SlideShare a Scribd company logo
Cloud Architecture
Muhammad Adeel Javaid (Microsoft Cloud Partner)
IntroductionIntroduction
High performance networks and advanced
development of internet is the basis for cloud
computing .
Cloud computing has started taking shape
incorporating virtualization and on demand
deployment and internet delivery of services.
Cloud is a pool of virtualized computer
resources networked, which can:
Host a variety of workloads.
Batch-style back-end jobs.
Interactive user-facing applications.
Workloads can be deployed and scaled out quickly
through the rapid provisioning of virtual machines or
physical machines.
Support redundant, self recovering, highly scalable
programming models that allow workloads to recover
from many unavoidable hardware / software failures.
Monitor resource use in real time to enable
rebalancing of allocations when needed.
IntroductionIntroduction
Cloud Computing Stack of ServicesCloud Computing Stack of Services
Cloud Clients
Cloud Applications
Cloud Services
Cloud StorageCloud Platform
Cloud Infrastructure
Distributed Multi-site Physical
Infrastructure
enabled by server virtualization
Architectural Layers of CloudArchitectural Layers of Cloud
ComputingComputing
In the cloud computing stack, there are three basic
layers
that together create cloud environment. They are:
1.Infrastructure as a Service(IaaS)
2.Platform as a Service (PaaS)
3.Software as a Service (SaaS)
SaaS
PaaS
IaaS
Framework of cloud computingFramework of cloud computing
Virtualized resources
Compute Networking
Storage
Image Metadata
Image
Virtualized images
Software kernel (OS. VM Manager)
Hardware
Application
Platform
Infrastructure
Basic middleware
(database services , application server )
Developments tools
Services and built in functionality
Virtual infrastructure managementVirtual infrastructure management
and Cloud Computingand Cloud Computing
For building the cloud environment a variety of
requirements must be met to provide a uniform and
homogeneous view of the virtualized resources.
Virtual Infrastructure Management is the key
component to build the cloud environment which does
the dynamic orchestration of virtual machines on a pool
of physical resources.
Virtual infrastructure management provide primitives
to schedule and manage VMs across multiple physical
hosts.
Cloud management provide remote and secure
interface for creating controlling and monitoring
virtualized resources on IaaS.
Virtual infrastructureVirtual infrastructure
management and Cloudmanagement and Cloud
ComputingComputing
View of Cloud DeploymentView of Cloud Deployment
Cloud
Application
Client
Infrastructure
Application
PaaS
VirtualizedApplication
Platform
Service
IaaS
Infrastructure
Storage
SaaS
Software as a ServiceSoftware as a Service
 It is a Deployment/Delivery model
• Hosted and managed by vendor
• Delivered across the internet
 It is a Business Model : usage-based pricing(vs.
perpetual license model of on –premise
software).Examples:
• Per user per month
• Per transaction
• Per GB of storage per month
Software as a ServiceSoftware as a Service
Architectural
 Multi-tenancy
 Scalability
 Security
 Performance
Functional
 Provisioning
 Billing
 Metering
 Monitoring
MULTI-TENANCYMULTI-TENANCY
 Multi-tenancy is an architectural pattern
 A single instance of the software is run on the service
provider’s infrastructure
 Multiple tenants access the same instance.
 In contrast to the multi-user model, multi-tenancy
requires customizing the single instance according to
the multi-faceted requirements of many tenants.
A Multi-tenants application lets customers (tenants)
share the same hardware resources, by offering them
one shared application and database instance ,while
allowing them to configure the application to fit there
needs as if it runs on dedicated environment.
These definition focus on what we believe to be the key
aspects of multi tenancy:
1.The ability of the application to share hardware
resources.
2.The offering of a high degree of configurability of the
software.
3.The architectural approach in which the tenants make
use of a single application and database instance.
MULTI-TENANCYMULTI-TENANCY
Multi-tenants Deployment ModesMulti-tenants Deployment Modes
for Application Serverfor Application Server
Tenant A
Fully isolated Application server
Each tenant accesses an application
server running on a dedicated servers.
Virtualized Application Server
Each tenant accesses a dedicated
application running on a separate virtual
machine.
Shared Virtual Server
Each tenant accesses a dedicated
application server running on a shared
virtual machine.
Shared Application Server
The tenant shared the application server
and access application resources
through separate session or threads.
Tenant B
Application Server
Application server
Virtual
machine
Virtual
machine
Application server
Tenant A
Tenant B
Virtual
machine
Tenant A
Tenant B
Session thread
Session Thread
Application Server
Tenant A
Tenant B
Application server
Multi-tenants Deployment Modes in Data CentersMulti-tenants Deployment Modes in Data Centers
Fully isolated data center
The tenants do not share any
data center resources
Virtualized servers
The tenants share the same
host but access different
databases running on separate
virtual machines
Shared Server
The tenants share the same
server (Hostname or IP) but
access different databases
Shared Database
The tenants share the same
server and database (shared or
different ports) but access
different schema(tables)
Shared Schema
The tenants share the same
server, database and schema
(tables). The irrespective data
is segregated by key and rows.
Tenant A
Tenant B
Tenant A
Tenant B
Tenant A
Tenant B
Virtual
Machine Database
Virtual
Machine
Database
Tenant A
Tenant B
Tenant A
Tenant B
Conceptual framework of Software as a ServiceConceptual framework of Software as a Service
Presentation Menu and Navigation User Controls Display and Rendering Reporting
Security
Identity and
federation
Authentication and
Single Sign on
Authorization and
Role-based Access
Control
Entitlement
Encryption
Regularity Controls
Operation
Monitoring and
Altering
Backup and Restore
Provisioning
Configuration and
Customization
Performance and
Availability
Metering and Indicators
Infrastructure
Database Storage Computer Networking and
Communications
Application Engine
User Profile
Notification and
Subscription
Metadata
Execution
Engine
Metadata
Services
Messaging
Workflow
Execution
Handling
Orchestration
Data
Synchronization
Migrating to Cloud EnvironmentMigrating to Cloud Environment
The Software can be redeployed in cloud
environment as Software as a Service (SaaS).
The main sections of the software can be
mapped to the SaaS architecture.
Payroll Processing in CloudPayroll Processing in Cloud
ComputingComputing
Many State Government departments are utilizing
standardized set up of payroll packages which are
deployed at user locations and it is amounting huge
investment on procurement of hardware and software
and maintenance for various locations of the
organization.
Payroll Software Installed at more thanPayroll Software Installed at more than
300 locations300 locations
User Software Module
Standalone Loaded on PC
DrawbacksDrawbacks
Drawbacks :
 Software Maintenance problems.
 Individual Hardware is required.
 Often Data Loss occurs.
Migrating the payroll package, to cloud
environment can be worked out without
changing business logic.
IN CLOUDIN CLOUD
User-1
Software
Module
User-1 User-3
Single Instance
Multi-tenancy
Architectural Overview for Multi-tenancyArchitectural Overview for Multi-tenancy
Client
Authentication
Authentication Module
Ticket Server
Session Ticket
Tenant Token
+ Create Ticket()
Tenant Auth
Data
Tenant
Config
Data
Layout Component
Configuration Component
File I/O Component
Workflow Component
Database
Query Adjuster Load Balancer Record Initializer
Database Pool
Data Data Data
Single-tenant
business logic
Query
Create Ticket()
HTTP
Request
Configuration
Provisioning for new tenants
• For Separate server model new machine is to be
installed.
• For separate database model create a database
start it on a server.
• For separate schema and shared schema models
scripts / stored procedure could create new
schema in one of the existing databases.
Background of the ApplicationBackground of the Application
The existing application, which is implemented in state
government departments, is having the following main
sections:
 
 Data admin
 Master data entry
 Month process
 Token no. entry
 Reports
 Back up to system
The existing package is deployed in the user premises and
found difficult in regular software maintenance and
overhead costs for the infrastructure requirements.
 
The application is ideally suited to deploy in cloud
environment with following features:
 
 The application can be taken up as a single instance and multi-
tenant model
 Configurability option in the software is required to be provided.
Configurability in SaaS enables the flexibility to access the software
by many tenants with the option of configuring each tenant for
their application needs.
 The software will have configurability for the following :
1.User interface.
2.Workflow.
3.Data.
4.Access control. 
User requirements / Use cases Type of environment in cloud Impact
Payroll processing IaaS (VM)
Cloud storage and
SaaS
1. Processing time will be reduced.
2. Hardware requirements will be
reduced.
3. Number of users can be
increased with scalability.
4. Maintenance cost will be
reduced.
Project Management PaaS and Cloud storage 1. Processing time can be reduced.
2. Project execution time and cost
can be reduced.
3. Efficient way of utilization of skill
sets and manpower can be attained.
e-Governance & Office automation IaaS
Cloud storage
SaaS
1. Hardware cost can be reduced.
2. CPU processing time can be
reduced.
3. Accountability can be maintained.
4. Maintainance cost can be
reduced.
5. Reduces energy consumption.
e-Learning Cloud storage
IaaS
PaaS
SaaS
1. Hardware cost can be reduced.
2. CPU processing time can be
reduced.
3. Accountability can be maintained.
4. Maintainance cost can be
reduced.
SaaS ApplicationsSaaS Applications
SOA and Cloud Computing
In cloud environment we adopt the bundling of
resources into layers of
Saas
Paas
Iaas
And furthur add a layer for business process
management with the concept of service oriented
architecture(SOA).
SOA is a base for furthur building of cloud environment
for composite application with work flow concepts.
Cloud architecture

More Related Content

What's hot

Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
Abhishek Pachisia
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
Software Park Thailand
 
Cloud computing
Cloud computingCloud computing
Cloud computing
DebrajKarmakar
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
Dr Geetha Mohan
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
Dinesh Kumar Wickramasinghe
 
Cloud computing
Cloud computingCloud computing
Cloud computing
pgayatrinaidu
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
sagaroceanic11
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
Ashok Kumar
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Sreehari820
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
Mehul Patel
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
CloudSyntrix
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications
Amazon Web Services
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
Sonali Jain
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
Amazon Web Services
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
NephoScale
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
Amazon Web Services
 

What's hot (20)

Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
IaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud ComputingIaaS, SaaS, PasS : Cloud Computing
IaaS, SaaS, PasS : Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
CLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptxCLOUD ARCHITECTURE AND SERVICES.pptx
CLOUD ARCHITECTURE AND SERVICES.pptx
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Introduction to Cloud Computing
Introduction to Cloud Computing Introduction to Cloud Computing
Introduction to Cloud Computing
 
Introduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless ApplicationsIntroduction to AWS Lambda and Serverless Applications
Introduction to AWS Lambda and Serverless Applications
 
Data storage security in cloud computing
Data storage security in cloud computingData storage security in cloud computing
Data storage security in cloud computing
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Evolution of Cloud Computing
Evolution of Cloud ComputingEvolution of Cloud Computing
Evolution of Cloud Computing
 
Introduction to Amazon EC2
Introduction to Amazon EC2Introduction to Amazon EC2
Introduction to Amazon EC2
 

Similar to Cloud architecture

Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
rohit_ainapure
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
kevnikool
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
charan7575
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
Mannat Singh
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
Abhijit Kundu
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Alessandro Iudica
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
kongara
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
raghavanp4
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
AngelineR
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
Sandip Kadam
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
Prabhat gangwar
 
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
Giragadurai Vallirajan
 
381101843.pptx
381101843.pptx381101843.pptx
381101843.pptx
nazimsattar
 
Unit 1
Unit 1Unit 1
Unit 1
Ravi Kumar
 
Cloud computing
Cloud computingCloud computing
Cloud computing
perfectican
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
DrThenmozhiKarunanit
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
Studying
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
Studying
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
NarendrakumarAnnadur
 

Similar to Cloud architecture (20)

Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
An introduction to the cloud 11 v1
An introduction to the cloud 11 v1An introduction to the cloud 11 v1
An introduction to the cloud 11 v1
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
Private Cloud With System Center Project
Private Cloud With System Center ProjectPrivate Cloud With System Center Project
Private Cloud With System Center Project
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloudmod4
Cloudmod4Cloudmod4
Cloudmod4
 
Cloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptxCloud Computing genral for all concepts.pptx
Cloud Computing genral for all concepts.pptx
 
Information Storage and Management
Information Storage and Management Information Storage and Management
Information Storage and Management
 
Cloud Computing Final1
Cloud Computing Final1Cloud Computing Final1
Cloud Computing Final1
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud models and platforms
Cloud models and platformsCloud models and platforms
Cloud models and platforms
 
Modern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale ComputingModern Software Architecture - Cloud Scale Computing
Modern Software Architecture - Cloud Scale Computing
 
381101843.pptx
381101843.pptx381101843.pptx
381101843.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
SOFTWARE COMPUTING
SOFTWARE COMPUTINGSOFTWARE COMPUTING
SOFTWARE COMPUTING
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
Intro cloud-1
Intro cloud-1Intro cloud-1
Intro cloud-1
 
Cloud Computing-notes.doc
Cloud Computing-notes.docCloud Computing-notes.doc
Cloud Computing-notes.doc
 

More from Adeel Javaid

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
Adeel Javaid
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
Adeel Javaid
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
Adeel Javaid
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
Adeel Javaid
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
Adeel Javaid
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
Adeel Javaid
 
What is ph d
What is ph dWhat is ph d
What is ph d
Adeel Javaid
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
Adeel Javaid
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
Adeel Javaid
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
Adeel Javaid
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
Adeel Javaid
 
Project management
Project managementProject management
Project management
Adeel Javaid
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
Adeel Javaid
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
Adeel Javaid
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
Adeel Javaid
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
Adeel Javaid
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
Adeel Javaid
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
Adeel Javaid
 
Cloud security
Cloud securityCloud security
Cloud security
Adeel Javaid
 

More from Adeel Javaid (20)

Cybersecurity threat assessment manual
Cybersecurity threat assessment manualCybersecurity threat assessment manual
Cybersecurity threat assessment manual
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Cloud computing security and privacy
Cloud computing security and privacyCloud computing security and privacy
Cloud computing security and privacy
 
Proposed pricing model for cloud computing
Proposed pricing model for cloud computingProposed pricing model for cloud computing
Proposed pricing model for cloud computing
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
How hackers attack networks
How hackers attack networksHow hackers attack networks
How hackers attack networks
 
What is ph d
What is ph dWhat is ph d
What is ph d
 
How To Get a Good Job in Academia
How To Get a Good Job in AcademiaHow To Get a Good Job in Academia
How To Get a Good Job in Academia
 
Secrets of success
Secrets of successSecrets of success
Secrets of success
 
Smartphone healthcare
Smartphone healthcareSmartphone healthcare
Smartphone healthcare
 
Share point presentation
Share point presentationShare point presentation
Share point presentation
 
Project management
Project managementProject management
Project management
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Inside the entreprenurial mind
Inside the entreprenurial mindInside the entreprenurial mind
Inside the entreprenurial mind
 
Template for marketing strategy
Template for marketing strategyTemplate for marketing strategy
Template for marketing strategy
 
The toyota production system
The toyota production systemThe toyota production system
The toyota production system
 
Channel marketing
Channel marketingChannel marketing
Channel marketing
 
Tps and lean manufacturing
Tps and lean manufacturingTps and lean manufacturing
Tps and lean manufacturing
 
Cloud security
Cloud securityCloud security
Cloud security
 

Recently uploaded

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 

Recently uploaded (20)

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 

Cloud architecture

  • 1. Cloud Architecture Muhammad Adeel Javaid (Microsoft Cloud Partner)
  • 2. IntroductionIntroduction High performance networks and advanced development of internet is the basis for cloud computing . Cloud computing has started taking shape incorporating virtualization and on demand deployment and internet delivery of services.
  • 3. Cloud is a pool of virtualized computer resources networked, which can: Host a variety of workloads. Batch-style back-end jobs. Interactive user-facing applications. Workloads can be deployed and scaled out quickly through the rapid provisioning of virtual machines or physical machines. Support redundant, self recovering, highly scalable programming models that allow workloads to recover from many unavoidable hardware / software failures. Monitor resource use in real time to enable rebalancing of allocations when needed. IntroductionIntroduction
  • 4. Cloud Computing Stack of ServicesCloud Computing Stack of Services Cloud Clients Cloud Applications Cloud Services Cloud StorageCloud Platform Cloud Infrastructure Distributed Multi-site Physical Infrastructure enabled by server virtualization
  • 5. Architectural Layers of CloudArchitectural Layers of Cloud ComputingComputing In the cloud computing stack, there are three basic layers that together create cloud environment. They are: 1.Infrastructure as a Service(IaaS) 2.Platform as a Service (PaaS) 3.Software as a Service (SaaS) SaaS PaaS IaaS
  • 6. Framework of cloud computingFramework of cloud computing Virtualized resources Compute Networking Storage Image Metadata Image Virtualized images Software kernel (OS. VM Manager) Hardware Application Platform Infrastructure Basic middleware (database services , application server ) Developments tools Services and built in functionality
  • 7. Virtual infrastructure managementVirtual infrastructure management and Cloud Computingand Cloud Computing For building the cloud environment a variety of requirements must be met to provide a uniform and homogeneous view of the virtualized resources. Virtual Infrastructure Management is the key component to build the cloud environment which does the dynamic orchestration of virtual machines on a pool of physical resources.
  • 8. Virtual infrastructure management provide primitives to schedule and manage VMs across multiple physical hosts. Cloud management provide remote and secure interface for creating controlling and monitoring virtualized resources on IaaS. Virtual infrastructureVirtual infrastructure management and Cloudmanagement and Cloud ComputingComputing
  • 9. View of Cloud DeploymentView of Cloud Deployment Cloud Application Client Infrastructure Application PaaS VirtualizedApplication Platform Service IaaS Infrastructure Storage SaaS
  • 10. Software as a ServiceSoftware as a Service  It is a Deployment/Delivery model • Hosted and managed by vendor • Delivered across the internet  It is a Business Model : usage-based pricing(vs. perpetual license model of on –premise software).Examples: • Per user per month • Per transaction • Per GB of storage per month
  • 11. Software as a ServiceSoftware as a Service Architectural  Multi-tenancy  Scalability  Security  Performance Functional  Provisioning  Billing  Metering  Monitoring
  • 12. MULTI-TENANCYMULTI-TENANCY  Multi-tenancy is an architectural pattern  A single instance of the software is run on the service provider’s infrastructure  Multiple tenants access the same instance.  In contrast to the multi-user model, multi-tenancy requires customizing the single instance according to the multi-faceted requirements of many tenants.
  • 13. A Multi-tenants application lets customers (tenants) share the same hardware resources, by offering them one shared application and database instance ,while allowing them to configure the application to fit there needs as if it runs on dedicated environment. These definition focus on what we believe to be the key aspects of multi tenancy: 1.The ability of the application to share hardware resources. 2.The offering of a high degree of configurability of the software. 3.The architectural approach in which the tenants make use of a single application and database instance. MULTI-TENANCYMULTI-TENANCY
  • 14. Multi-tenants Deployment ModesMulti-tenants Deployment Modes for Application Serverfor Application Server Tenant A Fully isolated Application server Each tenant accesses an application server running on a dedicated servers. Virtualized Application Server Each tenant accesses a dedicated application running on a separate virtual machine. Shared Virtual Server Each tenant accesses a dedicated application server running on a shared virtual machine. Shared Application Server The tenant shared the application server and access application resources through separate session or threads. Tenant B Application Server Application server Virtual machine Virtual machine Application server Tenant A Tenant B Virtual machine Tenant A Tenant B Session thread Session Thread Application Server Tenant A Tenant B Application server
  • 15. Multi-tenants Deployment Modes in Data CentersMulti-tenants Deployment Modes in Data Centers Fully isolated data center The tenants do not share any data center resources Virtualized servers The tenants share the same host but access different databases running on separate virtual machines Shared Server The tenants share the same server (Hostname or IP) but access different databases Shared Database The tenants share the same server and database (shared or different ports) but access different schema(tables) Shared Schema The tenants share the same server, database and schema (tables). The irrespective data is segregated by key and rows. Tenant A Tenant B Tenant A Tenant B Tenant A Tenant B Virtual Machine Database Virtual Machine Database Tenant A Tenant B Tenant A Tenant B
  • 16. Conceptual framework of Software as a ServiceConceptual framework of Software as a Service Presentation Menu and Navigation User Controls Display and Rendering Reporting Security Identity and federation Authentication and Single Sign on Authorization and Role-based Access Control Entitlement Encryption Regularity Controls Operation Monitoring and Altering Backup and Restore Provisioning Configuration and Customization Performance and Availability Metering and Indicators Infrastructure Database Storage Computer Networking and Communications Application Engine User Profile Notification and Subscription Metadata Execution Engine Metadata Services Messaging Workflow Execution Handling Orchestration Data Synchronization
  • 17. Migrating to Cloud EnvironmentMigrating to Cloud Environment The Software can be redeployed in cloud environment as Software as a Service (SaaS). The main sections of the software can be mapped to the SaaS architecture.
  • 18. Payroll Processing in CloudPayroll Processing in Cloud ComputingComputing Many State Government departments are utilizing standardized set up of payroll packages which are deployed at user locations and it is amounting huge investment on procurement of hardware and software and maintenance for various locations of the organization.
  • 19. Payroll Software Installed at more thanPayroll Software Installed at more than 300 locations300 locations User Software Module Standalone Loaded on PC
  • 20. DrawbacksDrawbacks Drawbacks :  Software Maintenance problems.  Individual Hardware is required.  Often Data Loss occurs.
  • 21. Migrating the payroll package, to cloud environment can be worked out without changing business logic.
  • 22. IN CLOUDIN CLOUD User-1 Software Module User-1 User-3 Single Instance Multi-tenancy
  • 23. Architectural Overview for Multi-tenancyArchitectural Overview for Multi-tenancy Client Authentication Authentication Module Ticket Server Session Ticket Tenant Token + Create Ticket() Tenant Auth Data Tenant Config Data Layout Component Configuration Component File I/O Component Workflow Component Database Query Adjuster Load Balancer Record Initializer Database Pool Data Data Data Single-tenant business logic Query Create Ticket() HTTP Request Configuration
  • 24. Provisioning for new tenants • For Separate server model new machine is to be installed. • For separate database model create a database start it on a server. • For separate schema and shared schema models scripts / stored procedure could create new schema in one of the existing databases.
  • 25. Background of the ApplicationBackground of the Application The existing application, which is implemented in state government departments, is having the following main sections:    Data admin  Master data entry  Month process  Token no. entry  Reports  Back up to system The existing package is deployed in the user premises and found difficult in regular software maintenance and overhead costs for the infrastructure requirements.  
  • 26. The application is ideally suited to deploy in cloud environment with following features:    The application can be taken up as a single instance and multi- tenant model  Configurability option in the software is required to be provided. Configurability in SaaS enables the flexibility to access the software by many tenants with the option of configuring each tenant for their application needs.  The software will have configurability for the following : 1.User interface. 2.Workflow. 3.Data. 4.Access control. 
  • 27. User requirements / Use cases Type of environment in cloud Impact Payroll processing IaaS (VM) Cloud storage and SaaS 1. Processing time will be reduced. 2. Hardware requirements will be reduced. 3. Number of users can be increased with scalability. 4. Maintenance cost will be reduced. Project Management PaaS and Cloud storage 1. Processing time can be reduced. 2. Project execution time and cost can be reduced. 3. Efficient way of utilization of skill sets and manpower can be attained. e-Governance & Office automation IaaS Cloud storage SaaS 1. Hardware cost can be reduced. 2. CPU processing time can be reduced. 3. Accountability can be maintained. 4. Maintainance cost can be reduced. 5. Reduces energy consumption. e-Learning Cloud storage IaaS PaaS SaaS 1. Hardware cost can be reduced. 2. CPU processing time can be reduced. 3. Accountability can be maintained. 4. Maintainance cost can be reduced. SaaS ApplicationsSaaS Applications
  • 28. SOA and Cloud Computing In cloud environment we adopt the bundling of resources into layers of Saas Paas Iaas And furthur add a layer for business process management with the concept of service oriented architecture(SOA). SOA is a base for furthur building of cloud environment for composite application with work flow concepts.