Description
visual effects you can apply to your image
floating slection layers
way to elimanate extra content from your image
resizing tools
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you for the opportunity to help you with your question!
visual effects you can apply to your image
..................................................................................
Please let me know if you need any clarification. I'm always happy to answer your questions.Completion Status:
100%
Review
Review
Anonymous
Really helpful material, saved me a great deal of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Colorado State University Network topology and proposal for RMDC Project
Note to All writer, l'm requesting for this help because I don't want no plagiarism. There is an answer to my questions on ...
Colorado State University Network topology and proposal for RMDC Project
Note to All writer, l'm requesting for this help because I don't want no plagiarism. There is an answer to my questions on this platform which I don't want to use. I need a fresh and new write up for the Assignment. So Please and please DON NOT COPY AND PASTE what is on this platform and send to me. Question DescriptionScenarioRocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.InstructionsIn an 8- to 10-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:Section 1: Topology (type of network) and Network DevicesRMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the local area network (LAN).The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).Provide a cryptography method that will ensure vital data is encrypted. Provide an explanation of what network protocols will be used on the LAN and why.Ensure that the network has the capacity to:Connect all users to company resources (e.g. printers, scanners, and other items);Provide file sharing options;Manage these resources in a central location;Allow for internal users to access the internet; and,Allow external users and vendors to access the LAN remotely.Your proposal should include budgetary cost estimates for the chosen topology.Section 2: IP InfrastructureRMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP class assignment), which is mindful of the company’s expectation of continued growth.Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner.Section 3: SecurityBasic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.Provide a thorough plan to protect the network from malware and various types of malicious attacks.Submission RequirementsYour proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.Your paper must be 8-10 pages in length, not including the required cover and references pages.Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the Network Pro LabSim.) The CSU-Global Library is a great place to find your sources.You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.Visit the Library’s special research guide (Links to an external site.)Links to an external site. for this discipline.If you have questions about the format or content of references, discuss it with your instructor.Ensure your entire document, including citations of sources, is in conformity with the CSU-Global Guide to Writing and APA (Links to an external site.)Links to an external site.. Visit the CSU Global Writing Center (Links to an external site.)Links to an external site. to find numerous guides on how to write and research papers including an APA template paper (Links to an external site.)Links to an external site..Your submission should include the following (title each portion accordingly):Cover page.Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.Body of the paper: Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.References.
Assignment 1: Disaster Recovery Plan, Computer Science Assignment Homework Help
Assignment 1: Disaster Recovery PlanDue Week 6 and worth 120 pointsYou are an administrator for the Contoso Corporation. T ...
Assignment 1: Disaster Recovery Plan, Computer Science Assignment Homework Help
Assignment 1: Disaster Recovery PlanDue Week 6 and worth 120 pointsYou are an administrator for the Contoso Corporation. The Contoso Corporation has two (2) large sites. The corporate office is in New York and the manufacturing site is in Cleveland, Ohio. In addition, the Contoso Corporation has five (5) smaller sites. At the Corporate site, you currently have eight (8) physical Hyper-V hosts that host approximately one hundred twenty (120) virtual machines. The virtual machines are running Windows Server 2008 R2 and Windows Server 2012. The servers are needed to host email, various databases, file services, print services, and a point-of sales-application. The virtual machines are stored on a centrally located storage area network (SAN) that has multiple power supplies, and use redundant array of independent disks (RAID).Over the last three (3) years, you have had two (2) power failures that caused the servers to go down at the corporate office. Recently, during one (1) of these incidents, files on one (1) of the servers were corrupted. It was later discovered that the backup could only partially restore the data files, but could not restore the server itself.The servers must remain available and reliable. As the administrator, you must ensure that you can recover from a failure or problem quickly with minimum loss. Write a three to five (3-5) page paper in which you:Develop a continuity plan / disaster recovery plan for Contoso Corporation in which you address the following:Suggest an approach that provides redundancy (failover) for all mission critical functions in the event of a disaster including power failure. Consider the following in your approach: Essential Infrastructure; Email; Database; File Services; Print Services; Point-of-Sale Applications; Power Redundancy Solutions.Identify the changes that should be made to the backup procedures in order to address the problem with the server backups.Outline the necessary actions that Server Administrators must verify for proper operation of servers in the event of a failover.Provide a plan for returning all services back to the primary systems once the crisis has passed.Examine the pros and cons of moving part of the data center to the Cleveland office and housing it there on a permanent basis. Provide your recommendation for the stated action. Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Demonstrate the ability to describe, manage, and configure load balancing and failover clustering.Demonstrate the ability to configure and manage backups to include role-specific and online or cloud environments.Demonstrate the ability to recover servers to include files and volumes.Use technology and information resources to research issues in advanced network infrastructure environments.Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.I already paid for the paper above, but I also need sources.
CCA 630 Abraham Lincoln Cloud Deployment Architecture Plan Paper
Start HereGreat news! Executive leadership has reviewed and approved the Cloud Adoption Policy Addendum. As the principal ...
CCA 630 Abraham Lincoln Cloud Deployment Architecture Plan Paper
Start HereGreat news! Executive leadership has reviewed and approved the Cloud Adoption Policy Addendum. As the principal cloud architect for BallotOnline, you are now looking forward to the next challenge from the leadership team: creating a design for cloud deployment throughout the organization. The designs for each component in the organization will make up the Cloud Deployment Architecture Plan.BallotOnline has decided to move forward with the top three workloads identified as "cloud ready": email, software development, and backups and archiving.You know that those workloads can be very different from one another. You will need to carefully review the workloads in terms of performance, capacity, cost, and availability requirements. You will need to design the deployment architecture plan for each workload. This will require you to research and evaluate the available cloud service offerings as well as the kind of architectures that would be best for BallotOnline. Your cloud deployment architecture plan must meet BallotOnline's cloud adoption policies and the business needs for deploying these workloads in the cloud. It's another layer of responsibility, and you realize that a lot of the company's financial viability rests on your ability to find the best service offerings.Check the Project 2 FAQ thread in the discussion area for any last-minute updates or clarifications about the project.You will design the deployment architecture plan for each workload over a series of 10 steps, and the project will take about two weeks to complete. Click on Step 1 to get started.CompetenciesYour work will be evaluated using the competencies listed below.6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).6.7: Assess cloud storage providers.8.2: Assess network security and privacy risks associated with cloud infrastructure.9.3: Develop documentation (plans, policies, and procedures) to support a cloud operation.9.5: Design a virtualized network infrastructure to meet business needs.9.6: Design cloud storage infrastructure to meet business needs.10.1: Develop and implement a cloud metering system.10.6: Configure a private cloud infrastructure using industry leading software.10.7: Configure a public cloud infrastructure using industry leading provider(s).11.2: Monitor cloud services charges from vendors and make adjustments to stay within budget.11.4: Monitor system performance. Step 1: Develop User Stories From BallotOnline EmployeesBallotOnline has decided to move forward with the migration of the email, software development, and backups and archiving workloads to the cloud. You will need to have a good understanding of what users really need in terms of performance, capacity, availability, etc., in order to design an effective architecture and select the best cloud offerings.In this step, you will write user stories, brief high-level definitions of requirements that describe what the user wants to achieve in simple terms.Watch the four user interviews of current BallotOnline employees describing their IT needs. You can record your user stories in the user stories template. Upload them to the submission box below for Sophia’s feedback.Step 2: Evaluate Available Cloud Service Offering Architectures for EmailThere is no one-size-fits-all cloud solution. You need to take workloads into account before deciding on a cloud deployment model. In order to make good design decisions, you have to understand the business, the cloud components, and the specific requirements involved.In this step, you will be using the workload requirements for email to evaluate the available SaaS offerings.Examples of Email as a Service OfferingsMicrosoft Azure’s Microsoft Office 360ZohoGmailAmazon Simple Email Service (SES)ReviewCloud ProvidersCloud Computing: A Review of PaaS, IaaS, SaaS Services and ProvidersConsiderations for Cloud Provider SelectionBest Practices for Cloud ImplementationAs you did while preparing the Cloud Adoption Policy Addendum, you will focus your efforts on the market leaders in the cloud computing industry: Amazon AWS, Microsoft Azure, and Google Cloud Platform.You will review the workloads based on the following criteria from the workload requirements for email and align the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsSummarize your findings in a one-page document that describes your rationale for selecting the appropriate cloud service offering. This will be part of the overall cloud deployment architecture plan that you will present to leadership.Step 3: Evaluate Available Cloud Service Offering Architectures for Software DevelopmentSimilar to the way you evaluated cloud architectures for email, in this step you will focus on the software development environment in cloud platforms.Traditionally, software development efforts follow the software development life cycle. In the cloud, the core steps of the SDLC may take advantage of PaaS offerings, which provide development environments for different kinds of software applications.Examples of Platform as a Service (PaaS) OfferingsAWSMicrosoft AzureGoogle Cloud PlatformThird PartyElastic BeanstalkAzure WebsitesGoogle AppsCloud FoundryIn today’s organizations, development teams work together with IT operations teams to implement practices of DevOps—seamless environments for rapid execution of software development life cycles along with automatic deployment and operation of systems in production.Examples of DevOps OfferingsAWSMicrosoft AzureGoogle Cloud PlatformCodePipelineAzure WebApps Visual Studio Team ServicesCloudBuildYou will use the information found in the workload requirements for software development to evaluate the available PaaS and DevOps offerings.Again, you will review the workloads based on the following criteria from the workload requirements for software development and align the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsTake detailed notes of your findings because the justification for your decision will be part of the final deployment architecture plan that you will present to leadership.In the next step, you will complete a similar evaluation for BallotOnline’s backup and archival procedures.Step 4: Evaluate Available Cloud Service Offering Architectures for Backups and ArchivingNow you will consider the workload requirements for backups and archiving to evaluate the available IaaS offerings.Examples of Backups and Archiving as a Service OfferingsAmazon S3Amazon GlacierAzure BackupRackspace Cloud BackupAlign the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsJust as you did with the earlier evaluations, take detailed notes on your rationale for selecting the appropriate cloud service offering. This will be part of the overall cloud deployment architecture plan that you will present to leadership.Now that you have completed your evaluation of the cloud service offering architectures and selected the appropriate service offering and the vendor for the three workloads, you can proceed to the next step.There, you will begin designing the cloud deployment architecture, showing how everything will be connected.Step 5: Design Cloud Deployment Architecture for EmailNow that the evaluations are complete, you need to document your design of the various deployment architecture plans, starting with email.In this step, you will produce a one-page document that shows the design of the cloud deployment architecture for BallotOnline’s email system. Using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new email system deployed in the cloud.Step 6: Design Cloud Deployment Architecture for Software DevelopmentNow that you’ve finished with the email cloud deployment design and received feedback from Sophia, you can move on to this step, in which you will produce a one-page document and drawing that will illustrate the cloud deployment architecture for BallotOnline’s computer software development. As you did in the previous step with email, using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new software development platform deployed in the cloud. The drawing will be part of the overall cloud deployment architecture plan that you will present to leadership.When you have completed the design for software development, move to the next step, where you will create another diagram, this time for backups and archiving.Step 7: Design Cloud Deployment Architecture for Backups and ArchivingThe final diagram component of the cloud deployment architecture plan will be a one-page document in which you will show the design of the cloud deployment architecture for BallotOnline’s backups and archiving. As before, using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new backup and archiving environment deployed in the cloud. The drawing will be part of the overall cloud deployment architecture plan that you will present to leadership.In the next step, you will set up procedures to monitor the use of the cloud.Step 8: Monitor Cloud Resource UsageAs the principal cloud architect, you’ve done your research and you’ve selected and designed architecture plans for email, software development, and backup and archiving. However, you know that you need more specifics for the cloud architecture plan. Your supervisor, Sophia, has reminded you to make sure that the plan includes a way to monitor how BallotOnline may consume resources in the cloud, since the leadership is always interested in keeping cloud-related costs in check, especially when it comes to backup and archiving.In the past few steps, you have documented the design for your cloud deployment plan. You will use those drawings as part of your final submission to company leadership. However, there are some additional components you will need for the cloud deployment architecture plan. In this step, you will consider resource consumption, which will be a key section of your overall plan.Draft a one-page document detailing how you will use AWS CloudWatch to monitor the cloud resource consumption for the backup and archiving workload. It may include the capacity consumption, billing information, and any other relevant elements that are needed to monitor the resource consumption in the cloud infrastructure.After you have documented how you will use AWS CloudWatch to monitor the cloud resource consumption for backup and archiving, move to the next step, in which you will consider the limitations for each of your designs.Step 9: Identify Design and Any Additional Limitations for Each WorkloadIn this step, you will identify and detail in a one-page document the limitations of the cloud deployment architecture design for each workload that you have created earlier.After you identify the design limitations for each workload, you can proceed to the last step, where you will create the final Cloud Deployment Architecture PlanStep 10: Write and Submit the Final Cloud Deployment Architecture PlanIn this step, you will create and submit your consolidated Cloud Deployment Architecture Plan for email, software development, and backups and archiving.The Cloud Deployment Architecture plan, which should be between eight and 10 pages, will consolidate the work that you have completed throughout the steps along with some additional elements (scope, executive summary, etc.) to create a comprehensive design for cloud deployment architecture for the selected "cloud ready" workloads. Sophia will present your work for approval at the executive meeting.Use the Cloud Deployment Architecture Plan Template to write the Cloud Deployment Architecture Plan and submit the document via the dropbox below.
Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).6.7: Assess cloud storage providers.8.2: Assess network security and privacy risks associated with cloud infrastructure.9.3: Develop documentation (plans, policies, and procedures) to support a cloud operation.9.5: Design a virtualized network infrastructure to meet business needs.9.6: Design cloud storage infrastructure to meet business needs.10.1: Develop and implement a cloud metering system.10.6: Configure a private cloud infrastructure using industry leading software.10.7: Configure a public cloud infrastructure using industry leading provider(s).11.2: Monitor cloud services charges from vendors and make adjustments to stay within budget.11.4: Monitor system performance.
6 pages
Models For Competitive Dynamics
In contemporary society, organizations are trying to implement distinct business strategies to remain competitive and avoi ...
Models For Competitive Dynamics
In contemporary society, organizations are trying to implement distinct business strategies to remain competitive and avoid situations where the rival ...
14 pages
Software Policies And Protocol Plan
A company’s proprietary software is a crucial asset to a business. Whether the company uses the software to offers servi ...
Software Policies And Protocol Plan
A company’s proprietary software is a crucial asset to a business. Whether the company uses the software to offers services to customers or license ...
Similar Content
SQL Database Design
A private kindergarten, Happy Learning, wants to build a database to manage their operations. You were assigned to create ...
Assignment: Executive Memo to the Board
Submit an Executive Memo addressed to the CIO and the board of directors. Last week, the CIO reviewed your presentation an...
IT 101 Saudi Electronic University Information Systems Questions
College of Computing and Informatics
Assignment 2
Deadline: Day 14/10/2021@ 23:59
[Total Mark for this Assignment is 5]
S...
Ashford University Advancing in a Career Presentation
Prompt 1For this week’s assessment, you will create a memo. Creating a memo will help you practice the MS Word skills yo...
University of Phoenix Compliance with Physical Access Policies Discussion
All of the information required is below:😎 Respond to the following in a minimum of 175 words: Analyze audit procedure...
sush-discussion 1
Your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves...
Computer Power
The power supply to a computer is an integral part of its functioning. The source of power is majorly electric current fro...
Electronic System Completed11
Keeping of records is an important issue for all the organizations that exist in the world. The development of records doe...
Impact Of Technology At The Workplace
Hyperautomation, a process that involves the combination of automation tools, packaged software, and machine learning to d...
Related Tags
Book Guides
Breakfast at Tiffanys
by Truman Capote
The Awakening
by Kate Chopin
The Russian Hoax
by Gregg Jarrett
Little Fires Everywhere
by Celeste Ng
Dead Poets Society
by Nancy Horowitz Kleinbaum
Calypso
by David Sedaris
Into the Wild
by Jon Krakauer
The Sun Is Also a Star
by Nicola Yoon
The Glass Castle
by Jeannette Walls
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Colorado State University Network topology and proposal for RMDC Project
Note to All writer, l'm requesting for this help because I don't want no plagiarism. There is an answer to my questions on ...
Colorado State University Network topology and proposal for RMDC Project
Note to All writer, l'm requesting for this help because I don't want no plagiarism. There is an answer to my questions on this platform which I don't want to use. I need a fresh and new write up for the Assignment. So Please and please DON NOT COPY AND PASTE what is on this platform and send to me. Question DescriptionScenarioRocky Mountain Corporation (RMC) has relocated to a new building that was previously wired and set up for a local area network (LAN). The company implemented a 50-user client/server-based wireless network, using WPA in which all printers, folders, and other resources are shared; everyone has access to everything and there is no security outside of the defaults that were in place when the system was set up.You have been hired to secure the RMC network and ensure that the company has a properly designed network that allows for future growth (500 users in 12 months) and for the highest levels of security to protect against internal and external attacks.RMC has scheduled a meeting with its key executives and you in order to provide you with any additional information you may need.InstructionsIn an 8- to 10-page proposal, address the following three sections and their action items to provide a comprehensive secure environment:Section 1: Topology (type of network) and Network DevicesRMC needs to set up a network; it requires clarification regarding the type of network (or topology) in order to properly configure the connections among all PCs within the organization. The company is looking for guidance regarding the type of network devices that will connect devices to the local area network (LAN).The company asks that you explain what internal and external networking components are required (explain each and justify why you chose the network devices you did).Provide a cryptography method that will ensure vital data is encrypted. Provide an explanation of what network protocols will be used on the LAN and why.Ensure that the network has the capacity to:Connect all users to company resources (e.g. printers, scanners, and other items);Provide file sharing options;Manage these resources in a central location;Allow for internal users to access the internet; and,Allow external users and vendors to access the LAN remotely.Your proposal should include budgetary cost estimates for the chosen topology.Section 2: IP InfrastructureRMC has asked that you provide details regarding an IP structure (which includes static, DHCP—or the possibility of both—and proper IP class assignment), which is mindful of the company’s expectation of continued growth.Provide a remote access plan to ensure that users who access the network remotely do so in a secure and efficient manner.Section 3: SecurityBasic security has been in place and now the company would like you to make this a more secure facility in hopes of protecting against internal and external security threats.Generate a plan to provide secure access control methods for all internal-user access including a viable password policy, which includes complexity, duration, and history requirements.Provide a thorough plan to protect the network from malware and various types of malicious attacks.Submission RequirementsYour proposal should include all of the bulleted elements in the three sections above, with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with outside sources.Your paper must be 8-10 pages in length, not including the required cover and references pages.Include a minimum of six sources. (For each of the three sections, include at least two scholarly references as well as material from the Network Pro LabSim.) The CSU-Global Library is a great place to find your sources.You cannot use your textbook as your primary source of information. You must draw on other sources such as books, websites, business and trade journals, legal and compliance journals, government agencies, professional associations, and industry standards, for example.Visit the Library’s special research guide (Links to an external site.)Links to an external site. for this discipline.If you have questions about the format or content of references, discuss it with your instructor.Ensure your entire document, including citations of sources, is in conformity with the CSU-Global Guide to Writing and APA (Links to an external site.)Links to an external site.. Visit the CSU Global Writing Center (Links to an external site.)Links to an external site. to find numerous guides on how to write and research papers including an APA template paper (Links to an external site.)Links to an external site..Your submission should include the following (title each portion accordingly):Cover page.Abstract: The abstract is an “executive overview” of your paper. It must be a 50- to 100-word summary that would be appropriate to present to a manager. The abstract provides the reader with the essence of your project without reading the paper in its entirety.Table of Contents: This lists the sections of your paper with corresponding page numbers. Include tables and figures (if you have more than two in your paper), and any appendices.Introduction: In this section, state the basis of the Detailed Technical Proposal—Comprehensive and Secure Solution example that you will be presenting. Discuss how this analysis will be based upon the concepts studied in the course.Body of the paper: Include discussion, implications, and conclusion/recommendations. Provide a thorough discussion of your findings and the implications of your study. Use as headings each of the three sections under Instructions.References.
Assignment 1: Disaster Recovery Plan, Computer Science Assignment Homework Help
Assignment 1: Disaster Recovery PlanDue Week 6 and worth 120 pointsYou are an administrator for the Contoso Corporation. T ...
Assignment 1: Disaster Recovery Plan, Computer Science Assignment Homework Help
Assignment 1: Disaster Recovery PlanDue Week 6 and worth 120 pointsYou are an administrator for the Contoso Corporation. The Contoso Corporation has two (2) large sites. The corporate office is in New York and the manufacturing site is in Cleveland, Ohio. In addition, the Contoso Corporation has five (5) smaller sites. At the Corporate site, you currently have eight (8) physical Hyper-V hosts that host approximately one hundred twenty (120) virtual machines. The virtual machines are running Windows Server 2008 R2 and Windows Server 2012. The servers are needed to host email, various databases, file services, print services, and a point-of sales-application. The virtual machines are stored on a centrally located storage area network (SAN) that has multiple power supplies, and use redundant array of independent disks (RAID).Over the last three (3) years, you have had two (2) power failures that caused the servers to go down at the corporate office. Recently, during one (1) of these incidents, files on one (1) of the servers were corrupted. It was later discovered that the backup could only partially restore the data files, but could not restore the server itself.The servers must remain available and reliable. As the administrator, you must ensure that you can recover from a failure or problem quickly with minimum loss. Write a three to five (3-5) page paper in which you:Develop a continuity plan / disaster recovery plan for Contoso Corporation in which you address the following:Suggest an approach that provides redundancy (failover) for all mission critical functions in the event of a disaster including power failure. Consider the following in your approach: Essential Infrastructure; Email; Database; File Services; Print Services; Point-of-Sale Applications; Power Redundancy Solutions.Identify the changes that should be made to the backup procedures in order to address the problem with the server backups.Outline the necessary actions that Server Administrators must verify for proper operation of servers in the event of a failover.Provide a plan for returning all services back to the primary systems once the crisis has passed.Examine the pros and cons of moving part of the data center to the Cleveland office and housing it there on a permanent basis. Provide your recommendation for the stated action. Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Demonstrate the ability to describe, manage, and configure load balancing and failover clustering.Demonstrate the ability to configure and manage backups to include role-specific and online or cloud environments.Demonstrate the ability to recover servers to include files and volumes.Use technology and information resources to research issues in advanced network infrastructure environments.Write clearly and concisely about advanced network infrastructure topics using proper writing mechanics and technical style conventions.I already paid for the paper above, but I also need sources.
CCA 630 Abraham Lincoln Cloud Deployment Architecture Plan Paper
Start HereGreat news! Executive leadership has reviewed and approved the Cloud Adoption Policy Addendum. As the principal ...
CCA 630 Abraham Lincoln Cloud Deployment Architecture Plan Paper
Start HereGreat news! Executive leadership has reviewed and approved the Cloud Adoption Policy Addendum. As the principal cloud architect for BallotOnline, you are now looking forward to the next challenge from the leadership team: creating a design for cloud deployment throughout the organization. The designs for each component in the organization will make up the Cloud Deployment Architecture Plan.BallotOnline has decided to move forward with the top three workloads identified as "cloud ready": email, software development, and backups and archiving.You know that those workloads can be very different from one another. You will need to carefully review the workloads in terms of performance, capacity, cost, and availability requirements. You will need to design the deployment architecture plan for each workload. This will require you to research and evaluate the available cloud service offerings as well as the kind of architectures that would be best for BallotOnline. Your cloud deployment architecture plan must meet BallotOnline's cloud adoption policies and the business needs for deploying these workloads in the cloud. It's another layer of responsibility, and you realize that a lot of the company's financial viability rests on your ability to find the best service offerings.Check the Project 2 FAQ thread in the discussion area for any last-minute updates or clarifications about the project.You will design the deployment architecture plan for each workload over a series of 10 steps, and the project will take about two weeks to complete. Click on Step 1 to get started.CompetenciesYour work will be evaluated using the competencies listed below.6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).6.7: Assess cloud storage providers.8.2: Assess network security and privacy risks associated with cloud infrastructure.9.3: Develop documentation (plans, policies, and procedures) to support a cloud operation.9.5: Design a virtualized network infrastructure to meet business needs.9.6: Design cloud storage infrastructure to meet business needs.10.1: Develop and implement a cloud metering system.10.6: Configure a private cloud infrastructure using industry leading software.10.7: Configure a public cloud infrastructure using industry leading provider(s).11.2: Monitor cloud services charges from vendors and make adjustments to stay within budget.11.4: Monitor system performance. Step 1: Develop User Stories From BallotOnline EmployeesBallotOnline has decided to move forward with the migration of the email, software development, and backups and archiving workloads to the cloud. You will need to have a good understanding of what users really need in terms of performance, capacity, availability, etc., in order to design an effective architecture and select the best cloud offerings.In this step, you will write user stories, brief high-level definitions of requirements that describe what the user wants to achieve in simple terms.Watch the four user interviews of current BallotOnline employees describing their IT needs. You can record your user stories in the user stories template. Upload them to the submission box below for Sophia’s feedback.Step 2: Evaluate Available Cloud Service Offering Architectures for EmailThere is no one-size-fits-all cloud solution. You need to take workloads into account before deciding on a cloud deployment model. In order to make good design decisions, you have to understand the business, the cloud components, and the specific requirements involved.In this step, you will be using the workload requirements for email to evaluate the available SaaS offerings.Examples of Email as a Service OfferingsMicrosoft Azure’s Microsoft Office 360ZohoGmailAmazon Simple Email Service (SES)ReviewCloud ProvidersCloud Computing: A Review of PaaS, IaaS, SaaS Services and ProvidersConsiderations for Cloud Provider SelectionBest Practices for Cloud ImplementationAs you did while preparing the Cloud Adoption Policy Addendum, you will focus your efforts on the market leaders in the cloud computing industry: Amazon AWS, Microsoft Azure, and Google Cloud Platform.You will review the workloads based on the following criteria from the workload requirements for email and align the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsSummarize your findings in a one-page document that describes your rationale for selecting the appropriate cloud service offering. This will be part of the overall cloud deployment architecture plan that you will present to leadership.Step 3: Evaluate Available Cloud Service Offering Architectures for Software DevelopmentSimilar to the way you evaluated cloud architectures for email, in this step you will focus on the software development environment in cloud platforms.Traditionally, software development efforts follow the software development life cycle. In the cloud, the core steps of the SDLC may take advantage of PaaS offerings, which provide development environments for different kinds of software applications.Examples of Platform as a Service (PaaS) OfferingsAWSMicrosoft AzureGoogle Cloud PlatformThird PartyElastic BeanstalkAzure WebsitesGoogle AppsCloud FoundryIn today’s organizations, development teams work together with IT operations teams to implement practices of DevOps—seamless environments for rapid execution of software development life cycles along with automatic deployment and operation of systems in production.Examples of DevOps OfferingsAWSMicrosoft AzureGoogle Cloud PlatformCodePipelineAzure WebApps Visual Studio Team ServicesCloudBuildYou will use the information found in the workload requirements for software development to evaluate the available PaaS and DevOps offerings.Again, you will review the workloads based on the following criteria from the workload requirements for software development and align the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsTake detailed notes of your findings because the justification for your decision will be part of the final deployment architecture plan that you will present to leadership.In the next step, you will complete a similar evaluation for BallotOnline’s backup and archival procedures.Step 4: Evaluate Available Cloud Service Offering Architectures for Backups and ArchivingNow you will consider the workload requirements for backups and archiving to evaluate the available IaaS offerings.Examples of Backups and Archiving as a Service OfferingsAmazon S3Amazon GlacierAzure BackupRackspace Cloud BackupAlign the workload requirements with the appropriate cloud service offering. Your criteria should include:performancecapacitycostavailability requirementsJust as you did with the earlier evaluations, take detailed notes on your rationale for selecting the appropriate cloud service offering. This will be part of the overall cloud deployment architecture plan that you will present to leadership.Now that you have completed your evaluation of the cloud service offering architectures and selected the appropriate service offering and the vendor for the three workloads, you can proceed to the next step.There, you will begin designing the cloud deployment architecture, showing how everything will be connected.Step 5: Design Cloud Deployment Architecture for EmailNow that the evaluations are complete, you need to document your design of the various deployment architecture plans, starting with email.In this step, you will produce a one-page document that shows the design of the cloud deployment architecture for BallotOnline’s email system. Using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new email system deployed in the cloud.Step 6: Design Cloud Deployment Architecture for Software DevelopmentNow that you’ve finished with the email cloud deployment design and received feedback from Sophia, you can move on to this step, in which you will produce a one-page document and drawing that will illustrate the cloud deployment architecture for BallotOnline’s computer software development. As you did in the previous step with email, using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new software development platform deployed in the cloud. The drawing will be part of the overall cloud deployment architecture plan that you will present to leadership.When you have completed the design for software development, move to the next step, where you will create another diagram, this time for backups and archiving.Step 7: Design Cloud Deployment Architecture for Backups and ArchivingThe final diagram component of the cloud deployment architecture plan will be a one-page document in which you will show the design of the cloud deployment architecture for BallotOnline’s backups and archiving. As before, using diagramming software such as Microsoft Visio or PowerPoint, you will create a professional diagram that will show a high-level architecture design of BallotOnline’s new backup and archiving environment deployed in the cloud. The drawing will be part of the overall cloud deployment architecture plan that you will present to leadership.In the next step, you will set up procedures to monitor the use of the cloud.Step 8: Monitor Cloud Resource UsageAs the principal cloud architect, you’ve done your research and you’ve selected and designed architecture plans for email, software development, and backup and archiving. However, you know that you need more specifics for the cloud architecture plan. Your supervisor, Sophia, has reminded you to make sure that the plan includes a way to monitor how BallotOnline may consume resources in the cloud, since the leadership is always interested in keeping cloud-related costs in check, especially when it comes to backup and archiving.In the past few steps, you have documented the design for your cloud deployment plan. You will use those drawings as part of your final submission to company leadership. However, there are some additional components you will need for the cloud deployment architecture plan. In this step, you will consider resource consumption, which will be a key section of your overall plan.Draft a one-page document detailing how you will use AWS CloudWatch to monitor the cloud resource consumption for the backup and archiving workload. It may include the capacity consumption, billing information, and any other relevant elements that are needed to monitor the resource consumption in the cloud infrastructure.After you have documented how you will use AWS CloudWatch to monitor the cloud resource consumption for backup and archiving, move to the next step, in which you will consider the limitations for each of your designs.Step 9: Identify Design and Any Additional Limitations for Each WorkloadIn this step, you will identify and detail in a one-page document the limitations of the cloud deployment architecture design for each workload that you have created earlier.After you identify the design limitations for each workload, you can proceed to the last step, where you will create the final Cloud Deployment Architecture PlanStep 10: Write and Submit the Final Cloud Deployment Architecture PlanIn this step, you will create and submit your consolidated Cloud Deployment Architecture Plan for email, software development, and backups and archiving.The Cloud Deployment Architecture plan, which should be between eight and 10 pages, will consolidate the work that you have completed throughout the steps along with some additional elements (scope, executive summary, etc.) to create a comprehensive design for cloud deployment architecture for the selected "cloud ready" workloads. Sophia will present your work for approval at the executive meeting.Use the Cloud Deployment Architecture Plan Template to write the Cloud Deployment Architecture Plan and submit the document via the dropbox below.
Check Your Evaluation CriteriaBefore you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).6.7: Assess cloud storage providers.8.2: Assess network security and privacy risks associated with cloud infrastructure.9.3: Develop documentation (plans, policies, and procedures) to support a cloud operation.9.5: Design a virtualized network infrastructure to meet business needs.9.6: Design cloud storage infrastructure to meet business needs.10.1: Develop and implement a cloud metering system.10.6: Configure a private cloud infrastructure using industry leading software.10.7: Configure a public cloud infrastructure using industry leading provider(s).11.2: Monitor cloud services charges from vendors and make adjustments to stay within budget.11.4: Monitor system performance.
6 pages
Models For Competitive Dynamics
In contemporary society, organizations are trying to implement distinct business strategies to remain competitive and avoi ...
Models For Competitive Dynamics
In contemporary society, organizations are trying to implement distinct business strategies to remain competitive and avoid situations where the rival ...
14 pages
Software Policies And Protocol Plan
A company’s proprietary software is a crucial asset to a business. Whether the company uses the software to offers servi ...
Software Policies And Protocol Plan
A company’s proprietary software is a crucial asset to a business. Whether the company uses the software to offers services to customers or license ...
Earn money selling
your Study Documents