COMP 20038 Cloud Computing Assignment

Assignment Help Computer Engineering
Reference no: EM132679232

COMP 20038 Cloud Computing - Middle East College

Learning Outcome 1: Analyze the concepts of Virtualization and types of virtualization.

Learning Outcome 2: Evaluate the concept of cloud computing.

Learning Outcome 3: Compare the cloud computing service architectures and models.

Assignment Objective

Cloud computing often referred as on-demand computing has had a significant impact on how IT services can be provisioned without establishing core infrastructure which includes high end hardware, software and applications. The objective of this assignment is to inculcate the advanced concepts of virtualization and its types which lays the foundation for understanding cloud computing concepts. This assignment further test the conjectural and pragmatic concepts related to cloud computing service architectures and challenges students comprehension of concepts through complex scenarios that are part of this assignment. This assignments also evaluates the ability of students and their comprehension level related to the advanced concepts of cloud computing.

Assignment Tasks

Task 1:

Write a detailed work proposal for the above tasks with particulars related to the source of information, overall understanding of tasks, comprehensive schedule and timeline. The work proposal should be submitted within two weeks from the issue date of the assignment which is 7th of November 2020.

The work proposals should include the following

i. Understanding of deliverables

ii. Identifying components required for tasks

iii. Timeline and references

Task 2:

You are working as cloud computing solutions architect for Rural Area Electricity Company (RAECO) Oman. Your company is a medium scale organization with diverse requirements for Information Technology services. Your manager has given you a broad classification of Information Technology services and corresponding user groups availing those services to understand the requirements for cloud service architecture that would be appropriate for each group of users. The classification of the user groups and corresponding services availed is provided in the below given table.

S. No

User Category

Information Technology Services Utilized

1.

Systems Administrators, Systems Engineers, Network Engineers

Require infrastructure like computing resources, storage devices and network devices to carry out their day to day activities and jobs.

2.

Information Systems architects, developers, programmers, Database administrator and solutions architects

Requires computing resources within the boundaries of particular O/S environment specific to their requirements. Require a particular type of hardware which meets their specific demands to carry out their day-to-day activities and jobs.

3.

All Non IT staff, General Managers, Managers, senior and junior Officers.

Require computing resources like applications, packages, software tools, software solutions, storage and both infrastructure and environment (Platform) that can run the desired applications.

As a cloud computing solutions architect propose the cloud service architecture appropriate for different category of users based on your understanding of cloud computing service architecture. You are supposed to write a detailed report complimented with proper in-text citations as appropriate and in detail explain the cloud service architectures and highlight their boundaries as far as provisioning of cloud services is concerned. Suggest cloud architecture appropriate for user groups provided in the above table and support your answer with suitable definitions and explanations.

Task 3:

Analyze the Platform as a Service (PaaS) on the web environment and implement any server of your choice by availing PaaS services. As a cloud administrator critically evaluate the services provided by the web interface and suggest enhancements for better user experience. Download your implementation as an evidence of your work.

Task 4:

Virtualization is a fundamental concept for overall understanding of cloud technologies and implementations. It is also essential to know the current research developments that are taking place in virtualization. In order to reflect and acquire individual research skills, you are advised to review a Journal article or conference publication of a reputed conference like IEEE, Springer, Elsevier or any Scopus or SCI indexed publication which is related to Virtualization, types of virtualization or secure virtualization for cloud computing. The students are advised to paste the first page of publication as an image in their assignment task clearly showing the abstract and publication information and then write the review with critical reflections, observations and commentary.

Reference no: EM132679232

Questions Cloud

Discuss social disorganization from a variety of perspective : Chapter 8 of Vold's Theoretical Criminology discusses social disorganization from a variety of perspectives. Begin by defining social disorganization.
Should Ontime Delivery Service record the interest payment : Murray paid interest of $3,200 on a personal loan of $60,000 that he used to begin the business. Should Ontime Delivery Service record the interest payment
Explain the meaning of search and seizure : Explain why the Fourth Amendment applies to the federal government and to state, county, and municipal governments. Explain the meaning of search and seizure.
What type of exchange rate movement concerns : If the current exchange rate is 1.364/$, what is the nature of the insurance company's exchange rate risk?
COMP 20038 Cloud Computing Assignment : COMP 20038 Cloud Computing Assignment Help and Solution, Middle East College - Assessment Writing Service - Analyze the concepts of Virtualization and types
Explain the crime models and patterns : Prefer people with experience with similar work as there is need of using the crime models/patterns and enough knowledge of criminological research.
Why auditing of computer-based information systems : Which is a reason why auditing of computer-based information systems focuses on the concepts and techniques used in auditing an AIS?
Review any previous efforts to resolve the conflict : Problem Description, will require you to identify a criminal justice professional or inter-group conflict issue that is of import to you.
Demonstrate that you understand the theories : The primary purpose of the writing assignments is to demonstrate that you understand the theories well enough to apply them to real-world situations.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd