Develop an implementation plan for cloud deployment

Assignment Help Computer Networking
Reference no: EM13834719

Major Report - Makeup Assignment specification

This makeup assignment is a follow up from Major Report 1 and 2 that relates to the Indian Railways case study.

You have developed a business systems implementation plan for mobile access to the railways reservation systems. You have also detailed the ICT infrastructure requirements, security issues and costing schedule for your implementation plan.

Indian Railways authorities have now requested you to consider the option of cloud computing for their passenger reservation system. You are asked to develop an implementation plan for cloud deployment of the passenger reservation system. You must address the following specific deliverables for the cloud-based passenger reservation system:

1. Service model of cloud computing

- Software, Platform and Infrastructure as a service - which models do you suggest Indian Railways should consider in their cloud implementation plan and why?

2. Service architecture to deploy cloud computing

- Private, Public, Hybrid and Community cloud options - which cloud service architecture should Indian Railways consider deploying and why?

3. Security issues with cloud computing

- There could be several cloud computing security issues in areas such as compliance, trust, identity and access, data protection, governance, incident response, availability and architecture. Suggest three security issues that you consider most important for Indian Railways passenger reservation system with justification.

Your research should be presented in the form of a written report, with a maximum word limit of 1500 words. References are not included in this word limit. You must state your assumptions clearly; validate the stated assumptions through proper literature search. The marking criteria is provided next.

Please note that you are not required to present deeply technical aspects of cloud computing. This is a business report and will be read by non-technical people, so you must understand the target audience here.

Word limit: 1500 words.

Reference no: EM13834719

Questions Cloud

Descriptive cohesive paragraph my hero mahatma gandhi : Descriptive Cohesive Paragraph MY Hero Mahatma Gandhi
Describe the requirements specific to your state : Describe the requirements specific to your state and whether insurance requirements differ on a financed purchase over a lease. Identify other variables that influence one's insurance premium.
What would have been lost : Imagine what corrections might have been made. What would have been lost? Use details from the poems to support your ideas. Why do you think the editors might have decided to change the original versions
Define the concept of the balance of power : Please define the concept of the Balance of Power and how it applied to World War I - Based on the war and the events that occurred did Balance of Power affect how the war was waged? In principle did balance of power work?
Develop an implementation plan for cloud deployment : Develop an implementation plan for cloud deployment of the passenger reservation system. You must address the following specific deliverables for the cloud-based passenger reservation system.
What benefits would involvement with a socially responsible : What benefits would involvement with a socially responsible cause offer the company and the employees? If you have had personal experience with companies involved with socially responsible causes
Write a summary on the power of situations : The Power of Situations
Determine how power can constrain or exacerbate conflict : Determine how power can constrain or exacerbate conflict - Discuss ways for leaders to integrate conflict mediation into organizational culture.
Use of financial data in strategic decision-making : Review the financial data - The company has narrowed the choice to the following two alternatives, with the cash flow information being available - Post an explanation of the tools that you believe would help you to reach a decision. If you were a..

Reviews

Write a Review

Computer Networking Questions & Answers

  Network reconfiguration

Suppose the image below is your company's network diagram after a merger and you have recently added access controls to your network. The CSO would like to

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Show that f-function of des is not reversible

Show that F-function of DES is not reversible and explain how a Feistelcipher whose main component is not reversible can actually support decryption.

  Input is control signal to represent four-bit binary number

When k=0, m=n+1, when k=1, m=n+2. Suppose that input for which m>1111 will never happen. The input variable will available from switches.

  Network that covers a large geographic area

A network that covers a large geographic area is most commonly referred to as a(n)

  Define the network topology in each office lan

Define the network topology in each office LAN, and define and describe the structure of the WAN to interconnect the offices

  Asymmetrical digital subscriber line and wi-fi

Describe the specific modulation techniques that are used in a 56K modem, Asymmetrical Digital Subscriber Line, and Wi-Fi.

  The purpose of this assessment is to focus on the

the purpose of this assessment is to focus on the fundamental aspects of operations amp quality management as it

  Lan security in a network environment

Discuss today's Local Area Networks security issues related to peer-to-peer network, client /server network and virtualisation environment.

  Find maximum number of telephones in intermediate switch

Let a simple telephone network consisting of two end offices and one intermediate switch. Ten percent calls are long distance. Determine maximum no. of telephones an end office can support?

  Compute the for each of the three subnets

Compute the for each of the three subnets. Also, compute the efficiency of your IP address assignment.Subnet mask, Subnet address and Subnet broadcast address

  Voip communication infrastructures

What are fundamental differences, from the risk management perspective, between Public switched telephone network (PSTN) and VoIP communication infrastructures

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd