IT Infrastructure Management eI9RGuDM0m
IT Infrastructure Management eI9RGuDM0m
S
IM
M
N
COURSE DESIGN COMMITTEE
S
IM
Author: Sanjive Saxena
M
Copyright:
2017 Publisher
ISBN:
978-93-86052-09-4
Address:
4435/7, Ansari Road, Daryaganj, New Delhi–110002
Only for
NMIMS Global Access - School for Continuing Education School Address
V. L. Mehta Road, Vile Parle (W), Mumbai – 400 056, India.
3 Server Farms 59
S
4 Service Management Processes 75
7 Virtualisation 183
M
I T I nf r a s t ru c t u r e M a n a g e m e n t
c u r r i c u l u m
S
Process documentation, Data, applications, Tools- integration, - standby stores - operations man-
agement - IT systems management patterns -design process of information systems – Information
system Models.
IM
Server Farms: What are Server farms? Applications of Server Farms, Performance, Compile farm
uration Management - Service desk - Incident management - Problem management - Change man-
agement - Release management – Service level agreement - Infrastructure management – Roles
– response times– Escalation charts – Dash boards.
N
Asset management: Asset – Asset classes - Organizational asset – IT asset – Physical asset – In-
formation asset – Use of assets in business - Asset capture methods – Concepts of stock registers.
Asset continuity planning – GAP analysis – Equivalent unit cost – Repair replace decisions – MTTR
– MTBF – Impact of downtimes - Over view of Risk,–Risk assessment methodology – Risk identifi-
cation, - Risk Evaluation, - Risk categorization - Risk registers - RISK Matrix
Virtualization & cloud: Virtualization concepts - Server virtualization - Server Virtualization Im-
plementations - Managing Virtual Server Environments- physical partitioning – logical partition-
ing – host machines – virtual machines – guest operating systems - platforms – Hypervisor –ESX
platform –VM kernel – COS – VMFS- ESX architecture -Cloud Basics -Service-Oriented Architec-
tures -Cloud Architecture -Amazon Web Services -Google Cloud Services -Windows Azure -Open
Source Cloud Stack
CONTENTS
S
1.1 Introduction
1.2 Understanding IT Management
IM
Self Assessment Questions
Activity
1.3 Understanding Infrastructure Management
1.3.1 Benefits
1.3.2 Roles and Responsibilities
1.3.3 Current Business Demands
M
CONTENTS
S
IM
M
N
Introductory Caselet
n o t e s
S
simply the IT processes are as follows:
Experimentation with small projects: The first principle that
they followed was to run each idea of IT streaming on a small-
IM
scale project to know how successful the idea would turn out
to be. For this, they needed a project manager who had all the
knowledge about the project and also knew when it is time to
declare the project a failure. Small-scale projects were cho-
sen as they would not cost the company a lot of its revenue
and also would give them the flexibility to try new approaches.
Of course, some ideas turned out to be a success and some
M
didn’t.
Virtualisation of everything: The next step was to virtualise
all the key components used in IT management, from servers
to storage to desktops, everything was virtualised. This helped
N
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
1.1 INTRODUCTION
S
By definition, infrastructure management means the management
of the various important aspects of an organisation, such as policies,
processes, internal and external relations of the company, in order to
IM
improve the overall performance of the organisation. In other words,
infrastructure management deals with the management of the infra-
structural policies of a company and helps in identifying the best prac-
tices to carry out the various functions of an organisation leading to
the reduction of cost, improved production practices, better customer
satisfaction, etc.
M
system management models. Finally, you will study about the infor-
mation system and IT system complexity.
n o t e s
S
the business strategies and the technology improves the working of
the organisation as the business strategies work towards improving
the connections of the internal and external environment, whereas
IM
the technology helps in improving the connections so formed by the
scientific methods of management.
Until the recent times, the management of the organisation was done
in a silo-like fashion in which resources were allocated and dedicated
according to the functions of the organisation. However, the drawback
of this method of resource allocation was that the resource utilisation
M
could not be optimised and hence, could sometimes not meet the actu-
al demand of the customers. This drawback led to the development of
the technology-driven organisation method and allocation of resourc-
es. This simplified the task of managing to a great extent as the func-
N
Activity
n o t e s
Understanding Infrastructure
1.3
Management
Infrastructure management can be defined as the management of an
organisation’s basic operations including its policies, equipment, data,
human resources and processes, in order to achieve overall business
performance.
S
Let’s discuss the benefits of infrastructure management first.
IM
1.3.1 BENEFITS
n o t e s
This management not only reduces the cost of production but also
helps in the effective utilisation of the money so saved; thereby
helping the organisation to gain an optimal point.
Risk management is one of the main concerns of the businesses to-
day. Business firms cannot completely eliminate the risk involved
in their various operations, but the IT management tool helps in
a better management of the risk, which reduces the overall cost of
production. Also, this kind of management helps the firms to get
their hands on the critical data in real time, combat the risks with
greater efficiency and ease and prepare for the future risks as well.
S
plays a very important role in managing an organisation. This kind
and style of management has various roles and responsibilities to fulfil
in order to help in the systematised functioning of the organisation.
Some such roles and responsibilities are discussed as follows:
IM
The designing and executing of plans for the short-term and long-
term development of the company ensure that the infrastructure
of the company is able to meet its current and future needs.
Infrastructure management helps in the project development and
execution of the various procedures to fulfil the projects undertak-
M
en by the firm.
The management also helps in defining various priority tasks,
such as maintenance, design, security, development of the infra-
structure system, etc.
N
n o t e s
With the changing scenario in the business environment and with the
emerging importance of technology in every sphere of life, the need
for better management policy has increased many folds, resulting in
an increase in the demand for infrastructure management as the man-
agement technique not only helps in the better management of the
company but also helps in the reduction of the costs for the company.
S
In order to make this IT infrastructure management technique more
adaptable, the organisations are taking up the two key models of ser-
vice management. Two key characteristics include a catalog of stan-
IM
dard services that are offered at a preset price to be consumed at a
price-time-quantity basis. This means that the cost will not be decided
on arbitrary estimation but on the basis of the aggregate cost of the
components used. Second characteristic includes making the man-
agement software more interactive and in a more commercial way by
defining the standard offers and solutions that are custom made to
M
1.3.4 CHALLENGES IN IT INFRASTRUCTURE
MANAGEMENT
N
n o t e s
S
the reports so made and take the correct decisions.
The firms should also be able to strike a balance between human
contributions and the dependence on computers. High human
IM
contribution will result in lower productivity and also, the produc-
tivity will not be standardised, and high dependence on computers
will result in a higher risk of security breach. Hence, it is of utmost
importance for the business firms to strike a balance between the
human and computer contribution so as to be able to grow and
develop.
M
1.3.5 RESPONSE TIME
n o t e s
Activity
Search the Internet to find out the challenges faced by a new start
up in the current business environment with respect to IT infra-
structure management.
S
and the areas of discrepancies. This section discusses various man-
agement models used in an organisation to optimise different process-
es of production and also the performance of the employees.
IM
1.4.1 FAULT MANAGEMENT
Fault management, as the name suggests, deals with the process of de-
tection, isolation and correction of malfunctions in the communication
network. In detail, it deals with the acceptance of the malfunction or
error, tracing the source of the error and taking corrective steps to re-
M
pair the malfunction with the help of various diagnostic tests and also
taking into account the various environmental changes taking place in
the organisation. In case of any occurrence of fault, the system sends
a notification to the network in the form of SNMP and a persistent
alarm is only cleared once the problem has been resolved. There are
N
The fault management system can be broadly classified into two types:
active management and passive management. Passive fault manage-
ment collects the alarms that are pinged on the devices through a sim-
ple network management protocol. But, the drawback of this kind of
fault management is that it triggers an alarm only if it considers the
n o t e s
S
Data Investigation Repair Repair
Collection Diagnostics Procedures Monitoring
IM
Figure 1.1: Fault Management Process
formation all through the product’s life. The main areas of the use of
this tool of management are in the military engineering organisations
for the better management of the weapon systems. Apart from this,
this management tool is used in IT service management, civil engi-
N
CM not only helps in the reduction of the cost but also helps to ensure
that the proposed changes are implemented effectively, immediately
and systematically so that the negative effects can be minimised. Once
the changes have been agreed upon and the way to implement it has
been decided, CM helps in the evaluation of the implementation of the
changes in the policies and the programmes of the organisation. The
categories of CM are shown in Figure 1.2:
n o t e s
Configuration
Management
Configuration
Configuration Change
Status
Identification Management
Accounting
Define the product Control changes Provide status and
and its configuration to a Product and Information about a product
documentation its configuration and its configuration
Identification documentation documentation
Configuration
Audits
Verify consistency of configuration documentation
against the product
S
Figure 1.2: Categories of Configuration Management
1.4.3 PERFORMANCE MANAGEMENT
APPLICATION
n o t e s
First, the employees must reconcile their goals with the mission state-
ment drawn in order to achieve the goals of the organisation. The
main reason behind such analysis is to determine the key objectives
for a particular job and also to set standards for job positions and con-
vey the same to the employees at the job position.
BENEFITS
The benefits of performance management are quite diverse. Some
argue that the use of performance management software and the im-
provement of the organisational performance are interrelated and
have a direct relation between each other. The benefits include vari-
ous broad categories, discussed as follows:
Financial gain
It helps in the growth of sales.
S
It helps in the cost reduction for the organisation.
It helps in the alignment of the employee and organisational
goals.
IM
It improves the communication process inside the organisa-
tion, which, in turn, results in better implementation of the
changes in the organisation.
Motivation of the workforce
It improves the employee contribution as employees are able
M
ORGANISATIONAL DEVELOPMENT
n o t e s
S
Rewarding the hardworking employees
other hand, performance appraisal is the term that includes all those
rewards and incentives given to the employees for their extraordinary
performance and is considered to be an incentive for the employees to
work better and contribute towards the fulfilment of the organisation-
al goals and objectives.
N
n o t e s
for the protection of the company’s assets. The main strategies used
by the companies to protect their assets are information classifica-
tion, risk assessment and risk analysis. These policies are adopted to
identify, analyse and measure the company’s threats and their
vulnerability.
S
the extent of loss incurred in case of occurrence of the risk and then
handling the risk on the basis of the priority of the risk.
But, before that, we need to identify the various risks prevalent in the
IM
business world. The risks can be categorised as external risks and in-
ternal risks. They are then further divided into various subcategories.
RISK OPTIONS
n o t e s
S
the risk to a considerably lower level. Once the risk has been brought
down to an acceptable level, the organisation can accept the risk and
carry on with its day-to-day activities.
IM
SECURITY POLICY IMPLEMENTATION
Once the security policy has been devised by the infrastructure man-
agement software, it is important to properly implement it. There are
various methods of security policy implementation. These methods
are listed as follows:
M
Alarm system
Keycard, locks, biometric locks
Attack dogs
N
Barricade
Security guards
Tie up with law enforcement agencies
1.4.5 ACCOUNT MANAGEMENT
n o t e s
the employees and that of the company so that in case the employee
leaves the organisation, he does not have the custody of any data that
is not in the company’s knowledge, or if any new employee is working
on any existing project, he does not have any problem in the procure-
ment of the information needed by him to get on with his work effi-
ciently. In a non-technology driven scenario, every organisation would
either have a central database or would have a different database for
different project or a mix of both, but in today’s highly decentralised
and technology-driven times, this method of data management is ab-
solutely impossible and hence, they need to find a new and improved
method of data storage and account management. This is where infra-
structure account management comes in.
S
thority they hold in the organisation. This also helps in differentiating
the users from the guest visitors and the Web logins. Account manage-
ment also ensures that no one can delete or distort any kind of data
in the system who is not authorised to do so. It helps in the access to
IM
the data according to the entitlements, and the people are granted
access to the information only according to the information they are
entitled to, and hence, it is not made available to all the employees.
It also reserves the right to access the information on the basis of the
passwords given to system, i.e, for every new information that the user
demands, the user will have to give a new password or some new iden-
M
tification code so that the system can verify that the user trying to
access the information is doing so in order to benefit the organisation
and not to harm it.
Figure 1.4 shows the login credentials required for account manage-
N
ment:
n o t e s
Activity
S
ment measures taken by an organisation to establish identities of
the employees for protecting the image of the organisation.
IM
1.5 INFORMATION SYSTEMS
The coherent group of individual digital components for the purpose
of collection, processing and storage of data in order to establish mean-
ingful information as well as knowledge is known as ‘Information Sys-
tems’ (IS). The IS are areas of major investment in the terms of high
M
For example, big corporates use IS tools to communicate with their es-
teemed clients through online surveys, polls, targeted SMS services,
etc. Not only corporate entities, but also the Government is also using
Information Systems to cater to the citizen’s needs like e-Adhaar, on-
line tax filing, etc. E-Commerce organisations like Flipkart.com, Am-
azon.in, etc. are creating revolution by using information systems to
sell their products online and gain huge profits. Other activities like
social networking banking services, educational services, entertain-
ment also use Information System for delivering superior customer
satisfaction.
n o t e s
1.5.1 IS COMPONENTS
gb
Hardware
Procedures
S
People
Software
IM
Databases
Telecom
M
gb
Source: http://maribelajarsss.blogspot.in/2013/05/introduction-to-information-systems.html
n o t e s
S
Telecommunications: Telecommunications are the means of elec-
tronic transmission of information over distances. The information
can be in the form of voice telephone calls, data, text, images, or
IM
video. In these days, telecommunications are used to organize re-
mote computer systems into telecommunications networks. These
networks themselves are run by computers. Generally, telecommu-
nications network consists of computing and telecommunications
resources for communication of information between distant loca-
tions. The network can be established by either wired or wireless
medium. The wired medium use coaxial cables and optical fibres to
M
n o t e s
S
SaaS (Software as a Service) and PaaS (Platform as a Service) will
enhance the growth of the business.
Data security: It is estimated that the role of human resource in
IM
the security of enterprise data will decrease with time and auto-
mated versions of IT will come into existence which will detect any
violation, assess the threat and respond accordingly.
User experience: Today, the IT solutions is being developed and
implemented by business owners, top management or IT person-
M
1.5.3 FRAMEWORK OF IS IN AN ORGANISATION
The general Information System structure remains the same in all or-
ganisations. The information system has a three layered structure as
shown in Figure 1.6:
n o t e s
Executive
information
Systems
Decision
Support Systems
Management
reporting Systems
MANAGEMENT SUPPORT
S
SUPPORT OG KNOWLEDGE WORK
n o t e s
S
Register
Request
Request Is
Rejected
Request Is Rejected
Car Is
Allocated + Request Is Made
IM
Customer
No
Review
Request
Approved
Administrative
M
Office
Yes
Allocate
a Car
Yes
+ Perform
Transportation
N
Allocated
Garage
n o t e s
Select
Assess
Define Deploy
(requirements) Evaluate
Recruit Monitor
Design Plan
(plans)
Develop
Measure
Plan Design
(performance)
Evaluate Deliver
Evaluate
Analyse Reatain Monitor
S
Staff Relations
Process
& Tool
Device
Tool Relationship
Data Information
Tools
Action
Resolution
IT Tool Space Reporting
n o t e s
S
authorised access to the confidential data of the company. If that is the
case, the information may be altered, destroyed or could even be used
for detrimental uses. This could also lead to the damage to the reputa-
IM
tion of the company in the eyes of the customers.
Activity
n o t e s
S
the technology is flexible enough so that the company is able to
adjust any future change in the technology. If the new technology
is not flexible enough, every change in the technology will disrupt
the current working and will also result in the delay of the im-
IM
plementation of the technology. It is like buying a new television
every time you want to watch a different channel. You don’t want
to do that. If a television is not flexible enough to adjust new chan-
nels, it is of no use as it would just make the television watching
experience more and more complex. Same is the case when a new
technology is introduced. If the IT team has to develop a new tech-
M
nology in order to adjust for any new change in the future, the
technology is nothing more than useless, and hence, it also leads
to complexity in the user experience.
N
17. __________ and _________ are the two main requirements for
reducing the complexities of the management system.
18. If the new technology is not flexible enough, every change in
the technology will disrupt the current working and will also
result in the delay of the implementation of the technology.
(True/False)
Activity
1.7 SUMMARY
Infrastructure management deals with the management of the
infrastructural policies of a company and helps in identifying the
best practices to carry out the various functions of an organisation
n o t e s
S
Risk management is one of the main concerns of the businesses to-
day. Business firms cannot completely eliminate the risk involved
in their various operations, but the IT management tool helps in
IM
a better management of the risk, which reduces the overall cost of
production.
The price of the management technique is sometimes considered
to be too high, which discourages the use of infrastructure man-
agement or the heads of the business firm think that the benefits
incurred from the management model are too little for the cost
M
paid by them.
The reporting ability of the business also defines the growth of the
business. A good reporting system means that the organisational
decisions are taken with the greatest ability and after taking into
N
n o t e s
S
key words
n o t e s
S
technology. Discuss how this situation can be avoided.
3. Value creation
4. Silo-like
Understanding Infrastruc- 5. 20%
N
ture Management
6. Customer satisfaction
7. Response time
IT System Management 8. Performance
Models
9. Account
10. Hazard
Information Systems 11. True
12. Operational Support Layer, Sup-
port of Knowledge Work, Manage-
ment Support
13. Software as a Service
14. Humans
15. Access
16. True
n o t e s
S
important aspects of an organisation, such as policies, processes,
internal and external relations of the company and human
resource management policy of the company, in order to improve
IM
the overall performance of the organisation. Refer to Section 1.3
Understanding Infrastructure Management.
3. The benefit of this kind of management technique over normal
management is that this technique uses technology to attain
standardisation of the production process. It also helps in the
performance evaluation of employees. Refer to Section 1.3
M
n o t e s
SUGGESTED READINGS
Anita Sengar, “IT Infrastructure Management” 2nd Edition, S. K.
Kataria & Sons 2009.
Roberto D. Sigolini, Abhijit V. Deshmukh, Lorenzo Fedele, Sara A.
McComb, “Recent Advances in Maintenance and Infrastructure
Management”, Springer 2009.
Bill Holtsneider, Brian D. Jaffe, “ IT Manager’s Handbook: Getting
Your Job Done”, Elsevier 2012.
E-REFERENCES
S
Limited, I. (2015). Infosys - Infrastructure management services
from Infosys. Infosys.com. Retrieved 14 July 2015, from http://www.
infosys.com/IT-services/infrastructure-management-services/
IM
SearchCIO,. (2015). What is infrastructure management (IM)? -
Definition from WhatIs.com. Retrieved 14 July 2015, from http://
searchcio.techtarget.com/definition/infrastructure-management
M
N
CONTENTS
S
2.1 Introduction
2.2 IT Infrastructure
IM
2.2.1 Design of an IT Organisation
2.2.2 Design of IT Infrastructure
Self Assessment Questions
Activity
2.3 Determine Customer Requirements
2.3.1 Elucidation
M
2.3.2 Documentation
Self Assessment Questions
Activity
2.4 Identifying System Components
N
CONTENTS
S
IM
M
N
Introductory Caselet
n o t e s
IT Infrastructure Transformation in
Northern Gas Networks
S
isting system:
A robust asset management system is required to be integrat-
ed with the existing system and provide improved customer
service from the field.
IM
The laptops used by field engineers must be refreshed and up-
dated with some security checks.
Anetwork set up of mobile infrastructure is required for com-
munication.
The network must be upgraded from GPRS to 3G network.
M
Solution
Introductory Caselet
n o t e s
S
Wipro designed the new network set up to work with the exist-
ing Oracle/AT&T data center.
Wipro implemented Computrace solution on the hard drives
IM to track the movement of laptops to prevent theft, and hav-
ing remote access capability to destroy the device in case of a
theft.
Wipro coordinated with multiple vendors and service provid-
ers to assure the client that the project would be completed as
per its scheduled time.
M
Result
Wipro fulfilled all the challenges faced by the Northern Gas Net-
works company. It coordinated with Panasonic and other vendors
N
n o t e s
learning objectives
S
2.1 INTRODUCTION
IM
Information technology in this digital era has become an indispens-
able tool for an organisation’s success. The performance of the organ-
isation depends heavily on the effective implementation of IT tools.
Latest, robust and improved versions of software and hardware are
created to cater to the client’s needs with implement IT solutions in
the organisation.
M
n o t e s
2.2 IT Infrastructure
The combination of various system components necessary for the fab-
rication, operation and conservation of the IT surrounding of a typical
organisation is known as IT infrastructure. The IT infrastructure pre-
vails within the organisational boundaries (internal) and caters to the
needs of the employees or staff, merchant, consumer, etc. The central
ambition of the management of IT infrastructure include:
Minimise operational costs
Effective business planning
Improved quality of service provided
S
More customer satisfaction
Minimise downtime
Improved level of flow of information in an organisation
IM
Better compliance to standards
Energetic work environment
In any IT system, there are three basic elements that are illustrated in
Figure 2.1:
M
Host/
Server
N
System
Elements
Client Network
n o t e s
S
liability plan necessary for the usage as well as problem solving of the
technology and so on.
Designing IT structure in an organisation is a challenging job as there
is no single proven design for every organisation but there are set of
IM
process and benchmarks which guide the design methodology. In ad-
dition, there should be an appraisal mechanism for locating the tough-
ness and shortcomings of the new system.
According to the book Structural Cybernetics: an Overview [UK edi-
tion] written by N. Dean Meyer, there are six core ingredients which
form the basis of IT design of an establishment. They are as follows:
M
n o t e s
Architects: They are the actual persons who are responsible for
the supervision of an IT infrastructure. They are accountable for
obedience to the standards and necessary guidelines that ensure
that IT development is carried out as per the documented busi-
ness plan and design specifications.
S
ious experts. It should contain the detailed design specifications of
the IT infrastructure to be created along with step by step description
of processes. A typical design document should include the following
types of information:
IM
Design of the network of the IT infrastructure.
Design of the server/host and data centre.
Design of the client and server operating system.
Hardware and software details of the components of IT infrastruc-
ture.
M
n o t e s
Efficient
design of the Local Area Networks (LAN) and Wide Area
Network (WAN) as well as routers, switches, modems, hubs etc.
Adequate attention should be given to the crucial network security
mechanisms with a careful assessment of risks and the methods to
solve them.
Effective architecture of the directory must be considered in order
to explore the geographic boundaries of an organisation in order
to undertake the most suitable deployment structure.
There is also a growing popularity for development of infrastructure
which is spread across a number of different cost centres as well as a
variety of platforms of the organisations that can be effectively added
or removed from the system as per necessity. This type of adjustable
mechanism is known as Cloud Computing.
There is a basic structural similarity between the IT infrastructures of
S
different companies. The basic segments of an IT system comprises of
broad categories like software, methodology, hardware, surrounding
and human resource. These leagues have smaller subdivisions that
IM
form the core of an IT infrastructure in any organisation.
Activity
DETERMINE CUSTOMER
2.3
REQUIREMENTs
As customers are considered as “Gods” in any business setting and
their choices should be given unconditional importance. Before con-
structing an IT infrastructure, the requirement and miniscule specifi-
cations of the customers must be settled. This job is generally execut-
ed by a Business Analyst. They reach out to the customers, represent
their requirements, investigate about the deployment time etc. The
noted requirement is transferred to the core IT team so that the de-
sign structure fulfills the customer demands absolutely.
n o t e s
the requirements can get modified which should be noted down and
communicated to the design team so that necessary changes can be
integrated. Various techniques are adopted like client surveys, ques-
tionnaires, customer polls etc. Sig sigma approach emphasises the
significance of customer requirements and treats them as a unique
entity.
2.3.1 ELUCIDATION
The requirement gathering is a progressive process which needs to be
done through utmost care.
There are certain steps which need to be followed. Deriving from
Goldsmith’s proposition of “Problem Pyramid” the following steps
should be followed in sequential order:
S
1. Perceive the problem, perform root cause analysis and gauge
threats.
2. Observe the current measures which showcases that the problem
already identified is real.
IM
3. Perceive the goals to exhibit that the identified problem has been
effectively addressed and its importance of fulfilling it.
4. Enumerate the “As-is” logic of the aforesaid problem, as the
reason of problem needs to be solved so that the problem will be
solved automatically.
M
Brain-
storming
Use Proto
Cases typing
Requirement
Role User Ob
Elucidation
Playing servation
Methods
Question-
Interviews
aires
Workshops
n o t e s
2.3.2 DOCUMENTATION
The design document should contain the below details about the IT
project:
S
Key deliverables and the primary objective of the project.
The blueprint of the customer’s requirements should be men-
tioned in a clear and crisp manner.
IM
Blueprint of the surrounding in which the IT infrastructure will
function.
Any background report or information pertaining to the current
IT infrastructure to be deployed.
Details of the possible challenges that might come up in designing
M
the IT infrastructure.
The deadline of the project that is the time limit for the delivery of
the IT infrastructure should be mentioned clearly as well as major
project milestones should be established.
N
Activity
n o t e s
CPU
INPUT DEVICE
S
CABLES
STORAGE DEVICE
IM
FIRMWARE
UTILITIES
SOFTWARE OS
SOFTWARE
M
APPLICATIONS
POWER
N
FLOOR SPACE
ACTIVATION
OPERATION
SYSTEM MANAGEMENT
HOUSEKEPPING
USERS
n o t e s
Activity
S
structure process is done, what process flow needs to be done, how
the finished product will look like etc. The colour scheme or design of
the welcome screen can be modified by the end user. There is detailed
mention of the System Requirements (technical perspective) needed
IM
for the IT infrastructure. Usually there are four preset themes for the
welcome screen of the system requirements. Different colour schemes
are provided for the text, active links, seen links, unseen links, back-
ground of the page and the different buttons. There is also a separate
section in the process document which specifies the design of the User
Interfaces that is the portion of the system which the end user visua-
M
n o t e s
S
3. Specific user requirement: This section contains the list of
requirements including any specific requirements along with
relevant requirement groupings.
IM
4. Appendix: This section contains the source documents if any,
like user interviews, use case scenario, etc.
5. Glossary: This section contains the list of uncommon terms and
their meanings, abbreviations or acronym used in the entire
document along with their full forms.
M
Activity
n o t e s
2.6 DATA
The small information piece which has exclusive formatting, stored
on a recording intermediate and transferred via electronic signals is
known as data. All the software have two distinct classes Data and
Programs. Programs are accumulation of data which functions on the
basis of coded instructions. Their main function is to monitor and in-
fluence the operation of an IT device like computer. Data is being pro-
cessed to convert information into knowledge.
There are several forms of data. It can be text or numerical form, bytes
or bits embedded in the electronic memory device etc. The nomencla-
ture “Data” is frequently used to separate human readable pieces of
information from binary information which can be read by machines.
The information about the database is stored in the data files of the
S
system. The type of data set which provides a summary of the details
of the individual data used is known as “Metadata”.
Reliable
Valid
N
Relevant
Timely
Complete
n o t e s
2.6.2 TYPES OF DATA
S
value 17/5 James Street
Boolean Data has got only two substitutes True/False, Yes/No
SURNAME Text
Text
ADDRESS Text
N
TELEPHONE_NUMBER Text
DATE_OF_BIRTH Date/Time Date/Time
Activity
n o t e s
DISTINGUISHING between
2.7
APPLICATIONS AND TOOLS
The small constituent of a software which is responsible for the over-
all smooth functioning of the software package as a whole is referred
as “Tools”. The miniature ingredients perform together to form a big-
ger entity which have practical applications. Each miniature part may
not perform at the same time but work in coordination when desired.
With the absence of the tools in a software package, the entire product
will be malfunctioned. Software tools are periodically amended and
new tools are added frequently in order to optimise the performance
of the software program.
The set of programs or the entire software package which allow the
end user to perform several activities, tasks by relevant directions is
S
known as “Application”. The Application software fails to perform ef-
ficiently on its own unless the Tools or the System Software executes
the specified function.
IM
Examples of Application include Web Browser, MS Word, Spread-
sheets, Graphical Interface, and Operating System etc. For example,
in software like MS Word, there is one tool called spell checker that
helps in checking spelling.Some of the fundamental distinguishing
factor between Applications and Tools are shown in Table 2.3:
and Tools
Application Tools
Big entity functioning as a Tiny miniature elements
single system.
N
Activity
n o t e s
S
etc.
The ensuing illustration in Figure 2.6 gives an idea of the tasks per-
formed by the specific software:
M
Incident
Monitoring Administration Troubleshooting Reporting
Management
N
Services
End user centric approach Real time ops culture Reduced costs of operations
ITL based service delivery Tool based approach Proactive performance management
n o t e s
Activity
S
2.9 IT SYSTEMS MANAGEMENT
IM
The administration of the widespread computer network in an organ-
isation is known as IT systems management. It aims in basic manage-
ment activities, fabricating structures, deploying required infrastruc-
ture, administrating the available IT resources in a company. It acts as
a catalyst in making the IT infrastructure in an establishment robust,
durable and competent. They are usually centralised and integrated
M
in nature.
n o t e s
S
cating the infected systems.
PEOPLE-PROCESS-TECHNOLOGY APPROACH
N
Process
People Technology
n o t e s
S
STRATEGY-TACTICS-OPERATIONS APPROACH
Strategy
M
Tactics
N
Operations
n o t e s
S
refers to actions that are formulated in order to achieve the
goals of the concerned firm.
IM
Activity
2.10 SUMMARY
M
key words
n o t e s
S
cesses, and People. All the components work together to give
seamless IT infrastructure in an organisation.
IM
2.11 DESCRIPTIVE QUESTIONS
1. Explain the basic design characteristics of an IT infrastructure.
2. List down the requirement gathering methods.
3. Write the process for initialising a requirement gathering
M
document.
4. What do you understand by data?
5. List down the different types of data.
N
n o t e s
S
Operations Management 14. Tool
15. True
16. IT operations manager
IM
17. Integrated Operations Manage-
ment
IT Systems management 18. True
19. Chief Information Officer
20. b. People-Process-Technology
M
21. Operations
n o t e s
S
their respective values. There can be several data types, which
are as follows:
Numerical: Represents the whole number or decimal but no
fraction
IM
Currency: Puts currency symbol like $ before the data ( up to
two decimal places)
Alphanumeric: Enters symbol, text or numerical value
Boolean: Represents logical values , such as true or false and
0 and 1
M
SUGGESTED READINGS
Choubey, M. (2015). IT infrastructure and Management.
Hudson, R. (2015). Infrastructure Management.
n o t e s
E-REFERENCES
Techopedia.com. (2015). What is IT Infrastructure? Definition from
Techopedia. Retrieved 14 July 2015, from http://www.techopedia.
com/definition/29199/it-infrastructure
Webster, M. (2013). IT Organisation Design. Leadership Thoughts.
Retrieved 14 July 2015, from http://www.leadershipthoughts.com/
it-organisation-design/
Projectsmart.co.uk. (2015). Requirements Gathering 101. Re-
trieved 14 July 2015, from http://www.projectsmart.co.uk/require-
ments-gathering.php
SearchCIO. (2015). What is infrastructure management (IM)? Defi-
nition from WhatIs.com. Retrieved 14 July 2015, from http://search-
cio.techtarget.com/definition/infrastructure-management
S
IM
M
N
Server Farms
CONTENTS
S
3.1 Introduction
3.2 Applications of Server Farm
IM
Self Assessment Questions
Activity
3.3 Performance of Server Farms
Self Assessment Questions
Activity
3.4 Advantages and Disadvantages of Server Farms
M
Activity
3.6 Render Farm
Self Assessment Questions
Activity
3.7 Link Farm
Self Assessment Questions
Activity
3.8 Summary
3.9 Descriptive Questions
3.10 Answers and Hints
3.11 Suggested Readings & References
Introductory Caselet
n o t e s
Company Profile
Once, due to high number of clients and work load, the company’s
servers started running out of memory due to which the compa-
ny failed to deploy large projects and complete the existing proj-
ects within deadlines. Moreover, the projects were highly dynam-
ic and demanded rapid modifications. B.L.V. Rao, CIO, Infotech
S
Enterprises stated, “This massive amount of customer data and
project information needs to be preserved, processed, analysed and
archived securely on heterogeneous platforms. There was an urgent
need for storage optimisation.”
IM
Challenges
Rao also stated that customers were very rigid about timelines
regarding the deployment of their project and the increase in the
N
storage space of servers can solve the problem. With any new ex-
periment, meeting client expectations are very crucial.
Solution
The Infotech’s IT team has set up a new server farm by using high
capacity disk for storing and archiving data. The team has also
ensured the security by storing it in compressed and encrypted
form to satisfy their customers related to security concern.
With the installation of new server farm, the company has saved
80 lakh rupees per annum and with the current ability of han-
dling of large projects, the company has been adding 15 custom-
ers every year. Moreover, the projects profit has been improved by
10-15 percent including better satisfaction of customers. The data
stored on the server farm are now more protected than before.
n o t e s
learning objectives
3.1 INTRODUCTION
S
In the previous chapters, you have learned about the client server
model in which a client machine sends a request and the server ac-
knowledges it by providing the necessary resources or services. A cli-
ent may request a file, a Web page or other applications stored on a
IM
server. The client server model is used in almost all the organisations
where all the files are stored at a centralised location and the employ-
ees can access the resources, as and when required. Necessary per-
missions are granted to each and every employee so that no employee
can destroy data and resources stored on the server.
M
As the resources and data grow, a single server cannot handle the
large number requests of the clients, giving rise to the need of inter-
connected servers. These interconnected servers are known as server
farms, which can fulfil large numbers of requests of the clients that
is not possible with the single server machine. The server farms are
N
In this chapter, you will first study about applications of server farm in
the real world. Further, you will study about how the performance of
server farms is measured in organisations. Next, you will study about
advantages and disadvantages of server farms. This chapter will fur-
ther discuss about compile farm, render farm and link farm.
n o t e s
S
IM
M
n o t e s
Web hosting: Server farms are also used for hosting of Web ap-
plications. They are capable of deploying from small to large Web
based applications. In context of Web hosting, the server farms are
also known as Web farms as a large number of Web servers are
used to publish and deploy websites or Web based applications.
Besides hosting the Web sites, the server farm also does the load
balancing. The nodes or computers in the server farm handle the
incoming traffics and provides the required resources and services
as per the user’s requests. In case a node fails, then the incoming
traffic is distributed to other available nodes.
Scientific simulations: Server farms also find its application in
the field of Computational Fluid Dynamics (CFD). It is a branch of
fluid mechanics that deals with the problems related to fluid flows.
It analyses and solves problems by performing numerical analysis
and using data structures. With the help of server farms and super
S
computers the results can be achieved with more precision. The
latest supercomputers comprise giant server farms having proces-
sors of high-speed interconnected by either Gigabit Ethernet or
IM
customised interconnections such as Infiniband or Myrinet.
3D rendering: Rendering refers to the process getting the actual
2D image finally from the created scene. In case of 3D rendering,
the actual 2D images are obtained from 3D wire frame models.
The 3D rendering requires cluster of computers or server farms as
they are high performance computers and therefore, can perform
M
Besides, the previous applications of server farms, they are also used
by large organisations in addition to mainframe computers. The or-
ganisations keep on monitoring the status of the server farms so that
N
n o t e s
S
Activity
With the help of Internet, find the information about the size of
IM
server farms of top companies like Yahoo!, Google, etc.
cooling systems of data centres and the total cost of electricity con-
sumed to keep the servers working on a 24x7 basis. The performance
of the server farms is not judged on the basis of the functionality and
performance of processors present in the servers. It is because the
computer runs on 24 x 7 basis and consumption of electricity is very
N
high.
The design of the server farm is based on the performance per watt
due to the large consumption of electricity. The performance per watt
measures how much the computer architecture or computer hard-
ware is energy efficient. It basically measures the speed of computa-
tion that is done by a computer for every watt of electricity consumed.
The prediction of performance per watt in a server farm is done by the
EEMBC EnergyBench, SPECpower, and the Transaction Processing
Performance Council TPC-Energy.
n o t e s
On the other hand, DCIE is the inverse of PUE. It calculates the ener-
gy efficiency of a data center in the percentage value by dividing the
computing equipment power with the total facility power.
It is estimated that for every 100 watts that is consumed by servers for
their operation, approximately additional 50 watts of electricity is re-
quired to cool them. Therefore, companies are looking for sites where
electricity consumption of server farms can be reduced. For example,
Iceland is an ideal site for building server farm hoisting because of its
S
climate which remains cold throughout the year. Moreover, another
advantage in Iceland is the availability of cheap carbon-neutral geo-
thermal electricity supply. Fiber optics cable being installed from Ice-
land to European countries so that companies can access their servers
IM
placed in the Iceland. Besides Iceland, some other countries such as
Canada, Finland, Sweden, and Switzerland are also ideal for building
server farms because of their cold climate. The heat released from the
server farms are used to heat the buildings in the cold countries thus
saves the usage of conventional heaters for warming in these coun-
tries.
M
Activity
Find the information how companies are looking for new avenues
related to the performance of server farms.
n o t e s
S
can access the data from the backed up server.
Server farms are scalable which means you can add or remove
hardware from the server farm. This does not affect the perfor-
IMmance of the server farm. Sometimes, the hardware needs to be
repaired or upgraded, which can be done without degrading the
performance of the server farm.
The servers in the server farm are capable enough to balance the
load of the server farm in terms of functionality, power consump-
tion, and bandwidth usage. For this purpose, they use the load
M
n o t e s
S
size and number of servers. Moreover, you also require supporting
hardware for a server farm which includes cooling devices, power
backup devices and others. It is estimated that setting up a server
IM
farm of 70,000 servers would cost millions of dollars to a company.
Exhibit
The company was started initially as an online book store, but fur-
ther expanded into offering of different other products, such as
computer software, electronics, video games, clothes, furniture,
food, toys etc. Besides their online store, they also provide cloud
computing services. For this purpose, they require large number
servers in their server farms. A server in the server farms approx-
imately consumes 350 watts of power and generates about 1200
BTU/hr of heat as waste material. Now, let’s calculate the heat re-
leased from the 50 servers which is 60,000 BTU/hr. But, the heat
generated in the server farm is not used and is removed with the
help of air conditioning devices.
n o t e s
Activity
S
3.5 COMPILE FARM
IM
A compile farm refers to a server farm which is set up generally for the
compilation of computer programs remotely. In the compile farm, one
or more servers are deployed for the compilation to provide assistance
to developers for compilation of their developed programs by sitting
at a remote location.
n o t e s
S
can be executed in parallel. The compile farm offers this facility to
developers to test the software in such an environment in which
many operations can run in parallel on several servers. Moreover,
by using the distcc software tool in distributed compilation envi-
IM
ronment, the speed of process of compilation on several servers
can be increased.
14. The compile farm offers ______ facility to developers for testing
the software in an environment in which many operations can
run in parallel on several servers.
Activity
n o t e s
The render farms include servers of high computing ability which can
S
produce high quality of images. The servers in the render farm are
managed by using the queue manager program which distributes the
processes among different servers which either obtains a full image
IM
or the sub-section of an image. The queue manager program in the
render farm performs various functions such as re-prioritisation of
the queue and management of software licenses. Besides this, queue
manager also manages some algorithms that best optimises through-
put on the basis of different types of hardware present in the farm.
Besides conventional render farms, the cloud based render farm are
M
also in use because of the high speed of internet access they provide.
Another benefit of using the cloud computing services is that they bill
for the amount of time of processors usage. The cloud based render
farm eliminates the requirement of customers of building and main-
N
taining their own render farm. Sometimes, users also use the process
of collaborative rendering in which they join the group of animators
who can share their processing power in the group for rendering im-
ages.
15. The real time rendering is mostly used in case of video games.
(True/False)
16. Besides conventional render farms, the ______ based render
farm are also in use because of the high speed of internet
access they provide.
Activity
List the companies that use render farms for image synthesis.
n o t e s
S
assign weight to links accordingly. Link farming was used to enhance
the PageRank of member pages.
The link exchange systems are also built that enables independent
IM
websites to exchange links with the significant websites only. A link
farm can also be considered as the spamdexing because it sends links
to the index of a Web search engine.
Activity
N
3.8 SUMMARY
A server farm is used to provide integrated computing power of
several interconnected servers.
Server farms are also used for hosting of Web applications. They
are capable of deploying from small to large Web based applica-
tions.
Rendering refers to the process getting the actual 2D image finally
from the created scene.
The performance of the server farms depends upon the working of
the cooling systems of data centers and the total cost of electricity
consumed to keep the servers working on 24x7 basis.
The total electricity consumed in a server farm can be reported ei-
ther in context of Power Usage Effectiveness (PUE) or Data Center
Infrastructure Efficiency (DCIE).
n o t e s
Server farms are scalable which means you can add or remove
hardware from the server farm.
A compile farm refers to a server farm which is set up generally for
the compilation of computer programs remotely.
key words
S
used for rendering computer generated images for providing
visual effects in films and television.
Server: A computer having high storage and processing capa-
IM
bilities required to fulfill the requests of clients.
Server farm: A cluster of interconnected computers that gives
an impression of a single system to handle lots of applications,
services and clients.
M
n o t e s
S
Compile Farm 12. compile
13. Cross-platform continuous inte-
gration
IM
14. Distributed compilation
Render Farm 15. True
16. cloud
Link Farm 17. True
M
n o t e s
SUGGESTED READINGS
Arregoces, M., & Portolani, M. (2004). Data center fundamentals.
Indianapolis, IN: Cisco.
Load Balancing Servers, Firewalls, and Caches. (n.d.). Retrieved
February 15, 2017, from http://www.wiley.com/WileyCDA/WileyTi-
tle/productCd-0471415502.html
S
E-REFERENCES
Cisco Press. (2014, February 14). Retrieved February 15, 2017, from
IM
http://www.ciscopress.com/articles/article.asp?p=102268
Miller, C. (2015, September 29). Apple purchases 200 acres of land
in Oregon to further expand its server farms. Retrieved February
15, 2017, from https://9to5mac.com/2015/09/29/apple-purchases-
200-acres-of-land-in-oregon-to-further-expand-its-server-farms/
Data centers on rise in rural areas. (n.d.). Retrieved February 15,
M
https://www.colocationamerica.com/blog/data-center-locations-ar-
rival-of-server-farms.htm
Prigg, M. (2012, October 19). Inside the internet: Google allows
first ever look at the eight vast data centres that power the online
world. Retrieved February 15, 2017, from http://www.dailymail.
co.uk/sciencetech/article-2219188/Inside-Google-pictures-gives-
look-8-vast-data-centres.html
CONTENTS
S
4.1 Introduction
4.2 Best Practice Approaches and ITIL
IM
Self Assessment Questions
Activity
4.3 Success of ITIL
Self Assessment Questions
Activity
4.4 Service Level Management
M
4.4.1 Purpose
4.4.2 Objectives
4.4.3 Scope
Self Assessment Questions
N
Activity
4.5 Other Service Design Processes
4.5.1 Financial Management
4.5.2 IT Services Continuity Management
4.5.3 Capacity Management
4.5.4 Availability Management
4.5.5 Configuration Management
4.5.6 Incident Management
4.5.7 Change Management
4.5.8 Release Management
Self Assessment Questions
Activity
4.6 Understanding the Service Level Agreement (SLA)
4.6.1 Building the SLA
4.6.2 Structuring the Agreement
Self Assessment Questions
Activity
CONTENTS
S
IM
M
N
Introductory Caselet
n o t e s
S
to be resolved on the first call. However, in cases where the issues
required more time for resolution, the call was dispatched to the
appropriate second line group. The helpdesk uses a helpdesk tool
IM
to log all tickets, and based on this, monthly reporting used to be
done. A Service Level Agreement (SLA) is measured by key per-
formance indicators like the number of calls answered, average
time taken to answer a call, initial resolution rate, etc.
During the time of the SLA report, it was seen that EDS had
shown a remarkable improvement in its performance. Out of 30
KPIs, one was reported as orange or red and the remaining 29
as green. Also, happy with the partnership with EDS, Vodafone
granted several other global services contracts to EDS.
n o t e s
learning objectives
4.1 INTRODUCTION
S
Service management is a customer-focused approach that creates
value for customers; thereby building cordial customer relationships.
ITIL is recognised worldwide as a best-practice approach to IT service
management with focus on the alignment of IT services with business
IM
needs. It focuses on processes, functions, and capabilities required for
supporting IT services in business. The main reason why ITIL is ad-
opted worldwide is that it is based on a practical approach to service
management.
the services in an agreement, and ensures that the targets are mea-
sured and met. The scope of SLM comprises performance and quali-
ty of the existing services and the description of the required service
levels.
SLA specifies the service and the quality processes that help in judg-
ing the delivery of this service. It should be a written agreement and
should provide the purpose and scope of the document so that any
reader can understand the intention of SLA clearly.
n o t e s
S
ents efficiently. However, it is important for an organisation involved
in delivering services to ensure that the service must meet the require-
ments of customers, remain cost effective and come under customer’s
budget. Figure 4.1 shows many sources of service management:
IM
Standards Employees
Industry practices Customers
Source Enables
Academic research Suppliers
(Generate) (Aggregate)
Training & education Advisors
M
Substitutes Competition
Drivers Regulators Scenarios
N
Compliance
(Filter) Filter
Customers Commitments
n o t e s
S
Six Sigma, ITIL, Lean, COBIT, Prince2, CMMI, PMBOK, ISO/
IEC 20000, ISO 9000 and ISO/IEC 27001 are some commonly
used standards.
IM
Training and education/academic research
Education and information present about publicly available
standards and research allow organisations in educating their
employees in a consistent way.
M
n o t e s
Activity
S
with any commercial proprietary approaches or solutions. There-
fore, the kind of guidance provided by the service management is
applicable across all types of organisations.
IM
Non-prescriptive: The ‘adopt and adapt’ approach has been fol-
lowed by ITIL since its inception. Implementing this approach
facilitates the adaptation to fulfill the particular needs for val-
ue creation in a particular organisation. The guidance compris-
es time-tested, robust and mature approaches that can be used
by any service industry. ITIL does not rely on the technological
environment and offers practical guidance that is applicable and
M
n o t e s
S
a. Vendor neutrality b. Non-prescriptive
c. Perspective d. All of these
IM
Activity
Find the information on how the ITIL framework can be used for
service management in an organisation.
M
vices provided are up to the agreed level or not. In other words, ser-
vice level agreement is used to define and document the services in an
agreement and ensure that objectives are measured and met. It also
ensures that necessary actions should be taken to improve the level of
the delivered service.
4.4.1 PURPOSE
n o t e s
4.4.2 OBJECTIVES
S
The goals of service level management are not limited to defining, doc-
umenting, agreeing, monitoring, measuring, reporting and reviewing
about how successfully the IT service is provided, and taking appro-
IM
priate actions for improvement when required. They also comprise
using business relationship management for dealing with business cli-
ents and building profitable business relationships with them.
targets that are feasible and mutually agreed upon by both parties.
These targets must be particular and measurable so that there would
be no debate on their achievement. Phrases like “as soon as possible”
or “reasonable endeavors” must not be used in the SLA because these
phrases are unclear and may create confusion. Using these expres-
sions in an SLA may save IT service provider from failing, but this
may create doubt at the customer’s end and spoil the relationship be-
tween the customer and IT service provider that SLM aims to create.
These phrases are often used by the IT service provider to save itself
from being sued by the customer. However, in case of internal service
provider, these excuses do not work. Use of objective success criteria
is necessary if SLM wants to attain one of its main aims, which is to
make sure that both the client and IT service provider have transpar-
ent and clear expectations with respect to the level of service.
n o t e s
Despite this nature of customers, the service level manager must still
try to monitor the satisfaction of customers as precisely as possible by
using whatever approaches are suitable. In addition to methods like
surveys and individual interviews, some other methods can also be
used. The final goal that ITIL has set for service level management
emphasises on improving the level of service even when the targets
are fulfilled. Improvements in the service level must be cost effective.
SLM always look for opportunities for implementing such cost-effec-
tive improvements.
S
4.4.3 SCOPE
n o t e s
S
Activity
Capacity Management
Availability Management
Configuration Management
Incident Management
Change Management
Release Management
n o t e s
S
demand of services
Cost and quality are main factors in the provisioning of services, and
the only method of allocating and understanding the cost of service
IM
provision is by using the sound financial methods.
To secure the funding needed for delivering the services. This will
need an important input from the business and will naturally rely
on the overall methodology to financial management and cross
charging in the organisation.
To work with the process of configuration management and ser-
vice asset in order to make sure that the service and customer as-
sets are being handled properly and all related costs are getting
noted.
To perform basic financial accounting with respect to the relations
between expenditures and income, and ensuring they are mutual-
ly balanced as per the overall organisational needs.
To report on and manage expenditure for service provisioning, in
place of the stakeholders.
To manage and execute the policies and practices of an organisa-
tion associating with financial controls.
To ensure that financial controls and accounting practices are ap-
plied while creating, delivering and supporting services.
n o t e s
S
the organisation. The organisation itself should have a business conti-
nuity plan for ensuring that any possible situations that could impact
the functional capability of the organisation must be identified and
IM
prevented. In case, where the avoidance of such an event is possible,
the business continuity management process must have a plan, which
is suitable and reasonable, for minimising its effect and recovery from
it. Therefore, ITSCM can be considered as one of the elements that
make up a business continuity plan, in addition to a human resources
continuity plan, a financial management continuity plan, a building
management continuity plan and so on. ITSCM must create several
M
case the requirements get changed, the plan must also be changed.
The main aim of ITSCM is to make sure that solutions must be creat-
ed and provided for ensuring that the needed level of service (or bet-
ter) can continue to be delivered. Whenever these solutions require
the use of services provided by external third-party suppliers, ITSCM
functions with supplier management to make sure the required con-
tracts are discussed and agreed.
n o t e s
The transition phase of the lifecycle makes sure that the implemented
service is performing according to its specification. On the other hand,
the operational phase of the lifecycle makes sure that routine adjust-
ments are needed in order to implement changes in requirements. In
the final phase, as part of continual service improvement, the capacity
related challenges are addressed, and adjustments are done to make
ensure the most cost effective and consistent delivery of the service.
S
capable of delivering to this level. The actual capacity needs will have
been decided upon as part of service level management. The capacity
management should not only fulfill these but also make sure that the
IM
future requirements of the organisation, which may alter over time,
are also fulfilled. An important goal is to provide any enhanced capac-
ity of service in time in order to prevent business from any negative
impact.
future needs and the tasks that can be performed to meet these re-
quirements. This plan must be reviewed and updated after regular
intervals to make sure that modifications in business needs are con-
sidered. Similarly, any requests required to modify the current config-
N
4.5.4 AVAILABILITY MANAGEMENT
n o t e s
S
tential risk to availability has been taken into account. Any updates
in the availability plan are needed as a result of modifications will
also be considered and implemented.
IM
To implement monitoring of availability to make sure that targets
are being met.
To optimise all areas of IT service provision for delivering the re-
quired availability consistently in order to enable the business for
using the services provided for achieving its objectives.
M
tain that control, you are required to know about the assets and their
connectivity with each other. Handling of assets involved in building
up your services can be a complex task in case of distributed environ-
ments. The components needed for your services may be present in
diverse locations, and may be handled by different types of teams.
The configuration management also ensures that the assets that are
under the control of the IT department are appropriately managed
which means the assets are required to be determined and, once de-
termined, are controlled during their entire lifecycles. Handling the
assets that are involved in creating your services is a significant part
of the governance and control that you must exercise for supporting
your organisation.
Determination about the assets is not the only part of the require-
ment. You also need to make sure that you have precise information
about them. Keeping such information is a challenge for any depart-
ment. Moreover, the information captured should comprise the re-
lationships among the assets and to maximise the utilisation of the
data. Understanding the associations between the items will aid in the
n o t e s
S
can guide the user to do so without sending the highly skilled techni-
cian for this simple task. From the user’s and business point of view,
the main focus is to get back to the work as early as possible. The
incident management is accountable for observing all such incidents
IM
from the time they are first pointed out until they get closed. Some or-
ganisations keep dedicated management staff for resolving such inci-
dents, but the most common methodology is to make the service desk
answerable for the process.
n o t e s
4.5.8 RELEASE MANAGEMENT
S
Some more objectives of release management are as follows:
Defining and agreeing on deployment strategies with the stake-
IM
holders of the project release. The agreement of a schedule and
management of the activity with the customers and stakeholders
who will take the delivery of the release is important in setting the
expectations for the desired result.
Creating and testing release packages. Release packages may
comprise a number of associated configuration items, and handle
M
n o t e s
10. _______ is an extremely significant area that enables
organisations in managing their funds and other resources.
11. The IT service providers need to ensure that the service must
be protected from unfavorable events or actions that may
prevent it from being delivered at all. (True/False)
12. _____ phase of the lifecycle makes sure that the implemented
service is performing according to its specification.
13. The aim of configuration management is to make sure that you
will be able to control the _______ that create your services.
S
Activity
All parties must sign the SLA involved in the agreement, including
the customer and service provider.
The SLA must be written in simple language, with some technical ex-
pressions, if possible. If the technical expressions are not avoidable, a
glossary must be provided. It is very essential that the business users
must understand the meaning of technical commitments provided in
SLA.
It is also essential to find the difference between the service and the sup-
port offered for that service and to mention the period for which each of
n o t e s
The SLA must specify the method used for calculating priority levels
for incidents and state the target times for incidents to be fixed and
requests to be responded. Some more SLA contents may include the
agreed downtime for maintenance and critical business periods when
alterations are not done to the service. The rates that are charged by
the service provider for the service must be stated clearly. It should
be clearly mentioned that whether the charge is per head or a charge
for particular elements such as megabytes of storage and so on. Is
there a provision of rebate in case the service fails to reach the agreed
standard? Finally, the practices by which the service delivery will be
judged must be stated in the SLA.
S
4.6.1 BUILDING THE SLA
n o t e s
S
the services delivered to an individual customer or a group of cus-
tomers. For instance, the human resources department, finance
department, etc. can have a customer-based SLA. This agreement
IM
is straightforward from the customer’s perspective, because all the
services delivered to the customers are specified in a single agree-
ment. It is also fairly simple to determine the appropriate signa-
tory. From an IT provider’s perspective, however, customer-based
agreements mean that the information about the same service may
appear in multiple SLAs, which gets difficult to monitor.
M
n o t e s
S
Corporate level SLA
IM
Figure 4.2: Multilevel SLA Structure
Source: http://www.hci-itil.com/ITIL_v3/images/service_design_ch4_fig_4_7.jpg
M
14. All parties must sign the SLA involved in the agreement,
N
Activity
n o t e s
S
IM
M
N
n o t e s
S
value entered from single data point that is clicked.
Space efficient folders: This feature helps you to arrange a group
of reports and charts in a “folder” on the dashboard according
IM
to their requirements so that more information can be filled in a
dashboard.
Real-time refresh: This feature helps you to set up automatic re-
freshing time interval for updating data in the dashboard.
Slideshow: This feature enables you to utilise a group of dash-
M
Activity
n o t e s
4.8 SUMMARY
It is important for an organisation involved in delivering services
to ensure that the services must meet the requirements of custom-
ers, remain cost effective and come under customer’s budget.
Organisations can create their proprietary knowledge with the
help of standards and publicly available knowledge.
The principle followed in the ITIL framework ensures that all ef-
forts must have a common objective.
ITIL provides the collected information and guidance from the
finest sources of service management approaches used across the
world.
The purpose of service level management is to discuss, negotiate
S
and agree with the client about the delivering of IT services.
The main aim of financial management is that an organisation
must have an appropriate level of funding for designing, develop-
IMing and delivering the services that meet needs of the organisa-
tions.
The service level agreement states the service and the quality pro-
cedures using which the delivery of that service can be judged.
A dashboard collects data from data warehouses and other data
sources and represents the output through various visual aids like
M
key words
N
n o t e s
S
Topic Q. No. Answers
Best Practice Approaches 1. ITIL
and ITIL
IM
2. True
3. a. Proprietary knowledge
Success of ITIL 4. False
5. True
M
6. c. Perspective
Service Level Manage- 7. ITIL
ment
8. False
N
n o t e s
S
Refer to Section 4.5 Other Service Design Processes.
5. The purpose of release management is to make sure the effective
introduction of alterations made into the live environment to
IM
minimise the unexpected influence to the business. Refer to
Section 4.5 Other Service Design Processes.
6. The Service Level Agreement (SLA) states the service and the
quality procedures using which the delivery of that service can
be judged. Refer to Section 4.6 Understanding the Service Level
Agreement (SLA).
M
SUGGESTED READINGS
Looy, B. (2015). Services Management: An Integrated Approach
Macfarlane, I., & Rudd, C. (2003). IT service management. Read-
ing, England: itSMF
Cigolini, R. (2009). Recent advances in maintenance and infra-
structure management. London: Springer
Desai, J. (2010). Service Level Agreements. Ely: IT Governance Pub
n o t e s
E-REFERENCES
ITSM - IT Service Management Information General Information.
(n.d.). Retrieved April 06, 2017, from http://www.itsm.info/ITSM.
htm
ITIL Service Design: From strategy to transition. (2016, December
09). Retrieved April 06, 2017, from https://advisera.com/20000acad-
emy/blog/2013/06/25/service-design-itil/
Best Practices for Service-Level Management. (n.d.). Retrieved
April 06, 2017, from http://www.techrepublic.com/resource-library/
whitepapers/best-practices-for-service-level-management/
S
IM
M
N
Asset Management
CONTENTS
S
5.1 Introduction
5.2 Asset Classes
IM
5.2.1 Organisational Asset
5.2.2 IT Asset
5.2.3 Physical Asset
5.2.4 Information Asset
Self Assessment Questions
Activity
M
CONTENTS
S
IM
M
N
Introductory Caselet
n o t e s
S
ing them unlike what was earlier being done.
With the new style of operations, there was a new form of industry
formed that was the leasing companies which would buy the air-
IM
crafts from the manufacturers and would lease the aircrafts to the
airlines. But in case the airlines were unable to make payments
of the lease of the aircraft, then the British aerospace would make
the payments on behalf of the airline, i.e., the company started to
guarantee the lease payments for a period of 18 years which was
the normal life expectancy of an aircraft.
M
But this system of agreement did not worked for a long period as
the gulf war of 1992 caused a major unrest in the economic envi-
ronment and had even a greater impact on the leasing industry.
Due to the gulf war, many airlines failed and many other carriers
N
n o t e s
learning objectives
5.1 Introduction
S
Asset management in its literal sense would mean the art and the sys-
tem of managing the assets that are of some value to any organisation.
The process of operating, maintaining, deploying, upgrading, and dis-
posing of asset cost in case of sale of any asset, and conducting all
IM
these functions effectively and efficiently is called the process of asset
management. The assets not only include the tangible assets, such as
land, building, machinery, etc. but also intangible assets, such as pat-
ents, goodwill, technical know-how, etc.
business but the most common use of this term is in the investment
business where the companies invest the sources of other people on
their behalf like investment managers and pension fund assets.
In this chapter you will study about asset classes. In addition use of as-
sets in business, asset capture methods are discussed. Further ahead
concepts of stock registers are discussed in the chapter. Finally asset
continuity planning and overview of risk are explained in the chapter.
n o t e s
But whatever may the asset class be, one fact that has been developed
over a period of time is that no two asset classes will react differently
in different market situations and would fetch different amount of re-
turns.
S
of the bonds effect the rate of return that the investor will receive. The
only point where there can be instability of the return is current rates
of interest and the inflation rates of the economy.
IM
Money market including the investment opportunities such as bank-
er’s acceptance and commercial papers are highly stable form of in-
vestment when compared to stocks and fixed deposits but the down-
side of this form of investment is that it has a lower growth potential
when compared to the other two forms of investment.
M
Guaranteed assets are the assets that have a fixed rate of interest and
have the claim paying ability also issued by the insurer. This not only
preserves your capital but also provides you with a specified amount
of return on the investment.
N
Real estate is the shares of funds that are invested in commercial real
estate. This also includes the investment property or the home bought
by any one. The real estate investment does not have the effect of
inflation as the value of the property increases as there is increase
in inflation. And the value of the property tends to rise and fall at a
slower rate when compared to stocks and fixed income investment
opportunity but they are subject to environmental liabilities, changing
property values, etc.
n o t e s
5.2.1 ORGANISATIONAL ASSET
And all of these services are backed up by the various assets of the
organisation. For example, the service of production is back up by the
S
asset of raw material and machinery used. But some other things are
also required to perform services such as people to operate machine,
information system to define the production process and carry out the
IM
actual production of the goods in the enterprise, technology to help in
the functioning of the organisation and to support the services of the
organisation.
5.2.2 IT ASSET
5.2.3 PHYSICAL ASSET
n o t e s
der the head of physical asset. The physical asset would include all the
cash, equipment, properties owned by the firm. Anything that can be
turned into cash at the time of inability to pay off the debts in the busi-
ness is also considered to be physical assets. For example, computers,
inventories, machinery, etc. are included in the category of physical
assets.
5.2.4 INFORMATION ASSET
S
change the information asset into cash and may not be able to pay
off the debts but like the tangible assets of the organisation, the infor-
mation asset of the organisation also undergoes depreciations but the
depreciation is at a faster rate because the life cycle of the information
IM
is very short.
But the life cycle of the information mainly depends on the type of
information in consideration. For example, a secret recipe of a food
industry may have a longer life cycle than the secrets of good manage-
ment system of the organisation.
M
n o t e s
S
Activity
IM
Using the Internet, prepare a report on how an organisation can
manage its physical asset in practice.
There are a lot of efforts made each day by each department to just
meet the basic organisational goals, to help the enterprise get through
the day to the next one and to help the organisation survive cut-throat
competition of the world. And in order to be able to do that, the organ-
isation is always in need of assets. Yet some people sometime fail to
N
The assets approach seems to seriously undermine the fact that an en-
terprise is a going concern and has a profit earning motive and hence
the assets approach of the valuation of business is applicable only in
the cases where the company is a marginally profitable enterprise.
n o t e s
In other cases, the value of the business can be determined with the
other two approaches, market approach and income approach. These
two approaches of the company mainly depend upon the income
earning capacity of the business. Hence, the income earning capacity
is multiplied by the market based multiple in case of the market ap-
proach and in case of the income approach, the capacity is multiplied
by the forecasted discount rate.
The value of the business in the practical scenario is based upon the
value of the tangible assets owned by the company. The value of the
assets directly influences the value of the business and hence the im-
portance of owning the tangible assets can never be under mined. So,
directly or indirectly, the ownership of the assets helps in determining
the income earning capacity of the business firm.
S
self assessment Questions
Activity
Using the Internet, prepare a report with a real life example to show
how a tangible asset can help in the procurement of the finance at
N
n o t e s
Hence, there arises a need for a better asset management and track-
ing methods. As this will help in company in not only estimating the
true worth of the assets of the organisation but will also help in sav-
ing the valuable time of the company. There are many management
software available in the market which are tailor made for the asset
management branch of the management function. This software not
only helps in the tracking of the assets but also helps in setting up of
the timely maintenance and servicing of the assets which help in the
extension of the life of the assets.
S
attached to it as well, such as:
It helps in the collection of data at a faster rate and with greater
detail.
IM
It helps in eliminating the human error factor.
It tries to enforce a sense of responsibility and accountability in
the employees.
Activity
n o t e s
The stock registers also help in the tracking of the stock already issued
for every share held by a shareholder, there is unique identity number
issued to the shareholder with all the information of the share holder
as to the name, address, value of the shares held, value at which the
shares were bought, face value of the shares, etc. This stock register
also comes handy at the time of theft of a share and helps in the issue
S
of a new share certificate. Also it helps in the sale of the shares and
changes the data of the shares in the stock register so that there is no
confusion at the time of issue of the premium. Hence, the company
must always keep their stock registers up-to-date otherwise it could
IM
be of a great hindrance in the smooth working of the organisation.
10. A ________ is the way to keep tracks of the stocks issued by the
company.
M
11. The stock register also comes handy at the time of theft of a
share and helps in the issue of a new _____________.
12. The stock registers also help in the tracking of the stock already
issued for every share held by a shareholder. (True/False)
N
Activity
n o t e s
3. All the information about the placement of the data backups and
the organisational backups should be duly provided.
Hence during the formulation of the plan, the most important opera-
tions of the organisations that are necessary to be carried on should be
duly determined. It is also important to determine the most necessary
people of the organisation as well as the most important tools and data
that are needed to run the operations of the organisation.
5.6.1 GAP ANALYSIS
Gap analysis, basically, means the comparison of the actual work per-
formed against the standards set. This helps in analysing if the re-
sources of the organisation are put to the best use or whether the in-
vestment opportunities provide the best kind of return or not.
S
Gap analysis, as the name suggests, analysis the gap between the op-
timum utilisation standards set by the system and the actual output
level received after performing all the necessary functions of the or-
IM
ganisation. It helps in determining the gap between the capabilities of
the organisation and the organisational goals. It also determines the
current level of the output received by determining and documenting
the processes of the organisation. The process of gap analysis starts
from the function of benchmarking and assessment. It helps in un-
derstanding the expected level of output of the company. It also helps
in the pointing out the areas where there is need for improvement in
M
n o t e s
The steps to be taken in order to analyse the gap and fill the gap be-
tween the desired outcome and the actual outcome are as follows:
Identify the existing process undertaken by the company.
Identifythe existing level of outcome at the existing processing
functions undertaken by the company.
Set the level of outcome that the company wants to achieve.
Analyse the gap between the existing level of outcome and the de-
sired level of outcome. Examine the difference that exists between
the desired and existing outcomes.
Then develop a way through which the gap between the desired
level of outcome and the actual level of outcome can be fulfilled.
After defining the means to fill the gap between the two, then there
is a need to prioritise the requirements.
S
Gap analysis also helps in the process of standardisation of the pro-
cesses carried out in various organisations in the industry. Gap analy-
sis helps in step-by-step comparison of the various processes and the
IM
analysis of the same and hence filling the gap between the desired
level and the actual level.
The labour cost of production will also include the cost of production
for the partially finished goods. For example, if the cost of production
for a unit is ` 100 then it would be same for the finished products and
the partially completed units or the units in-process.
n o t e s
The cost of replacement is more than the revenue earned from the
replaced machinery.
The damage of the assets is beyond the repair capacity and the
repair of the asset will not result in improved performance hence
it is better to replace the machinery.
When the enterprise plans to expand its capabilities and the re-
placement of machinery would result in expanding the capabilities
with reduced costs and better performance.
The existing machinery has turned obsolete and the repair of the
machinery is either too difficult as the spare parts are not available
or the repair is too expensive.
The existing machinery or technology is a great threat to the
health, environment and to the working of the enterprise, hence it
is better to replace the machinery rather than repairing it.
S
MTTR
IM
MTTR or better known as Mean Time To Repair is the time required to
repair the broken hardware. In the operational sense, the term ‘repair’
is used interchangeably with the replacement of the hardware. Hence,
it is important for the organisation to replace the broken hardware at
the earliest possible, because delay in replacement of the hardware
would result in high installation cost in the long run because of the
cost incurred due to the downtime caused by the replacement of the
M
hardware. Hence to avoid the high cost, the companies usually keep a
stock of the spare products.
MTBF
N
MTBF means Mean Time Between Failures. But for better under-
standing of MTBF, we need to first understand that what defaults are
considered as failures under this model. All those defaults in the sys-
tem that are beyond the limits of repair are not included as failure
under this model. Hence, the only failures that are considered are the
models that are repairable. Also the routine shut of system for mainte-
nance purposes are also not included. Figure 5.1 shows MTBF:
Up
between
Down failures
off one failure one failure one failure
Time Between Failures =
{down - up time}
n o t e s
5.6.4 Impact of Downtimes
The impact of downtime is not just measured in the forms of the money
lost but also includes the loss of goodwill among the customer, the
level of employee satisfaction, loss of competitive edge in this world
of cut-throat competition and the confidence level of the company or
the organisation as a whole. There are many examples that give us
the idea that the network outages not only cost the company a huge
amount of revenue but also a lot of confidence and other losses that
S
are beyond the capacity of measuring. For example, the 5 min network
outage of Google not only cost it about $500,000 but also caused a drop
of 40% in the overall traffic on the internet.
IM
One of the biggest and unexplained network outages that occurred in
amazon.com that was just below an hour caused the company a loss
of about $5 million. Not only that, it also caused the credibility of Am-
azon to come under the light of suspicion and a lot of questions were
being asked about the working of the Amazon.
M
While there are a lot of things that a downtime can impact in an indus-
try, some are of greater importance than other. Below is a list of some
of such things that are worst effected by occurrence of downtime:
Cash flow of the company suffers a great impact.
N
The industries that can be worst affected by the network outages are
those who rely on the use of computer/network systems or depend
upon the 24-hour service of the computers, such as:
Medical informatics
Infrastructure and nuclear power industry
Banks and financial institutions
Aeronautics and airlines
News reporting
Online transaction processing
n o t e s
The sensitivity of the impact of the downtime can be broadly into two
categories:
The length of the network outage and the time taken to correct the
fault in the system.
The time at which the outage happens, for example, if the outage
occurs at the peak time of business for the industry.
S
happen then combat the situation at the earliest possible to reduce the
impact of downtime.
Activity
n o t e s
organisation may have to face and there are various ways to identify
the risk and to devise the strategy to tackle the risk in the best possi-
ble manner. Given below is the detailed discussion on how to identify
the risk, what are the various categories of the risk and the various
ways through which a proper strategy can be developed to mitigate
the losses caused in event of occurrence of risk.
S
Many engineering systems use sophisticated risk assessment methods
and that is done within the norms of safety engineering and reliability
engineering in case the risk poses a threat to the life of the people.
Some of the examples of industries using this kind of risk assessment
IM
methodology are nuclear, aerospace, medical, hospital, food industry.
But the methods of the risk assessment can be tailor made according
to the needs and the legal obligations of the industry. The environ-
ment of the industry also plays a role in the risk assessment strategy
of the company.
M
5.7.2 Risk Identification
After the risk assessment strategy has been devised, the next step is to
put the strategy into play and identify the risk that is being posed to
the industry. The process of risk identification, hence, goes as follows:
N
There are various methods to identify the risk and the selection of the
method is done on the basis of the cultural environment, the indus-
trial practices. Some of the most common risk identification methods
are as follows:
Objectives-based risk identification: The risk can be identified
on the basis of the events that cause hindrance in the achievement
of the organisational goals and objectives.
Scenario-based risk identification: Under this system a risk is in-
dentified as the event that triggers the undesired scenario to come
n o t e s
5.7.3 Risk Evaluation
S
be caused and the probability of the occurrence of the event. An ac-
ceptable risk is a risk in which the cost of implementation of a defen-
sive strategy would be more than the loss caused by the occurrence of
IM
the risky event.
Once the risk has been identified and evaluated and also the loss that
the occurrence of the event has been judged, then the next step is to
make a defensive plan. But in order to make a correct and a full-proof
plan, the risk evaluation should be done to the best of the abilities of
the evaluator so that there is no scope of any error and the situations
M
is being faced at the time of risk assessment. Hence, the best educated
method of risk assessment would rely on the statistics and the primary
sources of information. There are several theories and numerous for-
mulas that have been developed over a period of time to help in the
assessment of the risk but so far, the best formula of risk assessment
is that
Risk intensity = Ro × Ie
5.7.4 Risk Categorisation
History has provided us with the evidence that not all types of risks
can be dealt with the same strategy just like not all kind of people can
be dealt with the same behaviour. Hence in order to combat the risk,
it is important to understand what type of risk it is and what kind of
solution is best suited for it.
n o t e s
Hence for a better understanding of the risk, the risks can be classi-
fied into following three broad categories:
Internal risks: Internal risks are the risks that are faced inside the
organisation and to tackle such risks, the established set of rules
are enough to tackle this problem. For example, in case of the risk
of employee misconduct, the set rules of code of conduct may be
sufficient for the employer to tackle the problem of employee mis-
conduct and to help in maintaining protocol in the organisation.
Strategic risks: Strategic risks are the risks that are of strategic
importance to the organisation and hence needs a specialised ap-
proach to face these risks and mitigate the loss that could be de-
rived due to the risks. There are three risk management structures
in place in the organisation that challenge the decision made of
about the risk inside the organisation. They are as follows:
S
1. An external risk advisory board.
2. Internal, centralised risk management group.
IM
3. Internal network of risk managers distributed all over the or-
ganisation.
External risks: These are the risks that are completely out of the
control of an organisation but there are still some ways through
which these risks can be managed. For example, by generating
ideas about the external situations that could happen and that
M
would cause a loss to the enterprise and the magnitude of the risk
imposed by the occurrence of the event, developing a plan in ad-
vance to combat the risk in case it actually occurs and the tools
to be used to help in the combat. There are three analytical tools
N
5.7.5 Risk Registers
n o t e s
knowledge. The success of the risk registers does not depend upon the
type of software used but upon the implementation of the stock reg-
ister methods and the organisation’s culture. The stock register must
contain the following:
The risk should be given a name so that the discussion about the
risk in easier.
The special category should be given to all the similar types of risk.
A company may add more fields according to its needs and the organ-
isational structure.
S
5.7.6 Risk Matrix
ing to the needs of the user and the project on which it is to be applied.
Hence, the risk matrix is custom made matrices.
The classification of the risk can either be done on the basis of se-
verity, such as catastrophic, critical, marginal and negligible or could
N
Then the company, on the basis of its risk taking capabilities would
classify the risk associated with different classes into the above given
different classes and hence devise a plan accordingly to minimise the
cost of production and also reduce the loss caused due to any risk.
n o t e s
Activity
S
Prepare a report analysing the risk associated with online market-
ing and e-commerce web sites.
IM
5.8 Summary
An asset class is a group of securities that are bound by similar le-
gal regulations and bear resemblance in financial characteristics.
There are various kinds of assets available in an organisation and
organisational assets are one of such kind of assets. The organisa-
tional asset includes all the employees of the organisation, infor-
M
n o t e s
Internal risks are the risks that are faced inside the organisation
and to tackle such risks, the established set of rules are enough to
tackle this problem.
Strategic risks are the risks that are of strategic importance to the
organisation and hence needs a specialised approach to face these
risks and mitigate the loss that could be derived due to the risks.
These are the risks that are completely out of the control of an or-
ganisation but there are still some ways through which these risks
can be managed.
Risk assessment is a process of quantitative evaluation and assess-
ment of the amount of risk involved in a situation. Quantitative
assessment of risk mainly includes the assessment of the magni-
tude of the loss that could be caused and the probability of the
occurrence of the event.
S
A risk register is a document that maintains a record of identified
risk factors and plays a significant role in risk management. It is
also known as risk log because it is used to keep track of risks in-
IM
volved in a project by maintain a log or record file.
Risk matrix refers to the matrix that categorises the harm caused
or the risk into various levels on the basis of the probability of
harm and the severity of the harm caused.
M
key words
n o t e s
S
4. False
Use of Assets in Business 5. Market, Income
6. False
IM
7. market
Asset Capture Methods 8. True
9. Asset tracking management
Concepts of Stock Registers 10. Stock register
11. Share Certificate
12. True
M
n o t e s
S
Suggested Readings
Crouhy, Michel, Dan Galai, and Robert Mark. Risk management.
New York: McGraw Hill, 2000. Print.
IM
Holmes, Andrew. Risk management. Oxford, U.K.: Capstone Pub.,
2002. Print.
Hiles, Andrew, and Peter Barnes. The definitive handbook of busi-
ness continuity management. Chichester: Wiley, 1999. Print.
M
E-References
Technet.microsoft.com, 'Risk Management Process Overview'.
N.p., 2015. Web. 16 July 2015. From https://technet.microsoft.com/
en-us/library/cc535304.aspx
N
CLOUD COMPUTING
CONTENTS
S
6.1 Introduction
6.2 Cloud Basics
6.2.1
IM
Cloud Environment
6.2.2 Types of Cloud
6.2.3 Cloud Computing Services
6.2.4 Open Source Cloud Stack
Self Assessment Questions
Activity
M
Introductory Caselet
n o t e s
S
Tom Albright, the IT manager, faces the following challenges:
To get more users to use the three cloud services: Users
IMcomplain of remembering many passwords and learning new
applications. Tom Albright started looking for an enterprise
grade SSO product that enables users to easily authenticate
once and then access all SaaS services without any more pass-
words.
To easily manage user accounts from the three saas ser
M
Introductory Caselet
n o t e s
S
authenticated, they could access the three SaaS services. South
ern Shipyards implemented a strong, two-factor authentication,
where the users had to type in an OTP, delivered to their cell
phone or corporate e-mail server.
IM
M
N
n o t e s
learning objectives
6.1 INTRODUCTION
Cloud is a model where users have a convenient, on-demand access to
S
a shared pool of resources, such as servers, storage, and applications,
over the Internet. Cloud Computing is said to be the biggest inven
tion since the advent of Internet. Generally, cloud computing can be
classified either on the basis of location or the type of service being
IM
provided. Cloud computing comprises a virtualised pool of infrastruc
ture resources with applications and services that can be used directly
through a self-service portal. For the end user, cloud computing con
sists of Client, Cloud network, and Cloud Application programming
Interfaces (APIs).
In this chapter, you will study the basics of cloud and cloud computing
services. In addition, you will study service-oriented architecture for
cloud applications. Next, you will study about the cloud application
architecture Finally, you will study about the windows Azure platform.
n o t e s
S
over the Internet. Users don’t have a control of underlying hardware
infrastructure that is owned and managed by the provider. They ac
cess the services or allocated resources by using a Web browser.
IM
Exhibit
n o t e s
S
definition.html
The word cloud was used in the early days of the telecom to represent
the telephone network. Later, it was used to represent the Local Area
Networks (LANs) and Wide Area Networks (WANs). It was also used
M
Cloud Computing
PaaS
IaaS
SaaS
Mobile ASPs
computing
Web
Client-Server
PCs
Minicomputers
Mainframes
n o t e s
S
infrastructure. Cloud resellers also provide customised, enhanced,
and user-centric cloud services to both Small and Medium Enter
prises (SMEs) and large organizations.
Cloud
IM
adopters: Enhance cloud platforms that are provided by
cloud providers or resellers. This empowers the cloud adopters to
cater dynamic business requirements. Cloud adopters convert the
cloud-enhanced systems into the user-specific software services.
Cloud tool providers: Offer essential tools and services to run and
manage the cloud services. They also offer hardware, virtual ma
M
6.2.2 TYPES OF CLOUD
The clouds, accessed or used by general masses and hosted, are main
tained as well as managed by cloud service providers, such as Ama
zon, Google, and Microsoft. In this type of cloud, the service providers
charge the companies according to their usage.
Due to this, initially, small organizations can start using the cloud ser
vices and then can expand by acquiring more resources according to
their requirements. During expansion, there is no need for the orga
nization to invest in the infrastructure and can pay just according to
what is being used. In the public cloud, there is no need for the or
ganizations (customers) to control or manage the resources; instead,
they are being administered by a third party. Some examples of public
n o t e s
cloud providers are Savvis, Verizon, Amazon Web Services, and Rack
space. You should understand that in case of public cloud, the resourc
es are owned or hosted by the cloud service providers (a company)
and the services are sold to other companies. Figure 6.2 demonstrates
the use of public cloud:
Company X
Cloud Services
Public Cloud (IaaS/ PaaS/ Company Y
SaaS)
Company Z
S
Figure 6.2: Showing the Level of Accessibility in Case of Public
Clouds
IM
THE PRIVATE CLOUDS
over, the cloud services are hosted by a third party that specialises in
cloud infrastructure. Note that on-premise private clouds are costlier
as compared to the externally hosted private clouds. In case of private
cloud, security is kept in mind at every level of design. The general
objective of private cloud is not to sell the cloud services (IaaS/ PaaS/
SaaS) to the external organizations, but to get the advantages of cloud
architecture by not providing the privilege to manage your own data
center. Figure 6.3 demonstrates the accessibility of private clouds:
Private Cloud
Cloud Services
(IaaS/PaaS/
SaaS)
n o t e s
S
Community Cloud Community Cloud
for Level A for Level B
IM
Cloud Services Cloud Services
(IaaS/PaaS/SaaS) (IaaS/PaaS/SaaS)
M
Finally, let’s now move over and learn about hybrid clouds.
n o t e s
Public Cloud
Migrated Application
Private
Cloud
S
Organization X Organization Y
IM Cloud Services
(IaaS/PaaS/SaaS)
required storage, OS, database, and development tools that you want
to use. On the other hand, to set up an internal, non-cloud server and
storage system for a new development project or application, the roll-
out will take weeks or months. In order to set up a new environment,
you will have to go through various phases, namely, architecture, ap-
proval, negotiation, procurement, setup, installation, testing, and go-
live. Each of these phases can take several weeks to complete.
The cloud services have been in use for years before the term “cloud
computing” was coined. In fact, all services available in the cloud have
been available since the dawn of computing. But now, the cost of set-
ting up cloud infrastructure has become cheaper, the cloud delivery
mechanisms have become more convenient to use, and the related
bandwidth has become more widespread and affordable.
For larger businesses, several of their internal business units will move
towards the cloud, unless compelled by government regulations to
keep the data and applications within their internal premises. There
are 3 key types of cloud-based service mechanisms:
n o t e s
S
The customer can install OS, applications, libraries, and other soft-
ware within the virtual machine and has limited control on networking
and security equipment, such as host firewalls. Since the early 1980s,
IM
various offerings such as mainframes and thin computing (which are
similar to today’s IaaS and private clouds) have been built.
ever, not ready for the services and they were unfortunately far ahead
of their times to be commercially successful.
In July 2003, its Board of Directors announced the closure of the busi-
ness and approved a plan to liquidate the company. The company ter-
N
n o t e s
As a user, you need to be sure that your IaaS provider has the
above-mentioned attributes. Here is a list of questions to ask your
provider:
1. What does the provider have in place to protect non-IT
infrastructure, such as its datacenter, UPS, diesel generator,
racks, and air-conditioners, and IT infrastructure, such as
servers and storage?
S
2. How does it configure the security of the virtual machines?
3. How does the provider validate the integrity of the Virtual
IM Machine Images (VMIs)?
4. How does it protect customer data, applications, and
infrastructure from attacks by other tenants in the same cloud?
5. What tools does the provider use to detect security flaws?
6. What are the physical locations where data will be stored? This
is required for compliance with certain regulations that need
M
n o t e s
S
Deployment Deployment and scalabil- Scalability, failover, and
ity are left for installation load-balancing are the
and go-live phases. basic building blocks.
Runtime Monitor-
IM
Development solutions Built-in monitoring
ing are usually not associated available with the devel-
with runtime monitoring. opment platform.
Virtual Machines, Multiple options are Need to work with the
Servers, Storage, available and can be cus- infrastructure offered by
Databases tomized to meet any user PaaS providers.
requirement.
M
Integrated Devel- May have separate envi- Same environment for all
opment Environ- ronment and infrastruc- phases.
ment (IDE) ture for development,
test, debugging, and
production.
N
n o t e s
S
Despite the availability of various PaaS vendors, consumers need to be
cautious. Small, start-up vendors may not be in business a few years
down the line and large established PaaS vendors may be slow to keep
IM
up with new offerings and attempt to sell their traditional products.
There are a few well-established PaaS providers, such as Force.com,
Google, and Microsoft.
n o t e s
S
based access mechanism. The PaaS cloud must support federated
identity management system where a user once authenticated is
given credentials to access services within the application as well
as on other clouds. APIs with the PaaS should cache, use, and de-
IM
lete credentials as needed.
Messaging: The PaaS cloud must provide ability to APIs to man-
age messages, such as the ability to post messages to any queue,
consume messages, and examine message content without con-
suming them. It must support a highly-secured and on-demand
collaboration throughout the Software Development LifeCycle
M
Besides the above-mentioned features, you must make sure that the
PaaS environment meets your specific programming needs. Here is a
list of questions you need to ask a potential PaaS provider:
What development environments does the vendor provide?
n o t e s
S
bust, centralized mechanism for maintenance without incurring
downtime or performance degradations?
What are the provisions for backups and DR?
IM
How does the cloud vendor ensure that application flaws of one
customer do not impact the shared infrastructure or someone
else’s data?
Can the public PaaS provider offer the services within a hybrid
cloud model? This will assure enhanced security and flexibility.
M
Out of all the applications you have to develop, some will not be suit-
able for PaaS. For example, if you need to develop and test on a main-
frame or Unix system, that is not offered by PaaS provider, you will
need to set up and use an internal environment. For other applica-
N
There are two categories of PaaS providers. The first are large IT op-
erating system and software vendors, who offer PaaS because it is a
natural extension of what they have traditionally sold. The second are
small, independent vendors for whom PaaS is the sole or key offering.
Here are a few guidelines for choosing a suitable PaaS provider:
Compatibility with other clouds: PaaS providers will claim porta-
bility to all other clouds. This cannot be true as the cloud environ-
ments are unique and standards are still evolving. However, you
need to be aware of providers who claim they have everything for
everyone.
Target customers: PaaS providers have certain target customers
and architect their environment to appeal to particular group of
users. For example, Microsoft focuses on .NET and PHP develop-
ers. Oracle focusses on Java developers. Make sure that the PaaS
n o t e s
S
With the ephemeral nature of cloud businesses, make sure that the
provider has a reliable set of partners, satisfied customers, and a
IM
sound financial base and can continue to survive even in harsh times.
The convenience attained with PaaS (as per the above points) leads to
a great loss of control over the environment and security. The follow-
ing are the drawbacks of using PaaS:
M
banned.
Portability/interoperabilitywith applications on another cloud:
Unlike IaaS, where OS images can be moved between clouds, ap-
plications developed on a PaaS involve cloud-provider’s APIs and
customized language extensions. This makes porting of applica-
tions difficult.
Security: Some PaaS providers include built-in security services,
but the end-user has no information on the implemented security
mechanisms. The customers cannot install host-level security ap-
plications for antivirus, WAF (python-based framework for config-
uring, compiling, and installing applications), host-based firewalls
or disable services or ports.
Security for development code: Since the development code re-
sides on a third-party, shared infrastructure, the customers are
wary of security and privacy of the code, which is the prime In
tellectual Property (IP) for the Independent Software Vendors
(ISVs).
n o t e s
Select a PaaS provider with the right type of orientation and support
for various software languages that will help to build a flexible and
portable application:
Programming-language specific PaaS: These were common in
the early 2000s but are now less in number. They support one
language, be it Java, Ruby on Rails, Python or .NET or any an-
other language. The advantages they provide are the use of lan-
guage-specific tools, customized support, extensive libraries, and
specific code to run compute-intensive tasks in the clouds. It allows
scientists and analysts to access extensive compute requirements
they are comfortable with and need from, within a development
and test environment.
S
Language-agnostic providers: They were designed for developers
working with multiple programming languages, databases, and
frameworks. For example, they offer support for various languag-
es, such as Python, Java, .NET, and Ruby, and databases, such as
IM
MS SQL, MySQL, Postgres, and MongoDB. Potential drawbacks
are that you may not find the same degree of language-specific
customizations or libraries to distribute your code to several other
clouds.
Hybrid PaaS: It is a cloud service that gives you the freedom to
M
The PaaS market is fast maturing with several commercial PaaS pro-
viders. Your selection would depend on your need for a single lan-
guage, mix of stack component and several languages or a PaaS that
would allow you to access in-house data or applications.
n o t e s
The use of SaaS provides several benefits to its users. For example,
users can use an application over the Internet, without actually imple-
menting or managing the software. As similar to IaaS and PaaS, the
fee of using an application is priced on the usage-basis, which means
the customer buys the rights to use some specific or all the modules of
an application as per their requirement.
It should be noted that SaaS appears almost similar to ASP, but the
two are different from each other.
S
Ownership ASP applications are Multi-tenant, appli-
generally single-user cation hosted by the
IM
applications hosted on application developer,
the client-server archi- with regular updates
tecture by an HTML- directly from the devel-
front end of the third oper.
party for remote use.
n o t e s
S
How does the provider make sure that the users who sign up are
not fraudsters and will not start malicious activity?
How and to what extent is security integrated with the SDLC at
IMdifferent phases, such as architecture, coding, testing, and deploy-
ment?
What are the design and coding standards?
What Web security standards are being followed?
How is customers’ data protected from attacks by other tenants?
M
The customer selected an IaaS provider and deployed VMs and exter-
nal storage (See Figure 6.6). The HR application used 3 VMs, running
N
n o t e s
Figure 6.6 shows the use of VMs for hosting applications and databas-
es at a datacenter:
Identity Management-as-a-
Service Provider
Public Cloud
Remote Users
HR App HR App HR App Database
VM1 OS VM2 OS VM3 OS VM4 OS
VPN to Public
cloud
Corporate
Network
S
Provider’s Physical Infrastructure
Corporate Security-as-a-
Users
IM Service provider
n o t e s
After diligent deliberations, the company chose the third option, ini-
tially motivated by economic reasons. The company decided on the
deployment roadmap, which was divided into various phases.
Table 6.4 lists these phases along with their brief description:
S
provider has free trails, take advantage of
it. They have an option of using a full-ser-
vice DR provider with backup and recovery
IM assets as standby at the DR site.
2. Backup and restore for Test if the cloud provider is suitable for you
non-critical data by backing up non-critical data. Try file-lev-
el, partial, and full restores. Also, see if you
can make application-level backups, such as
for databases or messaging. Try bare-metal
restores of the OS.
M
Over time and with due diligence and planning, backup and DR has
become a valuable cloud use case for the pharmaceutical company.
The cloud has solved the problem of having one or more remote sites
with a data copy. The cloud vendor maintains at least two data copies
at different sites. It has proven to be a cost-effective way to have a
backup of all critical data, applications, and a few operating systems
supported by the provider. The cloud data is easily accessible for res-
toration from any site that the customer selects, to use it as an alter-
n o t e s
S
ry. These servers have identities that the end-users are familiar
with.
EVault
IM
services (http://www.evault.com/ from seagate): It en-
ables you to efficiently backup your physical or virtual systems
and data and extend IT infrastructure to the cloud.
Sungard’s availability services (http://www.sungardas.com/):
It offers multi-site facilities and infrastructure to mitigate di-
sasters. They have a Secure2Disk solution that is an online,
M
There are numerous benefits of a cloud DR, which are given as fol-
lows:
N
n o t e s
S
Estimate your needs: Calculate what you will really need. It is ex-
pensive to add resources incrementally in real-time to meet load
spikes.
IM
Vendor and community support: Ask the cloud provider for refer-
ences and take time to speak with them. Check if the provider has
a capable team, which is willing to help you with technical issues
on a 24/7 basis. Make sure that the database has support from an
active user community and user forums.
API support for databases: Make sure that your provider supports
M
and that you use APIs that will work on other clouds. This lets you
focus on your application without worrying about infrastructure
and compatibility.
Price: Cost for cloud databases run from free versions to variable
pay-per-use to fixed monthly fee option. Open-source solutions are
N
n o t e s
S
passing messages between the processors. Examples include wire-
less-sensor network, telephone networks, network file systems, dis-
tributed databases, etc. On the other hand, in Parallelism as a Service,
all system and user processors have access to a shared memory space
IM
to enable efficient inter-process communication. It improves perfor-
mance by eliminating or reducing communication. Examples include
cluster computing and volunteer computing. Parallelism as a Service
enables multiple tasks or actions to be performed simultaneously. A
cloud is a convenient platform for Parallelism as a Service, as it made
up of various virtual resources that can do multiple actions or run
M
n o t e s
Heat
Orchestrates
cloud
Provides
Horizon
S
UI
Provides network
connectivity for
Neutron
IM
VM
Provides images
Provides
volumes for
Provisions
Cinder Stores
Nova Glance images Swift
in
M
Ceilometer
Monitors
N
Keystone
Provides
Auth for
Backups volumes in
FEATURES OF OPENSTACK
n o t e s
nodes one by one in a sequence. This will keep your cloud system
running and will require only individual components to be shut.
Federated identity: OpenStack provides you a federated identi-
ty system, called Shibboleth, which can be used for logging into
multiple OpenStack nodes through a single user ID. OpenStack
included this feature on special request by the European Organi-
zation for Nuclear Research (CERN).
Trove: The original term used for this feature is “Project Red
Dwarf”. You can use this feature to manage database resources.
For example, you can manage MySQL system for manipulating
users and schemas defined in MySQL. The manipulation is done
through Trove APIs. OpenStack is expected to provide support for
newer database technologies also, such as MongoDB and Cassan-
dra.
S
Object storage replication: A new mechanism for replication of
the object storage has been included with OpenStack’s object stor-
age system, Swift. This mechanism is known as ssync and is used
IM
for intercepting requests that are forwarded to Swift or are coming
out of Swift. This mechanism syncs the requests more intelligently
than the earlier mechanism, rsync.
COMPONENTS OF OPENSTACK
COMPUTE (NOVA)
n o t e s
The OpenStack Compute is code named as nova and works as the fab
ric controller in the cloud computing environment. Fabric controller
is the primary part in the construction of an IaaS system. The nova is
coded in Python language, but various external libraries are also used.
S
hardware or software needed. You can also integrate nova with your
legacy systems and with third-party technologies.
IM
The objective of designing nova is to automate and manage pools of
compute resources. Nova can be used efficiently with virtualization
technologies, bare-metal configurations, and high-performance com
puting (HPC) configurations. The example of hypervisor technologies
that can be used with nova include KVM and XenServer. Apart from
various hypervisors, OpenStack Compute also runs on ARM.
M
Both block storage and object storage support are provided from
OpenStack. OpenStack also provides a number of options for the de
ployment of each storage system. The deployment options depend on
the use case.
n o t e s
The Block Storage facility permits you to expose block devices. You
can then connect these devices to the compute instances for expand
ing the storage, enhancing the performance, and integrating with the
storage platforms traditionally used in the enterprise. These platforms
include NetApp, Nexenta, and SolidFire.
S
Stack. The devices being created on, attached to, or detached from the
servers are managed by Cinder. The users are allowed to manage the
storage requirements on their own by integrating Cinder volumes into
OpenStack Compute and Dashboard.
IM
You can use Cinder with storage platforms, such as Ceph, CloudByte,
Coraid, GlusterFS, various IBM Storage options, Linux LIO, NetApp,
etc., apart from using it with the local storage of the Linux server. You
will find Cinder appropriate for use in the scenarios that are perfor
mance sensitive, for example, database storage, expandable file sys
tems, or servers being provided with raw access at the block level.
M
NETWORKING (NEUTRON)
n o t e s
DASHBOARD (HORIZON)
S
ment. The code name given to the OpenStack dashboard is horizon.
The administrators or users are provided with a graphical interface
by the OpenStack dashboard. This interface is used for accessing, pro
visioning, and automating your cloud-based resources. Products and
IM
services from the third parties can also be incorporated with dash
board. These third-party services or products include billing, monitor
ing, or additional management tools.
Customizing the horizon with one’s own brands is possible for the ser
vice providers and other commercial vendors. Horizon is a technique
through which interaction with OpenStack resources is done. Open
M
Stack native APIs can be used by developers for building tools or au
tomating access to manage their resources.
In addition to this, a single registry that includes a list of all the ser
vices deployed in the cloud is provided by the catalog. You can pro
grammatically determine the resources accessible for you.
The code name given to the image services provided by the Open
Stack cloud environment is glance. Disk and server images can be
discovered, registered, or delivered by using glance. You can use the
stored images as templates. Unlimited number of backups can also
n o t e s
be catalogued and stored by using those images. You can store the
images of servers and disks in a variety of back-ends with the help of a
glance. These back-ends can be the object storage service OpenStack.
A standard REST interface is provided by APIs of the image service
so that the information about disk images can be queried. The clients
can also stream images to new servers by using glance.
S
d. All of the above
2. _______ provide clouds through various cloud computing
service models, such as APIs as PaaS model and direct access
as IaaS model.
IM
3. Which of the following is not a type of cloud?
a. The public cloud
b. The private cloud
c. The hybrid cloud
M
Activity
n o t e s
SERVICE-ORIENTED ARCHITECTURE
6.3
(SOA) FOR CLOUD APPLICATIONS
SOA refers to developing, hosting, and integrating applications and
resources to make them easily available in a distributed and heteroge
neous environment. It improves the service model using secure com
munication channels, quality of services, and maintenance. There is a
strong relationship between a grid and SOA. This relationship leads to
the misunderstanding that one is built on top of the other or both can
be used interchangeably. This misconception is more common while
implementing SOA and grid over a wide scope. The scope of e-Busi
ness grids and SOA can be used indistinguishably. The technologies,
such as .NET Framework and Globus Toolkit 4 are Web services, but
where GT4 is referred as the grid, .NET Framework is referred as a
Web service based on SOA. However, both these technologies possess
S
the same features.
The concept of cloud computing is based on the principles of SOA. In
the scope of resource virtualization in cloud systems, almost all the
IM
technological issues must be considered at the lower level of service
development. Therefore, the underlying concept of SOA can be useful
for services and applications build for and hosted on the cloud sys
tems. It also provides some extra features to enhance the capabilities
of the base cloud systems.
M
ing purposes, but also run your applications on the proven environ
ment of Amazon’s computing services.
Obtaining and booting new servers require very less time (within min
utes). This makes it possible for you to scale your capacity very fast by
using Amazon EC2. The biggest advantage, though, of using Amazon
EC2 is that you save money by requiring to pay only for the capacity
that you are actually using. Moreover, with Amazon EC2, you are of
fered tools for building applications that are resilient and capable of
separating themselves from common scenarios of failure. Following
are the benefits of Amazon EC2:
1. Up and down scalability of Web services
2. Complete control over computing resources
3. Flexibility of services for cloud hosting
4. Support for other Amazon Web services, such as Amazon Simple
Storage Service (S3), Elastic Block Store (EBS), and SimpleDB
5. High reliability and security
6. Cost efficiency
n o t e s
Let us now learn about the other Web services offered by Amazon.
The next sections discuss Amazon S3, EBS, and SimpleDB.
AMAZON S3
S
CloudFront content delivery network (CDN) with it in maximum cas
es; it is also suitable for source and working storage with computation
al data at a large scale; and live storage, such as backup, archive, or
IM
disaster recovery storage, you can use it to store any type of data. An
other important point about S3 is that you need to pay only for those
services (or storage space) that you are actually using. The primary
characteristics of Amazon S3 can be described as follows:
1. Buckets and objects are used in the double-layer hierarchy of
Amazon S3.
M
n o t e s
buckets are owned by accounts created with AWS. A unique key that
is defined by the user is used for the identification of each bucket.
S3 also allows you to export the Amazon Machine Images (AMIs) as
bundles from EC2 to S3. The Web interface (REST, HTTP, or SOAP) is
used for creating, listing, and retrieving buckets and objects in S3. In
addition to these features, you can download objects by using the GET
HTTP interface and BitTorrent protocol. Each bucket and object has
an access control list that is used for authorizing the requests. Names
for buckets and keys are selected in such a manner that the Uniform
Resource Locators (URLs) can easily address the objects. The follow-
ing were the design requirements for Amazon S3:
1. Security: The first and foremost requirement for designing
the Amazon S3 storage service had been the matter of security.
Amazon provides full control to the client who is authorised for
the access of stored data, hence making it a preferable storage
S
option in the cloud.
2. Reliability: The data storage had to be reliable and persistent.
You are offered extreme durability feature with Amazon S3 so
IM
that you can get benefits in storing data for any duration you
desire.
3. Scalability: The scaling of data up and down was required. You
have the possibility of scaling the data up and down up to 99.99%
in Amazon S3 that enables you to store as much data as you
require.
M
n o t e s
the sizes may vary between 1GB and 1TB, the same instance can have
multiple volumes mounted on it. Striping the data across volumes is al-
lowed for enhancing the performance of the system. A single available
EC2 zone might have a single EBS instance mounted with multiple
volumes that are also replicated automatically within the zone. The
snapshot facility allows volumes to be snapshotted to Amazon S3 eas-
ily. Also, on requirement, new volumes of various sizes can be created
where the snapshot works as a base. However, if the new volumes do
not match the size of the volume where the snapshot was taken, the file
system must be resized. The data loading is very slow when a volume
is created on the basis of S3 snapshot. However, you need not wait for
the snapshot loading the data. The usage charges for EBS are taken
on the basis of I/O requests and storage volume. The cost of storage is
$0.10 per GB in a month and that of I/O requests is $0.10 per million.
S
EC2 command line tools, ElasticFox, or numerous third-party tools
and libraries are made available with the EBS for accessing each of
the functionalities of Amazon EC2. For example, you can use a simple
dialog box for creating new volumes and attaching them to running
IM
instances. For this, you just require clicking once, and it will enable
you to create a snapshot, whereas clicking another time will enable
you to create a new volume from the snapshot.
Amazon EBS addresses some of the common patterns. The three top
patterns are as follows:
M
n o t e s
S
facility helps organizations to minimise the loss of data and
recovery time so that businesses processes can be conducted
well.
IM
6. EBS usage in file workloads: The file system creation facility
provided with Amazon EBS makes it suitable for handling large
workloads of files.
EBS is that it allows you to create new scenarios, permitting the man
agement of storage volumes. New scenarios help in creating Amazon
S3 snapshots that can be used as a starting point to create new vol
umes in any zone of availability.
N
These features are used mainly for the purpose of having long-term
backups, strategising the rollback, and recreating volumes. Snap
shots, combined with Availability Zones and Elastic IP addresses,
help vastly in fault-tolerant scenario development. All of this makes
Amazon EBS a wonderful tool that helps in further enhancement of
the cloud technology.
AMAZON SIMPLEDB
Database systems have evolved very much over the years. However,
the scalability, speed, and accuracy requirements have increased so
much, along with the need for reducing the cost, that almost all con
ventional database systems have become inefficient. The idea behind
creating Amazon SimpleDB was to develop a fast, scalable system
that would provide fully managed database services. Any amount of
data can be stored, retrieved, and managed easily through SimpleDB
in a cost-effective manner. SimpleDB can handle any level of traffic of
requests and serve them efficiently. It is most suited for applications
such as gaming, advertising technology, mobiles, etc.
n o t e s
S
2. Querying for structured, fine-grained data requirements
3. Requiring data with flexible schema
Attributes Column
Values Values
From Table 6.6, we observe that RDBMS tables are known as domains
in SimpleDB, rows as items, columns as attributes, and values as val
ues. The following are the characteristics of Amazon SimpleDB:
1. Scalable: The Amazon SimpleDB systems provide a seamless
throughput and scaling for storage. The scaling features can be
described as follows:
a. Scaling the storage automatically: You can store any amount
of data in SimpleDB domains and more storage will be allo-
cated automatically to you by the service as you continue to
store more data through the right APIs provided with Ama-
zon SimpleDB.
b. Provisioning of throughput: The required request capacity
needs to be specified by the user during the time of creating
domains. This enables allocation of dedicated resources to
the user domains for meeting the performance requirements.
n o t e s
S
3. Flexible: You can use secondary indexes for querying on any
attribute flexibly, without sacrificing the performance, scalability,
and fault-tolerance characteristics.
IM
4. Fast, predictable performance: Usually, on an average, the
latency for Amazon SimpleDB at service side is less than or at
max equal to 9 milliseconds. Fast and consistent latencies are
maintained by running the services on solid state drives for any
scale of the workload.
5. Built-in fault tolerance: The recovery from failure is
M
machine failures.
6. Schemaless: No fixed schema is provided with Amazon SimpleDB.
The data items may have different number of attributes, instead.
Also, the data model is enhanced by the existence of multiple
data types that involve strings, numbers, binary data, and sets.
7. Strong consistency, atomic counters: The permission for
consistent read operations, which makes the development
practices easier, ensures that the latest values are always read by
the user of Amazon SimpleDB. With support for various native
data types, Amazon SimpleDB services also support Atomic
Counters. You can use these counters to automatically increment
or decrement the numerical attributes with a single call for APIs.
8. Cost effective: The cost efficiency of Amazon SimpleDB is
unaffected by the workload that can be scaled up to any level.
You are allowed to start using Amazon SimpleDB services with a
free tier, with no money payment required for performing up to
40 million data operations. However, consumption of resources
requires low rates to be paid on an hourly basis. The easy
administration and efficient request pricing facilities offered
n o t e s
S
track the consumption of resources by them.
With all the above features and their benefits, Amazon SimpleDB is a
data management platform that you can use for storing, querying, and
IM
managing structured data at a very low cost.
10. The concept of cloud computing are not based on the principles
of SOA. (True/False)
M
11. Amazon S3 is ideally suited for static Web content. What does
S3 stands for?
12. ______is a data storage and management system that has a
structure similar to the relational database management
N
systems.
13. SOA improves the service model using secure communication
channels, quality of services, and maintenance. (True/False)
Activity
n o t e s
S
zz Corporate Policies for Cloud Use
IMDunctional Requirements Non-functional Requirements
zz Required Features zz Performance & Response Time
zz Business Goals zz Security
zz User Requirements zz Service Availability in the Cloud
zz Backup to Other Clouds
zz Extension to Hybrid Clouds
zz Localization
zz Compatibility with Other Cloud Platforms
M
n o t e s
S
a. Business need b. Require outcome
c. Enterprise vision d. Security
IM
Activity
Using the Internet, find out the various functional and non-func-
tional requirements of the cloud application. Prepare a report on
your findings.
M
n o t e s
Figure 6.9 shows the three main components of the Windows Azure
platform:
Windows Azure
Let us learn how to enable the Windows Azure tools in Visual Studio
2012.
S
6.5.1 ENABLING THE WINDOWS AZURE TOOLS
The Windows Azure tools for Visual Studio 2012 help developers to
create, build, debug, run and deploy Web applications and services
IM
from Visual Studio 2012 IDE on Windows Azure. Initially, the Windows
Azure tools in Visual Studio 2012 are not available. You can download
and install the Windows Azure tools by performing the following steps:
1. Open the New Project dialog box.
2. Select the Cloud option in the New Project dialog box. The Get
Windows Azure SDK for .NET template appears in the middle
M
pane.
3. Enter the name of the application in the Name text box and
location in the Location combo box and click the OK button, as
shown in Figure 6.10:
N
n o t e s
As you are using the Windows Azure platform for the first
time, the .NET framework prompts you to first download the
Windows Azure SDK for .NET, as shown in Figure 6.11:
S
IM
Figure 6.11: Downloading Windows Azure SDK for.NET
4. Download the vwdorvs11azurepack.exe file and save it on the
computer hard drive.
5. Close VS 2012 IDE; otherwise, the installation wizard will not
execute properly.
M
n o t e s
S
Figure 6.13: Displaying the List of Software to be Installed
The wizard displays the progress bars during the installation of
the software, as shown in Figure 6.14:
IM
M
N
n o t e s
After successfully installing Windows Azure SDK for .NET, let us now
learn how to configure the Windows Azure Storage Emulator environ
ment.
S
Perform the following steps to configure the Windows Azure Storage
Emulator environment on a local SQL Server:
IM
1. Select Start → All Programs → Windows Azure → Windows Azure
SDK for .NET October 2012. Open Windows Azure Command
Prompt as an administrator.
2. Type the following command on the command prompt:
DSInit /SQLInstance:<SQLServerInstance>
However, to use the default SQL Server instance, you can type
M
n o t e s
S
The Windows Azure Storage Emulator environment is configured for
the Windows Azure applications.
IM
Now, let us create a simple cloud application using the Windows Azure
platform.
n o t e s
S
IM
M
n o t e s
7. Open the Default.aspx page in the Source view and add the
following code, as shown in Figure 6.21:
S
IM
Figure 6.21: Adding Code in the Default.aspx Page
8. Open the Design View and double-click the Button control and
add the following code, as shown in Figure 6.22:
M
N
n o t e s
S
IM
Figure 6.23: Modifying the ServiceConfiguration.Local.cscfg File
10. Now, press F5 to run the application, the output appears.
M
n o t e s
12. Click the Show hidden icons arrow in the taskbar to view the
hidden icons.
13. Right-click the Windows Azure icon and select the Show
Compute Emulator UI option in the context menu, as shown in
Figure 6.25:
S
IM
Figure 6.25: Opening the Compute Emulator UI
The Windows Azure Compute Emulator window is displayed
(Figure 6.26).
14. Click the WebRole node to view the instances created in the
application, as shown in Figure 6.26:
M
N
n o t e s
S
platform?
Activity
IM
Using the Internet, find out how Microsoft Azure helps in maintain-
ing and securing businesses data. Prepare a report on your find-
ings.
6.6 SUMMARY
M
n o t e s
S
usually located within the user’s data centre.
Cloud services offer infrastructure resources, platform or software
applications as a service.
IM
Infrastructure-as-a-Service (IaaS) allows you to set up a ded-
icated server with compute power, storage, memory, and net-
work bandwidth from resources at a provider’s datacenter. You
do not have to purchase, set up or maintain IT hardware, OS
or datacenter space within your organization. You just have
to pay for the resources you actually used or are reserved for
M
your use.
Platform-as-a-Service allows users to develop, test, and deploy
applications from the cloud service provider’s location. The pro-
gramming environment (compilers, debuggers, etc.), OS, and un-
N
n o t e s
key words
S
Public cloud: Refers to the cloud in which there is no need for
the organizations (customers) to control or manage the resourc-
es; instead, they are being administered by a third party.
IM
6.7 DESCRIPTIVE QUESTIONS
1. Explain the five salient features of a cloud.
2. Discuss the various types of clouds.
3. What are the common types of roles in a cloud environment?
M
applications.
7. Explain the cloud application architecture.
8. Write a note on the Windows Azure platform.
n o t e s
S
tecture
15. Architecture
16. False
IM
17. Requiered features, Business
goals, and User requirements
18. d. Security
Windows Azure Platform 19. Cloud
20. SQLAzure, AppFabric and
M
Windows Azure
n o t e s
S
6.9 SUGGESTED READINGS & REFERENCES
IM
SUGGESTED READINGS
Sosinsky, B. (2011). Cloud computing bible. Indianapolis, IN: Wiley.
Rountree, D., & Castrillo, I. (2013). The basics of cloud computing.
Burlington: Elsevier Science.
Furht,B., & Escalante, A. (2010). Handbook of cloud computing.
M
E-REFERENCES
SearchCloudComputing,. (2015). What is cloud computing? - Defi
nition from WhatIs.com. Retrieved 16 July 2015, from http://search
cloudcomputing.techtarget.com/definition/cloud-computing
Strickland, J. (2015). How Cloud Computing Works. HowStuffWorks.
Retrieved 16 July 2015, from http://computer.howstuffworks.com/
cloud-computing/cloud-computing.htm
WhatIs.com,. (2015). What is Amazon Web Services (AWS)? - Defi
nition from WhatIs.com. Retrieved 16 July 2015, from http://wha
tis.techtarget.com/definition/Amazon-Web-Services-AWS
VirtualiSation
CONTENTS
S
7.1 Introduction
7.2 Virtualisation Concepts
IM
Self Assessment Questions
Activity
7.3 Server Virtualisation
Self Assessment Questions
Activity
7.4 Server Virtualisation Implementations
M
CONTENTS
7.8 Summary
7.9 Descriptive Questions
7.10 Answers and Hints
7.11 Suggested Readings & References
S
IM
M
N
Introductory Caselet
n o t e s
S
Therefore, the organisation planned to implement virtualisation
on a Storage Area Network (SAN) instead of replacing the hard-
ware. To do this task, Shelco signs an agreement with AT-NET
Services.
IM
AT-NET Services was founded in 1999 with its headquarters in
Southern Pine Blvd in Charlotte, North Carolina, USA. It is one of
the premier risk management and technology integration indus-
try. It offers complete engineering services of systems from the
designing phase to management phase.
M
n o t e s
learning objectives
7.1 INTRODUCTION
S
In the computing scenario, virtualisation allows the creation of virtual
machines that can run on different operating systems. These virtual
machines are hosted on a single physical server containing hardware
resources, and are capable of running different applications and act as
IM
they are physical machines. The physical server that hosts the virtual
machines is called the host server and the virtual servers are known
as guest servers. Similarly, the operating system running on the host
server is called the host operating system while the operating system
running on the guest server is called the guest operating system. The
resources of the physical server are shared by each virtual machine
M
environment.
In this chapter, you will learn about virtualisation. You will also get
familiar to different types of virtualisation. Next, you learn about the
concept of server virtualisation and how to implement it in an organ-
isation. You will also become familiar to the management of virtual
server environment and ESX architecture.
n o t e s
Application Application
S
Operating System VMware Virtualization Layer
costs related to IT, and also helps in boosting the efficiency of a busi-
ness. Some of the benefits of virtualisation are as follows:
Several
operating systems and applications can be run on a single
computer simultaneously.
N
TYPES OF VIRTULIsATION
n o t e s
S
er from where they can be accessed anytime and from anywhere
without the requirement of your personal computer. The virtual-
ised desktops are not stored on the hard drive of the personal com-
puter. In this virtualisation technique, the client/server approach
IM
is used for the virtualisation of desktops; therefore, it is also called
client virtualisation.
Network virtualisation: Refers to a virtualisation technique that
monitors a single network formed by joining all the physical net-
working devices. It divides the network bandwidth into small dis-
tinct channels that are distributed to servers and network devices
M
Activity
n o t e s
S
Para-virtualisation (also known as paravirtual machine model)
OS-level virtualisation
FULL VIRTUALIsATION
M
tor to create guests, which are using different operating systems. The
guest is not aware of the host’s operating system. However, it needs
real computing resources from the host. For this purpose, a special
type of software is used, which is known as hypervisor. The hypervi-
sor cooperates with the CPU of the physical server and functions as
a platform for the operating system of the virtual server. Each virtual
server runs independently and does not know about the other virtual
server running on the same physical machine.
n o t e s
In the full virtualisation model, each guest can run on a different op-
erating system such that one is running on Linux and other is running
on Windows. It is also known as a virtual machine model. This model
is usually used by VMware and Microsoft Virtual Server. Figure 7.2
shows the concept of full virtualisation:
S
Figure 7.2: Concept of Full Virtualisation
Source: https://www.slideshare.net/mahbubnoor/virtualization-and-cloud-computing-34998595
IM
PARA-VIRTUALIsATION
n o t e s
OS-LEVEL VIRTUALIsATION
S
ever, common libraries can be shared that allows an OS-level virtual
server to host a lot of guests concurrently. The OS-level virtualisation
approach is used by Virtuozzo and Solaris Zones. Figure 7.4 shows the
concept of OS-level virtualisation:
IM
Container Container
App process
App process
App process
User Apps
OS File system
OS Kernel
N
Hardware
Exhibit
n o t e s
Resource Optimization
Consolidation
Maximize Uptime
S
Implement Redundancy
Easy Migration
IM
Save Investment
n o t e s
S
be made on exchanging legacy systems. These systems can be run
on virtual machines installed over the new hardware, thereby con-
tinuing the services running on legacy systems. It also saves the
cost required for exchanging the legacy systems with new ones.
IM
limitations of server virtualisation
in Figure 7.6:
Degraded Performance
N
Software Licensing
Processing Power
Security
n o t e s
S
is broken when a virtualised environment is deployed. So, addi-
tional security tools may be required for securing the virtualised
environment from any type of threats.
IM
self assessment Questions
a. OS-level virtualisation
b. Full virtualisation
c. Para-virtualisation
N
d. All of these
Activity
Server Virtualisation
7.4
Implementations
Each organisation has its own set of rules for implementing server
virtualisation. There are several risks associated with server virtuali-
sation; therefore, its implementation requires more planning and con-
sideration. It should also be considered by each organisation about
necessary infrastructure required for implementing virtualisation.
Therefore, a common approach can be defined for the implementa-
n o t e s
• Infrastructure Discovery
Process of • Server Resources
Inventory • Application Resources
• Resource Allocation
S
Physical • Move to 64-bit Architecture
IM
Infrastructure • Shared Storage
Inventory Process
n o t e s
S
and security concern between servers. Server roles can be catego-
rised into the following types:
Network infrastructure servers
IM
Identity Management servers
Terminal servers
File and print servers
Application servers
M
Database servers
Application resources: After categorising servers, application re-
sources can also be categorised into different types, as follows:
Commercial versus in-house
Custom applications
Legacy versus updated applications
Infrastructure applications
Support to business applications
Line of business applications
Mission critical applications
Resource allocation: The next step after creating the workloads is
assigning computing resources to different workloads as per their
requirements. These resources should be arranged in the nor-
n o t e s
Nature of virtualisation
S
containing more than 100 physical servers.
Hardware Maximisation
IM
During the implementation process of server virtualisation, the hard-
ware maximisation or usage acts as an important step as it becomes
difficult to maintain high availability of virtual workloads with the
available hardware that causes hardware issues. Therefore, there is a
requirement of installing new hardware that provides the best price
and performance.
M
physical infrastructure
n o t e s
virtualisation management
S
in the process of the implementation of server virtualisation. It allows
the end users and administrators to decide whether they want to im-
plement the virtualisation or not. The decision of the implementation
IM
of virtualisation depends on several factors including cost, return on
investment, security, and service level agreements.
Activity
n o t e s
7.5.1 Physical partitioning
S
partitioning. A discussion of these physical partition schemes is as fol-
lows:
Physical hardware separation: Refers to a physical partitioning
IM
scheme where multiple physical servers are deployed, each con-
taining its own operating system and each having its own function-
ality. For example, an organisation can deploy different servers for
different requirements including file server for file sharing pur-
poses, database server for database purposes, application server
for running applications and print server for printing jobs. Such
M
n o t e s
7.5.2 Logical partitioning
S
Logical partitioning is a partitioning technique in which physical hard-
ware devices are separated into different groups of resources. Each
separate group can function independently and run its own operating
IM
system. It entirely depends on the model of the system processor and
available resources to create the number of logical partitions.
n o t e s
S
These systems are vendor independent which means that these
systems can be installed on any vendor’s hardware.
IM
Resource partitioning: Refers to a logical partitioning scheme
that specifies the way the resources are allotted to the instances of
applications running in the operating system. The main function-
ality of this partitioning scheme is resource management. Figure
7.9 shows resource partitioning:
M
Operating System
Partitioning
Resource
CPU
N
n o t e s
Database Instance 1
Database Instance 2
Database Instance 3
Database Instance 4
Operating System
Partitioning
Service
Figure 7.10: Service Partitioning
S
Source: http://www.ittoday.info/Articles/Server_Virtualization_Technologies/Server_Virtualiza-
tion_Technologies.htm
7.5.3 Host machines
IM
The host machine or host server is the main component of a virtual-
ised environment. It is the physical server or physical implementation
of the server computer that hosts the virtualisation layer. Virtualisa-
tion layer is the common term used interchangeably with the term
virtualisation and can be defined as the implementation of software
partitioning system. This layer is responsible for creating abstraction
M
7.5.4 Virtual machines
A Virtual Machine (VM) can be defined as the software implementa-
tion of a computing environment to which operating system and other
applications can be installed and executed. A physical computing en-
vironment is followed by the virtual machine by requesting for hard-
ware resources such as CPU, memory, hard disk, and network. A vir-
tualisation layer is used to manage these hardware resources requests
by translating them into essential physical hardware.
A virtualisation software known as a hypervisor or a virtualisation
platform runs on a client or server operating system which creates vir-
tual machines within a virtualisation layer. The operating system run-
ning on this virtualisation platform is known as the host OS. There-
fore, from the above perspective, you can say that the multiple VM
environments can be created using virtualisation layer.
However, it must be noted that you cannot define virtual machine ex-
actly as VM is not an instance of a guest operating system. VM can be
n o t e s
defined by the perspective of inside or outside the VM. From the view-
point of software running inside a VM, it can be defined as a collection
of virtual hardware which is used to run the guest operating system
instance. Also, from the viewpoint of the ESXi host running the VM,
a VM contains various types of files which are stored on a storage de-
vice. A virtual machine is created using two common files such as the
configuration file and the virtual hard disk file. The configuration file
is identified by a .vmx extension, therefore sometimes known as VMX
file. This configuration file defines the VM’s virtual hardware such as
number of processors, amount of RAM, number of network adapters,
MAC address, the networks connected, and number, name, and loca-
tions of virtual hard drives. The virtual hard disk file is identified by
the .vmdk extension, therefore known as VMDK file. The VMDK file
contains the actual data stored by a VM.
S
There are various advantages of virtual machines, which are as fol-
lows:
Allows multiple operating system environments on a single ma-
chine isolated to each other
IM
Provides an instruction set architecture that is distinct from real
machine
Provides easy maintenance, application provisioning, and useful
recovery
M
n o t e s
S
maximum of four CD/DVD drives.
USB controller: Refers to a device which is used to connect USB
to the computer. A virtual machine needs a single USB controller
IMhaving 20 USBs connected to it.
Keyboard: Refers to an input device which is used to provide in-
formation to the computer.
Video card: Refers to a device which is used to provide visual in-
formation to the monitor.
M
n o t e s
Activity
Take help of the Internet and create a table containing the advan-
S
tages and disadvantages of different types of partitioning schemes.
7.6 Platforms
IM
A platform allows you to create virtual machines and virtual environ-
ments. Different platforms are introduced by different vendors where
each platform acquires some unique features. You can install any plat-
form according to your organisation requirement. One of the com-
monly used platforms is VMware ESX. Some common terms are asso-
ciated with different platforms including hypervisor, COS, VMkernel
M
7.6.1 Hypervisor
The term “hypervisor” was first coined in 1972 when an update in the
control program of System/370 mainframe computing platform was
made by IBM for providing virtualisation support. It has several ad-
vantages over mainframe computers. Some of the advantages are as
follows:
Itoverwhelms the architectural limitations of mainframe comput-
ers.
It costs less than mainframe computers.
n o t e s
Microkernel
S
TYPE 1 HYPERVISOR
IM
Type 1 hypervisor refers to a type of hypervisor that executes directly
on the host computer’s hardware and works as a control program.
Each virtual machine runs its own guest operating system and lies
above the hypervisor layer, as shown in Figure 7.11:
M
Hypervisor
Hardware
n o t e s
TYPE 2 HYPERVISOR
S
Hypervisor
IM
Operating System
Hardware
M
You should note that the Type 2 hypervisor is also called hosted vir-
N
7.6.2 ESX platform
n o t e s
S
ESX server 3.0: Contains additional features and was launched in
2005.
IM
VMware infrastructure 3 (VI3): Contains advanced features in-
cluding VMware High Availability, Distributed Resource Schedul-
ing, VMware vMotion, and VMware Consolidated Backup. It was
launched in 2006.
ESX server 3.5: Provides additional functionalities including high
level of automation, increased overall infrastructure, and high per-
M
formance.
7.6.3 VMkernel
7.6.4 COS
n o t e s
ities. It has been upgraded with the upgrade in the Red Hat Linux ver-
sion. The major functionality of the COS is creating an environment
used for managing and administrating the ESX system. As COS is
used for managing the ESX system, it can also be referred as manage-
ment application. COS usually runs on the virtual machine. It should
be noted that the COS is a variant of Red Hat Linux operating system,
it is not the Red Hat Linux operating system itself. Therefore, it is rec-
ommended to apply only those updates to COS that have only come
from VMware, not the updates of Red Hat Linux.
7.6.5 VMFS
S
for a hypervisor, which divides a physical server into various virtual
machines. In other words, you can say that VMFS is a high perfor-
mance cluster file system which is usually considered for abstracting
the storage infrastructure’s complexities.
IM
This file system states control, security, and management issues that
were related to virtual hard disk files. VMFS have been optimised for
a number of SCSI drives as well as for Fibre Channel and iSCSI SAN
equipment. In comparison to conventional file systems, a VMFS al-
lows multiple instances of VMware ESX to read and write to the same
M
storage simultaneously.
n o t e s
from the boundaries of a single system. Figure 7.13 shows how VFMS
is used in a virtual environment:
VMFS
S
Figure 7.13: The VMFS File System
IM
The VMFS provides an enhanced feature known as on-disk locking
which specifies that a single virtual machine cannot run on multiple
vSphere hosts simultaneously. It must be noted that while enabling
vSphere HA, if a server fails, then on-disk lock is broadcasted for each
virtual machine under the supervision of vSphere HA which restarts
the virtual machines on other vSphere hosts.
M
Activity
n o t e s
are more reliable and efficient as ESX server can be installed directly
on the physical hardware and an additional operating system is not
required. For running directly on the physical hardware, the ESX
server requires to enable I/O operations and resource management
feature. The architecture of ESX server differs from one version to
another. For example, the ESX Server 2 contains four major compo-
nents including virtualisation layer, resource manager, hardware in-
terface components and service console. On the other hand, the ESXi
contains Direct Console User Interface (DCUI), Virtual Machine Mon-
itor (VMM), agents and Common Information Model (CIM) system.
In this chapter, we are dealing with ESX Server components and its
architecture. ESX Server 2 contains several components, as shown in
Figure 7.14:
S
Virtualization Layer
IM
Resource Manager
Hardware Interface
Components
Service Console
M
n o t e s
S
IM
Figure 7.15: ESX Architecture
M
Source: http://igm.univ-mlv.fr/~dr/XPOSE2006/KELLER/Ressources/ESX2.jpg
From Figure 7.15, it can be analysed that each virtual machine runs
on its own operating system, known as guest operating system, and
contains its own set of applications. The virtualisation layer is made
N
Virtualisation Layer
CPU Virtualisation
Virtual CPUs are the CPUs running inside the virtual machines. In
ESX server architecture, each virtual machine requires one or two vir-
n o t e s
tual CPUs. If a virtual machine has more than one virtual CPU, then it
will be called Symmetric Multiprocessing (SMP) virtual machine. You
should note that the CPU virtualisation is done by the Virtual Machine
Monitor (VMM). Whenever a virtual machine is executed, control is
transferred to the VMM who starts execution of instructions.
S
CPU utilisation. However, there is a CPU available for capturing the
overhead, thereby, providing the comparable performance.
Memory Virtualisation
IM
In ESX server, all the machine memory is managed by the VMkernel.
However, it does not control or manage the memory assigned to the
service console. The managed memory is available for use by the VM-
kernel. On the other hand, the remaining memory (unmanaged mem-
ory) is dedicated for virtual machines. The machine memory is used
M
Nowadays, all the operating systems are equipped with virtual memo-
ry support thereby allowing applications to use more memory than the
physical memory possessed by physical machine. The complete mem-
ory block is divided into smaller size blocks possessing a data storage
capacity of 4 KB, which are also known as pages. A page table is used
to map and translate virtual memory addresses into physical mem-
ory addresses on native systems. Similarly, page tables of the guest
opearting systems contain mapping from guest virtual pages to guest
physical pages. An additional level of address translation is added by
the ESX server during the virtualisation of guest physical memory.
n o t e s
Guest
a b c b Virtual
Memory
Guest
a b b c Physical
Memory
S
Machine
a b b c Memory
IM
Figure 7.16: ESX Server Implementaion of Memory Virtualisation
Memory can be efficiently managed by the ESX server among all the
virtual machines due to the feature of virtualisation that is extra level
of memory mapping. The virtual memory management is done by the
ESX server without dealing with the guest operating system.
M
Resource Management
CPU Scheduling
ESX Server runs more virtual machines than the number of physi-
cal processors and therefore, the physical processors are shared by
the virtual machines such that each virtual machine gets the required
CPU time. The work of allocation of proper CPU time to each virtual
machine is done by the scheduler. However, you should note that only
one virtual processor can run on a physical processor at a time.
n o t e s
0 Virtual
0 1 0 0 1 0 1
Machines
(2000 for each (1000 for each (1000 for each
Virtual CPU) Virtual CPU) Virtual CPU)
A0 A1 B0 E0 Time 1
Physical
C0 C1 D0 D1 Time 2 Processors
S
A0 A1 B0 E0 Time 3
IM
Figure 7.17: ESX Server Scheduling
Memory Management
n o t e s
S
ory allocation, ESX Server requires some free memory, approximate-
ly six percent of the total memory for handling dynamic allocation
requests. There is also a need of some swap space memory on disk
IM
for saving virtual machine’s memory under any circumstances. This
swap space memory is the amount of memory between maximum and
minimum memory.
Device Management
ing CPU and memory allocation, some configuration options are also
provided by the ESX server for controlling the disk and network band-
width allocation for each virtual machine. In the context of network
management, a traffic-shaping module is used by the ESX server that
controls the outbound traffic of the network for each virtual machine.
N
Hardware Interface
Device Drivers
The VMkernel is responsible for running device drivers who gets ac-
cess to the physical devices including network interface card, SCSI
adapters, and Host Bus Adapters (HBAs) on a server machine. During
the installation process of the ESX server, if any device allocated to
n o t e s
The Linux device drivers are used by the ESX server that are ported
to run in the VMkernel with the help of Linux compatibility layer. The
main functionality of the Linux compatibility layer is providing an in-
terface between the VMkernel and the Linux drivers.
S
A large file system block is implemented by the VMFS for keeping
metadata small of virtual disk files so that all of the metadata can be
placed in the main memory and the requirement to access the disk for
IM
reading and writing the metadata can be eliminated. You should al-
ways note that data from virtual machine I/O operations is not cached
in any case by the VMFS, it is just only to provide stable performance
and maintain consistency.
including mouse, keyboard, screen, and floppy drives etc. are not per-
formance critical and are supported by the service console.
You should note that the performance of the virtual machine is degrad-
ed when the performance of the remote console is poor. Therefore, for
the consistent performance, the CPU minimum should be increased if
the service console requires more CPU time.
n o t e s
assign some additional memory to the service console so that any ap-
plication that runs directly on the service console can be accomodat-
ed easily. You should note that the performance of virtual machines
executing on the server machine is badly affected when the service
console has a little amount of memory and starts swapping; thereby,
causing the applications to slow down.
S
Activity
7.8 SUMMARY
Virtualisation refers to “an abstraction of resources” that means it
deals with separation of a service request from the original physi-
M
n o t e s
S
capacity, type and number of disk drives, operating system, and
running applications and services.
The hardware maximisation step of the server virtualisation im-
IM
plementation process ensures the high availability of virtual work-
loads.
Physical infrastructure defines the infrastructure where Informa-
tion Technology and telecommunication network can be put to-
gether.
Physicalpartitioning refers to a partitioning technique where the
M
n o t e s
S
Type 1 hypervisor refers to a type of hypervisor that executes di-
rectly on the host computer’s hardware and works as a control
program such that each virtual machine runs its own guest oper-
ating system and lies above the hypervisor layer.
IM
Type 2 hypervisor refers to a type of hypervisor that runs on host
operating system instead of host hardware and the virtual ma-
chines with the guest operating systems lies above the hypervisor.
ESX platform, commonly known as VMware ESX, is the common-
ly used server virtualisation platform that has a lot of enterprise
M
system.
Console Operating System (COS) refers to an operating system
that is a variant of Red Hat Linux operating system with limited
functionalities.
Virtual Machine File System (VMFS) refers to a cluster file sys-
tem which provides support for large files and is used for solving
performance related issues. VMFS facilitates storage virtualisa-
tion for a hypervisor, which divides a physical server into various
virtual machines. In other words, you can say that VMFS is a high
performance cluster file system which is usually considered for ab-
stracting the storage infrastructure’s complexities.
ESX server is an enterprise level virtualisation platform that is
responsible for managing several virtual machines with the help
of associated services.
Virtualisationlayer is responsible for creating hardware environ-
ment in which physical hardware devices such as CPU, memory,
n o t e s
key words
S
Virtualisation: An abstraction of resources
VMM: A hypervisor that merges the sessions into one physical
IM
server to make the proper utilisation of hardware resources
Virtual machine model: A virtualisation model in which each
guest runs on different operating system that is one is running
on Linux and other is running on Windows
VMware Capacity Planner (VCP): A tool used for identifying
potential virtualisation candidates by generating a report on the
M
n o t e s
S
7. High Availability
Managing Virtual Server 8. True
Environments
IM
9. .vmdk
10. It provides efficient resource shar-
ing and management abilities
11. Processor and memory
12. Service partitioning is a logical
partitioning scheme in which one
M
the service
Platforms 13. Virtual Machine File System
14. A hypervisor refers to the special-
ised software used in virtualisation
environment for running several
operating systems on single physi-
cal computer or host computer.
15. False
16. Type 2 hypervisor
17. ESX Server 2.0
ESX Architecture 18. Resource manager is responsible
for dividing a physical machine
into several virtual machines and
allocating the physical resources
including CPU, memory, and disk
to each virtual machine.
n o t e s
S
2. Different types of virtualisation include server virtualisation,
hardware virtualisation, desktop virtualisation, network
virtualisation, and storage virtualisation. Refer to Section
7.2 Virtualisation Concepts.
IM
3. Server virtualisation is needed because of the several reasons
including resource optimisation, consolidation, uptime
maximisation, redundancy implementation, easy migration, and
less investment, etc. Refer to Section 7.3 Server Virtualisation.
4. Physical partitioning refers to a partitioning technique where the
M
n o t e s
SUGGESTED READINGS
Virtualization for dummies. (2007). Hoboken, N.J: Wiley.
Portnoy, M. (2016). Virtualization Essentials. Wiley & Sons, Incor-
porated, John.
E-REFERENCES
Virtualization with VMware ESX Server. (2005). doi:10.1016/b978-
1-59749-019-1.x5040-1
Data Center Virtualization | Dell United States. (n.d.).
Retrieved March 8, 2017, from http://www.bing.com/
S
cr?IG=B968111E47514F58B3BA34EA0D290C50&CID=3CBD-
B10C14C46EE9245DBB3315F56FB0&rd=1&h=GAd-
l A 2 6 b v G b 0 n N S h w Z R V u 1 R 5 _ 0 s I 0 P AO i 7 Y L -
b i T V k- 4 & v = 1 & r = h t t p % 3 a % 2 f % 2 f w w w. d e l l .
IM
com%2fen-us%2fwork%2flearn%2fdc-virt&p=DevEx,5146.1.
Server Virtualization Architecture and Implementation. (n.d.). Re-
trieved March 8, 2017, from http://www.bing.com/cr?IG=24D2F-
D55960644A3ADE3329042627F68&CID=37B18B250F44691A2
801811A0E7568A3&rd=1&h=hpIjARR0CWyBqJxwqimmzbh-
dCfm_5hsmpvU3rVTI6x8&v=1&r=https%3a%2f%2f1.800.gay%3a443%2fhttp%2fcs.smith.
M
edu%2fdftwiki%2fimages%2f7%2f7f%2fServerVirtualizationAr-
chitectureAndImplementation2009.pdf&p=DevEx,5088.1.
N
Green Computing
CONTENTS
S
8.1 Introduction
8.2 What is Green Computing?
IM
8.2.1 Objectives of Green Computing
Self Assessment Questions
Activity
8.3 Regulations and Initiatives in Green Computing
8.3.1 Government initiatives
8.3.2 Industry initiatives
M
Activity
8.5 Energy Efficient Networking and Communication
Self Assessment Questions
Activity
8.6 Greening Data Centres and Servers
Self Assessment Questions
Activity
8.7 Summary
8.8 Descriptive Questions
8.9 Answers and Hints
8.10 Suggested Readings & References
Introductory Caselet
n o t e s
S
In the PC, laptop, phone or other device on which the user can
directly access their emails
In the networking devices, such as wireless routers, network
IM
switches
In the email servers (computer or group of computers) that is
used for receiving, sending and storing email. The servers re-
main constantly on, and therefore; consume lots of electricity.
Introductory Caselet
n o t e s
S
organisation’s users, then “N+1” redundancy means there is one
spare server for handling e-mails. For example, if an organisation
requires two servers for hosting their emails, then, they require
IM
one additional server or third server in case of failure of either of
these two servers. The redundant server provides reliability but
the consumption of electricity gets higher significantly. Not only
this, the electrical energy is also required to cool the servers.
Consider the case of Google, which can optimise the servers irre-
spective of the geographical location of the user. The size, focus,
and ability of Google for optimising across barriers provide sever-
al distinct advantages for their servers used for providing cloud-
based email services are as follows:
Customised and highly efficient servers: The servers provid-
ed by Google are mainly designed to host cloud-based services
having components that are essential for them to perform and
function.
Customised and high-efficiency in power supplies: These
days servers use power supplies that provide 80% efficiency
which means for every 100 Watts the server requires, almost
Introductory Caselet
n o t e s
S
IM
M
N
n o t e s
learning objectives
8.1 INTRODUCTION
Due to the high demand of energy consuming resources by different
S
types of organisations, power consumption has become a key factor.
In case of data centers, the power is not only required to run the serv-
ers but also to cool them. Managing consumption of power in organ-
isations by computers and cooling systems have become a matter of
IM
great challenge and concern. Various organisations are working hard
on reducing the power consumption of computers or other power con-
suming devices such as cooling systems.
In this chapter, we will study about the green computing and the rea-
sons for going green.
Next we will study about the regulations and initiatives in green com-
puting followed by the various approaches to green computing. We
will also learn about the energy efficient networking and communica-
tion. Lastly, we will study about the greening data centres and servers.
n o t e s
S
Going green helps us to deal effectively with the following:
1. Release of harmful heat from the electronic devices
2. More use of power energy which indirectly involves more cost
IM
3. Improper removal of e-waste
method that can help to save energy by coupling with the existing
technologies and methods. Green computing is all about reducing the
power consumption of computers, which leads to the reduced costs
and reduced use of hazardous material (pollutants) that cause harm
N
n o t e s
Preserve
environment
Ensure Objectives
Reduce
reliability of of Green
costs
power Computing
S
Reduce power
consumption
IM
Figure 8.1: Objectives of Green Computing
n o t e s
Use of
Use of the Use of the
Use of the the green
green green disposal
green design manufacturing
equipment techniques
concepts
S
environment friendly.
Use of the green disposal techniques: Organisations refurbish
and reuse the existing computing and electronic devices and prop-
IM
erly recycle them using the take back policy of IT vendors. The IT
vendors take the full responsibility of the life cycle of the electronic
product they manufacture.
Use of the green design: Organisations can design their processes
in an environment friendly way to enhance the economic develop-
ment.
M
n o t e s
Activity
S
also private industries acknowledge the needs of green computing to
minimise the environmental changes and take initiatives accordingly.
IM
8.3.1 Government initiatives
either imposed a heavy advance recovery fee for every unit sold by
retailers or compelled the manufactures of the electrical devices to
reclaim the electronic components for disposal after use.
8.3.2 Industry initiatives
The private sector and industries have also taken initiatives like the
government organisations to reduce their carbon footprint and go
green.
n o t e s
S
cious time, resources and educate the consumer to improve the
efficiency of green computing.
Climate Savers Computing Initiative (CSCI): This is an initia-
IM
tive started in June 2012 to reduce the electric power consump-
tion in personal computers. The organisation provides a catalog
that provides information about the green products. The catalog is
prepared by the member organisations of CSCI. The catalog also
holds the information on how to reduce the power consumption of
personal computers when they are in active or inactive state.
M
n o t e s
Activity
Using the Internet, search and enlist the initiatives taken by the
government bodies for green computing.
S
Virtualisation
Algorithm
Telecommuting
IM
Efficiency
Approaches
Materials Power
to Green
Recycling Management
Computing
M
Power
Display Supply
N
Storage
n o t e s
S
nificantly. Moreover, the consumption and cost of energy for an
organisation also gets reduced. For example, the EDF algorithm
achieves higher energy saving over the non-DVS scheduling and
has much lower complexity compared to the existing algorithm.
IM
Power management: Advanced Configuration and Power Inter-
face (ACPI) is an open industry standard and a successor of In-
tel-Microsoft standard called Advanced Power Management. By
following the ACPI standard, an OS directly controls the compo-
nents of a system to reduce the power consumption. This standard
provides the facility of turning off computer system’s components
M
n o t e s
8. Virtualisation means
a. Two or more logical computer system running over a set of
physical hardware.
b. A machine that is a combination of several physical
sub-systems,
S
c. Both a. and b.
d. None
9. In the desktop computer, the power supplies are known as
IM
____________.
10. Advanced Configuration and Power Interface (ACPI) is an
open industry standard and a successor of Advanced Power
Management. (True/False)
11. Which of the following is not an advantage of virtualisation?
M
Activity
n o t e s
Organisations need to find out the areas for implementing green net-
working in order to improve energy efficiency of network. Some of the
possible areas are as follows:
S
Energy efficiency areas for mobile networking, wired and wireless
Activity
n o t e s
Green data centers and servers use advanced technologies and strat-
egies to perform its operation. Creating a green data center may be
S
costly but in the long run, it saves money and proves economical.
Moreover, it also offers healthy and comfortable work environment.
Activity
Visit a data center and meet the concerned manager to find out the
different ways of implementing green networking.
8.7 SUMMARY
Green computing is not a mathematical formula, this is just a prac-
tice of using computing devices so that they can be used efficiently
and is not harmful for human beings.
Green computing is all about reducing the power consumption of
the computers.
Green computing reduces the emission of carbon dioxide.
Green computing reduces the use of fossil fuel in a data center.
Green computing saves energy which means it saves cost indirect-
ly.
n o t e s
key words
S
diffuse data.
Green networking: It refers to the way networking principles
are optimised and are made more efficient to attain green com-
IM
puting.
n o t e s
S
ing and Communication
Greening Data Centres 13. Green data centre and server
and Servers
14. b. It uses maximum power re-
IM
sources for operation
n o t e s
SUGGESTED READINGS
Smith, B. E. (2014). Green computing tools and techniques for sav-
ing energy, money, and resources. Boca Raton: Auerbach Publica-
tions.
Feng, W. (2014). The green computing: tackling energy efficiency at
large scale. Boca Raton, FL: CRC.
Nguemaleu, R. C., & Montheu, L. (2014). Roadmap to greener
computing. Boca Raton: CRC Press.
Kawahara, T., & Mizuno, H. (2013). Green Computing with Emerg-
ing Memory Low-Power Computation for Social Innovation. New
S
York, NY: Springer New York.
E-REFERENCES
IM
Vikram, S. (2015). Green computing. 2015 International Confer-
ence on Green Computing and Internet of Things (ICGCIoT).
doi:10.1109/icgciot.2015.7380566.
Computing Noise Pollution. (2014). Roadmap to Greener Comput-
ing, 95-148. doi:10.1201/b16913-5
“Green Computing | CoSN.” Green Computing | CoSN. N.p., 03
M
CASE STUDIES
S
CONTENTS
Assessments
Case Study 6 Citygate Car Dealership Ditches Legacy
Telephony for Cloud
Case Study 7 Volkswagen India: Uses Virtualisation in its
Core Manufacturing Systems
N
Case study 1
n o t e s
S
vide solutions to challenges faced by it. These challenges were as
follows:
Risk from security breaches
IM
Compliance issues
Access to strictly private and confidential data
lations.
Case study 1
n o t e s
questions
S
IM
M
N
Case study 2
n o t e s
The Organisation
S
Challenges
Solutions
Case study 2
n o t e s
Results
S
accuracy in regulatory reports designed to increase supervision,
transparency and disclosure while enhancing risk management
and governance practices in the Australian banking sector. Man-
IM
agers have greater insight into the state of the bank’s global fi-
nancial operations, especially by having a single, master view of
financial data.
questions
Case study 3
n o t e s
S
dents, the hospital uses two Citrix Server farms in Minneapolis
which is their central location. Of the two farms, one farm stores
information regarding the training programs to medical students.
On the other hand, another farm provides the data related to in-
IM
patient/outpatient, support for publishing various applications
programs, portals and specialty applications. Apart from this,
the server farm also manages more than forty departmental pro-
grams which monitors and records daily activities which occur
among different units of hospital using the medical applications
hosted on them.
M
Case study 3
n o t e s
S
questions
Case study 4
n o t e s
BACKGROUND
S
and services to their African-based clients. In addition, their com-
mercial banking solutions offer the same services to local and in-
ternational corporates at a larger level. Another activity included
in HSBC African company’s portfolio is the representative office
IM
of their off-shore personal bank that provides services to Afri-
can-based premier clients.
BUSINESS CHALLENGE
plained that the biggest challenge that they were facing was ac-
curate measurement, tracking, and reporting of the incidences
logged with the department. “We needed accurate, measurable
reporting to identify where improvements could be made in our in-
ternal processes and to enable evaluation of service levels against
internal SLAs.”
In addition, all the IT departments of the company across South
Africa were merged in a single centralised department, located
in Johannesburg, which required the capability of managing and
monitoring the work of other branches remotely. Hence, HSBC
Africa required a self-help facility that would allow their custom-
ers to log incidences which could be quickly measured, assigned,
monitored, and resolved.
Mr. Reid declared and confirmed that HSBC Africa runs on a
different product from rest of the HSBC Group. “We needed a
solution that included a self-service module and business monitor
and the product selected by the rest of the group didn’t offer us that
option.”
Case study 4
n o t e s
SOLUTIONS
The HSBC Africa company first analysed the product used by HSBC
globally, then took the decision to look for an alternative solution.
The company then chose to implement FrontRange HEAT® Service
& Support™, which provided them an automated ITSM (IT Service
Management) solution along with included self-service and business
monitoring facilities for operational activities.
RESULTS
Graham Reid accepted that as HSBC did not have an automated
solution prior to the installation of FrontRange HEAT® Service
& Support™, the company found it difficult to quantify specific
cost savings and reductions in call time and status enquiries. With
manual handling of work, there was room for human error. Some-
S
times, tickets and other important information got lost as there
was no audit trail and little accountability.
IM
However, after the implementation of FrontRange HEAT® Service
& Support™, the IT department is able to accurately monitor and
report on all incidences and activities. Now, the team members work
in an error-free processing environment. There is an equivalent and
efficient distribution of resources, improved monitoring, and escala-
tion of incidences. Further, the change management process is also
greatly enhanced. This process starts with a change request that is
M
questions
Case study 5
n o t e s
S
foreseeable future. But, the challenge is that the existing infra-
structure for electrical supply was not capable enough to support
this growth. Moreover, most electrical infrastructure assets have
IM
also reached at an age, where their replacement became neces-
sary. Reliability and service quality have become the main con-
cerns in the replacement and maintenance of the present assets.
With the above listed points, it is obvious that the available as-
sets needed to be managed properly to improve the performance
of the electrical distribution network, and for this Eskom and its
Case study 5
n o t e s
questions
S
an age, where their replacement was necessary.)
2. Why Eskom decided to implement PAS 55 to streamline
its asset management?
IM
(Hint: Publicly Available Specification 55 (PAS 55) is the
only recognised standard for physical asset management,
which was published by the British Standards Institution
(BSI)).
M
N
Case study 6
n o t e s
S
ness functionalities like book keeping, administration, and call
centre activity.
tography and moving images in and out of the business meant that
[our] bandwidth was just hopeless.”
“You would end up with, typically, voice priority over data so you’d
have applications locking up; just the whole thing was grinding to
N
a halt.”
Case study 6
n o t e s
THE IMPLEMENTATION
Node4 started the project in 2011 along with a detailed plan and
structure. It gave the top most priority to centralise the telephone
systems of Citygate. According to Dickey, “One strand of this stage
was to move to a hosted telephony switch, hosted by Node4, based
on a Cisco platform.” He also declared that this was a complete
replacement and then moved to IP phones across the group.
The second step was to keep in place the physical network in-
frastructure that supported the telephony, before replacing the
existing infrastructure with the centralized hosted telephony
switch Node4’s Northampton data centre. The final implemen-
tation completed in September 2011. It took around three to four
months to cover all sites. The main implementation of the project
S
were related to civil engi-neering works carried out by BT Open-
reach and Virgin. One of the issues they faced was related to the
use of fibres into building. Another issue was about connections
IM
with Volkswagen during the implementation of project. Dickey
admitted “There were a lot of issues in terms of the network design
and the configuration of the IP ranges.” As Volkswagen was inter-
sted in the dealership and Node4 was going to work on a given
range of IP 172.x.x.x addresses, the new network was set up with
a 10.x.x.x IP range.
M
BENEFITS
Case study 6
n o t e s
questions
S
IM
M
N
Case study 7
n o t e s
This Case Study discusses how Volkswagen India improved the re-
liability and performance of business related application with VM-
ware vSphere. It is with respect to Chapter 7 of the book.
Volkswagen India Private Ltd is a leading passenger car manufac-
turer and part of the global Volkswagen AG group. The company’s
headquarter is located in western India at Pune in Maharashtra.
This organisation employs about 3,500 people. It has a produc-
tion capacity of building up to 200,000 vehicles each year. It took
around 17 months to build the plant in Pune by Volkswagen India
Private Ltd. The cost of building this plant was too large around
S
` 3,800 Crores (580 million Euros). This was the largest investment
made by a German company in the Indian market.
The new plant was inaugurated on March 31, 2009, in the pres-
IM
ence of nearly 500 international guests by the Honourable Gover-
nor of Maharashtra, His Excellency Shri. S. C. Jamir and Prof. Dr.
Jochem Heizmann.
The Pune plant is known for its most modern nature in the Volk-
swagen Group as it is the only production plant in India that en-
tails the entire production process and possesses a high level of
M
as the exhaust of the paint shop can be re-burnt and heat and en-
ergy can be reused.
The company implemented VMware vSphere to run busi-
ness-supporting applications used for manufacturing a car every
two minutes. The implementation of virtualisation provided reli-
ability and performance requirements of the application.
CHALLENGES
Case study 7
n o t e s
SOLUTION
VMware vSphere provides several products that are useful for the
organisation, including the following:
S
VMware vSphere vMotion removes application downtime
caused at the time of marinating the server
VMware vSphere High Availability feature helps organisa-
IM
tions to protect against failure of server or operating system
The virtualisation also eliminates the need of purchasing a
new physical machine for the other works of the organisation
as it could deploy several virtual machines on demand. The
number of host machines gets reduced because of the use of
large number of virtual machines, thereby, enhancing server
M
Case study 7
n o t e s
S
The provisioning time for new servers has been reduced to a
large extent.
The operating costs including power and cooling costs are re-
IM
duced to a large extent about approximately 86 percent.
The recovery point and recovery time has been reduced to a
large extent through the usage of continuous replication given
by VMware virtualisation and NetApp storage.
M
questions
business-supporting applications)
2. Discuss the benefits incurred by Volkswagen India Private
Ltd on implementing a virtualisation solution.
(Hint: Server consolidation ratio of 1:8, more returns
on hardware investments, improved utilisation rates,
reduced provisioning time, reduced operating costs, and
reduced recovery point and recovery time.)
Case study 8
n o t e s
This Case Study discusses about the potential of the green comput-
ing in different organisations. It is with respect to Chapter 8 of the
book.
More than 50% of the world’s population uses the Internet daily.
By 2020, it is projected that anywhere from 20 billion to 50 billion
devices will be connected to the Internet. These devices would
be performing myriad unique functions, such as processing code,
sharing data and choking up servers.
S
bon emissions on Earth.
Green code has several uses such as increasing battery life for
N
It is believed that the green code will play a vital role in offset-
ting the growing burden of data as we move forward in future. It
would be easier to transition to green code in the coming years, if
businesses started reducing their digital footprint.
Case study 8
n o t e s
questions
S
IM
M
N
Case study 9
n o t e s
Background
S
application services to its clients. These services help in enabling the
real-time operational and executive visibility of the network’s impact
on revenues and customer experience.
IM
The company’s objective is focused on various modules that are
designed to address customers’ requirements related to network
project rollout and upgrade logistics, outside plant infrastructure
inventory management, network estate management, network
asset tracking and network asset maintenance.
M
Case study 9
n o t e s
S
The management of renewals process to achieve better.
The management of renewal process to maintain better rela-
tions with their landlord.
IM
Alignment of all agreements in a standard contract structure,
reducing the legal costs of managing unique contracts and re-
ducing the resultant financial irregularities.
Maintaining a secure and centralized location to store all their
commercial agreements within the access of their staff.
M
Deliverables
Case study 9
n o t e s
S
It has centralised all the contracts and agreements, maintained
the financial terms, and allowed the derivation of payment in-
formation accurately and without human interference.
IM
It has implemented a standard structure in commercial agree-
ments, and reduced the legal costs associated with contract
negotiation and renewal.
It has implemented a robust approval process that ensures
payment approvals to landlords, or service and utilities pro-
viders are given by right individuals in the organisation.
M
questions
Case study 10
n o t e s
S
The main challenge for Rigel was to provide high degree of avail-
ability of critical systems to financial services firms. Rigel asso-
ciated with All Covered, an IT solutions provider to provide full
IM
range of IT services and technology support to its clients.
Solution
Result
Case study 10
n o t e s
questions
S
1. What solution was adopted by Rigel Capital IT systems to
have a high degree of availability and reliability in their
systems?
IM
(Hint: Rigel Capital IT systems used the solutions
provided by All Covered, which implemented the
VMware Infrastructure 3 platform to provide the features
like ESX Server 3 with VMFS, VirtualCenter 2, VMotion,
Distributed Resource Scheduler (DRS), and High
Availability (HA).)
M
Case study 11
n o t e s
S
ible architecture for migrating applications to the cloud, which
would allow the company to rapidly define optimal landing areas
for its diverse portfolio. The company also required a PaaS-fo-
cused reference architecture and a vendor assessment of the most
IM
relevant PaaS providers in the enterprise market.
CHALLENGES
Case study 11
n o t e s
SOLUTION
S
managed by Cloud Technology Partners, the client ultimately
decided on Window’s Azure.
PaaS Rollout Roadmap: A comprehensive strategy and adop-
IMtion plan for a global federated PaaS rollout to the entire com-
pany.
PaaSLaneTM: The team employed PaaSLane, Cloud Tech-
nology Partners’ proprietary cloud compliance tool, to test ap-
plications against cloud coding standards and determine the
level of effort required to migrate the applications.
M
RESULTS
Case study 11
n o t e s
questions
S
and server-storage infrastructure owned and managed by
them.)
IM
M
N
Case study 12
n o t e s
Background
S
broad range online services in the United States.
Challenge
IM
Recently, EarthLink has expanded its operation model and in-
cluded IT services for small size business to medium size by creat-
ing a separate division called EarthLink Business. The company
management has realized that as per market demands, it is nec-
essary to provide a feasible cloud offering to remain competitive
with other IT service providers. According to Joe Reazor, director
M
Solution
Case study 12
n o t e s
S
M3 Blade Servers, along with Cisco UCS Fabric Interconnects
connecting into Cisco Nexus® switches. A Cisco ASR 9000 Series
Aggregation Services Router was also used through which all net-
IM
work connections are made to pass. Now, the EarthLink Business
IT team can monitor and manage all the five data center environ-
ments from a single location.
Results
Case study 12
n o t e s
questions
S
offering for small to medium-size businesses and
inability to achieve greater scalability with legacy cloud
infrastructure)
IM
2. Discuss the consequences of deploying cloud-ready
infrastructure by EarthLink.
(Hint: After deploying cloud-ready infrastructure,
EarthLink witnessed reduction in the time to deploy,
replace and upgrade hardware by 25 percent, decrease
in firmware upgrade time from days to hours and
M