MOD005714 Data Centre and Cloud Infrastructures Assignment

Assignment Help Computer Network Security
Reference no: EM132717830

MOD005714 Data Centre and Cloud Infrastructures - Anglia Ruskin University

Data Centre and Cloud Infrastructures

Service Management & Security Concerns

A cloud service provider for DoDo.Com uses 50 percent of its data centre equipment to setup a cloud infrastructure. The remaining equipment is used for internal operations and for testing. The cloud infrastructure consists of a hypervisor cluster. A resource pool is created by aggregating the available resources of the hypervisor cluster. The cloud infrastructure is used to provide compute services. The services are allocated necessary processing power and memory resources from the resource pool.

The hypervisor cluster is composed of 10 identical physical compute systems containing 2 redundant (passive) compute systems. This means that the cluster can absorb up to two compute system failures and continue to support all services at the same level of performance. The available processing power and memory per physical compute system in the cluster is equal to 20.8 GHz and 96 GB respectively. The existing resources in the data centre can meet capacity requirement of services in short-term. However, the provider should procure and provision additional resources as required to avoid the capacity issues in future. Further, the provider is concerned about security attacks that may compromise the hypervisors running on the physical compute systems. The provider should take control measures to protect against such attacks.

The capacity management process in a service provider's organization is shown in the ?gure. The process comprises several activities, shown in rectangular boxes. The process also consists of conditions. They allow the process to branch into different directions, depending on whether the conditions are met or not.

Given: The thresholds for over utilization and underutilization of resources are 70 percent and 40 percent utilization of total resource capacity respectively. These are used to determine whether the resource pool is over utilised or underutilised.

Part (a) (500 words maximum)

DoDo.Com is asking you as its cloud provider to establish the required capacity management activities marked by ‘X1' and ‘X2' in the previous ?gure for below cases:

· Case 1: Processing power already allocated to services from the resource pool is equal to 48GHz and memory capacity already allocated to services from the resource pool is equal to 122 GB

· Case 2: Processing power already allocated to services from the resource pool is equal to 112GHz and memory capacity already allocated to services from the resource pool is equal to 340 GB
Document your calculations and recommend what actions the server provider should take in each scenario with appropriate justi?cations.

Part (b) (2500 words maximum)
In a formal report, justify to the client what security control measures should be undertaken to address their security concerns especially with regard to cloud compute functions and in particular hypervisor vulnerabilities especially with regard to cloud service providers.
The service provider needs to know what current vulnerabilities exist "out in the wild" with respect to hypervisors affecting service providers and what you predict may become a problem in the future, justi?ed by the use of literature.
Evidence of respected research in to both the theory of hypervisor attacks and documented vulnerabilities is expected. Hint: use of CVE/NVD documented vulnerabilities.

You are expected to minimise any desire you may have to explain basic cloud c oncepts as this already well known and ignorance will be frowned upon.

You are expected to provide examples of how both current and future vulnerabilities can be mitigated against.
DO NOT JUST MAKE BULLET LISTS OF POINTS COPIED FORM REFERENCE
MATERIAL OR THE MODULE NOTES AS WILL ATTRACT MINIMAL MARKS.

Recommendations should be backed with appropriate authoritative accredited references and case study material. Students are expected to compare and contrast between reference material to be able to demonstrate critical analysis.

Part (1000 words) Lab Portfolio
Re?ect on what you've learnt from each lab exercise and provide evidence of successful lab completion (screenshots), 1% for each lab exercise that you have successfully completed and provided a re?ective summary of (up to a maximum of 10 lab exercises).
Students are required to complete a minimum of 10 self- study weekly exercises (consisting of Cisco CCNA Introduction to Network v7 exams, NDG on line "Cloud and Virtualisation Concepts" Labs and Netlab VMware VCA DCV 6 Labs )as scheduled in the Syllabus
For each lab exercise students should write a Word document which contains:

• 3-4 screenshots of undertaking the lab exercise (NOT stolen from the worksheet) ideally showing your URL.
• a 100-word re?ection of the lab exercise containing

o What you learnt from the exercise?

o What further follow-up research you've done following the exercise and evidence in terms of references given (this is crucial otherwise you could fail the component) including at least two URL's and explain how the research is relevant.
o What problems you might have encountered?

Attachment:- Data Centre and Cloud Infrastructures.rar

Reference no: EM132717830

Questions Cloud

Which the days debtors ratio indicates : Which the days debtors ratio indicates? the average length of time it takes an entity to collect accounts receivable./ an entity's efficiency in raising capital
Prepare a differential analysis as of March : Prepare a differential analysis as of March 24 to determine whether to sell raw sugar (Alternative 1) or process further into refined sugar (Alternative 2)
Find what is the cash flow to shareholders : If no new debt was issued during the year, what is the cash flow to creditors? What is the cash flow to shareholders? Explain and interpret the positive sign
Compute the annual fixed cost for maintenance expenditures : Maintenance expenses of a company are to be analyzed, Using the high-low technique, estimate the annual fixed cost for maintenance expenditures
MOD005714 Data Centre and Cloud Infrastructures Assignment : MOD005714 Data Centre and Cloud Infrastructures Assignment Help and Solution, Anglia Ruskin University - Assessment Writing Service
Find what will be the expected unit time for the sixteenth : This aircraft required 26,000 hours. Condor just received a contract to make fifteen identical aircraft. What will be the expected unit time for the sixteenth
What price will Toyota establish for the Camry : Assume further that the Camry's total unit cost for the upcoming model year is estimated to be $22,500. What price will Toyota establish for the Camry
Which of statements with respect to stock options is correct : Which of statements with respect to stock options is correct? If the option price for shares is less than the grant date market value of the shares
Prepare journal entries to record labour costs for period : Standard labor hours per unit of output 8.3 hours. Standard labor rate $ 12.10 per hour. Make the journal entries to record the labour costs for the period

Reviews

inf2717830

3/6/2021 1:38:52 AM

Thanks for your kind work. Part-C will be taken care by us. You can close this task and can move to delivered stage. it was an amazing job by your team, Once again thanks for your help.

inf2717830

3/6/2021 1:38:08 AM

Payment is done. Kindly check it and do necessary please. I need this coursework of 3500 words with clear screenshots and required matter in it and also the Lab work screenshots in a separate PPT. I hope Lab work screenshots will atleast take around a minimum of 40. I request writers to please check the entire coursework clearly and do necessary please. Kindly let me know if you have any queries. Need the LAB details from student. Part© (1000 words) Lab Portfolio Re?ect on what you’ve learnt from each lab exercise and provide evidence of successful lab completion (screenshots), 1% for each lab exercise that you have successfully completed and provided a re?ective summary of (up to a maximum of 10 lab exercises). Students are required to complete a minimum of 10 self- study weekly exercises (consisting of Cisco CCNA Introduction to Network v7 exams, NDG on line “Cloud and Virtualisation Concepts” Labs and Netlab VMware VCA DCV 6 Labs )as scheduled in the Syllabus

len2717830

12/2/2020 10:42:20 PM

Hello team, Attached is the file. Kindly make this coursework with less than 3500words and with best results please. Kindly deliver the doc & pdf file along with plagiarism report please. Kindly let me know if you have any queries. Thanks.

Write a Review

Computer Network Security Questions & Answers

  Create an inventory file for the three managed machines

Create an inventory file for the three managed machines. Create a playbook with roles to manage the basic setup of all three machines.

  Network security structure

After looking at your network security structure there are various physical threats that we will focus on that could have a Hugh impact on your business intellectual property and availability.

  Management issues of computer security

What are the major defensive mechanisms that can be used to stop such attacks-Pick up one mechanism and comment on it - Management issues of computer security

  Information security vulnerabilities with related threats

Create a list of 50 information security vulnerabilities with related threats relevant to the organization

  Explain your research and your findings of the tools

Create a PowerPoint or a similar presentation to explain your research and your findings of the tools. Graphics - Charts, Graphs, Illustrations, etc.

  Network security controls assignment requirements

Network Security Controls Assignment Requirements Securing Windows networks requires recognizing potential vulnerabilities and selecting the best control

  Explain ingredients that decide algorithm in fiestel cipher

How does DES and 3DES work? Provide an example of each. Explain the following ingredients that decide the algorithm in the Fiestel cipher.

  Analogue to digital conversion and source coding

ME502 - Digital Communications - How many samples of the analog signal do we need to store in order to reproduce 10? seconds of it (i.e., the analog signal)

  What are the two general approaches to attacking a cipher

What are two general approaches to attacking cipher? Why do block cipher modes of operation only use encryption while others use both encryption and decryption?

  Write down a 350- to 700-word article review addressing the

write a 350- to 700-word article review addressing the sequential process the article discusses that highlights a

  How will ids and passwords be properly maintained?

How will IDs and passwords be properly maintained?

  Describe the most efficient attack against encryption method

Suppose Bob uses the RSA cryptosystem with a very large modulus n. If not, describe the most efficient attack against this encryption method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd