Cloud data center
The literature review, in this case, focuses on the cloud computing data center, and it does address energy as well as trade-off performance. The server within cloud data center is virtualized in the cloud environment hence the instances of virtualization must be handled with a lot of care to improve machines as well as the host efficiency. Cloud computing is a technology which has the capability to achieve massive data storage, efficient communication process, performance at a higher rate, hosting as well as services on demand to all the cloud consumers. The rate at which social application, as well as e-business, is growing, calls for an increase in the number of data centers (Abid et al., 2012, p. 1-4). A major challenge that is faced by this technology is the issues of global warming in addition to climate change. However, from the study carried out by different computer experts, the only available option for the future generation is the data center technology.
On the other hand, the data center can be viewed as a combination of computing systems as well as network infrastructure supports. The IT system comprises the following, networking devices, storage devices, servers, software stacks, as well as middleware (Corbet et al., 2012, p. 10). While the infrastructure support consist of a power distributing units, backup power generators, cooling technology systems, batteries as well as uninterruptible power supplies. There are three structures available within cloud computing; (a) private clouding or else company clouding which has been designed for that require more management as well as monitoring their data privately. (b) Public cloud, which any cloud consumer can assess significant information according to IDC report. (c) Hybrid cloud, which incorporates both private as well as public clouds.
Asterisk PBX
Several portion of reviewed literature on Asterisk indicates that there is difference utilization of the entire system, but the most significant are the approach of the software. For instance, rather than switching analog lines within the hardware, it routes as well as deploys VoIP packets within the software. Therefore, the mainstay of the system typically becomes an IP empowered network as well as phones which can be hooked into it. Consequently, it also supports the old analog phones by utilizing the gateway devices (Dart et al., 2014, p. 174). The researchers who have been performed on the significant of Asterisk shows that it has the capability of giving more features from conventional PBX. Several features such as paging, voice mailing, conferencing, music on hold and IVR are achievable with this device. Additionally, every Asterisk user can provide service to both digital and analog phones, perform voice mailing as well as teleconferencing services, operating small or else massive queues for all call centers in addition to developing a call logic routing so as to choose the least expensive way to route a particular call (Fukushima et al., 2014, p 64).
Architecture of Asterisk
The design of Asterisk is very flexible, and particularly APIs are well-defined for maximum within the PBX core system. This enhances the internal interconnection of the PBX from a particular protocols and hardware codes interfaces from the telephony application (Gupta et al., 2013, p. 4). Hence, Asterisk can utilize any appropriate hardware as well as the technology available presently or in the future to carry out its essential functions of connecting hardware application. There is also a PBX Switching, which explicitly connects callers arriving on different hardware as well as software interfaces. The available codec module aid in encoding as well as decoding various formats used within the telephony industry (Khaldi et al., 2014, p 290).
Linux Operation System and DMZ
Computer networks consist of the system that interconnects computers with an objective of sharing the digital information. Networking concept initiated in 1962 at MIT when a server was connected to Santa Monica in Canada. And there is a need for an operation system to facilitate the networking process (Rahman &Islam 2014, n.p). Therefore, Linux OS has been recommended as the most valuable for operating network servers because of its free coding mechanism. According to Linux Foundation (2012), about seventy-two percent of the modern companies utilizes Linux-based systems in their servers at the datacenter. This is because Linux is an open source software and can quickly be adopted by various IT companies (Secci & Murugesan 2014, p. 84). Since cloud computing is an evolving technology, the significant concern is about the security measures.
Some IT vendors such as Microsoft, Citrix as well as Red Hat have been investing largely in Virtualization although it does not have enough security capability for a network about cloud computing. Security efficiency of virtual DMZ in both private and public cloud was explored through the usage of vCloud Director 5.5 as well as vCenter Server 5.5. A Demilitarized Zone do exist in between internal network as well as outside the network (Singh 2012, n.p). It comprises services and devices which are utilized mostly for a business model for a firm. Since DMZ separates internal LAN from the untrusted networks, it has the capacity provide an additional layer of security to local area network because it constrains hackers from accessing both internal servers as well as data directly through the internet. Therefore, any service which is given out to the users on the internet. The most applied means of designing a network with the DMZ are a single firewall or else double firewall. In conclusion, for higher security in networking, two firewalls has to be created by using DMZ. The first firewall is known as the perimeter firewall, and it has been designed to allow traffic destined towards DMZ only. While the second, firewall only allow traffic from a DMZ towards internal network only (Yao et al., 2013, p. 75).
References
Abid, F., Izeboudjen, N., Bakiri, M., Titri, S., Louiz, F. and Lazib, D., 2012, December. Embedded implementation of an IP-PBX/VoIP gateway. In Microelectronics (ICM), 2012 24th International Conference on (pp. 1-4). IEEE.
Corbet, J., Kroah-Hartman, G. and McPherson, A., 2012. Linux kernel development: How fast it is going, who is doing it, what they are doing, and who is sponsoring it. The Linux Foundation, pp.1-13.
Dart, E., Rotman, L., Tierney, B., Hester, M. and Zurawski, J., 2014. The science dmz: A network design pattern for data-intensive science. Scientific Programming, 22(2), pp.173-185.
Fukushima, M., Yoshida, Y., Tagami, A., Yamamoto, S. and Nakao, A., 2014, July. Toy block networking: Easily deploying diverse network functions in programmable networks. In Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International (pp. 61-66). IEEE.
Gupta, P., Agrawal, N. and Qadeer, M.A., 2013, July. GSM and PSTN gateway for asterisk EPBX. In Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on (pp. 1-5). IEEE.
Khaldi, A., Karoui, K., Tanabene, N. and Ben Ghzala, H., 2014, April. A secure cloud computing architecture design. In Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2014 2nd IEEE International Conference on (pp. 289-294). IEEE.
Rahman, M.M. and Islam, N.S., 2014. VoIP Implementation using Asterisk PBX. IOSR Journal of Business and Management (IOSR-JBM), 15(6).
Secci, S. and Murugesan, S., 2014. Cloud networks: Enhancing performance and resiliency. Computer, 47(10), pp.82-85.
Singh, S.R., 2012. Virtualization and information security: A virtualized DMZ design consideration using VMware ESXi 4.1.
Yao, Y., Cao, J. and Li, M., 2013. A network-aware virtual machine allocation in cloud datacenter. In Network and Parallel Computing (pp. 71-82).