What delivery and deployment models should dsi adopt

Assignment Help Computer Networking
Reference no: EM131036890

Task

The Department of Spatial Information (D51) is a State Government department. The major functions of 1331 is to provide accurate and timely spatial information to other Government departments, but also to make some of this spatial information available to the public. In order to provide both the government and public services, 1331 has developed a number of web services that deliver this information through a number of internally developed applications. This suite of web services and applications is referred to as the DSI Online Spatial Delivery System (OSDS).

DSI have a number of new projects being developed that are expected to increase the demand for its spatial data dramatically. The Executive Management of DSI have looked at a number of proposals to support these new programs. The two alternatives they are investigating are:

1. Increasing the internal DSI Data Centre capacity to host and support the new projects in the OSDS. This would probably need a 50% increase in web infrastructure and support services within the Department. This would necessitate an increase in data centre Infrastructure, server numbers as well as a major increase in the bandwidth available to DSI.

2. Migrating the OSDS to a Cloud provider. This would allow DSI to continue to develop and refine the data in its Internal Maintenance systems and then move a copy of the completed data to the cloud-based Delivery system for publication.

DSI Management is planning to adopt Proposal 2 but have asked you to give them a report that looks at the following aspects of the proposal:

1. What delivery and deployment models should DSI adopt for a cloud-based OSDS?

2. How should 051 assess the risk of adopting a cloud-based OSDS?

3. What steps should 051 take to provide adequate security for the OSDS?

Tasks-

Prepare a report that covers the following aspects:

1. An executive summary of no more than 1 page that summarises your report and recommendations;

2. The model that you recommend that the DSI adopt for the cloud-based OSDS. This should include any Cloud Architectures that should be deployed to support the model:

3. A review of the risks involved In migrating the OSDS to a cloud-based provider.

4. A review of the general security steps that 031 should take to secure the OSDS when deployed to a Cloud provider.

Reference no: EM131036890

Questions Cloud

Determine the range of the driving frequency ? : If the driving frequency for the system of Prob.8/47 is ω = 6 red/sec. determine the required value of the damping coefficient if the steady-state amplitude is not to exceed 3 in
Complete a sfas matrix and a tows matrix : Complete a SFAS Matrix and a TOWS Matrix on Tesla Motors Inc. using the supplied EFAS and IFAS.
Statement of beauty is only skin deep : discuss the irony of the statement "beauty is only skin deep" from both a medical and physical aspect. Consider the physical anatomy of the skin and the integument system as a whole.
Compare these amplitudes to the static spring deflection ds : Determine the amplitude X of the steady-state motion if the viscous damping coeffi- cient c is (a) 0 and (b) 60 lb-sec/ft Compare these amplitudes to the static spring deflection δst.
What delivery and deployment models should dsi adopt : What delivery and deployment models should DSI adopt for a cloud-based OSDS? How should 051 assess the risk of adopting a cloud-based OSDS
Which cause excessively large oscillations of the system : An external force F = F0 sin ωt is applied to the cylinder as shown. What value ωc of the driving frequency would cause excessively large oscillations of the system?
A block of rooms is reserved : Which is correct: "A block of rooms is reserved" or "A block of rooms are reserved"?
Find the coordinates of the other point : The tangent line to the graph of g(x)=2x^3-7x at (1,-5) intersects the curve at another point. Find the coordinates of the other point. Round all non-terminating decimals in the calculation to seven significant digits. Round your final answer to t..
What is the purpose of creating a logical process model : What is the purpose of creating a logical process model and then a physical process model? What information is found on the physical DFD that is not included on the logical DFD?

Reviews

Write a Review

Computer Networking Questions & Answers

  Effect of data rates on each part of the network

Explain the effect of data rates on each part of the network. Describe strategies to ensure the availability of network access in switched and routed networks

  Search a number of antivirus companies eg symantec mcafee

search a number of antivirus companies e.g. symantec mcafee kaspersky f secure avg bitdefender webroot eset gdata avira

  Advantages and disadvantages of packet switching

What is a packet? What is packet switching? How would you explain the concept of packet switching? What are the advantages and disadvantages of packet switching over circuit switching

  Home networking solutions

Question:  The Thomsons all have their own separate computers at home. The problem is, there is only one printer, and it is attached to Bob's computer.

  The relationship between client/server model

the relationship between each terminal and the corresponding data center as either client/server or peer-to-pee.What transport protocols are used in the following applications? two data centers used for retail credit authorization are located in two ..

  How cloud computing is used to solve computing problems

Describe how cloud computing is used to solve computing problems and provide a reason why that item is a benefit to the AEC.

  Identify impediments to successfully cybersecurity program

Outline the steps you recommend and identify any impediments to successfully implementing the suggested cybersecurity program.

  Create both a firewall architecture and acls

A firm has the following firewall policy: Employee access to Internet servers should be unrestricted and external clients should only be able to access the firm's public webserver.

  Analyze the key tools available for scanning a network

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen t..

  What do you look for in the trace file you were sent

Based on the data you have in this scenario, state a possible explanation for the cause of the problem.

  Attacks and defenses to session key establishment protocols

Illustrate attacks and defenses to these session key establishment protocols at all levels, including one or both of communicating machines being compromised.

  Explain the topology that will be used

Two server rooms have been allocated, one on the first floor and one on the second floor. Define the topology that will be used

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd