代做CP2422 Cloud architecture for holiday search帮做Java编程

Cloud architecture for holiday search

CP2422 case study group presentation

This assignment is a group project in which you get to help a company transition to the cloud. Legacy systems need adapting to cloud paradigms, security needs to be considered, and a disaster recovery  strategy is needed. You will get the opportunity to design an architecture, estimate its costs, ensure compliance and try to anticipate/mitigate potential problems.

The work will be submitted as a group presentation, with Q&A, in the subject’s final tutorial session. There will also be two tutorial sessions allocated for students to work on the assignment, although additional time is expected to be put in outside of these.

Subject Learning Outcomes

“SLO2: Discuss and apply industry knowledge and best practices into specific case studies” is the main focus of this assignment, although it may also contribute to other SLOs.

Prerequisites

You will be using free online tools, teamwork and your own research to complete this assignment, so there are no technical prerequisites. You won’t need to deploy any cloud resources to complete this  assignment.

Groups will be assigned by the lecturer.

Structure

The assignment is presented as a case study that groups of up to five students will work together on. The case study describes a holiday booking company, its existing IT architecture and its challenges, along with the desired outcomes it has from making the transition to cloud. You are then expected to work on four things:

1.    Re-defining their architecture for cloud and estimating costs.

2.    Addressing security concerns using cloud tools and best practices.

3.    Ensure compliance with prevailing regulations regarding personal data and payment processing.

4.    Consider resilience through disaster recovery and other availability-preserving measures.

Your work will be documented in a slideshow presentation, which you then present to the class and lecturer, then you will be questioned on it and expected to defend your decisions.

Submission

It’s mandatory for all group members to be in attendance for their group presentation Q&A, although who and how many members actually present is at the group’s discretion. The group must also submit a digital copy of the presentation slides before the presentation session, via the assignment section on LearnJCU. Pre-recorded presentations are required and must be submitted as an mp4 file, along with a copy of your slide deck in PDF format. DO NOT ZIP THESE FILES.

Each group will have 15 minutes for their presentation. There is no slide/page limit on the presentation, but only content that is successfully covered in the presentation will be considered for marking, so be mindful of the time limit.

A five-minute question and answer (Q&A) session follows the presentation, in which the lecturer will ask questions and the group must answer in defense of their work.

Marking

Marks will be allocated based on the grading rubric, holistically, meaning all three parts are taken into consideration together when determining the mark. The defense of the submission, through the group’s answers to questions from the lecturer, will also contribute to the final mark.

It is expected that each group member plays an equal role in the work. While people’s roles and  contributions may be different, the effort should be similar. Marks will not be peer assessed or adjusted per individual, unless any formal concerns are raised about uneven contributions to the work.

Ethics

Please remember not to copy directly from other groups, past or present. If you use external sources, you must indicate clearly what they are and where you have used them. While good research will help you achieve a good mark, it is essential that you document your sources properly. See the student handbook for more details of JCU's ethics guidelines. Be particularly mindful of JCU’s guidelines on the use of Artificial Intelligence.

The specifics of assignments are updated from term-to-term. Be advised that if you include context from an earlier version of the assignment that is no longer relevant, it will be considered academic  misconduct and your team risks receiving zero marks or further proceedings.

Support

If you are having problems completing the assignment, there are various ways to get help:

•    Work closely with your group and share your problems with each other.

•    Ask in a lecture or tutorial session.

•    Send the lecturer an e-mail or a message via LearnJCU.

•    Schedule a consultation with the lecturer.

•    Use the conversations feature which is enabled for this assignment.

People who ask more questions tend to achieve higher marks, so don't be afraid to use any and all of the above options!


Case study

Situation

•     You are a consultant for book.lah, a Singapore holiday booking site that helps users find rooms in hotels around the world.

•     You are tasked with helping the organization modernize its ICT infrastructure.

•     Somehow, book.lah has managed for years with simple co-located infrastructure that connects to various hotel chains in order to find rooms and prices for customers.

•     Different chains have different systems for handling availability and pricing, so book.lah maintains multiple ways for interfacing with these external systems.

•     Book.lah stores its customer data as well, allow customers to setup searches, alerts, and quickly book & pay for rooms.

•     The booked hotel later settles the bill with book.lah, so book.lah is an intermediary handler of the money.

Legacy Architecture

A single diagram is provided to explain the architecture of the current setup (Figure 1). The key details are:

•    The book.lah service is a monolith, meaning a single web-application handles everything,

from collecting availability data, to servicing customer search requests, through to handling customer and later hotelier payments.

•    Two servers are co-located in a datacenter, with one acting as a standby stand-by and

backup. If the active server encounters an issue, a load balancer directs traffic to the stand- by, which is then promoted to the active role. The failed server must be restored and re-synced with the new active server before it can enter its new role as stand-by. 

Figure 1: The architecture of the current co-located book.lah system


On occasion, book.lah has encountered problems with this setup, and as post-COVID travel demand has surged, they have become concerned with sustainability of their businesses, as well as their competitiveness compared to other, larger services providing similar features. Some of these problems include:

•    Integrating with new hotel groups requires adding new capabilities to the monolith, which is slow to do, expensive to test, and disruptive to deploy as it requires restarting the whole application. It is essentially infeasible to cater to individual independent hotels unless they already use a well-defined interface that is already implemented.

•    While one active server is generally adequate for site performance, there is a noticeable

drop when scheduled activities happen, such as payment processing to hotels and periodic updates to room availability and prices. This can adversely affect end-user experience.

•    The reliability of the servers has been good, but they are approaching 5 years old and so more likely to fail, and are near the limit of traffic that they can handle.

•    In a single incident, the active server encountered an error during a software update, leading to the standby server taking over. However, it took several days to restore the failed server into a useful state, leaving book.lah at significant risk of a second issue taking them offline.

•    The Chief Information Officer has expressed concern at the lack of separation between

customer data and hotelier data, as well as the lack of a proper backup plan, which currently just assumes that data is stored in duplicate on both servers.

At the behest of the CIO, and with the blessing of the CEO, you have been engaged to see if the impending replacement of the ageing servers can be used as an opportunity to embrace the cloud, and realise additional benefits that may make the business more competitive and resilient.

Instructions

There are four equal parts to this work. Your group will collect a lot of information and ideas, but must refine this down into concise, well-visualised slides, while still referencing your sources.

Part 1 : Adoption journey [25%]

Choose a cloud adoption framework [1] to follow and then explain how it can help the company adopt the cloud. Explain in a single slide how the key pillars/principles/etc of the chosen framework can be applied to the company.

Part 2 : Service selection [25%]

Identify the cloud components needed to implement book.lah’s system in the cloud.

•    First, be general. Specify the type of service (compute, database, security, etc) and the service model that is used for is (IaaS, PaaS, SaaS).

•    Then, provide a table of equivalent products for three or more cloud providers, for each of the

services you have decided to include in the new implementation. One of the providers should be the creator of the adoption framework you followed.

•    Finally, using the same provider who produced your adoption framework, draw a cloud

architecture diagram usingdiagrams.net(or another of your preference) that includes all of these services. Highlight security features and design choices that support any of the three   aspects of CIA. Explain how the architecture differs from Figure 2.

•    Provide sizing/quantity specifications for the services, and cost projections using your cloud provider’s cost estimation tool.

Part 3: Compliance [25%]

Based on the architecture from part two, visualise where the boundaries of responsibility are, between book.lah and their cloud service provider, for each of the services in your proposed architecture.

Show how the CSP can comply any relevant regulations, such as PDPA regarding customer data and payment processing, referencing appropriate vendor and regulator documentation. Highlight areas that book.lah must continue to adhere to themselves.

Part 4: Disaster recovery [25%]

Supported by your architecture diagram any information available from the CSP, explain how your design is resilient to failure. It is recommended to examine each individual component of the architecture and ask, “what happens if this piece fails?”, then see if the CSP provides a solution or if you must deal with it yourself.

Secondly, define a step-by-step process for dealing with a catastrophe in the cloud. Choose one of:

•    A prolonged outage of the cloud provider in the company’s home region of Singapore.

•    A successful ransomware on one or more critical application’s data sets.

•    A configuration update resulting in a critical database going offline.

Briefly explain how you would respond to it, plausible RTO/RPOs, (Recovery Time/Point Objectives) and what architectural choices you made that may help make this response easier.

Notes

•    Use the IEEE style. of referencing [2].

•    Include relevant references at the footnote on each slide, as well as a complete references list as a final slide.

•    Remember that you have 15 minutes for your video plus 5 minutes of questions. Be sure to rehearse before your recording, and be prepared to answer questions.

•    Avoid walls of text in your presentation. The assignment instructions have asked for diagrams

and tables in places. There are lots of other places where graphs, figures and other visuals will be very useful too. Be creative!

•    For best marks, distribute work fairly, consult with each other, ask the lecturer questions, and consult the marking rubric (available in LearnJCU).

•    The three marking criteria will be evaluated in turn for each of the parts of the assignment. Note that this includes the slide content, your presentation performance, and any Q&A.

•    For the presentation video, remember: less is more. Do not cram content in or artificially speed up the video. It will make your presentation less comprehensible and harm your overall mark.

References

[1] V. Shreenivos and S. Kerrison, Lectures on Cloud and Data Center Security: Cloud Adoption Journey, James Cook University, 2021.

[2] James Cook University, “IEEE Style. Guide,” [Online]. Available: https://libguides.jcu.edu.au/IEEE. [Accessed July 2023].


热门主题

课程名

mktg2509 csci 2600 38170 lng302 csse3010 phas3226 77938 arch1162 engn4536/engn6536 acx5903 comp151101 phl245 cse12 comp9312 stat3016/6016 phas0038 comp2140 6qqmb312 xjco3011 rest0005 ematm0051 5qqmn219 lubs5062m eee8155 cege0100 eap033 artd1109 mat246 etc3430 ecmm462 mis102 inft6800 ddes9903 comp6521 comp9517 comp3331/9331 comp4337 comp6008 comp9414 bu.231.790.81 man00150m csb352h math1041 eengm4100 isys1002 08 6057cem mktg3504 mthm036 mtrx1701 mth3241 eeee3086 cmp-7038b cmp-7000a ints4010 econ2151 infs5710 fins5516 fin3309 fins5510 gsoe9340 math2007 math2036 soee5010 mark3088 infs3605 elec9714 comp2271 ma214 comp2211 infs3604 600426 sit254 acct3091 bbt405 msin0116 com107/com113 mark5826 sit120 comp9021 eco2101 eeen40700 cs253 ece3114 ecmm447 chns3000 math377 itd102 comp9444 comp(2041|9044) econ0060 econ7230 mgt001371 ecs-323 cs6250 mgdi60012 mdia2012 comm221001 comm5000 ma1008 engl642 econ241 com333 math367 mis201 nbs-7041x meek16104 econ2003 comm1190 mbas902 comp-1027 dpst1091 comp7315 eppd1033 m06 ee3025 msci231 bb113/bbs1063 fc709 comp3425 comp9417 econ42915 cb9101 math1102e chme0017 fc307 mkt60104 5522usst litr1-uc6201.200 ee1102 cosc2803 math39512 omp9727 int2067/int5051 bsb151 mgt253 fc021 babs2202 mis2002s phya21 18-213 cege0012 mdia1002 math38032 mech5125 07 cisc102 mgx3110 cs240 11175 fin3020s eco3420 ictten622 comp9727 cpt111 de114102d mgm320h5s bafi1019 math21112 efim20036 mn-3503 fins5568 110.807 bcpm000028 info6030 bma0092 bcpm0054 math20212 ce335 cs365 cenv6141 ftec5580 math2010 ec3450 comm1170 ecmt1010 csci-ua.0480-003 econ12-200 ib3960 ectb60h3f cs247—assignment tk3163 ics3u ib3j80 comp20008 comp9334 eppd1063 acct2343 cct109 isys1055/3412 math350-real math2014 eec180 stat141b econ2101 msinm014/msing014/msing014b fit2004 comp643 bu1002 cm2030
联系我们
EMail: 99515681@qq.com
QQ: 99515681
留学生作业帮-留学生的知心伴侣!
工作时间:08:00-21:00
python代写
微信客服:codinghelp
站长地图