MOD005714 Data Centre and Cloud Infrastructures Assignment

Assignment Help Computer Network Security
Reference no: EM132717830

MOD005714 Data Centre and Cloud Infrastructures - Anglia Ruskin University

Data Centre and Cloud Infrastructures

Service Management & Security Concerns

A cloud service provider for DoDo.Com uses 50 percent of its data centre equipment to setup a cloud infrastructure. The remaining equipment is used for internal operations and for testing. The cloud infrastructure consists of a hypervisor cluster. A resource pool is created by aggregating the available resources of the hypervisor cluster. The cloud infrastructure is used to provide compute services. The services are allocated necessary processing power and memory resources from the resource pool.

The hypervisor cluster is composed of 10 identical physical compute systems containing 2 redundant (passive) compute systems. This means that the cluster can absorb up to two compute system failures and continue to support all services at the same level of performance. The available processing power and memory per physical compute system in the cluster is equal to 20.8 GHz and 96 GB respectively. The existing resources in the data centre can meet capacity requirement of services in short-term. However, the provider should procure and provision additional resources as required to avoid the capacity issues in future. Further, the provider is concerned about security attacks that may compromise the hypervisors running on the physical compute systems. The provider should take control measures to protect against such attacks.

The capacity management process in a service provider's organization is shown in the ?gure. The process comprises several activities, shown in rectangular boxes. The process also consists of conditions. They allow the process to branch into different directions, depending on whether the conditions are met or not.

Given: The thresholds for over utilization and underutilization of resources are 70 percent and 40 percent utilization of total resource capacity respectively. These are used to determine whether the resource pool is over utilised or underutilised.

Part (a) (500 words maximum)

DoDo.Com is asking you as its cloud provider to establish the required capacity management activities marked by ‘X1' and ‘X2' in the previous ?gure for below cases:

· Case 1: Processing power already allocated to services from the resource pool is equal to 48GHz and memory capacity already allocated to services from the resource pool is equal to 122 GB

· Case 2: Processing power already allocated to services from the resource pool is equal to 112GHz and memory capacity already allocated to services from the resource pool is equal to 340 GB
Document your calculations and recommend what actions the server provider should take in each scenario with appropriate justi?cations.

Part (b) (2500 words maximum)
In a formal report, justify to the client what security control measures should be undertaken to address their security concerns especially with regard to cloud compute functions and in particular hypervisor vulnerabilities especially with regard to cloud service providers.
The service provider needs to know what current vulnerabilities exist "out in the wild" with respect to hypervisors affecting service providers and what you predict may become a problem in the future, justi?ed by the use of literature.
Evidence of respected research in to both the theory of hypervisor attacks and documented vulnerabilities is expected. Hint: use of CVE/NVD documented vulnerabilities.

You are expected to minimise any desire you may have to explain basic cloud c oncepts as this already well known and ignorance will be frowned upon.

You are expected to provide examples of how both current and future vulnerabilities can be mitigated against.
DO NOT JUST MAKE BULLET LISTS OF POINTS COPIED FORM REFERENCE
MATERIAL OR THE MODULE NOTES AS WILL ATTRACT MINIMAL MARKS.

Recommendations should be backed with appropriate authoritative accredited references and case study material. Students are expected to compare and contrast between reference material to be able to demonstrate critical analysis.

Part (1000 words) Lab Portfolio
Re?ect on what you've learnt from each lab exercise and provide evidence of successful lab completion (screenshots), 1% for each lab exercise that you have successfully completed and provided a re?ective summary of (up to a maximum of 10 lab exercises).
Students are required to complete a minimum of 10 self- study weekly exercises (consisting of Cisco CCNA Introduction to Network v7 exams, NDG on line "Cloud and Virtualisation Concepts" Labs and Netlab VMware VCA DCV 6 Labs )as scheduled in the Syllabus
For each lab exercise students should write a Word document which contains:

• 3-4 screenshots of undertaking the lab exercise (NOT stolen from the worksheet) ideally showing your URL.
• a 100-word re?ection of the lab exercise containing

o What you learnt from the exercise?

o What further follow-up research you've done following the exercise and evidence in terms of references given (this is crucial otherwise you could fail the component) including at least two URL's and explain how the research is relevant.
o What problems you might have encountered?

Attachment:- Data Centre and Cloud Infrastructures.rar

Reference no: EM132717830

Questions Cloud

Which the days debtors ratio indicates : Which the days debtors ratio indicates? the average length of time it takes an entity to collect accounts receivable./ an entity's efficiency in raising capital
Prepare a differential analysis as of March : Prepare a differential analysis as of March 24 to determine whether to sell raw sugar (Alternative 1) or process further into refined sugar (Alternative 2)
Find what is the cash flow to shareholders : If no new debt was issued during the year, what is the cash flow to creditors? What is the cash flow to shareholders? Explain and interpret the positive sign
Compute the annual fixed cost for maintenance expenditures : Maintenance expenses of a company are to be analyzed, Using the high-low technique, estimate the annual fixed cost for maintenance expenditures
MOD005714 Data Centre and Cloud Infrastructures Assignment : MOD005714 Data Centre and Cloud Infrastructures Assignment Help and Solution, Anglia Ruskin University - Assessment Writing Service
Find what will be the expected unit time for the sixteenth : This aircraft required 26,000 hours. Condor just received a contract to make fifteen identical aircraft. What will be the expected unit time for the sixteenth
What price will Toyota establish for the Camry : Assume further that the Camry's total unit cost for the upcoming model year is estimated to be $22,500. What price will Toyota establish for the Camry
Which of statements with respect to stock options is correct : Which of statements with respect to stock options is correct? If the option price for shares is less than the grant date market value of the shares
Prepare journal entries to record labour costs for period : Standard labor hours per unit of output 8.3 hours. Standard labor rate $ 12.10 per hour. Make the journal entries to record the labour costs for the period

Reviews

inf2717830

3/6/2021 1:38:52 AM

Thanks for your kind work. Part-C will be taken care by us. You can close this task and can move to delivered stage. it was an amazing job by your team, Once again thanks for your help.

inf2717830

3/6/2021 1:38:08 AM

Payment is done. Kindly check it and do necessary please. I need this coursework of 3500 words with clear screenshots and required matter in it and also the Lab work screenshots in a separate PPT. I hope Lab work screenshots will atleast take around a minimum of 40. I request writers to please check the entire coursework clearly and do necessary please. Kindly let me know if you have any queries. Need the LAB details from student. Part© (1000 words) Lab Portfolio Re?ect on what you’ve learnt from each lab exercise and provide evidence of successful lab completion (screenshots), 1% for each lab exercise that you have successfully completed and provided a re?ective summary of (up to a maximum of 10 lab exercises). Students are required to complete a minimum of 10 self- study weekly exercises (consisting of Cisco CCNA Introduction to Network v7 exams, NDG on line “Cloud and Virtualisation Concepts” Labs and Netlab VMware VCA DCV 6 Labs )as scheduled in the Syllabus

len2717830

12/2/2020 10:42:20 PM

Hello team, Attached is the file. Kindly make this coursework with less than 3500words and with best results please. Kindly deliver the doc & pdf file along with plagiarism report please. Kindly let me know if you have any queries. Thanks.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd