johnson_margret_stage_4

docx

School

University of Maryland *

*We aren’t endorsed by this school

Course

311

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

5

Uploaded by ConstableCloverGuanaco14

Report
1 Stage 4 Margret Johnson University of Maryland Global Campus IFSM 310 Enrique Vasquez 3/7/23
2 Stage 4 Introduction This paper will discuss the alterations to Mark's IT infrastructure resulting from his decision to host his systems and data with an Infrastructure as a Service (IaaS) cloud provider. This article will discuss the infrastructure setup, including Mark's main facility, the IaaS cloud provider's data center, and two satellite offices. A discussion of the design's communication protocols, the nature of layered system architectures, and the roles played by each of the TCP model's four layers will round out the introduction. The study will also detail what happens to data packets as they transit from the cloud provider's server to a tablet gadget at Mark's facility. IT Infrastructure Changes At a site of an IaaS cloud provider, Mark will transfer his systems and data. The cloud provider will host the database server, file server, and ERP system. Computers, printers, and network switches will be at Mark's central location. The same parts will be present at both distant sites. To utilize the IaaS cloud services, changes will be required at the two distant sites, including secure remote access to the cloud services and a dependable, quick internet connection. (Bass, 2015) Graphical Representation The cloud provider and the three prevailing locations are delineated graphically below. The file server, database server, and ERP information system are the elements that are situated on the cloud provider's premises. Computers, printers, and network switches are the only items still present at the three sites.
3 Communication Protocols Communication protocols utilized in the architecture include security protocols like SSL/TLS and Internet connection techniques like TCP/IP. For wired connections, Ethernet will be used, and for wireless ones, Wi-Fi. (Mrabet, 2020) Layered Systems Architecture A design strategy known as layered systems architecture divides complicated systems into simpler, easier-to-manage components. A layered architecture, like the TCP or OSI model, allows for modular construction, more straightforward maintenance, and flexibility in adding or changing features. (Veríssimo & Rodrigues, 2001) Four-Layer TCP Model
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 The four-layer TCP architecture includes application, transport, network, and link layers. The function of each layer is as follows: Application layer: Provides access to the network for applications and services. Transport layer: Ensures reliable data transfer between applications. Network layer: Handles the routing of data between networks. Link layer: Provides physical network access for data transfer. The application layer will allow Mark's ERP application to access the network when he utilizes the cloud service provider's location-based ERP system. Although the network layer will manage data routing between the cloud provider and the main facility, the transport layer will provide dependable data transmission between the application and the database server. Packet Information Travel The connection layer acts as the primary communication facilitator when a packet of data is sent from a server at the cloud provider to a tablet gadget at Mark's facility. Routing the data from the cloud provider to Mark's main facility is the responsibility of the network layer. Although the tablet application has access to the network via the application layer, the transport layer ensures secure data flow between the database server and the tablet device. (Sakr, 2011) In conclusion, Mark's choice to shift his IT infrastructure to an IaaS cloud provider is smart and will help his firm thrive. Mark may make an educated selection by knowing which innards will be at the cloud provider's site and which will stay at each location. Mark may enhance his system's performance and security by knowing communication connection protocols and the advantages of layered systems design. Using the four-layer TCP model, Mark can also
5 understand how data moves from the cloud provider to his facilities and devices. Mark may use this information to improve his IT infrastructure and position his firm for success. References Bass, L., Weber, I., & Zhu, L. (2015). DevOps: A Software Architect's Perspective. In Google Books . Addison-Wesley Professional. https://books.google.com/books? hl=en&lr=&id=fcwkCQAAQBAJ&oi=fnd&pg=PT13&dq=At+a+site+of+an+IaaS+cloud +provider Mrabet, H., Belguith, S., Alhomoud, A., & Jemai, A. (2020). A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis. Sensors , 20 (13), 3625. https://doi.org/10.3390/s20133625 Sakr, S., Liu, A., Batista, D. M., & Alomari, M. (2011). A Survey of Large Scale Data Management Approaches in Cloud Environments. IEEE Communications Surveys & Tutorials , 13 (3), 311–336. https://doi.org/10.1109/surv.2011.032211.00087 Veríssimo, P., & Rodrigues, L. (2001). Distributed Systems for System Architects. In Google Books . Springer Science & Business Media. https://books.google.com/books? hl=en&lr=&id=oOzwLX1_bpkC&oi=fnd&pg=PR13&dq=A+design+strategy+known+as +layered+systems+architecture+divides+complicated+systems+into+simpler