Understanding The Cloud Computing Infrastructure

Understanding The Cloud Computing Infrastructure

As a long time advocate of cloud computing, I already know most of the technology and terms surrounding cloud computing and if someone mentions a new application or feature I might be able to gleam how it works based on the technologies used. This is not necessarily true for most people even if they have been in the IT industry for a long time. That is why I write “simple” articles that the less informed might be able to grasp easily. But to get a real understanding of something, you need to get an understanding of its internal structure, understand how it works and not just what it does. If someone tells you that an airplane flies because of engines and wings, it will still seem like magic because you are not really informed on the how. Same as cloud computing, for many it simply provides them with that service that they take for granted without really knowing how it is done. And to understand it better, we must understand the underlying infrastructure of cloud computing.

To put it simply, the infrastructure or how all the hardware technology and other elements come together cloud computing is very similar to that of traditional network computing. You have your servers that contain the CPUs, RAM, and other processing elements, and then you have your various storage devices like NAS and RAID-style setups. Of course, to round out the bunch you have your networking hardware, the routers, switches, modems, repeaters, and any and all combinations of networking hardware technology. If you look at the list I just mentioned, it is obvious that the hardware used for cloud computing has been existing, but why hasn’t cloud computing existed as long?

To reiterate, cloud computing is an entirely new paradigm, a new approach in using and combining the current networking technology infrastructure, not a totally new technology even though networking technology has evolved in order to meet the paradigm’s demands. Cloud computing is simply a new way of putting together current technology to come up with new and different things, sort of like Legos.

One type of infrastructure might be better, more efficient than others depending on the way it was put together. And of course, the biggest element that distinguishes cloud computing is the way the service is being provided – virtualization and scalability, it allows providers to cater to all clients like they are the only ones using the service. Clients or users are allocated computing resources only according to their need so the rest of it can be provided to others, even if those needs fluctuate. Contrary to the old networking service infrastructures that are installed locally, all the computing power is made available to its owner, but not all of it is necessarily being used, this part is basically wasted.

With this new approach and delivery, service providers are finding new ways of using the technology for day-to-day business operations and are now even catering to individual consumers because of the popularity of mobile computing and entertainment media. Cloud computing as far as I am concerned, is the best way to deliver media to people that are always on the go. As communications technology become more powerful, so does the reach and function of cloud computing.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…