IT PARK
    Most Popular

    What is brute force cracking?

    Apr 23, 2025

    What is resolution? What does resolution mean?

    May 12, 2025

    After the collision between quantum computing and blockchain - quantum blockchain

    May 16, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Do you know what 3D Mapping is?

      May 20, 2025

      What is the hosts file? Where is the hosts file?

      May 19, 2025

      Apple phone into the water how to do? Four first aid measures to help you

      May 18, 2025

      A one-minute walk through the difference between a switch and a router

      May 17, 2025

      What are the Wi-Fi password security levels?

      May 16, 2025
    • AI

      Meta Quest 3 expected to support generative AI by 2024

      May 20, 2025

      Can AI work this round when you ask a doctor online to break a disease?

      May 19, 2025

      NASA is developing an artificial intelligence interface where astronauts can talk directly to AI

      May 18, 2025

      76-year-old father of deep learning Hinton left Google! Publishes AI threat theory, pessimistic prediction of catastrophic risk

      May 17, 2025

      What is the neural network of artificial intelligence?

      May 16, 2025
    • Big Data

      Winning Business Excellence with Data Analytics

      May 20, 2025

      Has the development of big data come to an end?

      May 19, 2025

      How Research Institutes Should Use Data Analytics Tools to Improve Research Efficiency

      May 18, 2025

      How to Program Big Data Effectively

      May 17, 2025

      Five database concepts, read the database layout of Amazon Cloud Technologies

      May 16, 2025
    • CLO

      Healthcare Explores Cloud Computing Market: Security Concerns Raise, Multi-Party Collaboration Urgently Needed

      May 20, 2025

      Remote work and cloud computing create a variety of endpoint security issues

      May 19, 2025

      Three common misconceptions about sustainability and cloud computing

      May 18, 2025

      Ten Ways Cloud-Native Development is Changing Cybersecurity

      May 17, 2025

      What is a multi-cloud network?

      May 16, 2025
    • IoT

      Smart Supply Chain Guide

      May 20, 2025

      Internet of Things and the Elderly

      May 19, 2025

      The Future of the Internet of Things and Self-Storage

      May 18, 2025

      Skills shortage remains the biggest barrier to IoT adoption in the oil and gas industry

      May 17, 2025

      Why the Metaverse Matters for the Future of Manufacturing

      May 16, 2025
    • Blockchain

      Blockchain Foundation - What is Blockchain Technology

      May 20, 2025

      Blockchain Wallet

      May 19, 2025

      Scientists propose quantum proof-of-work consensus for blockchain

      May 18, 2025

      How blockchain technology can be applied to environmental protection to drive a green economy

      May 17, 2025

      After the collision between quantum computing and blockchain - quantum blockchain

      May 16, 2025
    IT PARK
    Home » CLO » The 6 principles of cloud computing architecture design, do you follow them?
    CLO

    The 6 principles of cloud computing architecture design, do you follow them?

    The composition structure of cloud computing, including infrastructure, cloud computing operating system, product system (including security and compliance, monitoring and management), solution system, and service system.
    Updated: Apr 24, 2025
    The 6 principles of cloud computing architecture design, do you follow them?

    Cloud computing has now penetrated into almost all industries and application scenarios. We don't necessarily feel the impact of cloud computing directly on our daily life, work, and learning, but as IT infrastructure, it quietly supports the various applications we are using.

    We can recognize the overall architecture and service capability of cloud computing from another perspective, which is the cloud computing architecture system, which includes infrastructure, cloud computing operating system, product system (including security and compliance, monitoring and management), solution system, and service system. Based on cloud computing for architecture design, all technical solutions should follow certain principles, which is the goal to be pursued in the architecture design. These include six major principles:

         Reasonable deployment

    The deployment of business systems on the public cloud includes the use of virtual machines in the form of cloud hosts, but also includes a stronger performance in the form of physical cloud hosts, hosting services including managed applications, managed physical servers.

    Based on historical IT resource status and compliance requirements, many enterprises have not yet gone to the cloud. In response to this situation, the cloud computing operating system is extracted and packaged as independent software and services, and deployed in the user's private environment. Unlike public clouds, which are open for use by "any" user, private deployments are only available to a small number of designated users.

    Hybrid architecture can unify the management and scheduling of resources such as public cloud and privatized deployment platforms, traditional VMware, OpenStack virtualization platform or physical servers, etc. Hybrid architecture enjoys the benefits of not changing the local environment and meeting compliance requirements, but also enjoys the advantages of abundant resources and sufficient service capabilities of the cloud platform. Hybrid architecture is also an intermediate state of the current enterprise transformation to the cloud, which will exist for a long time.

         Business continuity

    Business continuity mainly refers to the three aspects of high availability, high reliability, and disaster recovery, and the design model is also in accordance with this logic.

    High Availability refers to avoiding business interruption through redundancy and other designs when the resources for business operations fail.
    Continuous Operations means that the resources running the business are fault-free and the business can continuously provide services.
    Disaster Recovery refers to the ability to recover applications and data in different environments when the business operation environment is damaged.

         Resilient Scaling

    Tightly coupled systems are not easy to scale, and it is difficult to troubleshoot problems when software bugs and system failures occur, calling each system component with different pressures, and small problems are magnified step by step, which can easily cause the entire business interruption. To keep the system flexible and scalable, we must first decouple the system components, including dynamic data and static data decoupling, and the decoupled components can realize functional unitization, each in its own way.

    After decoupling, the components and services are then extended, and the migration of applications and data is also counted as the extension of the whole system, from one environment to another, and the system should remain resilient to scale and be able to implement migration quickly when it is needed. Finally, there is also a balance, and a unified access portal is needed after component decoupling, resource and service expansion to shield the bottom decoupling and expansion from the interface inconsistency and other problems.

         Performance efficiency

    Very many solutions and cases involve the challenges to performance brought by high concurrency and traffic surge. In performance efficiency, the main goal is to discover and improve the performance of applications and improve the efficiency of resources and components.

    The first is computational performance, which improves standalone performance by using highly configured cloud hosts or physical cloud hosts, and extends the overall service performance through cluster form. Second is storage and caching, through Redis to cache hot data, store temporary state data, in-memory computing can improve business performance. Once again, network performance is optimized, selecting the optimal data center when the business is deployed globally, and improving network performance based on global infrastructure network, CDN and global application acceleration to obtain the request acceleration effect.

    Finally, we introduce application performance monitoring and stress testing to evaluate the current performance status, discover bottlenecks, and solve problems from the application perspective.

         Security Compliance

    Security compliance on the one hand is to meet their own needs for business security protection, and on the other hand is to meet the compliance requirements of security regulation, and these two aspects will be crossed together in the concrete implementation.

    First, from the user account and permission management, appropriate accounts and roles are assigned to the right people, and minimum privileges are granted; appropriate public keys, private keys and privileges are assigned to programs or people accessed through API or CLI; and Tokens for temporary access to object storage files are strictly managed.

    Secondly, there are terminal security, data security, network security, application security, and auditing of logs, behaviors, and database operations in the whole security system. Finally, there are the requirements of Equal Protection 2.0, website filing requirements, and the system to meet the business and data privacy requirements of various regions such as GDPR.

         Continuous Operation

    The resources and services provided by the cloud platform have SLAs, and the SLA of cloud hosting is usually 99.95%. The business systems built by users are based on the SLAs of cloud resources and cloud services, on which business systems with higher availability and reliability are built. For their own business systems, they also need to develop SLAs to indicate service availability or other indicators. After developing SLAs for the user's business, they can set high availability limit values according to SLA thresholds, comprehensively assess the overall business service availability and data reliability, and specify failure contingency measures.

    Cloud resources, cloud services, events and user applications will be monitored in continuous operation and alarms will be set. When the alarm conditions are reached, the alarms will be given to the callback function, which can realize automated fault handling or corresponding contingency plans and reduce manual intervention.

    cloud computing design architecture
    Previous Article When AI starts to have "subconsciousness"
    Next Article Ten Ways Cloud-Native Development is Changing Cybersecurity

    Related Articles

    CLO

    Cloud computing has many applications in our daily life, what are the main ones?

    May 08, 2025
    CLO

    Last-generation firewalls won't meet cloud demands

    Apr 01, 2025
    CLO

    What is cloud computing?

    Apr 20, 2025
    Most Popular

    What is brute force cracking?

    Apr 23, 2025

    What is resolution? What does resolution mean?

    May 12, 2025

    After the collision between quantum computing and blockchain - quantum blockchain

    May 16, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.