0% found this document useful (0 votes)
4 views

UNIT2 Architecture of Cloud Computing

Uploaded by

Swapnil Roy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

UNIT2 Architecture of Cloud Computing

Uploaded by

Swapnil Roy
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

IQRA BCA College-Bharuch

TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

UNIT-2: Architecture of Cloud Computing

 Basics of Planning and deployment of Cloud


o Before deploying applications to cloud, it is necessary to consider your business
requirements. Following are the issues one must consider:
 Data Security and Privacy Requirement
 Budget Requirements
 Type of cloud - public, private or hybrid
 Data backup requirements
 Training requirements
 Dashboard and reporting requirements
 Client access requirements
 Data export requirements
o To meet all of these requirements, it is necessary to have well-compiled planning.
In this topic, we will discuss the various planning phases that must be practised by
an enterprise before migrating the entire business to cloud. Each of these
planning phases are described in the following diagram:

1 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

1. Strategy Phase
o In this phase, we analyse the strategy problems that customer might
face. There are two steps to perform this analysis:

 Cloud Computing Value Proposition:


In this, we analyse the factors influencing the customers when
applying cloud computing mode and target the key problems
they wish to solve. These key factors are:

o IT management simplification
o Operation and maintenance cost reduction
o Business mode innovation
o Low-cost outsourcing hosting
o High service quality outsourcing hosting.

All of the above analysis helps in decision making for future


development.

 Cloud Computing Strategy Planning:


The strategy establishment is based on the analysis
result of the above step. In this step, a strategy document is
prepared according to the conditions a customer might face
when applying cloud computing mode.

2. Planning Phase
o This step performs analysis of problems and risks in the cloud application
to ensure the customers that the cloud computing is successfully meeting
their business goals. This phase involves the following planning steps:

 Business Architecture Development:


In this step, we recognize the risks that might be caused by cloud
computing application from a business perspective.

 IT Architecture Development:
In this step, we identify the applications that support the
business processes and the technologies required to support enterprise
applications and data systems.

 Requirements on Quality-of-Service Development:


Quality of service refers to the non-functional requirements such
as reliability, security, disaster recovery, etc. The success of applying
cloud computing mode depends on these non-functional factors.

2 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

 Transformation Plan Development:


In this step, we formulate all kinds of plans that are required to
transform current business to cloud computing modes.

3. Deployment Phase
o This phase focuses on both of the above two phases. It involves the
following two steps:

 Selecting Cloud Computing Provider


This step includes selecting a cloud provider on basis of Service
Level Agreement (SLA), which defines the level of service the provider
will meet.
 Maintenance and Technical Service
Maintenance and Technical services are provided by the cloud
provider. They need to ensure the quality of services.

 Technologies behind the Cloud


o There are certain technologies working behind the cloud computing platforms
making cloud computing flexible, reliable, and usable. These technologies are
listed below:
 Virtualization
 Service-Oriented Architecture (SOA)
 Utility Computing

o Virtualization
 In computing, virtualization refers to the act of creating computing
resources that have no physical presence, that is, they are virtual. These
virtual resources are fundamentally pieces of software that act like their
tangible counterparts. Thus, they are also called virtual machines.
 These virtual computing resources find many use cases in day-to-day life.
They enable a single computer, called the host, to run multiple operating
systems in isolation. Many of them also act as components of a physical
computer, such as storage locations or virtual routers, as well as
standalone computers. Users can also access virtualized applications
remotely and run them as if they are locally installed. In short, the
applications of virtualization are far and wide.

3 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

 Understanding Virtualization in Cloud Computing


o Virtualization, as a computing concept, has existed for over six
decades. Its first instance appeared in the late 1960s to facilitate
the sharing of computing resources within organisations using
mainframe computers. The goal was to utilise the processing
power of the mainframe by allowing multiple sub-systems to
access its resources.

o Since then, the definition of virtualization has undergone several


changes, although the fundamental premise remains the same.

o Today, virtualization is a term almost synonymous with cloud


computing. Cloud service providers are now offering on-demand
customised and user-centric virtual environments via the cloud.
All these environments share a single physical cloud server that
houses all the processing and storage hardware. The users,
however, experience these environments as if they are localised.

 Virtualization is a technique, which allows to share single physical


instance of an application or resource among multiple organizations or
tenants (customers). It does this by assigning a logical name to a physical
resource and providing a pointer to that physical resource when
demanded.

4 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

 The Multitenant architecture offers virtual isolation among the multiple


tenants. Hence, the organizations can use and customize their
application as though they each have their instances running.
 Virtualization is the process of creating a virtual environment to run
multiple applications and operating systems on the same server. The
virtual environment can be anything, such as a single instance or a
combination of many operating systems, storage devices, network
application servers, and other environments.
 The concept of Virtualization in cloud computing increases the use of
virtual machines. A virtual machine is a software computer or software
program that not only works as a physical computer but can also function
as a physical machine and perform tasks such as running applications or
programs as per the user's demand.
 Creating a virtual machine over existing operating system and hardware
is referred as Hardware Virtualization. Virtual Machines provide an
environment that is logically separated from the underlying hardware.
 The machine on which the virtual machine is created is known as host
machine and virtual machine is referred as a guest machine. This virtual
machine is managed by a software or firmware, which is known as
hypervisor.
 Hypervisor: The hypervisor is a firmware or low-level program that acts
as a Virtual Machine Manager.

 Types of Virtualizations in Cloud Computing

So far, we have seen what virtualization as a computing technique is and


how cloud computing leverages its principles. Now let us look at the
different types of virtualizations in cloud computing with some insights
into their nitty-gritty.

1. Server Virtualization
One of the primary reasons behind the need for virtualization was the
underutilization of hardware computing resources. And while all the
types of virtualizations today address this issue in their capacity, server
virtualization hits closer to home.

Server virtualization refers to partitioning the resources of a server,


which consist of hardware, software and networking resources, and
distributing them over a network.

5 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

The partitions are instances of a powerful physical server lying in a


remote location but acting like standalone servers. These partitions are
also called virtual servers.

Server virtualization allows for flexible scalability as, depending upon


their need, users can request variable configurations of storage,
computing power, RAM, etc from the physical server.

Virtualizing a server comes in handy when users want to install different


operating systems on a single assembly of computer components.

The process of virtualizing a server begins with installing hypervisors on


it. Hypervisors are pieces of software, aptly referred to as primal
operating systems, that enable communication between the server and
the installed programmes (operating systems in this case).

One can deem hypervisors as a layer between the physical components


of a host machine (in this case, the server) and the software to be
installed on it. These hypervisors can either be directly installed on a
server (Type 1) or on top of an already installed operating system (Type
2).

2. Storage Virtualization

Storage virtualization works by gathering and merging multiple physical


storage arrays and presenting them as a single storage location to the
user over a network. It is employed typically by organizations and

6 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

individuals looking to scale and maintain their systems’ storage without


investing in physical storage devices.

Virtualized storage is visible as a single storage entity (such as a 2 TB disk


drive) on a user’s system. But, behind the scenes, storage virtualization is
pooling several storage locations to offer 2 TB worth of storage to the
user.

Benefits of storage virtualization:

 It allows for centralized management of all the storage devices by


masking their individual hardware/software configurations.
 It enables users to scale their storage capacity on-demand.
 It allows organizations to manage large amounts of crucial data by
allocating it to a single location.
 Backing up, recycling and dropping data is much easier when
consolidated at a single storage location.
 Virtualizing storage offers better storage performance at
significantly lesser expenses.
 Automated management is another remarkable feature of storage
virtualization. Automated managing of storage takes away much of
the storage management burden from IT teams.

3. Network Virtualization

Earlier, we saw how storage virtualization brings together various


heterogeneous storage pools as a single storage location. Network
virtualization does something similar, albeit with a few changes.

7 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

Network virtualization refers to combining all the components of


networks and administering them using only software. These network
components include all the underlying hardware and software of a
network with their respective functionalities.

Virtualizing a network takes away its dependency on the software


embedded in its underlying hardware, converting it into a virtual
network. Now, it is the virtualizing software, similar to a hypervisor,
that controls its functionality and availability, although the network is
still using its hardware resources.

Network virtualization is typically used to interconnect virtual


machines, group several networks into one or subdivide the resources
of a network.

Virtualizing networks enforces greater flexibility among the pooled


networks and allows for better networking at reduced costs.

4. Application Virtualization
Currently, if we need to use a computer application, we first install it
on our device and then launch it. But what if we never had to install
that application, or for that matter, any application again? What if we
could simply access applications on the cloud as and when required
that would work exactly as their local counterparts? This idea is what
application virtualization proposes.

Application virtualization refers to the process of deploying a


computer application over a network (the cloud). The deployed

8 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

application is installed locally on a server, and when a user requests it,


an instance of the application is displayed to them. The user can then
engage with that application as if it was installed on their system.

Application virtualization is a powerful concept that takes away most


of the drawbacks of installing applications locally.

Using this, users can access a plethora of applications in real-time


without having to allocate too much storage to all of them.
Users can also run applications not supported by their devices’
operating systems.
And let us not forget how it eliminates the need for managing and
updating several applications across different operating systems for IT
teams.

5. Desktop Virtualization
Desktop virtualization is similar to application virtualization, but the
apps are now replaced with whole desktop environments.

The desktop environments, also called virtual machines (VMs), are


housed on powerful servers that can host several desktop sessions
concurrently. Users can access these VMs on their devices as and
when required, regardless of the specifications of their devices.

9 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

Desktop virtualization is especially useful for enterprises as it offers a


consistent desktop experience to all employees.
IT teams responsible for managing a company’s devices can now
manage and issue updates centrally.
Virtual desktops also minimize the security risks associated with
employees storing the company data locally. And, since most of the
data is stored on servers, device failure will not result in any major
loss.

6. Data Virtualization
Data virtualization is a solution to the data management problem of
analyzing data from different sources collectively and at a much faster
pace. It enables organizations to centrally manage and alter data from
several sources, such as excel files, google analytics reports, HubSpot
reports, etc., while offering a holistic view (single view) of the data.
Data virtualization works by separating the collected data from its
underlying data logic. A virtualization layer, called a data virtualization
tool, acts as a mediator between the source and the front-end usage
of the data.

Virtualizing data enables users to collectively view heterogeneous


data sets via a single interface as well as access the source of the
collected data in real-time.

Data virtualization is primarily used as a part of data integration in


areas such as BI (business intelligence), Cloud computing and of
course, data management.

 Examples
o The Azure Virtual Desktop by Microsoft is an example of virtualization
in cloud computing. As the name suggests, this cloud service allows
users to deploy virtual desktops over the cloud. Using a virtual
desktop, users can enjoy a comprehensive experience of the Windows
OS without installing it on their personal computer.

o Another popular example is the GeForce Now cloud gaming service by


NVIDIA, released to the public on February 4, 2020.GeForce Now

10 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

allows virtually any compatible computer, whether it is a desktop, a


laptop, a smartphone, or even a smart TV, to play high-end games
sans the expensive hardware since all one needs is a stable internet
connection.GeForce Now is an excellent example that showcases the
immense prospects of virtualization in cloud computing.

 Advantages of Virtualization in Cloud Computing


o Perhaps the biggest advantage of virtualization is that all primary
computing operations are housed in cloud servers. This ensures
that users do not have to incur extra expenses on assembling
proprietary high-performance computers.
o Since most of an organisation’s data is stored on the cloud,
instances of data loss, data corruption and system failure are
minimised.
o Virtualization makes it easy for companies to centrally maintain
their IT processes. Since most of these processes are cloud-based,
companies do not need to spend time and resources in
maintaining physical servers.
o Virtual machines allow developers to test a piece of code without
disturbing the current configuration of their systems.
o Cloud service providers offer virtual firewalls as a defence
mechanism against threats to the data stored on a server. Hence,
organisations do not have to spend extra on setting up dedicated
data security measures.

o Service-Oriented Architecture (SOA)


 What is service-oriented architecture?
 Service-oriented architecture (SOA) is a method of software
development that uses software components called services to create
business applications. Each service provides a business capability, and
services can also communicate with each other across platforms and
languages. Developers use SOA to reuse services in different systems or
combine several independent services to perform complex tasks.
 For example, multiple business processes in an organization require the
user authentication functionality. Instead of rewriting the authentication
code for all business processes, you can create a single authentication
service and reuse it for all applications. Similarly, almost all systems
across a healthcare organization, such as patient management systems
and electronic health record (EHR) systems, need to register patients.

11 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

These systems can call a single, common service to perform the patient
registration task.
 Service-Oriented Architecture helps to use applications as a service for other
applications regardless the type of vendor, product or technology. Therefore,
it is possible to exchange the data between applications of different vendors
without additional programming or making changes to services.
 Service-Oriented Architecture (SOA) allows organizations to access on-
demand cloud-based computing solutions according to the change of
business needs. It can work without or with cloud computing. The advantages
of using SOA are that it is easy to maintain, platform independent, and highly
scalable.
 Service Provider and Service consumer are the two major roles within SOA.
 The cloud computing service-oriented architecture is shown in the diagram
below.

 Principles of service-oriented architecture


There are no well-defined standard guidelines for implementing service-
oriented architecture (SOA). However, some basic principles are
common across all SOA implementations.

o Interoperability
Each service in SOA includes description documents that specify the
functionality of the service and the related terms and conditions. Any
client system can run a service, regardless of the underlying platform or
programming language. For instance, business processes can use services
written in both C# and Python. Since there are no direct interactions,
changes in one service do not affect other components using the service.

12 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

o Loose coupling
Services in SOA should be loosely coupled, having as little dependency as
possible on external resources such as data models or information
systems. They should also be stateless without retaining any information
from past sessions or transactions. This way, if you modify a service, it
won’t significantly impact the client applications and other services using
the service.

o Abstraction
Clients or service users in SOA need not know the service's code logic or
implementation details. To them, services should appear like a black box.
Clients get the required information about what the service does and
how to use it through service contracts and other service description
documents.

o Granularity
Services in SOA should have an appropriate size and scope, ideally
packing one discrete business function per service. Developers can then
use multiple services to create a composite service for performing
complex operations.

 Components in service-oriented architecture


There are four main components in service-oriented architecture (SOA).

o Service
Services are the basic building blocks of SOA. They can be private—
available only to internal users of an organization—or public—accessible over
the internet to all. Individually, each service has three main features.
Service implementation: The service implementation is the code that
builds the logic for performing the specific service function, such as user
authentication or bill calculation.

Service contract: The service contract defines the nature of the service
and its associated terms and conditions, such as the prerequisites for using
the service, service cost, and quality of service provided.

Service interface: In SOA, other services or systems communicate with a


service through its service interface. The interface defines how you can
invoke the service to perform activities or exchange data. It reduces
dependencies between services and the service requester. For example,

13 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

even users with little or no understanding of the underlying code logic can
use a service through its interface.

o Service provider
The service provider creates, maintains, and provides one or more services
that others can use. Organizations can create their own services or purchase
them from third-party service vendors.

o Service consumer
The service consumer requests the service provider to run a specific
service. It can be an entire system, application, or other service. The service
contract specifies the rules that the service provider and consumer must
follow when interacting with each other. Service providers and consumers
can belong to different departments, organizations, and even industries.

o Service registry
A service registry, or service repository, is a network-accessible directory
of available services. It stores service description documents from service
providers. The description documents contain information about the service
and how to communicate with it. Service consumers can easily discover the
services they need by using the service registry.

 How does service-oriented architecture work?


In service-oriented architecture (SOA), services function independently
and provide functionality or data exchanges to their consumers. The
consumer requests information and sends input data to the service. The
service processes the data, performs the task, and sends back a response. For
example, if an application uses an authorization service, it gives the service
the username and password. The service verifies the username and password
and returns an appropriate response.

o Communication protocols
Services communicate using established rules that determine data
transmission over a network. These rules are called communication
protocols. Some standard protocols to implement SOA include the following:

• Simple Object Access Protocol (SOAP)


• RESTful HTTP
• Apache Thrift
• Apache ActiveMQ
• Java Message Service (JMS)

14 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

You can even use more than one protocol in your SOA implementation.

 Applications of Service-Oriented Architecture


o It is used in the healthcare industry.
o It is used to create many mobile applications and games.
o In the air force, SOA infrastructure is used to deploy situational
awareness systems.

 Benefits of service-oriented architecture


Service-oriented architecture (SOA) has several benefits over the
traditional monolithic architectures in which all processes run as a single
unit. Some major benefits of SOA include the following:

 Faster time to market


Developers reuse services across different business processes to save
time and costs. They can assemble applications much faster with SOA
than by writing code and performing integrations from scratch.

 Efficient maintenance
It’s easier to create, update, and debug small services than large code
blocks in monolithic applications. Modifying any service in SOA does not
impact the overall functionality of the business process.

 Greater adaptability
SOA is more adaptable to advances in technology. You can modernize
your applications efficiently and cost effectively. For example, healthcare
organizations can use the functionality of older electronic health record
systems in newer cloud-based applications.

15 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

o Utility Computing
 Utility computing is the most trending IT service model. It provides on-
demand computing resources (computation, storage, and programming
services via API) and infrastructure based on the pay per use method. It
minimizes the associated costs and maximizes the efficient use of resources.

 Utility computing is a model in which computing resources are provided to
the customer based on specific demand. The service provider charges exactly
for the services provided, instead of a flat rate.
 The foundational concept is that users or businesses pay the providers of
utility computing for the amenities used – such as computing capabilities,
storage space and applications services. The customer is thus, absolved from
the responsibility of maintenance and management of the hardware.
Consequently, the financial layout is minimal for the organization.
 Utility computing helps eliminate data redundancy, as huge volumes of data
are distributed across multiple servers or backend systems. The client
however, can access the data anytime and from anywhere.
 Utility computing enables client companies to procure computing resources
through an on-demand, pay-per-use billing method.
 Utility computing is a subset of cloud computing, allowing users to scale up
and down based on their needs. For example, a consumer pays his electricity
bill as per the number of units consumed, nothing more and nothing less.
Similarly, utility computing works on the same concept, which is a pay-per-
use model.
 The concept of utility computing is simple—it provides processing power
when you need it, where you need it, and at the cost of how much you use it.
 The advantage of utility computing is that it reduced the IT cost, provides
greater flexibility, and easier to manage.
 Large organizations such as Google and Amazon established their own utility
services for computing storage and application.

 Utility Computing: 5-Step Process

Step 1: Determine the need


The initial steps involved are assessing internal organizational needs and
the combination of services and resources required. Utility computing-
hosting centers exist for a reason. They provide valuable, tightly
integrated, fully customized utility computing solutions and resources as
per clients’ needs. However, all of this will not matter if your organization
is clueless about its actual objectives and needs.

Step 2: Evaluate the service provider’s claims

16 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

Once your objectives are determined, evaluate if the utility computing


solution will align with your goals and missions. Understanding which
tasks will be supported and what level of resources or services will be
provided is important.

Step 3: Assess the health of a computing resource


To assess the health of a computing resource, it is critical to deploy
resource monitoring tools that look after its security and dynamic
resource configuration requirements. Monitoring a utility computing
resource involves identifying failures in the network, storage, and
application resources. One of the best ways to make monitoring simple is
using a collection of industry-standard and site-specific tools and local
configuration files to be completely in sync with the overall utility
computing environment.

Step 4: Identify the resource provisioning requirements


The next step involves analysing the service provider’s capability to
customize and configure resources to meet customer needs and
establishing a load balance without overprovisioning or under
provisioning resources.

Step 5: Map out a timeframe


Once the need, objectives, and type of resources are determined, the
final step for architecting a utility computing solution involves mapping
out the schedule, identifying when a specific resource might be needed,
and for how much time. This allows the service provider to release
unused resources early and improve the overall resource utilization
strategy.

 Examples of utility computing


o Travel reservation services
o Online retailers
o Startups and small businesses

17 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

 Utility Computing Benefits


1. Removes the complexity of IT management

Before utility computing became prominent, the older system involved IT


being hooked onto the safekeeping of a large block of resources. Utility
computing has been instrumental in reducing the complexity of IT
architectures and their management. Signing up with a utility service
provider absolves the user from the responsibility of maintaining IT
resources, including hardware and software. The need for spending time
and resources on the maintenance of servers gets completely eliminated
with this model.
2. Saves valuable time & resources
Growing complexities of networks are leading to the consumption of a
large amount of resource and management time. The end to the
increased complexity of networks will begin with utility computing. When
the maintenance and management of IT architectures and servers fall
into the service provider’s hands, organizations can conserve a lot of
their precious time, allowing themselves to focus on addressing other
pressing business concerns. Utility computing facilitates agility and
integration between IT resources and enterprises.
3. Offers complete flexibility

For years, enterprises have been looking for a model that provides
flexibility and a bottom-up provisioning system. Utility computing
provides utmost flexibility in terms of availability of resources, on-
demand usage, billing methods, and ease of accessing data anytime and
anywhere. Utility computing simplifies the process of handling peak
needs. For instance, since you don’t own the resources or are renting

18 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

them for a long time, it becomes extremely easy to change the number
of services, thereby shrinking or expanding them based on changes in
season, demand, audience, or new efficiencies.

4. Facilitates minimal financial layout and maximum savings


Utility computing has created a storm in the business world primarily
because of its flexibility and better economics. Its pay-per-use method of
billing lets organizations pay for only those computing resources that
they require. This leads to maximum cost savings for organizations. From
reduction in operational costs, savings on capital expenses, and doing
away with the initial costs of acquiring new resources to significantly
lowered IT costs, this model is a complete package deal for enterprises
across business verticals.

5. Allows shorter time to market


Utility computing allows resources to be supplied in small, incremental
bites as and when required by an organization. This helps organizations
deliver fast and demonstrable output, with a substantial return on
investment, without having to wait for the full implementation to achieve
payoffs.

 Cloud Computing Architecture


 As we know, cloud computing technology is used by both small and large
organizations to store the information in cloud and access it from anywhere
at any time using the internet connection.
 Cloud computing architecture is a combination of service-oriented
architecture and event-driven architecture.
 Cloud computing architecture is divided into the following two parts -
 Front End
 Back End
 The below diagram shows the architecture of cloud computing –

19 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

Front End

The front end is used by the client. It contains client-side interfaces and
applications that are required to access the cloud computing platforms. The front
end includes web servers (including Chrome, Firefox, internet explorer, etc.), thin &
fat clients, tablets, and mobile devices.

Back End
The back end is used by the service provider. It manages all the resources that are
required to provide cloud computing services. It includes a huge amount of data
storage, security mechanism, virtual machines, deploying models, servers, traffic
control mechanisms, etc.

Note: Both front end and back end are connected to others through a network,
generally using the internet connection.

 Infrastructure Components of Cloud Computing Architecture


There are the following components of cloud computing architecture -

20 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

1. Client Infrastructure
Client Infrastructure is a Front end component. It provides GUI (Graphical User
Interface) to interact with the cloud.
2. Application
The application may be any software or platform that a client wants to access.
3. Service

A Cloud Services manages that which type of service you access according to the
client’s requirement.

Cloud computing offers the following three type of services:


i. Software as a Service (SaaS)
ii. Platform as a Service (PaaS)
iii. Infrastructure as a Service (IaaS)

4. Runtime Cloud
Runtime Cloud provides the execution and runtime environment to the virtual
machines.
5. Storage
Storage is one of the most important components of cloud computing. It provides a
huge amount of storage capacity in the cloud to store and manage data.
6. Infrastructure
It provides services on the host level, application level, and network level. Cloud
infrastructure includes hardware and software components such as servers,
storage, network devices, virtualization software, and other storage resources that
are needed to support the cloud computing model.
7. Management
Management is used to manage components such as application, service, runtime
cloud, storage, infrastructure, and other security issues in the backend and
establish coordination between them.
8. Security
Security is an in-built back end component of cloud computing. It implements a
security mechanism in the back end.

21 Prepared By: Tasneem Gandhi


IQRA BCA College-Bharuch
TYBCA (SEM-VI)
601-02: Fundamentals of Cloud Computing

9. Internet
The Internet is medium through which front end and back end can interact and
communicate with each other.

22 Prepared By: Tasneem Gandhi

You might also like