and the QosS parameter is increased. Pre copy approach copies the memory repeatedly from the source to the destination machine; this causes a lag in fetching the data and information and has a negative impact on the user. Matchmaking and scheduling fetches a pool of data from the resource table and allocates it to the different process on the job. Just in time resource allocation is the resource management technique used to minimize the standby time of any machine. The time intervals are set to different resources with a workload change on the cloud. SLA management SLA stands for Service Level Agreement. It is the contract between the cloud service provider and the customer, with a energetic IT manager the slowdown and the down time can be identified and repaired with less latency. When a problem occurs in the system the troubleshooting time should be minimum and the effect on the users should also be minimized. The SLA acts as standardization for the cloud service provider. The SLA provides a detailed view of the infrastructure of the company and the cost for the service. It specifies about the rights of the user to their data and the rights to retrieve those data. The details of the security and the action the user can take in case of failure of the terms are also mentioned in the SLA (Wu et al., 2012). There are certain criteria that the SLA must cover like data availability percentage, security, location of data, disaster recovery, performance, portability, management techniques and access to data. Spatial data infrastructure plays an important role in the current economy and with the involvement of current technology this technology can be virtualized and this removes the requirement of the centralized database system. The architecture of distributed spatial information system has to be interoperable in order to work efficiently. The main aim of the Spatial Information Act is the development of Australian Spatial Data Infrastructure (ASDI) (Dinh et al., 2013). The spatial management has the capability of emergency management and it discussed about the use of cloud service in achieving, accessing and managing spatial information access. Data backup in the cloud services The cloud service providers offer a huge storage space to its users with better processing speed, which leads the user to store more data to the cloud and have an access to it from any remote locations (Chen et al., 2012). The database storage space provided by the cloud server is scalable, which means that if the user requires more space for storing their files they can do it on the click of a mouse. The data that are stored in the cloud are encrypted at the source and then transferred to the storage location. There is a disadvantage of this cloud storage system that is if the data in the cloud storage gets destroyed or deleted due to some administrative mistake then there would be a huge loss for the company (Zissis Lekkas, 2012). The recovery time for a cloud backup system is more than the traditional backup system. When a large volume of data is needed to be restored the cloud service hosting the server sends the data required by some portable media devices. To avoid this situat ion the data should be stored redundantly in different locations such that in case of any disaster the data can be recovered. Cloud servers has more flexibility than traditional backup systems there is no need of extra hardware and the maintenance cost is zero for cloud servers. Conclusion The cloud service provided by any company is exposed to different threats like security and resource management. There are many flaws in the cloud system and avoid the loss of data and service the user and the cloud service provider should be aware. By implementing proper service level agreement and different backup and recovery techniques this shortcomings can be overcome and help the company to grow properly by using its advantage. The primary focus of this article is on the utility and management of cloud computing. The spatial data infrastructure can be used to resolve the risk and manage the cloud servers to work more efficiently. Reference: Beloglazov, A., Abawajy, J., Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing.Future generation computer systems,28(5), 755-768. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Wu, L., Garg, S. K., Buyya, R. (2012). SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments.Journal of Computer and System Sciences,78(5), 1280-1299. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.