Cloud Computing
Cloud Computing
SUBMITTED TO
APRIL, 2022
1
DECLARATION
We, are declaring that this project is written by us and it is a record of our research works, it has not
been presented for the award of any diploma degree in any institution of higher learning. This idea,
observations, comments, suggestions, and expressions in this work is our own convictional academic
traditions.
2
APPROVAL PAGE
This is to certify that this project: Cloud computing a better means of outsourcing, carried out by
group 6(D) in the Department of Computer Science, School of Information Technology, Federal
Polytechnic Nasarawa, Nasarawa State, under my supervision.
_________________
Project Supervisor Date and Signature
__________________
Head of Department Date and Signature
3
DEDICATION
We dedicate this project work to God Almighty for His divine mercies, faithfulness, guidance,
protection, favour and provision all through the course of my studies to this project, and also to our
parents and siblings, words alone are not enough to express our gratitude to you all.
4
ACKNOWLEDGEMENTS
Our appreciation goes to Almighty God for the strength, favour and divine wisdom in
keeping me alive and healthy during this journey.
We express our profound gratitude to our supervisor, MALL. ALIYU, HASSAN A., for the time
and effort to ensure the successful completion of this project works. We are very grateful sir.
Our sincere gratitude goes to our parents. To our fellow friends and course mates who
stood by us through thick and thin for their great support, word of advice and prayer. May God
Almighty bless you all.
5
TABLE OF CONTENTS
Title page i
Declaration Page ii
Certification iii
Dedication iv
Acknowledgement v
Table of Contents vi
Abstract viii
Chapter One: 1
Introduction 1
1.0 Background of the Study 2
6
3.6 Reliability and Validity of Instrument 19
3.7 Techniques of Data Analysis 20
3.8 Scoring of The Research Instrument 20
3.9 Decision Rule 21
3.10 System Design 21
3.11 Architectural Design 22
Chapter Four: 26
Data Analysis and Interpretation 24
4.1. Bio Data of Respondents 26
Chapter Five: Summary, Conclusion And Recommendation 37
5.1. Summary 37
5.2. Conclusion 37
5.3. Recommendation 37
References 38
7
ABSTRACT
The research focuses on cloud computing as a better means of its outsourcing. It provides an
analytical framework in the nature of cloud computing, characteristics and service models. It also
provides a detail study on cloud computing as a better means of it outsourcing.
8
CHAPTER ONE
INTRODUCTION
Cloud computing is a model for enabling ubiguitions, convenient, on-demand network access
to a shared pool of configurable computing resources (e.g. networks, servers, storage
applications and services) that can be rapidly provisioned and released with minimal
management effort or service provider interaction.
Although this widely adopted description of what makes a cloud computing solution is very
valuable, it is not very tangible or easy to understand. Why is cloud computing different than
just visualizing alone which is commonly mistaken to be cloud computing as well.
Cloud computing is composed of five essential characteristics, three deployment models and
four service models. The essential characteristics consist of;
B. Board network access; cloud computing resources are accessible over the network,
supporting heterogeneous client platforms such as mobile devices and workstations.
C. Resource pooling; service multiple customers from the same physical resources, by
securely separating the resources on logical level.
D. Rapid elasticity; resources are positioned and released on demand and/or automated
based on triggers or parameters. This will make sure your application will have
exactly the capacity it needs at any point in time.
E. Measured service; resource usage are monitored, measured and reported (billed)
transparently based on utilization.
Therefore cloud computing is much more than just visualization. IT’s really about utilizing
technology as a service. Users need little to no knowledge in the details of how a particular
service is implemented, on which hardware, on how many cpu’s and so on. All that is
9
important for a user is to have a good understanding of what the service offers and what it
does not and how to operate the self-service portal.
When it comes to outsourcing everyone has a tale of woe. Some software vendor that
outsources a new development project could not meet dead line because they were amateur
so they switch from one platform to another. But the big question is who reach the platform,
did the customer work daily? (NO). Did it have automated status reputing (it did not)
Outsourcing is a key part of ever modern IT group. The problem is we still don’t seem to do
it well, hence, many business technology professional fire vendors within a short period of
time. Companies using IT outsourcing speak of the importance of managing outsourcing
better.
IT outsourcing is moving up the stack as vendors take over increasingly strategic functions.
Nearly six to ten IT shops outsource some critical function. Management, engineering or
development, almost one fourth keep executive and management functions in-house but look
to outsource everything else as companies relies more on outsiders, a lack of oversight ,
management and even monitoring can have catastrophic consequences.
Cloud computing blurs the lines between what had been conventional outsourcing and
internal operations and it will test IT’s management and control policies. Therefore the
research seeks to investigate cloud computing as a better means of IT outsourcing.
The problem confronting this research is to investigate cloud computing as a better means of
IT OUTSOURCING
The aim of this project work is to investigate cloud computing as a better means IT
outsourcing.
10
To achieve the above aim, the study has the following objectives;
1. To offer a controlled approach for the problem of security, privacy and trust issues
from the end users of cloud services.
2. To offer benchmark for the amount of resources users can store in the cloud service
which solves the problem of scalability and load balancing.
AUTOMATED STATUS UPDATE: are great way to update your simple In/Out status
without doing anything. Your status will be updated automatically when you enter or exit a
location when you are carrying your device.
11
CLOUD COMPUTING is a model for enabling ubiquitous, convenient, on-demand and
network access to a shared pool of configurable computing resources (e.g. networks, servers,
storage, applications and services) that can be rapidly positioned and released with minimal
management effort or service provider interaction . Edwin .s (2014).
CONTROL POLICIES: outlines the controls placed on both physical access to the
computer system and to the software in order to limit access to computer network and data.
CHAPTER TWO
LITERATURE REVIEW
12
applications, and services) that can be rapidly Provisioned and released with minimal
management effort or service provider interaction. (Mell and Grance, 2011)
Other attempts to define clouds computing which assist to have a broader perspective and
understanding of the technology are:-
i. Cyber infrastructure (cloud) is a collection of computing resources that increases
efficiency, quality and reliability by capturing commonality among application needs and
felicitates the efficient sharing of equipments and services (Vouk, 2004).
ii. Cloud computing is not a new technology; it is a new business model wrapping round
technologies, such as server virtualization, to reduce the cost of using information technology
resources. It takes advantage of Web-based
1. Utility services are accessed so frequently that they need to be available whenever the
consumer requires them at any time. Consumers are then able to pay service providers based
on their usage of these utility services. (Buyya et al., 2009) Technologies to allow scalable,
virtualized IT resources to be provided as a service over the network (SNIA, 2009).
iii. Cloud is a type of parallel and distributed system consisting of a collection of inter-
connected and virtualized computers that are dynamically provisioned and presented as
2.3 History of Cloud Computing
Information technology has had a continuous evolution paradigm shifts, for example from
Main frames to the advent of personal computers and most recently mobile computing, from
standalone computing, peer–to-peer, client-server, distributed systems and the breakthrough
of all times the internet in the 1990 (David, 2009).
Cloud computing gained popularity in October 2007 when IMB and Google announced
collaboration in the domain. IBM followed up by announcing “Blue Cloud”. (Vouk, 2004)
2.3.1 Cloud Computing Predecessor Paradigm
Buyya (2009) describes cluster computing and grid computing as the immediate building
block of cloud computing. He gives the following description:-
Cluster – the resources in a cluster are located in a single administrative domain and
managed as single entity.
Grid system- the resources are geographically distributed across multiple administrative
domains with their own management policies and goals
13
Cloud computing – the cloud platform possesses characteristic of cluster and grids plus its
own special attributes and capabilities such as virtualization, dynamic services with web
services interfaces, and support for creating 3rd party value added computing storage and
application services.
2.4 Cloud Computing Service Models
The models are based on NIST definition of cloud computing (Mell and Grance, 2011).
2.4.1 Cloud Software as a Service (SaaS).
SaaS provides the consumer the ability to use the provider’s applications running on a cloud
infrastructure. The applications are accessible from various client devices through a thin
client interface such as a web browser (e.g., web-based e-mail, Gmail, yahoo, cooperate
email). The implication of this consumer rents services from the provider rather than buying,
installing and running their own software.
2.4.2 Cloud Platform as a Service (PaaS).
PaaS Provides the consumer the ability to deploy onto the cloud infrastructure consumer-
created or acquired applications created using programming languages and tools supported
by the provider. It implies that customers can develop and execute application in abstraction
of the underlying infrastructure. E.g. Microsoft Azure and Google App Engine
2.4.3 Cloud Infrastructure as a Service (IaaS).
IaaS Provides the consumer the ability to process, store, use networks, and other fundamental
computing resources where the consumer is able to deploy and run arbitrary software, which
can include operating systems and applications. The provider gives a solution that offers
computing power and storage space on demand.
E.g. Rackspace and Amazon S3
2.5 Characteristics of cloud computing
2.5.1 On-demand self-service
A consumer can unilaterally get computing capabilities such as server time and network
usage automatically without human interaction (Mell and Grance, 2011).
2.5.2 Broad network access
This is very vital for it helps in giving high capacity connectivity where large amount of data
can be transmitted.
2.5.3 Resource pulling
14
The provider’s computing resources are pooled to serve multiple consumers using a multi-
tenant model, with different physical and virtual resources dynamically assigned and
reassigned according to consumer demand. (Mell and Grance, 2011).
2.5.4 Rapid elasticity/ infinite capacity / Dynamism
Capabilities can be rapidly and elastically provisioned, in some cases automatically, to
quickly scale out and rapidly released to quickly scale in. to the consumer the capabilities
available for provisioning often appear to be unlimited and can be purchased in an quantity at
any time. (Mell and Grance, 2011)
2.5.5 Measured services
This is where consumer is billed on what they spend. Resource usage can be monitored,
controlled and reported, providing transparency for both the provider and consumer of the
utilized service. (Mell and Grance, 2011)
2.5.6 Abstraction of infrastructure
Computer, network and storage infrastructure resources are abstracted from the application
and information resources as a function of service delivery this is made possible by high
level of virtualization (Beaker, 2009).
2.5.7 Resource Democratization
The abstraction of infrastructure yields the notion of resource democratization – whether
infrastructure, applications, or information – and provides the capability for pooled resources
to be made available and accessible to anyone or anything authorized to utilize them using
standardized methods for doing so. (Beaker, 2009)
2.5.8 Service oriented Architecture
As the abstraction of infrastructure from application and information yields well defined and
loosely-coupled resource democratization, the notion of utilizing these components in whole
or part, alone or with integration, provides a services oriented architecture where resources
may be accessed and utilized in a standard way. In this model, the focus is on the delivery of
service and not the management of infrastructure. (Beaker, 2009)
2.6 Cloud Deployment Model
According to NIST (Mell. et al, 2011) there are four cloud deployment models namely:-
2.6.1 Private cloud
15
Cloud infrastructure is operated solely for an organization. It may exist on or off
organization’s premise and management could be outsourced or not. Private cloud could be
shared by several organizations that are interrelated and has shared concern like mission,
security requirement, policy, and compliance consideration and business and client base.
2.6.2 Public This is made available to the general public or a large industry group and is owned by
an organization selling cloud service.
2.6.3 Hybrid
This could be composition of two or more clouds bounded together by standardized or
proprietary technology that enable data and application portability.
Source: 2010 International Conference on Computer Application and System Modeling
(ICCASM 2010) (Jingyu, 2010) Figure 2.1 Conceptual Model of Cloud Computing
2.7 Benefits of Cloud Computing
According to (David, 2009) Cloud computing offers a number of benefits, including the
potential for:
i. Rapid scalability and deployment capabilities (providing just-in-time computing
power and infrastructure)
ii. Decreased maintenance/upgrades
iii. Improved resource utilization—elasticity, flexibility, efficiencies
iv. Improved economies of scale
v. Improved collaboration capabilities
vi. Ability to engage in usage-based pricing, making computing a variable expense,
rather than a fixed capital cost with high overhead 12
vii. Reduced information technology (IT) infrastructure needs—both upfront and support
costs
viii. Capacity for on-demand infrastructure and computational power
ix. Green-friendly—reduced environmental footprint
x. Improved disaster recovery capabilities
xi. Nein (2009) cites the following benefits cost reduction, increased flexibility, access
anywhere, easy to implement, service quality, delegate non-critical application,
always the latest software, sharing and group collaboration.
16
Source: International Journal of Advancements in Technology (Motahari, et al,
2009)Figure 2.2 Benefit of Cloud Adoption
Challenges of Cloud Computing
Federal Government CIO (Kundra, 2011) underscores security, interoperability, and
portability as major barriers to further adoption and use of cloud computing ervices. At the
IEEE 2010 conference (Tharam et al, 2010) pointed out that charging model, costing model,
security, service level agreement and what to identification to migrate to Cloud computing as
part of adoption challenges for cloud computing.
In a more specific angle, (David, 2009) highlights the following 10 issues as the major
challenges government leaders face while shifting to cloud computing.
i. The Need for Scalability
ii. The Need for High Reliability
iii. The Need for Securing Data in the Cloud
iv. The Need for Open Standards and Interoperability
v. The Need to Revise Procurement Practices
vi. The Need to Resolve Potential Legal Issues
vii. The Need to Regulate the “Cloud Market”
viii. The Need for Government Cloud Coordination
ix. The Need to Redefine the Roles of the IT Workforce
x. The Need to Assess the Return on Investment of Cloud Computing
2.8 Cloud Computing In Public Sector
Governments and public sector should come up with progressive, supportive and adoptable
government policies which encourage the development of Cloud computing in public sector.
They should also address issues of technology and standards for interoperability. This should
be done in line with existing laws and regulation of the land (Michael, 2009).
It means that Government will be the leading sector in the development of cloud computing
across the wider economy (David, 2010). Experience shows that the benefit of a new
technology can only be realized when enterprises change their structure and processes to take
advantage of technological innovation (Khajeh et al, 2010).
2.8.1 Federal Government US
17
Cloud computing offers the government an opportunity to be more efficient, agile, and
innovative through more effective use of IT investments, and by applying innovations
developed in the private sector (Kundra, 2011). Federal cloud computing strategy states that
if governments are going to become early adopters of Cloud services, they must overcome
bureaucratic, regulatory, and cultural barriers to resource sharing that could slow the
adoption of Cloud computing. Government IT procurement rules covering purchase of
hardware and software must be updated to enable purchase of Cloud services (Nelson, 2009).
Federal government has instituted massive changes in the IT strategy, both in mindsets and
operations. It believes that cloud computing represented a ‘tectonic shift’ in computing
technology and predicted that cloud will do for government what the internet did in the ‘90s’
(David, 2010).
2.8.1.1 Federal Government cloud strategy
In February 2011 Federal Government cloud strategy states that current Information
Technology (IT) environment is characterized by low asset utilization, a fragmented demand
for resources, duplicative systems, environments which are difficult to manage, and long
procurement lead times. These inefficiencies have a direct negative impact on the Federal
Government’s ability to serve the American public; the strategy reckons that there could be
massive improvement with the adoption of Cloud computing (Kundra, 2011).
The federal government commitment towards public cloud computing includes financial
supports and other incentives which include, $80 Billion IT spending $20 Billion is set aside
for Cloud computing, and the appointment of cloud computing Chief Information Officer just
to oversee the cloud computing agendas. The Government has instituted Cloud First policy to
harness the benefit of cloud computing and accelerate its adoption. All agencies are supposed
to evaluate safe, secure cloud computing options before making any new investment. The
cloud first policy was preceded by Federal Government Cloud Computing Initiative of
September 2009 (Kundra, 2010)
The main highlights of the Federal cloud computing strategy articulate how individual
organization should go about adopting to cloud computing and how the government should
assist organization in the same endeavor.
These follows under the list below as extracted from the strategy.
18
i. Agencies should Articulate the benefits, considerations, and trade-offs of cloud
computing
ii. Provide a decision framework in migrating towards cloud computing
iii. Highlight cloud computing implementation resources
iv. Identify Federal Government activities and roles and responsibilities for catalyzing
cloud adoption
2.8.1.2 Federal Government Decision Framework for Cloud Migration
In the strategy decision framework for cloud migration highlights how the agencies should
decide on the migration processes. It also underscore that organization should see IT in form
of commoditized computing service not as investments in servers, application and networks
owned by department.
Figure 2.3 Decision Framework for Cloud Migration (Kundra, 2011)
2.8.1.3 Selecting service to move to the cloud
This is a road map to prioritize services that have high expected value and readiness to
maximize benefit received and minimizes delivery risk.
It’s important to note that the strategy directs that for organization to determine the value
they should consider efficiency, agility and innovation. For cloud readiness determination,
security requirement, statutory compliance, data characteristics, privacy, confidentiality,
integrity, data controls and access policies and governance should be considered.
2.8.2 G-cloud strategy in UK
2.8.2.1 Digital British initiative G-cloud strategy
G-cloud is government- wide cloud computing network according to (David, 2010).
Through the Digital British initiative, G-cloud strategy is written by the representative from
public sector organizations and the ICT industry. Its objective is to set out how public sector
will realize the benefit of cloud computing. It outlines the following inter-related initiatives
as the driving force. (Vouk, 2010).
i. The Government Cloud (G-Cloud) infrastructure will provide a secure and resilient
shared environment through which public sector bodies can resource ICT service at
greater speed and lower cost.
ii. The Application Store for Government (ASG) will be a marketplace to review,
compare and select online G-Cloud business applications on a pay byuse basis.
19
iii. The Data Centre Strategy will significantly reduce the number of data centers used by
central Government to host G-Cloud and other ICT services. This will bring
substantial savings in cost and energy consumption.
iv. Lower ICT Costs, Faster and flexible, services and more joined up government
services.
2.8.3 Japanese Kasumigaseki cloud
The Japanese’ Kasumigaseki cloud’ is a national government initiative seeking to have a
private cloud environment that would eventually host all the Japanese government’s
computing. According to Japan’s ministry of internal affairs and communication the
Kasumigaseki Cloud will allow for greater information and resource sharing and promote
more standardization and consolidation in the government’s IT resources (David, 2010)
Source: Government of Japan, Ministry of Internal Affairs and Communications (2009).
Figure 2.4 The Japanese Government’s Kasumigaseki Cloud
20
such as infrastructure-as-a-service layer, platform-as-a-service layer and Application-as-a-
service layer on top(Weinhardt et al., 2009).
Infrastructure in the cloud: - the enabler layer that provide basic technologies for cloud
computing. E.g., storage and computing .
power Platform in cloud: - this provide solution on top of infrastructure that provide value
added services, Could be categorized as business platform and development platform
Application layer in the Cloud is the customer interface layer.
2.8.6 Cloud Migration Strategy
In his paper a model based approached to implement cloud computing in EGovernance
(David, 2010) highlights eight fundamental elements that are vital for cloud computing
concepts which should be used in both public and private sector.
i. Universal connectivity – users must have near-ubiquitous access to the internet
ii. Open Access- users must have fair, non-discriminatory access to the internet
iii. Reliability – the cloud must function at level to or better than current standalone
systems
iv. Interoperability and user choice- users must be able to move cloud platform.
v. Security – user’s data must be safe
vi. Privacy users rights to their data must be clearly defined and
vii. Economic value- the cloud must deliver tangible savings and benefits
viii. Sustainability – the cloud must raise energy efficiency and reduce ecological impact
The paper further discusses Cloud migration strategy in a six stages process which should be
followed to successful migration to cloud computing, the six stages are :-
i. Learning – (knowledge transfer) This involves learning about cloud computing
basics through seminars, networking, talking with vendors and reading
ii. Organizational Assessment –baseline assessment
The IT manager should conduct an assessment of their present IT
needs, structure, and capacity utilization.
iii. Cloud pilot
One area should be used as the pilot.
iv. Cloud-Readiness assessment
21
After the pilot run, the managers should conduct an overall cloud readiness
assessment to determine if their organization has data and application that could
readily move to cloud environment. The manager should have a modality to
determine which services are eligible and which are not.
v. Cloud Rollout Strategy
This stage you rollout your cloud computing strategy, gaining buy-in from both
organizational leadership and IT staffers. You communicate with external and
internal stakeholders the goals, progress and cost benefit of the cloud project. This is
the step cloud becomes a normal organizational operation.
2.8.7 HP Government Cloud Roadmap Service
Hp proposes HP Transformation planning tool and HP Cloud Capability Framework. (HP,
2011).
The model that helps the organization to do self assessment before implementing cloud in
this line:-
i. the service that are right for cloud and which are not.
ii. What are the cost trade off, and the best way to build an effective private cloud for
posterity?
iii. It guides on organizational compliance to legislation and regulation
iv. It focuses on security
v. That the cloud will guarantee achievement of expected benefits.
vi. Assists in building a flexible environment and accommodate changing business
requirement
vii. Create a business return on investment (ROI) case and payback analysis as well as
alternative scenarios.
In a nut shell HP proposes a model that helps organizations to use the best practices to
achieve the benefits, within the scope by doing gap analysis, where the results is used to
develop a high level architecture, financial case, organization model , master program plan
and mission goals. All this is done with the aid of HP Transformation Planning tool and HP
Cloud Capability Framework
2.8.8 Australian Cloud Computing Strategic Direction
22
The Australian Department Of finance and Deregulation draft paper on Cloud Computing
strategic direction (Austratilian Government, 2011) recognizes three streams that need to be
resolved before critical government services can be transitioned to the cloud as follow:-
i. Stream One – provide agencies with guidance and tation
ii. Stream Two – Encourage agencies to adopt public services for public facing
unclassified government services and to undertake proof of concept studies to fully
understand the risks of the cloud environment.
iii. Stream Three- encourage a strategic approach to cloud.
2.8.9 Aneka Cloud Application
Figure 2.6 Aneka Cloud Applications
Aneka is a platform for developing resource-intensive and elastic applications and their
deployment on Clouds. It can harness a huge variety of physical and virtual resources,
ranging from desktops, clusters, to virtual datacenters, to provide a single logical “application
execution layer”. The key components of the platform are depicted in the diagram, which
gives an overall view of Aneka from its foundations to the applications and the end user
services. The platform is based on an extensible
Service Oriented Architecture (SOA), which makes the integration of new components,
incremental development of new features, and infrastructure deployment and configuration
seamless tasks (Rajkumar and Karthik, 2011).
2.8.10 Key Metrics and scenarios for government cloud g
2.8.10.1 Metrics
Some important metric by (Nein, 2009) to be considered for cloud adoption are: -
i. Net Present Value (NPV) is calculated for as each cloud scenarios discounted net benefits
(i.e., the cloud scenario's reduced operations and support [O&S] costs relative to the SQ
environment's O&S costs) minus the clouds discounted one-time investment costs. A
positive dollar figure indicates a positive economic benefit versus the SQ environment.
NPV is an absolute economic metric.
ii. Benefit-to-Cost Ratio (BCR) is calculated for each cloud scenario's discounted net
benefits divided by its discounted investment costs. A number greater than 1.0 indicates a
positive economic benefit versus the SQ environment. BCR is a relative economic metric.
23
iii. Discounted Payback Period (DPP) reflects the number of years (from FY10) it takes for
each scenario's accumulated annual benefits to equal its total investment costs.
2.8.10.2 Analysis scenario
For the choice of the cloud model (Nein, 2009) suggest the following consideration to be
done
i. To Use public clouds
Key Agency Characteristic: Migrates low-sensitivity data to an ublic cloud.
Assumptions: Transition to the new cloud environment will occur steadily over 3
years; workload remains constant (i.e., no increase in capacity demand).
ii. Build private clouds
Key Agency Characteristic: Builds its own private cloud solution or participates in an
interagency cloud solution (i.e., community cloud).
Broad mission sensitivity results in the need to maintain control of infrastructure and
data.
Assumptions: Transition to the new cloud environment will occur steadily over 3
years; existing facilities will be used (i.e., no new investment is required in physical
facilities); workload remains constant (i.e., no increase in capacity demand).
iii. Adopt a hybrid approach
Key Agency Characteristic: Uses a private cloud solution to handle the majority of its
IT workload; also uses a public cloud solution to provide "surge" support and/or
support for low-sensitivity data.
Assumptions: Seventy-five percent of the IT server workload will migrate to a private cloud,
and the remaining 25 percent will transition to a public cloud; transition to the new cloud
environments will occur steadily over 3 years; existing facilities will be used (i.e., no new
investment is required in physical
2.9 Summary
The literature review indicates that the researchers have concentrated on the infrastructural
frameworks and there is a common understanding in this regard. All the vendors and user of
the cloud have a common agreement on the cloud implementation framework. What they
refer to as architectural framework.
24
This is lacking in the way of how organization can achieve the implementation. They are not
providing specific strategies, polices, guidelines or rules. The human factor is missing in this
frameworks or models. An indication that with the cloud architecture available it’s the
solitary duty of the organization to come up with the cloud computing strategies polices
guideline and rules.
This research will borrow heavily on the existing works and propose an implementation
framework for the DeG Kenya out of the outcome of the case study.
CHAPTER THREE
RESEARCH METHODOLOGY
3.0 INTRODUCTION
This chapter covers the description and discussion on the various techniques and procedures
used in the study to collect and analyze the data as it is deemed appropriate.
25
3.1 RESEARCH DESIGN
According to Asika (2009), research designs are often referred to as the structuring of
investigation aimed at identifying variables and their relationships to one another. In this
study, questionnaire serves as useful guide to the effort of generating data for this study. The
survey research design through the administration of questionnaires was used for the study.
The Federal Polytechnic, Nasarawa was established on 1 st July, 1983 by the Federal
Government of Nigeria. The establishment of the Polytechnic was predicted on the
Government’s desire to transform the society technologically.
The Convenient sampling technique was used in selecting 50 computer science students in
the University from the entire population. This was chosen due to the financial strength of the
researcher coupled with time constraints.
These are the tools or methods used in getting data from respondents. In this study,
questionnaires and interview are research instruments used. Questionnaire is the main
research instrument used for the study to gather necessary data from the sample respondents.
The questionnaire is structured type and provides answers to the research questions and
hypotheses therein.
This instrument is divided and limited into two sections; Section A and B. Section A deals
with the personal data of the respondents while Section B contains research statement
postulated in line with the research question and hypothesis in chapter one. Options or
alternatives are provided for each respondent to pick or tick one of the options.
26
3.6 RELIABILITY AND VALIDITY OF INSTRUMENT
Reliability means the accuracy of precision of a measuring instrument while validity means
the extent to which the research instrument measures what it is supposed to measure. In order
to determine the reliability and validity of the study, the test-retest method was used. To have
a valid instrument, the questions in the questionnaire will be free from ambiguity (i.e the
questions will not be too complex). To have reliable instrument, the questionnaire will be
followed with interview of sample of respondents to know whether their view on the subject.
Having gathered the data through the administration of questionnaire, the collected data will
be coded, tabulated, and analyzed according to the research question and hypothesis.
In order to analyze the data collected effectively and efficiently for easy management and
accuracy, the simple percentage method was the analytical tools used for this research project
and a sample size of two hundred (200) will be represented by 100% for easy analysis the
responses.
Also, Correlation statistical analytical method will be used in the research work. Correlation
as a statistical technique is used in testing of hypothesis so as to predict what the relationship
between two variables should be. It is used in drawing and reaching conclusion by collecting
the observed values from the questionnaire administered to respondents, testing the degree of
freedom and carrying out a decision in determining the critical value of the hypothesis.
y = dependent factor
27
3.8 SCORING OF THE RESEARCH INSTRUMENT
Since the research instrument used was the questionnaire, it was designed using the liker
scale method. The questionnaire was designed in the following ways:
i) If the value of “r” tabulated is greater than “r” calculated, accept the alternative
hypothesis (H1) and .reject the null hypothesis (H0).
ii) If the “r” calculated is greater than the “r” tabulated, accept the null hypothesis (H 0)
while the alternative hypothesis is rejected
28
3.10 SYSTEM DESIGN
29
FRONT END
The front end is used by the client. It contains client-side interfaces and applications that are
required to access the cloud computing platforms. The front end includes web servers
(including Chrome, Firefox, internet explorer, etc.), thin & fat clients, tablets, and mobile
devices.
BACK END
The back end is used by the service provider. It manages all the resources that are required to
provide cloud computing services. It includes a huge amount of data storage, security
mechanism, virtual machines, deploying models, servers, traffic control mechanisms, etc.
CHAPTER FOUR
30
Table 1 sex of respondents
Valid Cumulative
Frequency Percent Percent Percent
Table 1 above shows the gender distribution of the respondents used for this study.
Valid Cumulative
Frequency Percent Percent Percent
Table 2 above shows the age grade of the respondents used for this study.
8 respondents which represent 25.0 percent of the population are between 31-40yrs
31
10 respondents which represent 31.2 percent of the population are between 41-50yrs.
5 respondents which represent 15.6 percent of the population are between 50-60yrs.
Valid Cumulative
Frequency Percent Percent Percent
Valid WASSCE/
4 12.5 12.5 12.5
SSCE
OND/HND/
10 31.2 31.2 43.8
BSC
PGD/MSC/
10 31.2 31.2 75.0
PHD
Table 3 above shows the educational background of the respondents used for this study.
Out of the total number of 32 respondents, 4 respondents which represent 12.5 percent of the
population are WASSCE/SSCE holders.
10 respondents which represent 31.2percent of the population are Table 3 above shows the
educational background of the respondents used for this study.
Out of the total number of 32 respondents, 4 respondents which represent 12.5 percent of the
population are FSLC holders.
8 respondents which represent 21.0 percent of the population are MSC/PGD/PHD holders
32
8 respondents which represent 21.0 percent of the population have other types of certificates.
Valid Cumulative
Frequency Percent Percent Percent
Table 4 above shows the marital status of the respondents used for this study.
‘Out of the total number of 32 respondents, 10 respondents which represent 31.2 percent of the
population are single.
Valid Cumulative
Frequency Percent Percent Percent
33
Table 5 above shows the level or position of respondents used for this study.
Out of the 32 respondents, 20 which represent 62.5 percent of the population are junior staff.
Valid Cumulative
Frequency Percent Percent Percent
Table 6 above shows the years of experience of the respondents used for this study.
Out of the 32 respondents, 8 which represent 25.0percent of the population have had 0-2yrs
experience at work.
10 which represent 31.2 percent of the population have had 3-5yrs experience.
4 which represent 12.5 percent of the population have had more than 12yrs experience.
34
Table 7 cloud computing has more benefits than making use of local
servers or a personal computer.
Valid Cumulative
Frequency Percent Percent Percent
Table 7 above shows that cloud computing has more benefits than making use of local servers or a
personal computer.
35
Table 8 cloud computing helps in getting more work done with less
people and less time.
Valid Cumulative
Frequency Percent Percent Percent
Table 8 above shows that cloud computing helps in getting more work done with less people and
less time.
36
Table 9 storing information in the cloud gives almost unlimited
storage capacity
Valid Cumulative
Frequency Percent Percent Percent
Table 9 above shows thatstoring information in the cloud gives almost unlimited storage capacity.
Valid Cumulative
Frequency Percent Percent Percent
Table 10 above shows thatthere is an increase in the use of cloud computing in Nigeria.
37
9 respondents which represent 28.1 percent of the population agreed.
Valid Cumulative
Frequency Percent Percent Percent
Table 11 above shows the responses of respondents that the level of IT outsourcing in Nigeria is
high.
38
Table 12 the impact of cloud computing on IT sourcing is High
Valid Cumulative
Frequency Percent Percent Percent
Table 12 above shows that the impact of cloud computing on IT sourcing is high.
RESEARCH HYPOTHESIS
Hypothesis 1
Decision rule: reject the null hypothesis if the p-value is less than the level of significance.
39
Table 11 Test Statistics
Chi-Square 21.437a
Df 4
Asymp. Sig. .000
a. 0 cells (.0%) have expected frequencies less than 5. The minimum expected cell
frequency is 6.4.
Conclusion based on the decision rule:
Since the p-value (0.000) is less than the level of significance (0.05), we reject the null
hypothesis and accept the alternative thereby concluding that the growth of cloud computing
is high.
Hypothesis 2
Decision rule: reject the null hypothesis if the p-value is less than the level of significance.
Chi-Square 21.437a
Df 4
Asymp. Sig. .000
a. 0 cells (.0%) have expected frequencies less than 5. The minimum expected cell
frequency is 6.4.
Conclusion based on the decision rule:
40
Since the p-value (0.000) is less than the level of significance (0.05), we reject the null hypothesis
and accept the alternative thereby concluding that the impact of cloud computing on IT sourcing is
high.
CHAPTER FIVE
5.1 SUMMARY
The proposed monitoring system is expected to be a part of the organization’s network. Like
existing devices, the additional devices and servers used by the monitoring system will also
be protected by the organization’s existing firewall, VPN or other security system.
5.2 CONCLUSION
Network monitoring and management is always a challenging task for large organizations
with complex network topology. It is tedious for network engineers/administrators to
manually check the operational state of hundreds or potentially thousands of devices in the
network topology.
41
5.3 RECOMMENDATION
i. Adopt an opportunistic approach in the use of cloud computing to meet both new and
existing needs.
ii. Establish standards and best practices applicable to cloud computing.
iii. Deliver a common platform environment.
iv. Act as a partner and broker in obtaining access to cloud resources for the polytechnic
community.
v. Provide resources to help support Department who choose cloud-based solutions for their
work in research, instruction, project, or outreach.
vi. Provide resources and support for experiential learning opportunities in cloud-based
technologies for students.
REFERENCES
Beaker. (2009). Cloud Computing security architechural framework, rational survivability.
Buyya, R., Yeo, Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud Computing
and Emerging IT Platform: Vision, Hype and reality for Delivering computing as a 5th
utility. Future generation computer system.
Cater-Steel and Al-Hakim. (2008). Information Systems Research Methods,
Epistemology, and Applications
Creswell. (1994). Quantitative and Qualitative Approaches.
David, C. W. (2009). 2010-07 IBM Business of Goverment Cloud Computing in
Goverment .
David, C. W. (2010). A model Based approach to Implement Cloud Computing in EGoverment.
International Journal of Computer Applications IJCA, .
Gay and Airasian. (2000). Selecting a Quantitative or Qualitative Research.
HP. (2011). Cloud consulting.
42