Source cloud business | cloud computing technology in IT support system application


Currently, the IT support system mainly adopts a “shaft type” construction method. This method lacks overall planning and the system construction time is long, which is not conducive to the rapid realization of the business and the effective use of the system. In addition, due to the wide variety of IT support system equipment, support for cloud computing is uneven, equipment is dispersed, and all service quality and security levels are different. The introduction of cloud computing in IT support systems will face many difficulties. Therefore, how to solve these problems has important research significance.

First, the development of cloud computing technology

Cloud computing is the third IT industry revolution following the personal computer and Internet revolution. The three stages of information technology development are as follows: First, the personal computer revolutionary stage: In the 1980s and 1990s, the mainframes that were only used in specific industries became personal computers that could be afforded by everyone, and the individuals were greatly improved. Productivity and business efficiency. Second, the phase of Internet transformation: At the end of the last century, hundreds of thousands of information islands were brought together into a huge information network, which greatly improved the efficiency of human communication, sharing and collaboration, and enriched the social and entertainment life. The third is the phase of cloud computing transformation: transforming IT infrastructure resources and services into social and public infrastructure like water and gas, making cloud computing data centers the providers of IT resources and services.

Second, the impact of cloud computing on the construction of IT support systems

2.1 Cloud Computing Brings Changes to the IT System Construction Model

The traditional construction mode: The traditional IT support system is built from the top down, and the hardware and software procurement and construction of the system are based on business requirements. The business needs precede the system construction and the “chimney” system is finally formed. Cloud computing platform construction mode: The cloud computing platform adopts a bottom-up approach. The construction of a cloud computing resource pool precedes the application system requirements and is no longer bundled with specific business applications. The application system is built, expanded, and upgraded. Software development is main, and hardware physical resources needed are applied to the resource pool.

2.2 Cloud Computing Brings Changes to Departmental Job Functions

Under the traditional model, the job function of the IT department is to construct the business implementation plan and system under the premise of understanding the business requirements, and consider the installation, deployment and allocation of new equipment and the equipment operation monitoring after the system goes online before the system goes online; Under the computing model, the IT department focuses on the operation and management of resources and services, proposes a platform expansion plan and installation and deployment of new equipment resources on the platform. The issues of concern mainly include: the deployed business applications, the degree of satisfaction of business requirements, and business application requirements. To apply for resources, guarantee the quality of services, how to rationally allocate resources, and whether resource reserves meet business development needs.


Third, the application of cloud computing technology in IT support system

3.1 Application of Cloud Computing Resource Pool in IT Support System

1, the type of cloud computing resource pool

According to providing different types of services, cloud computing can be divided into three kinds of service pools: IaaS, PaaS, and SaaS. The IaaS resource pool provides external hardware resources, including virtual host/storage/network resources. The PaaS resource pool provides application service engines externally, including application programming interfaces/operating platforms. By building a virtualized deskotherid2 cloud system, the desktop terminal with the original access, calculation, and storage evolved into a terminal that only completes access access, and storage and computing resources are migrated to a background resource pool for deployment. All applications are also deployed in the backroom.

2, the application of cloud computing resource pool

Through virtualization technology, equipment of IT support systems is organized into a resource pool system. Through the management tools, management protocols, and open interfaces provided by IT software and hardware vendors, various resources and equipment in the resource pool are managed, and cloud management platforms are received. The instructions complete resource deployment, configuration, scheduling, and other operational tasks, as well as reporting resource measurement information. A single-node cloud computing resource pool system is usually a physical node, and the IT resources contained in the same machine room do not exceed a distance of several hundred meters; the scope of a cross-domain cloud resource pool system across physical areas can be one. In the physical area, the contained IT resources can be distributed in different cities across different regions. Internally, multiple logical data centers/logical resource pools can be divided to correspond to a professional business system or user.

3, cloud resource pool networking

Based on factors such as service application characteristics and installed space in the equipment room, the resource pool can be divided into two types: single-node and extended-area.

(1) Cloud resource pool single node networking. Compared with traditional data center networks, cloud computing platform networking has increased virtual networks, virtual computing, and virtual storage tiers. At the same time, a large number of new cloud computing-related technologies have been applied. The network resource layer can use technologies such as virtual switching, 10 Gigabit Ethernet, unified switching, enhanced Layer 2, large Layer 2, and virtual firewall. (2) Cloud resource pool cross-domain networking. The technical requirements for cross-domain data centers are as follows: First, the IP and storage network interconnection devices and storage virtualization devices of the two nodes are isomorphic; secondly, the latency of the two-node IP and storage networks is less than 5 ms, and the resources are supported for cross-domain expansion. Business scenarios such as cross-domain hot migration and active-active data center service system; thirdly, the delay of two-node IP and storage network is greater than 5ms, and it supports the implementation of service scenarios such as active and standby data centers.

3.2 Application of cloud computing cloud desktop technology in IT support system

1, cloud desktop technology overview

The desktop cloud based on the thin terminal evolves desktop terminals with integrated access, calculation, and storage as the terminal only completes access access. The storage and computing resources are migrated to the background resource pool for deployment. All applications are also deployed in the back-office equipment room. The comparison between desktop and cloud desktop is shown in Figure 2.

The characteristics of traditional distributed desktops and cloud desktops are as follows: (1) Distributed desktop terminals: Terminal devices include access, computing, and storage components; and personal configurations such as operating systems and application software must be deployed at the terminals. (2) Cloud desktop terminal: Front desk thin terminal devices access access, and the back room deploys computing and storage devices. The back-end server uniformly deploys personal configurations such as operating systems and application software.

2, cloud desktop implementation

Cloud desktop virtualization can be divided into desktop virtualization and application virtualization. Desktop virtualization can be divided into virtual desktops and remote desktops. The comparison of various virtualization technologies is as follows:

(1) Virtual desktops: The back-end server uses virtualized products to implement host virtualization, and end users can access their respective desktop work environments from thin clients through remote access protocols. Users have independent operating systems and strong customization capabilities; each virtual machine can enjoy exclusive CPU and memory resources, and the independence between virtual machines is strong; fault tolerance technology using a unified resource pool ensures high availability; (2) Remote Desktop: The back-end server adopts the remote desktop architecture, and the thin client logs in to the back-end server through the remote access protocol. Each user has different desktops based on the same operating system. Users share CPU resources and user isolation is poor. If different users need to access an application on the same operating system at the same time, the program needs to support multiple instances; when an operating system error or physics occurs When a server fails, a large number of users and services on the server will be unavailable. (3) Application virtualization: The user's local client presents the user interface of an application rather than the entire desktop, and the resource overhead is the lowest; different users need to simultaneously access an application on the same operating system. Multiple instances are supported; however, different applications accessed by the same user may be deployed on different operating systems and data exchange between applications cannot be implemented.

3, cloud desktop application and technology selection

(1) Cloud desktop application scenario. The cloud desktop can be widely used in seats to solve the problems of traditional distributed desktop terminals. First, there is a hidden security risk in customer information; second, computer decentralized management causes difficulties in maintenance and update; and third, high energy consumption and noise. (2) application technology selection. For the seat application scenario, three different implementations are selected as follows: First, remote desktop. When the operating system crashes or server hardware fails, services cannot be dynamically migrated. At the same time, a large number of users experience service interruptions at the same time. It is not suitable for promotion in service centers that require high business continuity. The second is desktop virtualization. The bottom layer is completely virtualized and can realize advanced functions such as high reliability of virtualized software and automatic resource allocation. Virtual desktops can provide better and diverse desktop experiences than virtual applications and are suitable for popularization in customer service centers. The third is application virtualization. The desktop of the customer service staff has the problem of multi-application collaboration and a large amount of data interaction. It is not suitable for promotion in the customer service center. By comparison, it is recommended to select the implementation of desktop virtualization.

IV. Conclusion

The introduction of cloud computing technology in the construction of IT support systems is the trend of information technology development. However, how to maximize the effectiveness of cloud computing applications requires the cooperation and adjustment of various specialties in addition to selecting the appropriate technology selection.

Source-one cloud merchant is an online omni-channel supply chain management system that is located in outdoor equipment, sporting goods, clothing shoes and bags. Source cloud provider is based on the cloud and adopts SaaS mode and B/S architecture. It does not need to install client and database software locally, which simplifies the use and upgrade of the system, saves IT personnel and reduces maintenance costs. Support the use of terminals such as PCs, PADs, and smart phones, and strive to be professional and easy to use, and achieve seamless connection of upstream and downstream information in the industry supply chain B2B2C, helping industry brand owners and retailers to improve the level of operation and management under the “Internet Plus” environment , Improve efficiency and reduce costs.

The emergence of source-cloud business will also become a true embodiment of cloud computing technology in the outdoor industry.


Source: Internet, edited and published by equipment cool, reprint please indicate the source!

Disclaimer: This article is reproduced on the Internet. If copyright is involved, please contact us!

White Security Envelopes

Sun Kee Envelopes Limited , https://www.sunkeeenvelope.com

Posted on