Research Paper: Server Virtualization // Read the docs before doing the paper For your written assignment this week, complete a case study of the organization you work f
Research Paper: Server Virtualization // Read the docs before doing the paper
For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
- Describe the organization’s environment, and evaluate its preparedness for virtualization.
- Explain Microsoft (or another product) licensing for virtualized environments.
- Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
- Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities
- Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.
Submit your research paper as a single document. Your paper should meet the following requirements:
- Be approximately 3-4 pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Paper/Writing Issues
Issues – Writing Issues
Unnecessary capitalization, or no capitalization
Use of personal pronouns where 3rd party would better suit
Use of translators that muddle sentences and paragraphs such that they are unreadable
No quotation marks when copying text from a source (i.e. plagiarism)
Lack of attention to assignment requirements
Lack of support for opinion
Grammar
Recommendations
Have a friend proof-read and critique. Honest, rather than nice, is required.
Run everything through Grammarly to check for inadvertent plagiarism and grammar.
Create a checklist of the assignment requirements. Do a check before you submit that each requirement has been met.
Resources
· Plagiarism/APA Citing Tutorial: https://www.powtoon.com/c/fk7fUaMMf8z/1/m
· Citation Help Tools: http://ucumberlands.libguides.com/citations
· Basic Research Skills: https://ucumberlands.libguides.com/research
· Graduate Research Skills: https://ucumberlands.libguides.com/research/graduate
· Information Systems Top Resources: https://ucumberlands.libguides.com/security
,
Cloud Computing and Virtualization
Supplemental Lecture
Agenda
Cloud Computing
Virtualization
Cloud Computing
3
3
Cloud Computing
Pay-per-use computing model
Customers pay for only the resources they need
May revolutionize computing
Unlike hosted services, does not require long-term contracts
Three service models of cloud computing
Cloud software as a service (SaaS)
Cloud platform as a service (PaaS)
Cloud infrastructure as a service (IaaS)
4
4
Cloud Computing Options
On-premise
Private clouds
Data—managed by the company or offsite by a third party.
Community clouds.
Cloud infrastructure is shared by several organizations
Supports the shared concerns of a specific community.
Public clouds.
Data is stored outside of the corporate data centers
In the cloud provider’s environment
Hybrid clouds
Combination of two or more other clouds.
5
Public Clouds – Versions
Infrastructure as a Service (IaaS).
Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software.
Designed to augment or replace the functions of an entire data center.
The customer may have full control of the actual server configuration.
More risk management control over the data and environment.
Platform as a Service (PaaS).
Virtualized servers
Clients can run existing applications or develop new ones
Provider manages the hardware, operating system, and capacity
Limits the enterprise risk management capabilities.
6
Public Clouds – Versions
Software as a Service (SaaS) or Application Service Provider (ASP).
Software application functionality through a web browser.
The platform and infrastructure are fully managed by the cloud provider.
If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk.
The most widely known and used form of cloud computing.
Some managers shy away from cloud computing because they are concerned about:
security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud.
data privacy.
7
To manage risk, an SLA needs to spell out these requirements.
7
Security Challenges
Cloud computing security challenges
Cloud provider must guarantee means to approve authorized users and deny imposters
Transmissions from the cloud must be protected
Customers’ data must be isolated from one another
8
8
Virtualization Architectures
Type II Virtualization
Requires a “host” operating system
Using the Type II Hypervisor, you create a virtual hardware environment for each VM
Install a “guest” operating system on each VM, just like installing a new computer
The host operating system shares access to the computer’s processor with the hypervisor
Does not provide the same performance as separate physical computers
Good testing or lab environment
9
Virtualization Architectures
A hybrid VMM sharing hardware access with a host operating system
10
Virtualization Architectures
Type I Virtualization
Hypervisor is an abstraction layer that interacts directly with the computer’s physical hardware
No host operating system required
Individual environments, called partitions have their own operating systems installed and accesses hardware through the hypervisor
No host operating system is sharing processor
Parent partition runs the virtualization stack which creates and manages the child partitions
11
Virtualization Architectures
A Type 1 VMM, with the hypervisor providing all hardware access
12
,
Running head: THE VIRTUALIZATION SOFTWARE
1
THE VIRTUALIZATION SOFTWARE 5
The virtualization software
Students name:
Professor:
Date:
Discuss the benefits of virtualization software.
The term virtualization is used for the application of the software in creating abstraction layers that will exist over the physical hardware. Virtualization allows users to run various virtual computers, applications, and OS, among others, on a single physical server. Virtualization has the capability of bringing in a lot of benefits to the users. Among them is the ability to slash the expenses, and there are a lot of inefficiencies when using the non-virtualized environment since one is not fully making use of applications on the servers. It cuts down the IT cost by enabling a single physical server to run from various virtual machines with different OS and running different applications when still hosted by one server (Menken & Blokdijk, 2018). Another benefit is the ability to reduce downtime and enhance resiliency during disaster recovery. Whenever a disaster strikes, it becomes important that an individual is tasked with fixing and replacing the affected physical server. The virtualized environment makes it possible to deploy, and one can easily clone or replicate the Virtual machine affected. Time taken to recover from a disaster with the virtual machine fully is normally short compared to the time taken to replace the damaged physical server with a new one fully. This allows the users to enjoy elements of resiliency and continuity (Rot & Chrobak, 2018). Another benefit is the ability and the chance to increase productivity and efficiency. Improved productivity and efficiency are curtesy of having few servers. It helps the teams involved in IT to be able to spend a short duration when maintaining the IT infrastructure and physical hardware (Khelf & Ghoualmi-Zine, 2018). The virtual environment will assist and play a crucial role in allowing one to install, maintain and update everything across the virtual machine. One does not necessarily have to go through a tedious and rigorous procedure in updating each server. It is another benefit brought about by virtualization where it is possible to offer control to the dependence and also the DevOps. It is easy to spin up a VM without affecting the production environment. It makes it easy for eh developer to clone the virtual machine and run the tests on the current environment (Rot & Chrobak, 2018). Another vital benefit is the ability to conserve the environment by using less power due to the fewer physical servers in use. These benefits assist in cost reduction and hence a chance to reinvest the money and secondly a chance to reduce the carbon footprint for the data center.
Do you agree/disagree with these benefits?
The above benefits mentioned, which have been proven to be true by the experts and supported by the many types of research done, I agree with the benefits mentioned above.
Discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.
There are concerns in matters of security when it comes to server sprawl. Security is a major concern since the information stored is always guided by the principles of information, calling for integrity, availability, and confidentiality to be observed at the highest levels. The cloud providers must at all times assure and guarantee security by being able to approve the authorized identity before granting access and also deny the Imposters. Data transmission via clouds must also be protected, and again the information of clients must be separated from others (Khelf & Ghoualmi-Zine, 2018). To get the solution to that challenge is to adopt new ways of authenticating the real and actual users of eh information before granting access. It can be a two-way or biometric authentication where an individual will be examined on the physical characteristics and matched with the information in the servers before being granted access (Menken & Blokdijk, 2018). Another solution is to bring on competent board employees knowledgeable in maters security to ensure that they work well and have the resources they need at their disposal.
Khelf, R., & Ghoualmi-Zine, N. (2018). IPsec/Firewall security policy analysis: A survey. 2018 International Conference on Signal, Image, Vision and their Applications (SIVA). https://doi.org/10.1109/siva.2018.8660973
Menken, I., & Blokdijk, G. (2008). A complete guide on virtualization. Emereo Pty.
Rot, A., & Chrobak, P. (2018). Benefits, limitations and costs of IT infrastructure virtualization in the academic environment. Case study using VDI technology. Proceedings of the 13th International Conference on Software Technologies. https://doi.org/10.5220/0006934707040711
,
Cloud Computing and Virtualization
Supplemental Lecture
Agenda
Cloud Computing
Virtualization
Cloud Computing
3
3
Cloud Computing
Pay-per-use computing model
Customers pay for only the resources they need
May revolutionize computing
Unlike hosted services, does not require long-term contracts
Three service models of cloud computing
Cloud software as a service (SaaS)
Cloud platform as a service (PaaS)
Cloud infrastructure as a service (IaaS)
4
4
Cloud Computing Options
On-premise
Private clouds
Data—managed by the company or offsite by a third party.
Community clouds.
Cloud infrastructure is shared by several organizations
Supports the shared concerns of a specific community.
Public clouds.
Data is stored outside of the corporate data centers
In the cloud provider’s environment
Hybrid clouds
Combination of two or more other clouds.
5
Public Clouds – Versions
Infrastructure as a Service (IaaS).
Infrastructure through grids or clusters of virtualized servers, networks, storage, and systems software.
Designed to augment or replace the functions of an entire data center.
The customer may have full control of the actual server configuration.
More risk management control over the data and environment.
Platform as a Service (PaaS).
Virtualized servers
Clients can run existing applications or develop new ones
Provider manages the hardware, operating system, and capacity
Limits the enterprise risk management capabilities.
6
Public Clouds – Versions
Software as a Service (SaaS) or Application Service Provider (ASP).
Software application functionality through a web browser.
The platform and infrastructure are fully managed by the cloud provider.
If the operating system or underlying service isn’t configured correctly, the data at the higher application layer may be at risk.
The most widely known and used form of cloud computing.
Some managers shy away from cloud computing because they are concerned about:
security—specifically about external threats from remote hackers and security breaches as the data travels to and from the cloud.
data privacy.
7
To manage risk, an SLA needs to spell out these requirements.
7
Security Challenges
Cloud computing security challenges
Cloud provider must guarantee means to approve authorized users and deny imposters
Transmissions from the cloud must be protected
Customers’ data must be isolated from one another
8
8
Virtualization Architectures
Type II Virtualization
Requires a “host” operating system
Using the Type II Hypervisor, you create a virtual hardware environment for each VM
Install a “guest” operating system on each VM, just like installing a new computer
The host operating system shares access to the computer’s processor with the hypervisor
Does not provide the same performance as separate physical computers
Good testing or lab environment
9
Virtualization Architectures
A hybrid VMM sharing hardware access with a host operating system
10
Virtualization Architectures
Type I Virtualization
Hypervisor is an abstraction layer that interacts directly with the computer’s physical hardware
No host operating system required
Individual environments, called partitions have their own operating systems installed and accesses hardware through the hypervisor
No host operating system is sharing processor
Parent partition runs the virtualization stack which creates and manages the child partitions
11
Virtualization Architectures
A Type 1 VMM, with the hypervisor providing all hardware access
12
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.