SlideShare a Scribd company logo
Presentation on Cloud
Architecture
Prepared By: Sujit Timilsina
Introduction
● Cloud Architectures
● Importance of Cloud Architectures in modern technology
● Benefits of cloud computing
Cloud Computing and its characteristics
- Cloud computing refers to the delivery of computing services, including storage,
processing power, and software applications, over the internet. It enables users
to access and utilize these resources on-demand, without requiring local
infrastructure or physical hardware.
Key Characteristics:
● On-Demanf self-service
● Broad Network Access
● Resource Pooling
● Rapid Elasiticity
Public Cloud Architecture
-Public cloud architecture refers to a type of cloud computing model in which
cloud resources and services are provided by third-party service providers over
the public internet. These services are available to multiple organizations or
individuals on a pay-as-you-go basis. Public cloud architecture is designed to
offer scalability, accessibility, and cost-effectiveness to a wide range of users.
Key Characteristics:
● Shared Infrastructures
● Accessibility
● Scalability
● Pay-as-you-go-price
Private Cloud Architecture
Private cloud architecture refers to a cloud computing model that provides
dedicated infrastructure and resources for a single organization. Private cloud
architectures can be deployed on-premises within an organization's own data
center or hosted by a third-party service provider.
Key Characteristics:
● Dedicated Infrastructure
● Enhanced security and compliance
● Customization and Control
● Data Privacy
Hybrid Cloud Architecture
Hybrid cloud architecture refers to a cloud computing model that combines the
use of both public and private cloud environments. It enables organizations to
leverage the benefits of both cloud models, allowing them to optimize their IT
infrastructure, data storage, and application deployment based on specific needs
and requirements.
Key Characteristics:
● Integration of Public and Private Clouds
● Flexibility and Scalability
● Data Placement and Control
● Disaster Recovery
Multi Cloud Architecture
Multi-cloud architecture refers to a cloud computing approach in which an
organization utilizes services and resources from multiple cloud service
providers. It involves the strategic distribution of workloads, applications, and
data across different cloud platforms to leverage the strengths and capabilities
of each provider.
Key characteristics:
● Diversity of Cloud Providers
● Vendor Independence
● Best-of-Breed Services
● Data Sovereignty and Compliance
Considerations of Cloud Architectures
important factors to consider when designing cloud architectures:
● Scalability: Designing systems to handle varying workloads and
accommodate growth
● Reliability: Ensuring high availability and fault tolerance in the architecture
● Security: Implementing robust security measures to protect data and
systems
● Performance: Optimizing performance through resource allocation and
network design
● Cost Optimization: Designing cost-effective architectures by selecting the
right resources and services
Cloud Architecture Best Practices
● Use of automation and infrastructure as code
● Implementation of proper security measures, including encryption and
access controls
● Continuous monitoring and optimization of cloud resources
● Disaster recovery planning and data backup strategies
Conclusion
● Businesses need to choose the right cloud architecture based on their needs
and priorities.
● Cloud architectures offer businesses the agility, scalability, cost savings, and
performance they need to thrive in today's digital economy
THANK YOU !!!!!!!!!

More Related Content

Similar to Presentation on Cloud Architecture.pptx

pertemuan-2-introduction-to-cloud.pdf
pertemuan-2-introduction-to-cloud.pdfpertemuan-2-introduction-to-cloud.pdf
pertemuan-2-introduction-to-cloud.pdf
MohdLee3
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
SourodeepChakraborty3
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak
 
12458003.ppt
12458003.ppt12458003.ppt
12458003.ppt
solutionsipec
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
Dss
 
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
TalluriRenuka
 
Intro
IntroIntro
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
BHASKAR CHAUDHURY
 
file_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptxfile_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptx
AnkitMishra290193
 
Unit 4 PART 1.pdf
Unit 4 PART 1.pdfUnit 4 PART 1.pdf
Unit 4 PART 1.pdf
ShreyChandrakar2
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
NishantAnand39
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
ChSreenivasuluReddy
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
TomMot10
 
A Seminar on Cloud Computing
A Seminar on Cloud ComputingA Seminar on Cloud Computing
A Seminar on Cloud Computing
Abdullah Yousafzai
 
cloud computing.pptx fundamentals and deployment models
cloud computing.pptx fundamentals and deployment modelscloud computing.pptx fundamentals and deployment models
cloud computing.pptx fundamentals and deployment models
Dineshkumar Rangarajan
 
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdfbsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
MrSameerSTathare
 
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptxOE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
abhispal122
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
Yong Heui Cho
 

Similar to Presentation on Cloud Architecture.pptx (20)

pertemuan-2-introduction-to-cloud.pdf
pertemuan-2-introduction-to-cloud.pdfpertemuan-2-introduction-to-cloud.pdf
pertemuan-2-introduction-to-cloud.pdf
 
cloud computing architecture.pptx
cloud computing architecture.pptxcloud computing architecture.pptx
cloud computing architecture.pptx
 
CLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGECLOUD COMPUTING AND STORAGE
CLOUD COMPUTING AND STORAGE
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 
12458003.ppt
12458003.ppt12458003.ppt
12458003.ppt
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...Microsoft Fabric Online Training Course  |   Microsoft Fabric Online Training...
Microsoft Fabric Online Training Course | Microsoft Fabric Online Training...
 
Intro
IntroIntro
Intro
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
file_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptxfile_1689742072_0007818_intoductiontocloud.pptx
file_1689742072_0007818_intoductiontocloud.pptx
 
IoT Cloud Overview
IoT Cloud OverviewIoT Cloud Overview
IoT Cloud Overview
 
Unit 4 PART 1.pdf
Unit 4 PART 1.pdfUnit 4 PART 1.pdf
Unit 4 PART 1.pdf
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
cloudintro-lec01.ppt
cloudintro-lec01.pptcloudintro-lec01.ppt
cloudintro-lec01.ppt
 
A Seminar on Cloud Computing
A Seminar on Cloud ComputingA Seminar on Cloud Computing
A Seminar on Cloud Computing
 
cloud computing.pptx fundamentals and deployment models
cloud computing.pptx fundamentals and deployment modelscloud computing.pptx fundamentals and deployment models
cloud computing.pptx fundamentals and deployment models
 
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdfbsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
bsc comp scienceINTRODUCTION TO CLOUD COMPUTING_final.pdf
 
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptxOE Unvjgugugugjjjjjigugiigugigiggit1.pptx
OE Unvjgugugugjjjjjigugiigugigiggit1.pptx
 
Cloud Computing Fundamentals
Cloud Computing FundamentalsCloud Computing Fundamentals
Cloud Computing Fundamentals
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Presentation on Cloud Architecture.pptx

  • 2. Introduction ● Cloud Architectures ● Importance of Cloud Architectures in modern technology ● Benefits of cloud computing
  • 3. Cloud Computing and its characteristics - Cloud computing refers to the delivery of computing services, including storage, processing power, and software applications, over the internet. It enables users to access and utilize these resources on-demand, without requiring local infrastructure or physical hardware. Key Characteristics: ● On-Demanf self-service ● Broad Network Access ● Resource Pooling ● Rapid Elasiticity
  • 4. Public Cloud Architecture -Public cloud architecture refers to a type of cloud computing model in which cloud resources and services are provided by third-party service providers over the public internet. These services are available to multiple organizations or individuals on a pay-as-you-go basis. Public cloud architecture is designed to offer scalability, accessibility, and cost-effectiveness to a wide range of users. Key Characteristics: ● Shared Infrastructures ● Accessibility ● Scalability ● Pay-as-you-go-price
  • 5. Private Cloud Architecture Private cloud architecture refers to a cloud computing model that provides dedicated infrastructure and resources for a single organization. Private cloud architectures can be deployed on-premises within an organization's own data center or hosted by a third-party service provider. Key Characteristics: ● Dedicated Infrastructure ● Enhanced security and compliance ● Customization and Control ● Data Privacy
  • 6. Hybrid Cloud Architecture Hybrid cloud architecture refers to a cloud computing model that combines the use of both public and private cloud environments. It enables organizations to leverage the benefits of both cloud models, allowing them to optimize their IT infrastructure, data storage, and application deployment based on specific needs and requirements. Key Characteristics: ● Integration of Public and Private Clouds ● Flexibility and Scalability ● Data Placement and Control ● Disaster Recovery
  • 7. Multi Cloud Architecture Multi-cloud architecture refers to a cloud computing approach in which an organization utilizes services and resources from multiple cloud service providers. It involves the strategic distribution of workloads, applications, and data across different cloud platforms to leverage the strengths and capabilities of each provider. Key characteristics: ● Diversity of Cloud Providers ● Vendor Independence ● Best-of-Breed Services ● Data Sovereignty and Compliance
  • 8. Considerations of Cloud Architectures important factors to consider when designing cloud architectures: ● Scalability: Designing systems to handle varying workloads and accommodate growth ● Reliability: Ensuring high availability and fault tolerance in the architecture ● Security: Implementing robust security measures to protect data and systems ● Performance: Optimizing performance through resource allocation and network design ● Cost Optimization: Designing cost-effective architectures by selecting the right resources and services
  • 9. Cloud Architecture Best Practices ● Use of automation and infrastructure as code ● Implementation of proper security measures, including encryption and access controls ● Continuous monitoring and optimization of cloud resources ● Disaster recovery planning and data backup strategies
  • 10. Conclusion ● Businesses need to choose the right cloud architecture based on their needs and priorities. ● Cloud architectures offer businesses the agility, scalability, cost savings, and performance they need to thrive in today's digital economy