Chat with us, powered by LiveChat Research Paper: Server Virtualization // Read the docs before doing the paper For your written assignment this week, complete a case study of the organization you work f | EssayAbode

Research Paper: Server Virtualization // Read the docs before doing the paper For your written assignment this week, complete a case study of the organization you work f

Research Paper: Server Virtualization // Read the docs before doing the paper

For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
  • Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Paper/Writing Issues

Issues – Writing Issues

Unnecessary capitalization, or no capitalization

Use of personal pronouns where 3rd party would better suit

Use of translators that muddle sentences and paragraphs such that they are unreadable

No quotation marks when copying text from a source (i.e. plagiarism)

Lack of attention to assignment requirements

Lack of support for opinion

Grammar

Recommendations

Have a friend proof-read and critique. Honest, rather than nice, is required.

Run everything through Grammarly to check for inadvertent plagiarism and grammar.

Create a checklist of the assignment requirements. Do a check before you submit that each requirement has been met.

Resources

·         Plagiarism/APA Citing Tutorial: https://www.powtoon.com/c/fk7fUaMMf8z/1/m 

·         Citation Help Tools: http://ucumberlands.libguides.com/citations 

·         Basic Research Skills: https://ucumberlands.libguides.com/research 

·         Graduate Research Skills: https://ucumberlands.libguides.com/research/graduate 

·         Information Systems Top Resources: https://ucumberlands.libguides.com/security 

This Photo by Unknown Author is licensed under CC BY-SA

,

Cloud Computing and Virtualization

Supplemental Lecture

Agenda

Cloud Computing

Virtualization

Cloud Computing

3

3

Cloud Computing

Pay-per-use computing model

Customers pay for only the resources they need

May revolutionize computing

Unlike hosted services, does not require long-term contracts

Three service models of cloud computing

Cloud software as a service (SaaS)

Cloud platform as a service (PaaS)

Cloud infrastructure as a service (IaaS)

4

4

Cloud Computing Options

On-premise

Private clouds

Data—managed by the company or offsite by a third party.

Community clouds.

Cloud infrastructure is shared by several organizations

Supports the shared concerns of a specific community.

Public clouds.

Data is stored outside of the corporate data centers

In the cloud provider’s environment

Hybrid clouds

Combination of two or more other clouds.

5

Public Clouds – Versions

Infrastructure as a Service (IaaS).

Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software.

Designed to augment or replace the functions of an entire data center.

The customer may have full control of the actual server configuration.

More risk management control over the data and environment.

Platform as a Service (PaaS).

Virtualized servers

Clients can run existing applications or develop new ones

Provider manages the hardware, operating system, and capacity

Limits the enterprise risk management capabilities.

6

Public Clouds – Versions

Software as a Service (SaaS) or Application Service Provider (ASP).

Software application functionality through a web browser.

The platform and infrastructure are fully managed by the cloud provider.

If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk.

The most widely known and used form of cloud computing.

Some managers shy away from cloud computing because they are concerned about:

security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud.

data privacy.

7

To manage risk, an SLA needs to spell out these requirements.

7

Security Challenges

Cloud computing security challenges

Cloud provider must guarantee means to approve authorized users and deny imposters

Transmissions from the cloud must be protected

Customers’ data must be isolated from one another

8

8

Virtualization Architectures

Type II Virtualization

Requires a “host” operating system

Using the Type II Hypervisor, you create a virtual hardware environment for each VM

Install a “guest” operating system on each VM, just like installing a new computer

The host operating system shares access to the computer’s processor with the hypervisor

Does not provide the same performance as separate physical computers

Good testing or lab environment

9

Virtualization Architectures

A hybrid VMM sharing hardware access with a host operating system

10

Virtualization Architectures

Type I Virtualization

Hypervisor is an abstraction layer that interacts directly with the computer’s physical hardware

No host operating system required

Individual environments, called partitions have their own operating systems installed and accesses hardware through the hypervisor

No host operating system is sharing processor

Parent partition runs the virtualization stack which creates and manages the child partitions

11

Virtualization Architectures

A Type 1 VMM, with the hypervisor providing all hardware access

12

This Photo by Unknown Author is licensed under CC BY-SA

,

Running head: THE VIRTUALIZATION SOFTWARE

1

THE VIRTUALIZATION SOFTWARE 5

The virtualization software

Students name:

Professor:

Date:

Discuss the benefits of virtualization software.

The term virtualization is used for the application of the software in creating abstraction layers that will exist over the physical hardware. Virtualization allows users to run various virtual computers, applications, and OS, among others, on a single physical server. Virtualization has the capability of bringing in a lot of benefits to the users. Among them is the ability to slash the expenses, and there are a lot of inefficiencies when using the non-virtualized environment since one is not fully making use of applications on the servers. It cuts down the IT cost by enabling a single physical server to run from various virtual machines with different OS and running different applications when still hosted by one server (Menken & Blokdijk, 2018). Another benefit is the ability to reduce downtime and enhance resiliency during disaster recovery. Whenever a disaster strikes, it becomes important that an individual is tasked with fixing and replacing the affected physical server. The virtualized environment makes it possible to deploy, and one can easily clone or replicate the Virtual machine affected. Time taken to recover from a disaster with the virtual machine fully is normally short compared to the time taken to replace the damaged physical server with a new one fully. This allows the users to enjoy elements of resiliency and continuity (Rot & Chrobak, 2018). Another benefit is the ability and the chance to increase productivity and efficiency. Improved productivity and efficiency are curtesy of having few servers. It helps the teams involved in IT to be able to spend a short duration when maintaining the IT infrastructure and physical hardware (Khelf & Ghoualmi-Zine, 2018). The virtual environment will assist and play a crucial role in allowing one to install, maintain and update everything across the virtual machine. One does not necessarily have to go through a tedious and rigorous procedure in updating each server. It is another benefit brought about by virtualization where it is possible to offer control to the dependence and also the DevOps. It is easy to spin up a VM without affecting the production environment. It makes it easy for eh developer to clone the virtual machine and run the tests on the current environment (Rot & Chrobak, 2018). Another vital benefit is the ability to conserve the environment by using less power due to the fewer physical servers in use. These benefits assist in cost reduction and hence a chance to reinvest the money and secondly a chance to reduce the carbon footprint for the data center.

Do you agree/disagree with these benefits?

The above benefits mentioned, which have been proven to be true by the experts and supported by the many types of research done, I agree with the benefits mentioned above.

Discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

There are concerns in matters of security when it comes to server sprawl. Security is a major concern since the information stored is always guided by the principles of information, calling for integrity, availability, and confidentiality to be observed at the highest levels. The cloud providers must at all times assure and guarantee security by being able to approve the authorized identity before granting access and also deny the Imposters. Data transmission via clouds must also be protected, and again the information of clients must be separated from others (Khelf & Ghoualmi-Zine, 2018). To get the solution to that challenge is to adopt new ways of authenticating the real and actual users of eh information before granting access. It can be a two-way or biometric authentication where an individual will be examined on the physical characteristics and matched with the information in the servers before being granted access (Menken & Blokdijk, 2018). Another solution is to bring on competent board employees knowledgeable in maters security to ensure that they work well and have the resources they need at their disposal.

References

Khelf, R., & Ghoualmi-Zine, N. (2018). IPsec/Firewall security policy analysis: A survey. 2018 International Conference on Signal, Image, Vision and their Applications (SIVA). https://doi.org/10.1109/siva.2018.8660973

Menken, I., & Blokdijk, G. (2008). A complete guide on virtualization. Emereo Pty.

Rot, A., & Chrobak, P. (2018). Benefits, limitations and costs of IT infrastructure virtualization in the academic environment. Case study using VDI technology. Proceedings of the 13th International Conference on Software Technologies. https://doi.org/10.5220/0006934707040711

,

Cloud Computing and Virtualization

Supplemental Lecture

Agenda

Cloud Computing

Virtualization

Cloud Computing

3

3

Cloud Computing

Pay-per-use computing model

Customers pay for only the resources they need

May revolutionize computing

Unlike hosted services, does not require long-term contracts

Three service models of cloud computing

Cloud software as a service (SaaS)

Cloud platform as a service (PaaS)

Cloud infrastructure as a service (IaaS)

4

4

Cloud Computing Options

On-premise

Private clouds

Data—managed by the company or offsite by a third party.

Community clouds.

Cloud infrastructure is shared by several organizations

Supports the shared concerns of a specific community.

Public clouds.

Data is stored outside of the corporate data centers

In the cloud provider’s environment

Hybrid clouds

Combination of two or more other clouds.

5

Public Clouds – Versions

Infrastructure as a Service (IaaS).

Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software.

Designed to augment or replace the functions of an entire data center.

The customer may have full control of the actual server configuration.

More risk management control over the data and environment.

Platform as a Service (PaaS).

Virtualized servers

Clients can run existing applications or develop new ones

Provider manages the hardware, operating system, and capacity

Limits the enterprise risk management capabilities.

6

Public Clouds – Versions

Software as a Service (SaaS) or Application Service Provider (ASP).

Software application functionality through a web browser.

The platform and infrastructure are fully managed by the cloud provider.

If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk.

The most widely known and used form of cloud computing.

Some managers shy away from cloud computing because they are concerned about:

security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud.

data privacy.

7

To manage risk, an SLA needs to spell out these requirements.

7

Security Challenges

Cloud computing security challenges

Cloud provider must guarantee means to approve authorized users and deny imposters

Transmissions from the cloud must be protected

Customers’ data must be isolated from one another

8

8

Virtualization Architectures

Type II Virtualization

Requires a “host” operating system

Using the Type II Hypervisor, you create a virtual hardware environment for each VM

Install a “guest” operating system on each VM, just like installing a new computer

The host operating system shares access to the computer’s processor with the hypervisor

Does not provide the same performance as separate physical computers

Good testing or lab environment

9

Virtualization Architectures

A hybrid VMM sharing hardware access with a host operating system

10

Virtualization Architectures

Type I Virtualization

Hypervisor is an abstraction layer that interacts directly with the computer’s physical hardware

No host operating system required

Individual environments, called partitions have their own operating systems installed and accesses hardware through the hypervisor

No host operating system is sharing processor

Parent partition runs the virtualization stack which creates and manages the child partitions

11

Virtualization Architectures

A Type 1 VMM, with the hypervisor providing all hardware access

12

This Photo by Unknown Author is licensed under CC BY-SA

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing