Identify appropriate cloud service providers

Assignment Help Computer Network Security
Reference no: EM132311239

Cloud Based Smart Application Management

Purpose of the assessment

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

c. Analyse and model system functionality and behaviour.
d. Compare and contrast different approaches to system analysis and design, such as object-oriented, agile, and service oriented techniques
e. Analyse and model the functional and non-functional requirements of a software system
f. Design and deploy functional solutions, such as initiating, analysing and implementing system plans

Assignment Specifications

The assignment helps students to develop fundamental knowledge on cloud computing along with different types of services provided.They get a deep understanding on different cloud service provides and their offers based on the services that are requested by an organization. Also this assignment helps students in better understanding the difference in working of the SOA and cloud based applications.

Smart Application Management

Requirements:

Consider any of the smart applications such as an Integrated cloud-based smart home management system, healthcare management applications etc. Write a report on the following:

• Write an introduction to the cloud computing environment with its advantages and disadvantages
• Identify one application and model the functional requirements including the system behavior
• The challenges faced in the development and deployment process of the cloud environment
• Provide insights about the performance management of cloud applications from the perspective of:
- Communication over the internet
- Providing private and public instances
- Application performance components

Analysis:

• Identify appropriate cloud service providers to build the application. Justify your opinion based on the comparison of the services provided by the two cloud providers. Which service provider performed better and why?

• Explain how this applications would be different in terms of the functional requirements if it was to be designed using a Service Oriented Architecture (SOA)

• Conclusion
• References

Verified Expert

The report is about cloud computing based health care management services. The technology is about the features, applications, and comparison of different service providers. Also provided is the discussion about the SOA and differences of the same with Cloud computing in this context. References are given in IEEE format.

Reference no: EM132311239

Questions Cloud

What risk management issues should an employer consider : BULAW5911 Managing The Legal Environment Assignment, Federation University, Australia. What risk management issues should an employer consider
What was it about the second example : Provide an example of a situation where an attempted motivational tool did not work. What was it about the second example that did not work? Explain
Logical treatment to use : If a risk is classified as occurring frequently and having a high severity which of the following would be the most logical treatment to use?
Contrast the advantages and disadvantages of buying : Compare and contrast the advantages and disadvantages of buying, building or leasing space for a small business.
Identify appropriate cloud service providers : Identify appropriate cloud service providers to build the application. Justify your opinion based on the comparison of the services provided by the two cloud
What are some considerations that the entrepreneur : What are some considerations that the entrepreneur should take into account I business is to be conducted in a foreign maker?
What is the purpose of an operational plan : What is the purpose of an operational plan? Please explain
Identify strengths and weaknesses : 1) Conduct internal and external analysis of specific organisations in order to identify strengths and weaknesses.
Strategic plan and an operational plan : What is the difference between a strategic plan and an operational plan?

Reviews

len2311239

5/24/2019 3:57:21 AM

Grades Excellent Requirements Relevant application and cloud service provider selection Analysis Comparisons, reasons and suggestions are precise Conclusion Clear conclusion covering of all that has been achieved in this assignment. IEEE Reference style Clear styles with excellent source of references.

len2311239

5/24/2019 3:57:15 AM

Analysis Justification on the best cloud provider (reasons for preferences of one over the other) Functional requirements of the same application in SOA 15 15 Conclusion Provide a conclusion based on your findings 5 Reference style Follow “IEEE – Transactions on networking” reference style (should have both in-text citation and reference list) 5 Total 80

len2311239

5/24/2019 3:57:07 AM

For example, your system enhancements could include increasing the level of fault tolerance, decreasing the time to recovery, or adding features to increase scalability, security and QoS. Questions Description Marks Requirements Introduction to cloud computing Describe the application and its functional requirements including the quality of design and interface Challenges faced in the application development Performance Management 5 15 5 15

len2311239

5/24/2019 3:56:58 AM

Due Date Friday, 11.55 Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.

len2311239

5/24/2019 3:56:52 AM

Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. c. Analyse and model system functionality and behaviour. d. Compare and contrast different approaches to system analysis and design, such as object-oriented, agile, and service oriented techniques e. Analyse and model the functional and non-functional requirements of a software system f. Design and deploy functional solutions, such as initiating, analysing and implementing system plans

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd