SlideShare a Scribd company logo
1 of 10
CloudApplication
Architecture styles
Presented by
Nilay Shrivastava
Introduction
Success of any cloud application depend on the way it has deployed.
According to MicrosoftCloud application reference there are at
least 7 application architectures
1. N-tier architecture
2. Web-Queue-Worker architecture
3. Microservices
4. CQRS architecture
5. Event Driven architecture
6. Big data architecture
7. Big compute architecture
N-Tier
When to use
• Simple web application
• Migrating an on-premise
application to cloud with
minimum refactoring
• Hybrid Application i.e. unified
development of on-premises and
cloud applications
Benefits
Challenges
• Portability between cloud and
on-premises, and between
cloud platforms
• Less learning curves for most
developers
• Open to heterogeneous
environment
• Monolithic design prevents
independent deployment of
features
• Managing an IaaS application
is more work than an
application that uses only
managed services
• Difficult to manage network
security
Dividing applications in to logical layers and physical tiers
WebQueueWorkerArchitecture
When to use
Benefits
Challenges
• Applications with relatively
simple domain
• Applications with long running
workflows or batch applications
• When you want to use managed
services, rather than IaaS
• Relatively simple architecture
that is easy to understand
• Easy to deploy and manage
• The front end is decoupled from
the worker using asynchronous
messaging
• The front end and the worker
can be scaled independently
• Without careful design, the
front end and the worker can
become large, monolithic
components that are difficult to
maintain
• Hidden dependencies between
front end and the worker
Consists of a web front end that serves clients requests and a worker that performs resource intensive tasks
MicroservicesArchitecture
When to use
Benefits
Challenges
• Large applications that require
high release velocity
• Complex applications that need
to be highly scalable
• Applications rich domains or
many subdomains
• Organization with small
development teams
• Independent deployments
• Independent development
• Small focused team
• Fault isolation
• Mixed technology stacks
• Granular Scaling
• Complexity
• Lack of governance
• Network congestion and latency
• Data integrity
• Versioning
Small autonomous services implementing a dedicated business capability
CQRS architecture style
When to use Benefits
Challenges
• Use CQRS for collaborative
domains where many users access
the same data, especially when the
read and write workload are
asymmetrical
• CQRS is not a top level architecture
that applies to an entire system.
Apply CQRS only to those
subsystems where there is a clear
value in separating reads and writes
• Independent scaling
• Optimized data schemas
• Security
• Separations of concerns
• Simple Queries
• Complexity
• Messaging
• EventualConsistency
Separates read and write operations
Event driven architecture style
When to use
Benefits
Challenges
• Multiple subsystems must
process the same events
• Real time processing with
minimum time lag
• Complex event processing such
as pattern matching or
aggregation over time windows
• High volume and high velocity of
data, such as IoT
• Producers and consumers are
decoupled
• No point to point integrations,
it’s easy to add new consumers
to the system
• Consumers can respond to the
event immediately as they
arrive
• Highly scalable and distributed
• Guaranteed delivery
• Processing events in order and
exactly once
Event producers that generate a stream of events, and event consumers that listen for the events
Big data architecture style
When to use
Benefits
Challenges
• Batch processing of big data
sources at rest
• Real time processing of big
data in motion
• Interactive exploration of big
data
• Predictive analytics and
machine learning
• Performance through
parallelism
• Elastic Scale
• Interoperability with existing
solutions
• Technology choices
• Complexity
• Security
• Technology maturity
• Skillset
Ingestion processing and analysis of data that is too large or complex for traditional database
Big compute architecture style
When to use
Benefits
Challenges
• Simulation and number
crunching
• Long running computations
• Smaller computations that
must be run 100s or 1000s of
times
• High performance
• Solve large problems faster
• On-demand computing
• Managing theVM
infrastructure
• Managing volume of number
crunching
• Provisioning thousands of
cores in a timely manner
Large-scale workloads that require a large number of cores, often numbering in hundreds or thousands
Nilay Shrivastava
shrivastava.nilay@gmail.com
+91 93532 65476
ThankYou

More Related Content

What's hot

Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
Manish Singh
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
Adeel Javaid
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
Rajan Kumar
 

What's hot (20)

Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Vm migration techniques
Vm migration techniquesVm migration techniques
Vm migration techniques
 
Distributed & parallel system
Distributed & parallel systemDistributed & parallel system
Distributed & parallel system
 
Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)Open Cloud Consortium Overview (01-10-10 V6)
Open Cloud Consortium Overview (01-10-10 V6)
 
Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3Cs6703 grid and cloud computing unit 3
Cs6703 grid and cloud computing unit 3
 
Cloud architecture
Cloud architectureCloud architecture
Cloud architecture
 
Agreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared MemoryAgreement Protocols, distributed File Systems, Distributed Shared Memory
Agreement Protocols, distributed File Systems, Distributed Shared Memory
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Aneka platform
Aneka platformAneka platform
Aneka platform
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Trends in distributed systems
Trends in distributed systemsTrends in distributed systems
Trends in distributed systems
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 
Deadlock in Distributed Systems
Deadlock in Distributed SystemsDeadlock in Distributed Systems
Deadlock in Distributed Systems
 
Locks In Disributed Systems
Locks In Disributed SystemsLocks In Disributed Systems
Locks In Disributed Systems
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Cloud Reference Model
Cloud Reference ModelCloud Reference Model
Cloud Reference Model
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
 

Similar to Cloud Application architecture styles

Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
Akash Pandey
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1
Anne Starr
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
Anne Starr
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 

Similar to Cloud Application architecture styles (20)

Serverless microservices
Serverless microservicesServerless microservices
Serverless microservices
 
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
Alex Thissen (Xpirit) - Een verschuiving in architectuur: op weg naar microse...
 
cloud computing
 cloud computing cloud computing
cloud computing
 
Introductorytocomputing
IntroductorytocomputingIntroductorytocomputing
Introductorytocomputing
 
Presentation cloud computing
Presentation cloud computingPresentation cloud computing
Presentation cloud computing
 
Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1Cloudtechnologyassociatepart 1
Cloudtechnologyassociatepart 1
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
CLOUD COMPUTING.ppt
CLOUD COMPUTING.pptCLOUD COMPUTING.ppt
CLOUD COMPUTING.ppt
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
Virtualization and cloud computing
Virtualization and cloud computingVirtualization and cloud computing
Virtualization and cloud computing
 
Cloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr AliCloud Computing and Virtualization Overview by Amr Ali
Cloud Computing and Virtualization Overview by Amr Ali
 
Closer Look at Cloud Centric Architectures
Closer Look at Cloud Centric ArchitecturesCloser Look at Cloud Centric Architectures
Closer Look at Cloud Centric Architectures
 
The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015The move-to-hybrid-cloud-itsmf-april2015
The move-to-hybrid-cloud-itsmf-april2015
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba CloudCloud Computing Essentials in Alibaba Cloud
Cloud Computing Essentials in Alibaba Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud computing and Service Platforms
Cloud computing and Service Platforms Cloud computing and Service Platforms
Cloud computing and Service Platforms
 
Micro service session 1
Micro service   session 1Micro service   session 1
Micro service session 1
 
Microservice intro
Microservice introMicroservice intro
Microservice intro
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Cloud Application architecture styles

  • 2. Introduction Success of any cloud application depend on the way it has deployed. According to MicrosoftCloud application reference there are at least 7 application architectures 1. N-tier architecture 2. Web-Queue-Worker architecture 3. Microservices 4. CQRS architecture 5. Event Driven architecture 6. Big data architecture 7. Big compute architecture
  • 3. N-Tier When to use • Simple web application • Migrating an on-premise application to cloud with minimum refactoring • Hybrid Application i.e. unified development of on-premises and cloud applications Benefits Challenges • Portability between cloud and on-premises, and between cloud platforms • Less learning curves for most developers • Open to heterogeneous environment • Monolithic design prevents independent deployment of features • Managing an IaaS application is more work than an application that uses only managed services • Difficult to manage network security Dividing applications in to logical layers and physical tiers
  • 4. WebQueueWorkerArchitecture When to use Benefits Challenges • Applications with relatively simple domain • Applications with long running workflows or batch applications • When you want to use managed services, rather than IaaS • Relatively simple architecture that is easy to understand • Easy to deploy and manage • The front end is decoupled from the worker using asynchronous messaging • The front end and the worker can be scaled independently • Without careful design, the front end and the worker can become large, monolithic components that are difficult to maintain • Hidden dependencies between front end and the worker Consists of a web front end that serves clients requests and a worker that performs resource intensive tasks
  • 5. MicroservicesArchitecture When to use Benefits Challenges • Large applications that require high release velocity • Complex applications that need to be highly scalable • Applications rich domains or many subdomains • Organization with small development teams • Independent deployments • Independent development • Small focused team • Fault isolation • Mixed technology stacks • Granular Scaling • Complexity • Lack of governance • Network congestion and latency • Data integrity • Versioning Small autonomous services implementing a dedicated business capability
  • 6. CQRS architecture style When to use Benefits Challenges • Use CQRS for collaborative domains where many users access the same data, especially when the read and write workload are asymmetrical • CQRS is not a top level architecture that applies to an entire system. Apply CQRS only to those subsystems where there is a clear value in separating reads and writes • Independent scaling • Optimized data schemas • Security • Separations of concerns • Simple Queries • Complexity • Messaging • EventualConsistency Separates read and write operations
  • 7. Event driven architecture style When to use Benefits Challenges • Multiple subsystems must process the same events • Real time processing with minimum time lag • Complex event processing such as pattern matching or aggregation over time windows • High volume and high velocity of data, such as IoT • Producers and consumers are decoupled • No point to point integrations, it’s easy to add new consumers to the system • Consumers can respond to the event immediately as they arrive • Highly scalable and distributed • Guaranteed delivery • Processing events in order and exactly once Event producers that generate a stream of events, and event consumers that listen for the events
  • 8. Big data architecture style When to use Benefits Challenges • Batch processing of big data sources at rest • Real time processing of big data in motion • Interactive exploration of big data • Predictive analytics and machine learning • Performance through parallelism • Elastic Scale • Interoperability with existing solutions • Technology choices • Complexity • Security • Technology maturity • Skillset Ingestion processing and analysis of data that is too large or complex for traditional database
  • 9. Big compute architecture style When to use Benefits Challenges • Simulation and number crunching • Long running computations • Smaller computations that must be run 100s or 1000s of times • High performance • Solve large problems faster • On-demand computing • Managing theVM infrastructure • Managing volume of number crunching • Provisioning thousands of cores in a timely manner Large-scale workloads that require a large number of cores, often numbering in hundreds or thousands