Server Virtualization For VICAT – Benefits, Risks, And Proposed Plan

Existing infrastructure of the server

An analysis is made on the current infrastructure of VICAT for the development of the server infrastructure and configuration of the centralized management system for the organization. The current server infrastructure of the organization uses separate servers for storing the backup, email and storage. There are different problems faced due to the use of the physical server in the current business process and it is identified. The physical server is dependent on the hardware and if there is a need to migrate the content of the server there is an issue that the content of the server is dependent on the hardware platform of the physical server. There is a need to virtualize the server platform for creating an independency of the hardware and increase the portability of the data residing in the physical server. In the current server architecture there are different problems such as distribution of the loads on the server is not possible and this can be done by virtualizing the server and moving the resources to another server for increasing the availability of the data and reduce the cost of implementation of a new physical server in the network.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The server infrastructure is created for the organization for supporting the current framework and it consists of a physical and virtual resources for supporting the storage and flowing of the data packets in the network. The existing serevr

An alternative virtualization scenario can be created for the mitigation of the problem currently faced in the physical server environment. A centralized infrastructure is created within the data centre and it can be decentralized for distributing the resources in the different data centre. The different subsystem are included in the servers such as the servers, storage subsystem and the other network device. The infrastructure of the data centre should have the proper security measures proper authentication mechanism should be used for the development of the data centre. For the development of the data centre a formalized process of data centre should be analysed for the optimization and maintaining the infrastructure and include the different components for the development of the data centre. A detailed expertise is required for the configuration of the server and optimization of the system with the integration of the system with the current business process of the organization. With the implementation of the virtualization of the server the disaster recovery can be handled and the servers can be uploaded to the cloud platform for backing up the data and management of the different operation of the business. It can be used for performing different operation and different services should be configured for the development of the network.   

For the development of the server infrastructure it is important to deal with the design the server architecture after analysis of the goals and objectives of the organization. Different factors should be considered such as selection of the various components, hardware, software and thee technology used for the development of the server framework. The traditional process of the development of the server requires lots of manual effort and optimization of the storage and the other components of the server. Modular approach can be used for the hardware and virtualization and making the management process easy. There are other approaches such as use of hyper v for the virtualization of the resources. Determination of the number of virtual machine that should run on the server and determination of the core speed and the number of cores required for meeting the current demand of the users is important for the development of the server.

Alternative Virtualization Scenario including risk analysis

The following resources are required for the virtualization of the server and given below:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
  • Task identification
  • Selection of the right software
  • Selection of the virtualization expert.

Authorised personnel should be informed about the new strategy that is selected for the implementation of the virtualization server for the VICAT ICT system. Stakeholder meetings should be arranged for discussing the strategy for the development of the server virtualization. The risk associated with centralized storage should be analysed for the adoption of the server configuration and providing the service following the guidelines. There are different alternative scenario that are analysed and different comparison should be used for the development of the network environment and approval of the client. A checklist should be added for the software and the hardware platform and analysing the reliability and security of the server platform for the development of the server infrastructure.

  • Operating system – Windows Server 2012 R2 is used as the operating system for the development of the server.
  • Server Applications – An application server should be used for the development of the web server and service model should be used for the implementation of the network service. The application server should be configured with the available server application and balancing the loads on the servers.
  • Server Design – For designing the server the terminology and the recommended host server should be identified. The processor should have the basic computing function and physical processing unit, socket and the motherboard should be defined for the management of the memory modules.

Server oriented architecture should be used for the development of the application component and using the communication protocol. There are different basic principle that should be followed such as independent vendor, product and different technology. There are different functionality that are used for accessing the remote resources and updating it independently for retrieving the information. The service should have the four properties such as:

  • Logical representation of the business activity and getting a specific outcome.
  • It is self-contained
  • It has a black box for the users
  • There are different services that can be used for providing different functionality and have a modularized program

The concept should defines according to the orientation of the service and coupling between the services. The business goals, strategic goals, intrinsic inter-operability, shared service, flexibility and evolutionary refinement should be defined for the coordination between the activities.

There are different technology that should be used for the needs and the resource should be defined for development of the virtual framework. There are different networking principle for the development of the service. The service provider should be identified for the development of the web service and analysis of the price for offering different service. The different category of service and the agreement should be created for analysis of the requirement of the service. The service broker, service registry and the service repository should be analysed for the identification of the activity. The entries in the registry should be defined and the needs of the consumer should be identified for the development of the server infrastructure. The approaches for the implementation of the virtualization. The cost of the processor, memory, hard disk should be analysed for the identification of the legacy and enabling the service.  

For the development of the server is important to create the logical steps and is given below:

Task Name

Server Virtualization for VICAT

   Initiation phase

      Development of business case

      Cost-benefit analysis

      Developing project charter

      Appointing project team members

      Milestone 1: Completion of project initiation phase

   Planning phase

      Developing plan for the project

      Developing the project resource plan

      Developing financial plan

      Developing the risk management plan

      Developing the quality plan for the project

      Procurement plan for the project

      Developing proper communication plan for the project

      Milestone 2:Completion of project planning phase

   Analysing requirements of the projects

      IP address scheme development

      Proper subnetting

      Identification of network device

      Types of network cables

      Identification of the software

      Identification of the server

      Milestone 3:Completion of requirement analysis

   Designating phase

      Designating the logical network for the project

      Designating the physical network for the project

      Milestone 4: Completion of designing phase of the project

   Implementation phase of the project

      Installation of the network device

      IP allocation

      Deployment of the network cable plan

      Connecting the device

      Deploying server

      Milestone 5: Completion of project implementation phase

   Project testing phase

      Testing the network speed

      Testing congestion

      Testing performance

      Milestone 6: Completion of project testing phase

   Project closure phase

      Reviewing the project

      Stakeholder sign off

      Project documentation

The current hardware configuration of the server should be analysed for reviewing the hardware requirement that should be used for the development of the current server framework. The security characteristics of the server should be considered for the development of the server. The updates that should be made on the hardware should be identified for the development of the server and the current configuration of the server is given below:

Hardware

Processor – 64 bit Dual core processor with 2.5 Ghz for a minimum core

RAM –  8 Gb for the use of evaluation and developer purpose

Hard Disk – Minimum 80 Gb for the installation and the more size is required for the use of production and more disk space is required for the management of the day to day activity.

Proposed plan and required resources

The current application software that are installed in the server for the management of the daily activity of the user connected with the network are give below:

Software

Operating system – Windows Server 2012 R2

Antivirus – Quick heal antivirus

Database – Oracle 10g

Web server – Apache Tomcat

The hardware that are required for the server should be available and combined to develop the server framework. The server is configured such that it can be virtualized for balancing the load and serve the different needs of the user. The following list is created for the development of the server framework and virtualization of the server to meet the growing demands of the organization.

Processor – 64 bit Quad core processor with 2.5 Ghz for a minimum core

RAM –  24 Gb for the use of evaluation and developer purpose

Hard Disk – Minimum 80 Gb for the installation and the more size is required for the use of production and more disk space is required for the management of the day to day activity.

For the development of the network framework Windows Server 2012 r2 is used as the operating system. The hyper v settings should be configured for the creation of the virtual machine and it is used for abstracting is physical hardware and creating a multiple virtualized environment. Multiple Virtual machines can be supported and can be managed as a standalone computers. Different virtual architecture can be used for the creation of the virtual disk and configured according to the business needs of the organization. A license should be required for the installation of the windows server and it can support upto 2048 number of PCs.

Additional tools and third party software can be used for the configuration of the service that are required for running different business operation. Additional tools such as active directory, IIS, DHCP, File server, print server, etc. can be used depending upon the requirement. There are additional third party software such as antivirus, apache, etc. can be used for the management of the security of the server. There are other network policy and active directory certificate service that are used for the management of the multiple roles and service.  

There are different flaws in the operating system and the application software that can be exploited to reach the resources and gaining the access of the network. The operating system should be updated for reducing the security issues and configuring the server to meet the needs of the organization. Roles and responsibility of the network administrator and the testing team should be analysed for the development of the network framework. For ensuring maximum security of the server antivirus software should be installed in the server such that the third party software should be used for the development of the ICT system.

For the configuration of the server different features should be enabled for the windows server 2012 R2 server manager. The hard drive should be virtualized and partitioned into parent and child for storing the information in the file server. It should be configured with printer server for the management of the printing queue and management of the printing job of the organization. It should also be configured with hyper v for the management of the virtual machine and allocating the physical resources of the server. The implementation of the hyper v helps in allocation of roles and responsibility of the user for the management of the workstation products. Hyper v licencing should be used for the identification of the limitation and scalability of the network framework.

Approval of the recommendations

The main scope identified for the development of the network framework and the hyper v server should be configured using the simple script and configuration of the interface. Latest hardware should be used for the virtualization of the hardware and the BIOS of the system should support the virtualization technology for the management of the roles and service. Virtual switches should be used for the management of the network adapter and migration of the alternative. Hyper v manager should be used for the management of the multiple virtual servers and exercising a full control on the centralized server management.

The configuration of the server should be tested for the management of the technical requirement and integration of the different components. The modules and the features installed in the server should be configured with the system compliance and specified requirement should be followed for the development of the server. An integration testing should be used for the integration of the applicable hardware system and detection of the inconsistency between the assemblages and software units. The system should be tested as a whole according to the functional requirement specification document and a system test design document should be created for the analysis of the behaviour of the customers. The bounds that are defined as the hardware and the software needs should be analysed for the identification of the requirement specification. There are different types of test that should be performed on the system such as:

  • Graphical user interface test
  • Testing the usability
  • Performance testing of the software application
  • Testing the compatibility
  • Testing the loads on the server
  • Testing the scalability
  • Testing the installation of the server
  • Testing the maintenance

The following document should be followed for the development of the test plan.

Test phase

Duration

Resources

Date

Status

Unit testing

5 days

System Tester [1]

19/06/2018

Completed

Functional test

4 days

Functional tester

Pending

Load test

5 days

Load tester

Pending

Volume test

3 days

Volume tester

Pending

Usability test

2 days

System analyst

Pending

Compatibility test

7 days

System analyst

Pending

Conformance test

6 days

System tester [2]

Pending

Regression test

4 days

System tester [1]

Pending

Stress test

3 days

Load tester

Pending

Vulnerability test

5 days

Penetration tester

Pending

For development of the system testing the testing should be conducted for the integration of the system and evaluation of the system compliance defining the specific requirement of the organization. The testing of the system is considered as the scope of the black box testing and it does not requires any knowledge about the design of the network. The system testing is performed on the server and the software system for the detection of the inconsistency with the software unit. The system testing has different types of limitation such as detection of the limitation of the defects as a whole. For testing the whole system the entire system is used for the identification of the software product for the verification of the identity of the errors in the configuration of the software. A testing environment should be created for testing the virtualization of the server framework. Different types of testing environment should be created for meeting the different needs of the consumers and different strategy such as virtualization of the server platform for the development of the network solution for the hotel. The different roles should be installed in the server such as active directory domain service, DNS and DHCP service for accessing the internet and the local area network. Virtual computers should be created for testing the client server framework and it should be created with different processor and hardware configuration. There are different utilities that are used by the VMWare workstation, Microsoft Virtual Computer and Sun Virtual Box that can be used for testing the real life computing environment. The virtual printers are used for the redirection of the printing session and additional devices such as scanner, printer and other usb devices can be used for the development of the sustainable ICT system.

The errors in the reporting of the software should be considered for the documentation of the errors identified during the test. The errors should be documented such that it can be used for troubleshooting the problems in the configuration. The errors should be used for debugging the problems and configure the server aligning the needs of the network. The windows error reporting technology should be used for capturing the crash data and gathering information about the different service about the real life problem of the customer. The actual codes needs to be debugged WER is used for collecting the data points and diagnosis of the error for increasing the efficiency of the configuration. The crash analyser is used for finding the issues causing crash of application and prioritize the problem. It can be used as a tool by the developer for reducing the effort and time for the development of the virtual server framework for the hotel and serve the needs of the user using the system. The unauthorised access of the server can be found from the log files and it can be used as an administrative tool for the management of the failover cluster and enabling different option for mitigation of the problem.  

References

Huh, Jun-Ho, and Kyungryong Seo. “Design and test bed experiments of server operation system using virtualization technology.” Human-centric Computing and Information Sciences 6.1 (2016): 1.

Mohammadi, Reza, Seyyed Yahya Nabavi, and Seyyed Mohsen Emam. “Analysis of FTP and Web Server Performance In Open Source Server Virtualization.” International Journal of Computer Science Issues (IJCSI) 13.5 (2016): 159.

Okita, Hideki, Keitaro Uehara, and Yoshiko Yasuda. “Proposal and Evaluation of Data-Model Translation for Server-Virtualization Environment to Improve Virtual-Network Configuration Management.” Advanced Applied Informatics (IIAI-AAI), 2016 5th IIAI International Congress on. IEEE, 2016.

Yang, Hwan-Seok, Dong-Hwi Lee, and Seung-Jae Yoo. “A study on stable web server system using virtualization technology against attacks.” Multimedia Tools and Applications 74.16 (2015): 6381-6390.