$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Defining The Cloud Architecture And Reasons For Deploying It

tag 2 Downloads12 Pages 2,942 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Defining The Cloud Explain Architecture And Reasons For Deploying It?




Cloud Computing is gradually becoming the necessity for every organization due to its unique features and security. It also offers varieties of option for every group of organization so that it can support well in the premise. Cloud computing also helps in understanding the market quite well and can generate better decisions (Rosado & Bernardino, 2014). Cloud computing also aims in providing efficient work.

The following report discusses about the different cloud architectures and the problems related on having hybrid cloud architecture.

Cloud Architecture that is useful for SoftArc Engineering

There are various types of cloud services that can be deployed by SoftArc in order to meet the board strategy. Some are as follows:

  • Redundant Storage Architecture
  • Elastic Disk Provisioning Architecture
  • Service Load Balancing Architecture
  • Dynamic Scalability Architecture
  • Resource Pooling Architecture

Defining the Cloud Architecture and reasons for deploying it

  • Resource Pooling Architecture: It a type of architecture where all the identical IT resource pools are grouped together and stored in a system and later maintained by the system which ensures that all of the resources stay synchronized with all other resources (Alamri et al., 2013). The main reason of deploying it because with this, the company can store all their resources within a single system and they can retrieve these resources from anywhere and the best part of using this architecture is that all of them works simultaneously meaning this will make the process much faster and also makes it efficient (Almorsy, Grundy & Müller, 2016).
  • Dynamic Scalability Architecture: It is a type of architectural model that is completely works on pre-defined system having scaling condition that helps in triggering the dynamic allocation of all IT resources from resource pools. It is very closely related to Resource Pooling Architecture. The reason behind using this architecture is that it helps in allocating dynamic storage that is those spaces can be changed later which is not possible in static storage.
  • Service Load Balancing Architecture: It is a type of cloud architecture that is specifically designed to scale down the cloud service implementation. The main reason of implementing this architecture is because with this, the load can be evenly distributed so that there is no load on a single server and also it helps in scaling of the cloud services (Almorsy, Grundy & Müller, 2016).
  • Elastic Disk Provisioning Architecture: It is type of architecture where it helps in giving a dynamic storage provisioning system which helps the cloud users to be billed for the exact amount of storage that the individual uses and not for the whole part (Othman, Madani & Khan, 2014). The main reason to consider this architecture as then SoftArc will have to pay for the amount storage they are using and not for the whole which will be cost efficient.
  • Redundant Storage Architecture: It is a type of cloud architecture where a duplicate secondary storage is introduced which works as a failover system and helps in synchronizing the data that is already presented in the cloud storage device (Othman, Madani & Khan, 2014). The main reason behind to consider this is that it will create a backup and save the data elsewhere and after that it can be merged later on with the primary one.

Benefits and Issues related with these architectures

Redundant Storage Architecture

Benefits: It is having high availability when it comes on cloud storage. It also helps in providing high level protection. With the help of this, a backup is generated automatically which then merges with the primary one afterwards.

Issues: Redundant Cloud Storage devices are mainly the subject for failure and this is caused by some network connectivity issues or controller or some general hardware failure or even the security breaches.

Elastic Disk Provisioning Architecture

Benefits: The main advantage of using this cloud architecture is that the company needs to pay for only the amount of cloud storage it is using and not the rest (Rosado & Bernardino, 2014). This functionality helps the company from the financial perspective as their cost to company would be less.

Issues: Problem with using this architecture is that the companies are given a limited amount of storage that they ask for. If that storage gets used up, they need to ask for extra storage again for which they need to pay extra amount.

Service Load Balancing Architecture

Benefits: The benefit of using Cloud Load Balancing is that it is scalable and is a global character. It helps the company by handling all types of traffic spikes without compromising the performance. This is done by placing a cloud load balancer which helps in auto scaling so meet the requirements.

Issues: There are many issues that needs to be considered while implementing Cloud Load Balancer like Infrastructure as the main purpose of cloud load balancer is to distribute the traffic among all the servers in the infrastructure and without proper infrastructure, messages will not get delivered. Bindings are also another issue because it is dependent on the infrastructure and under bindings; there are various sub parts like the BasicHttpBinding and NetTcpBinding (Sadiku, Musa & Momoh, 2014).   

Dynamic Scalability Architecture

Benefits: There are many benefits of using this cloud architecture as these can monitor and track runtime usage with dynamic fluctuations. It is also useful as the hypervisor can be invoked with the help of dynamically scalable systems which in turn helps in removing virtual server instances (Alqahtanye et al., 2014).  

Issues: It can become very tedious at times and also quite time consuming. When there are multiple requests, one of server will gets full loaded. Here the performance is reduced with the increase in servers.


Resource Pooling Architecture

Benefits: The benefit of using this cloud storage architecture is that with this, it can help in storing all the IT resources in a single place. It is mainly used for the interface with backend systems and programs so that resource pool administration can be featured (Sanaei et al., 2014). This is used to generate instances for IT resources.

Issues: As all the systems remains synchronized so if there is any technical issue found inside the system, then it becomes very difficult for the retrieval of information from that dedicated pool of resources.

Hybrid Cloud Strategy risks and mitigating with the risks

Identifying the risk

Possible explanation

Controlling the risk

IT architectural design

A hybrid cloud computing is a very complex type of cloud computing which basically involves all forms of cloud services like the public clouds, private clouds and in premises IT. To build a hybrid cloud computing, it requires great skill as it has to be secure from one end to another end so that the communication becomes secure else anyone can highjack in the middle.

The only way to control this risk is that it the cloud based architecture needs to build by someone who is quite experienced and has got acquired quite expertise in this field.

Data Management

Many companies uses this storage for automation in the their data centers to route data to their tiers but for some reason the data may gets lost in its way and it can be quite problematic. In this way, it puts the company’s data into a greater risk and even more complex when data goes to some non-data center destination.

The only possible way to mitigate these problems is to make a backup  for these data and all the routes should be made secure so that the company can keep a track record of every data and in this way the data will be safe.

Network Visibility

Hybrid cloud computing can create some problems as through a loss of network visibility. Without perimeter, the risk of security breaches increase. These are often vulnerable as these are outside the control of any business.

This can be controlled by applying clear perimeters so that there might not be security breach. Also the company should try to take control of their application as they might get attacked and get corrupted and this might hamper their whole infrastructure.

Bandwidth and latency

Access of cloud computing mainly works with the internet connection as without internet connectivity, no work can be performed. Risk of latency for the real time data streams and this can be quite dangerous as this can interfere with company’s own internal network.

This can be avoided by making the internet available and the company should ask their service providers if they are offering high speed internet connectivity or not because to work with this, internet connectivity is really important for any type of data communication and this ensures un-interrupted data flow.


General Information Security steps and controls

  1. Malware Protection: All the systems and servers should be installed with anti-malware defense mechanism as this can help in from getting the system from being collapsed or even stealing of any confidential data. Scanning for malware across the organization in every system should be made compulsory (Arora, Parashar & Transforming, 2013). Malware can damage any system and cripple the networking systems which will put a huge financial pressure over the company.
  2. Network Security: Protecting the networking system from any kind of external and internal attack. Managing the network perimeter is really important and all the networks should be monitored well for any kind of unauthorized access (Kant & Sharma, 2013). This should also try to monitor any kind of malicious content and the network security protocols should be maintained strictly.
  3. Secure Configuration: Applying security patches to all the existing applications would prove to be very useful as with this, the network layout can be kept secure. Applying security patches helps the application or system from any recent threat so it becomes very useful for the company to update their application on a monthly basis so as to secure their systems (Arora, Parashar & Transforming, 2013).
  4. Monitoring: The Company should try to monitor everything that is related to cloud services as this is the place where the company will store all their data. That is why they need to keep a close look on the networks to see if anyone is trying to gain access without permission or if there is any virus, malware or anything like that which can steal information or can seriously damage the system (Kant & Sharma, 2013).
  5. Incident Management: The Company should set up an incident management system where all the incidents regarding network issues will be registered. If the security officials find anything suspicious, then they can report it to the management and necessary steps are taken according to the registered complaint (Hashem et al, 2015).

SoftArc Engineering’s BCP in adopting the Hybrid Cloud approach

There are multiple factors for which the SoftArc’s can do a great deal of change if they use Hybrid Cloud System. The first is the Business Continuity and it can be described as something that it is not something where all the data gets backed up or replicating the content over the cloud. It basically means that data is still accessible over the cloud (Garg, Versteeg & Buyya, 2013). It needs to be planned before hand so that working can be done properly. Second is that there are more opportunity for innovation that is with hybrid cloud computing, the company is getting the most advanced form of cloud computing from which the company can do their work more efficiently and also it can be able to store backup if there is any technical fault or even due to some natural disaster (Hashem et al, 2015). The third is the Scalability and this can help the company by scaling down the specific workloads and implementing these automation rules over the cloud provides the ability to scale resources up and down. It also helps in optimizing the environment that can help for better performance and efficiency.

Points to be considered by SoftArc

Remote Server Administration

Remote Server Administration System mechanism helps in providing tools and also provides user interfaces that can be used for external cloud resource administrators so that they can configure and administer cloud based IT resources. The system can help in providing the user console while interfacing with underlying management system with the help of their APIs (Di Spaltro, Polvi & Welliver, 2016). This helps any server to communicate remotely and they can share information.

Resource Management System

The Resource Management System can be useful when coordinating with IT resources with response the actions mainly performed by cloud consumers and providers. In the very core of this system lies the Virtual infrastructure manger that helps it in co-coordinating the server and this helps in creating virtual server instances (Bahrami & Singhal, 2015).

SLA Management System

It is a management mechanism system that represents a varied range of commercially available cloud management products that features in administration, collection, storage and also helps runtime notification of SLA data (Hashizume et al., 2013)


Steps involved in moving the current application to AWS cloud

There are various steps that are involved in while moving the current application to AWS cloud. There are basically six steps through which it has to be passed through like:

  • Cloud Assessment Phase: While having this phase, security and compliance assessment is being conducted and also the technical assessment is conducted. The officials should also try to identify the tools that need to build this (Wei et al., 2014). They should also try to migrate their licensed products and making of a plan and measure success.
  • Proof of Concept Phase: Validating the technology and should try to test the existing software that is present in the cloud.
  • Data Migration Phase: Understanding different storage options that are present in the AWS cloud. All fileservers should be migrated to Amazon S3 and MySQL to Amazon RDS.
  • Application Migration Phase: Hybrid migration strategy made. Creating AMIs for every particular component (Wei et al., 2014).
  • Leverage the Cloud Phase: Hardening the security is must and automat the elasticity and SDLC. It should also leverage multiple availability zones and should contain AWS services.
  • Optimization Phase: Improving the efficiency and trying to implement advanced monitoring and telemetry. Should also re-engineer the application and should decompose all the relational databases.

Critical Points and Issues

  • Identifying the gaps that are present in between the current traditional legacy architecture and next generation cloud architecture.
  • Mitigating the risk by validating critical pieces for the proposed architecture.
  • They should also consider the security issues.
  • Considering the location is also important
  • It should be future proof
  • Should be able to generate automated management backup.


From the above report it can be concluded that cloud computing is really important when it comes on business standards as they help in sharing of files and communication much easy. All the file sharing and communication takes place with full security so that no one can intercept in the middle. Also with cloud computing, efficient work is guaranteed as they can process huge data within very less time and that also from multiple systems. There are different cloud services which offer different functionalities. They should also try to implement network security and protocols so that they can keep all their files safe and intact.



Alamri, A., Ansari, W. S., Hassan, M. M., Hossain, M. S., Alelaiwi, A., & Hossain, M. A. (2013). A survey on sensor-cloud: architecture, applications, and approaches. International Journal of Distributed Sensor Networks, 9(2), 917923.

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2014). A forensically-enabled iaas cloud computing architecture.

Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.

Bahrami, M., & Singhal, M. (2015). The role of cloud computing architecture in big data. In Information granularity, big data, and computational intelligence (pp. 275-295). Springer International Publishing.

Di Spaltro, D., Polvi, A., & Welliver, L. (2016). U.S. Patent No. 9,501,329. Washington, DC: U.S. Patent and Trademark Office.

Garg, S. K., Versteeg, S., & Buyya, R. (2013). A framework for ranking of cloud computing services. Future Generation Computer Systems, 29(4), 1012-1023.

Kant, D. C., & Sharma, Y. (2013). Enhanced security architecture for cloud data security. International Journal of Advance D Research in Computer Science and Software Engineering, Volume3, (5).

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.

Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.

Othman, M., Madani, S. A., & Khan, S. U. (2014). A survey of mobile cloud computing application models. IEEE Communications Surveys & Tutorials, 16(1), 393-413.

Rosado, T., & Bernardino, J. (2014, July). An overview of openstack architecture. In Proceedings of the 18th International Database Engineering & Applications Symposium (pp. 366-367). ACM.

Sadiku, M. N., Musa, S. M., & Momoh, O. D. (2014). Cloud computing: opportunities and challenges. IEEE potentials, 33(1), 34-36.

Sanaei, Z., Abolfazli, S., Gani, A., & Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 369-392.

Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., & Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing. Information Sciences, 258, 371-386


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Defining The Cloud Architecture And Reasons For Deploying It. Retrieved from

"Defining The Cloud Architecture And Reasons For Deploying It." My Assignment Help, 2018,

My Assignment Help (2018) Defining The Cloud Architecture And Reasons For Deploying It [Online]. Available from:
[Accessed 02 April 2020].

My Assignment Help. 'Defining The Cloud Architecture And Reasons For Deploying It' (My Assignment Help, 2018) <> accessed 02 April 2020.

My Assignment Help. Defining The Cloud Architecture And Reasons For Deploying It [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: boasts a pool of 3000+ PhD qualified dissertation writers, who are committed to providing highest quality dissertation paper help in more than 100 subjects. Each expert specializes in providing top-quality dissertation writing services in the exact manner that students want. Being a cheap dissertation writing services, we ensure prices don

Latest Management Samples

BSBMKG609 Development Of Marketing Strategies For Vision Statement

Download : 0 | Pages : 7
  • Course Code: BSBMKG609
  • University: APEX Institute Of Education
  • Country: Australia

Answer: Introduction  The paper is a combination of two tasks. First part includes a strategic report on Houzit and the second part includes a marketing plan of Houzit. Systematic structuring is followed in both tasks. Organizational Overview Strategic Directions And Organizational Objectives Vision Statement The vision statement of Houzit is- To be one of the national retail homeware brands, emphasizing on the various home makers&rsqu...

Read More arrow

COMM1410 Management For Informal Lunch And Learn Sessions

Download : 0 | Pages : 2

Answer: To Claire Smithfield Subject: Lunch and Learn Session Dear Ma’am, It is in regard to the very recent decision of yours to have informal “Lunch and Learn” sessions. This idea is undoubtedly interesting and I would not decline it in any way. It would be very helpful in creating a critical awareness for the issues right at hand and would also reinforce the overall culture of our company. I believe that these sessions...

Read More arrow

NIT2222 Wide Area Network Technologies For Address Planning

Download : 0 | Pages : 3
  • Course Code: NIT2222
  • University: Victoria University
  • Country: Australia

Answer: Address Planning Workout of IPv6 subnet for company HQ and each branch from the address block AB12:1640::/51 AB12:1640:0:2000::/51 AB12:1640:0:4000::/51 AB12:1640:0:6000::/51 AB12:1640:0:8000::/51 AB12:1640:0:A000::/51 AB12:1640:0:C000::/51    Address assignment table for the company network HQ Router Subnet ::/51 Network AB12:1640::/51 Default- Gateway AB12:1640::1 ...

Read More arrow Tags: Australia Bexley Management education University of New South Wales 

BUS353e Project Management For Cash Flow And NPV Calculation

Download : 0 | Pages : 6

Answer: Section 1 Question 1 The project classification and consideration for classification are shown in the following table. Project Classification Consideration Project A Strategic The new service will significantly enhance the strategic direction of the polyclinic Project B Operational This project will enhance the operations of the polyclinic Project C Compliance ...

Read More arrow

B01SYAD310 Systems Analysis And Design

Download : 0 | Pages : 10

Answer: System requirements for Smith Antiques System requirement level includes functional and non-functional requirement type. It is important for every system to ensure proper working. The Smith antique needs to have proper management information system that will ensure managing the details. Details regarding every customer needs to be managed properly. The newly developed management information system will also help in understanding the c...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

416 Order Completed

95% Response Time

Tyler Moore

MBA in Accounting

Washington, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The assignment was return to me on time has to make corrections and adjustment myself but still made a good grade. thanks


User Id: 392946 - 02 Apr 2020


student rating student rating student rating student rating student rating

OMG this was totally better than expected and worth every penny!!! I suck at math so i\'m excited to see my grade!


User Id: 394019 - 02 Apr 2020


student rating student rating student rating student rating student rating

Very happy with work provided by My assignment Excellent work. Always with in deadline.


User Id: 228464 - 02 Apr 2020


student rating student rating student rating student rating student rating

Haven\'t get result yet but already feel like a great piece of writing, no disappoint.


User Id: 329158 - 02 Apr 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?