Management Mechanisms In Cloud Computing

Cloud Computing Models: IaaS, SaaS, PaaS

Question:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Discuss the requirement for remote administration, resource management and SLA management.
 

The IT resources in the cloud, that are shared between the end users are needed to be managed and  allocated in  a manner  such that every user can get their required resources  whenever they need and in a cost efficient manner. Now to configure, maintain and monitor the resources. All this management issues in cloud systems are maintained by using different mechanisms, such as resource management system, remote administration system, management system of SLA and payment management system.

2.1 SaaS model

In the cloud computing there are three models IaaS, SaaS, PaaS. The SaaS is the abbreviation of the software as a service. These solutions include the   email management solutions, ERP solutions, or the customer relationship management solutions.  As the services provided to the client organization through the internet, user or the client does not have to install any package in their local system. In this model the as the services from the  provider  is accessed remotely  from  the organization in the similar way the remote access also facilitates the administrator to control the access ,usage and other administrating monitoring tasks.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

As an example we can take the case of ACL realty’s case study of implementing the SaaS models using the Google cloud services for managing its CRM and the email services. Google provides its own encryption and decryption methodologies to provide a extra layer of security to its cloud services .The Google provides the data store dashboard as a remote administration tool to its clients. Where the console need to have a valid user name and password to login and use the provided services. The administrator can view the data related to the applications provided by the Google cloud services. Also the statistics of composite and built in indexes can be checked from the provided data store dashboard.    

2.2 Remote administration

In the remote administration of the clouds, this mechanism provides tools like interfaces that are used by both the internal and external administrator to configure and administrate the services of the cloud. The administrative tasks are implemented on the leased resources. There are some typical tasks are to be realized or completed by using the remote administrator   interface or the console (Beloglazov et al., 2012).

  1. Managing the cloud usage and the costs related to that.
  2. Configuring and setting up the services of the cloud according to the business needs o the organization.
  • Managing the corporate users, credentials related to security, authentication.
  1. Monitoring the service level agreements and the quality of the services.
  2. Tacking the services or the usage by the external or internal clients.
  3. Monitoring the capacity of the cloud.

2.3 Remote administration using VPN

In case of remote administration of the cloud services using a VPN, it requires networks that can handle dual channels. Because using a VPN channel the normal user data can be  sent or received and using the another  channel  the administrative

Packets can be transmitted. The VPN helps the administrators of the corporate organizations to connect the remote branches to the   headquarters or the main office in secure, economic way. The main advantage in using the VPN in the remote administration is that, although the data channel can have a problem but the  administrator can  use the  administrative channel can reach the desired machine and work on solving the  problem. The administrations through the VPN have some problems and difficulties too. Like if some the machines are local and some of them are remote then there would be no administrator to solve the problems (Alfano et al., 2014).

Resource Management Strategies

2.4 Resource management in cloud services

In the cloud services, the resource allocation process has a very vital role that ensures the success of the total cloud services. There are different strategies adopted by the provider to manage the resources in the most efficient way. Some of those methods are as follows:

Linear scheduling strategy: In this strategy, the algorithm mainly targets to maximize the selected quality of service parameters.  The resources are allocated among the users to maximize the QoS parameters. In this strategy, the parameter is cost function (Wu et al., 2013).

Pre copy approach: In this approach, the copies of the memory are repeatedly copied from the source machine to the destination host machine. The main drawback of this approach is, it causes delay to the experience of the user (Nguyen et al.,2013).

Matchmaking and scheduling: In this approach the method of allocating the job are obtained from the resource pool and in the next step it is determined that how the requested resources will be allocated to the different processes or jobs (Erdil, 2013).

Just in time resource allocation: In this resource management technique, it is tried to minimize the idle time for any resources. To do this the time intervals are set to the resources and altering the resources with the change of workload on the clouds (Rasmi & Vivek , 2013). 

2.5 SLA

The SLA is the abbreviation is the service level agreement. It is a contract between the cloud service provider (both internal and external) and the client. It defines the expected services that a user will get from its cloud provider.

There are some guidelines that each SLA should maintain to provide the quality services to its clients.

2.6 The business cases that should map to SLA

In the organization the IT resources helps in the automation. Therefore, a misaligned SLA can cause problem in the automation process of the client organization. This can also lead to the unreasonable deviation in the  provider guaranties.

Scope of SLA: The scope of the SLA should be understood both by the provider and by the client organization. Since the cloud services are provided by integrating many  layers so it is important to know that to which extent the  guarantee applies.

Scope of the SLA monitoring: Also in case of monitoring, the agreement should ensure that where the monitoring should be done and where the performance will be measured.

Defining penalties or compensation: In case of the provider, fails to maintain the quality of service of the cloud then the provider should compensate the client. This issue also needs to be documented on the SLA.

Securing the non measurable requirements: Some client requirements cannot be measured in the usual performance metrics. Like the privacy and the data security issues. When a client is adopting a provider then the provider should maintain a level of    privacy security of the data.

2.7 Archiving the SLA data

The data acquired by monitoring the SLA should be archived. So that this data can be   presented in future for reporting purpose.

Role of SLA in Cloud Computing

For the Amazon web services the service level agreement is a policy that governs the use of its cloud services by the client under the terms of its customer agreements. As stated in its site the company tries to make the services available to the users with the uptime of 99.95% monthly. If the   provider fails to meet the commitment then the client is eligible for the  service credit depending upon some conditions that are stated by the AWS. The uptime in the service is defined by the time amount in which the cloud services provided by the provider is accessible the client or the end user.

2.8 Data backup in the cloud services

As the cloud, service providers provide a huge storage space to its clients with the higher computation power. This leads the users to store the data to the clouds, to have the access    remote locations.  This storage has the problems too.  Like if the user data gets destroyed or disappears from cloud by some administrative mistake. To avoid the loss of the data there are different    backup and disaster recovery techniques are adopted by the providers.

There are several techniques are available for the backup and disaster recovery. Some of them are as follows:

2.9 High security distribution and rake technology

This technique utilizes the mechanism process of distributed data transferring under the encryption technology. Three components are mainly used in this method, data centers, supervisory servers and client nodes. The backup sequence and the recovery sequence. When there is a need of back up then the data centers encrypts, scrambles, duplicates the data, and sends Meta data to the supervisory servers (Thomas et al., 2013). In the recovery, sequence the supervisory servers’ collects the encrypted, fragmented data using the “rake reception” procedure and then they are merged, decrypted, and as well as descrambled.

2.10 Efficient routing grounded on taxonomy

In our research, this technique is not a data backup technique but a data retrieval technique. This technique is completely dependent on the semantic comparison in service requests and descriptions. The ERGOT (AH et al., 2014) use three components i) SON (semantic overlay network) ,ii) DHT(data hash table) ,iii) measure of semantic similarity of the service request and description.

2.11 Cold and hot backup service replacement strategy      

This recovery process is activated whenever it detects the failure of the services. This technique returns the service compositions dynamically. At the time of implementation of the services, the backup services remains in the active state.

2.12 Shared backup router resources

This technique focuses on the cost reduction in the back up of the data. This technique uses the IP address that is unchanged even after the failure of the router. This technique uses the network management system to backup the data (Weiyan et al., 2014). 

3.0 Conclusion

Due to different security and the implementation flaw the cloud services provided by different providers is exposed to different security as well as loss of data threats. To avoid the loss of data due to this threats and flaws the provider as well as end user or client should be aware. By implementing the proper SLA, use of different backup and recovery techniques   can this shortcomings can be avoided, and help the organization grow by properly using the advantages of the  IT enabled  business services or cloud services.  

References

AH, N. H., Shu, G., Malek, A. G., & Zi-Long, J. (2013). An optimal semantic network-based approach for web service composition with qos.TELKOMNIKA Indonesian Journal of Electrical Engineering, 11(8), 4505-4511.

Alfano, M., Prete, D. D., Michelino, D., Pardi, S., Vela, R., & Russo, G. (2014, December). Network Management in Cloud Computing for Public Administration: A Practical Use Case. In Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (pp. 768-773). IEEE Computer Society.

Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), 755-768.

da Cunha Rodrigues, G., Calheiros, R. N., de Carvalho, M. B., dos Santos, C. R. P., Granville, L. Z., Tarouco, L., & Buyya, R. (2015, July). The interplay between timeliness and scalability in cloud monitoring systems. In 2015 IEEE Symposium on Computers and Communication (ISCC) (pp. 776-781). IEEE.

Erdil, D. C. (2013). Autonomic cloud resource sharing for intercloud federations. Future Generation Computer Systems, 29(7), 1700-1708.

Nguyen, H., Shen, Z., Gu, X., Subbiah, S., & Wilkes, J. (2013, June). Agile: Elastic distributed resource scaling for infrastructure-as-a-service. In Proc. of the USENIX International Conference on Automated Computing (ICAC’13). San Jose, CA.

Rasmi, K., & Vivek, V. (2013). Resource management techniques in cloud Environment-A Brief Survey.

Thomas, G., Jose, V., & Afsar, P. (2013). Cloud computing security using encryption technique. arXiv preprint arXiv:1310.8392.

Weiyan, X., Dong, L., Ming, L., & Pengfei, J. (2014). Autonomous Recovery Technique of Software Bus Based on VxWorks Operating System. InProceedings of the World Congress on Engineering (Vol. 1).

Wu, Z., Liu, X., Ni, Z., Yuan, D., & Yang, Y. (2013). A market-oriented hierarchical scheduling strategy in cloud workflow systems. The Journal of Supercomputing, 63(1), 256-29.

Younis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep.

Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Services offered

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code ESSAYHELP