Project 2 - Cloud Architecture Plan
Question
New Details: This week, you will continue to leverage details from the previous project. Afterwards, you will build an AWS architecture for a fictitious company’s proposed cloud business need, explain the services in the cloud architecture, and make recommendations to the customer.
Guidelines
Use the Cloud Architecture Plan Template to prepare the architectural plan and submit the report. In the template, you will see specific instructions. Delete the instruction text before you submit the project. The final deliverable will be used by the IT staff when implementing the cloud-based solution.
Your report should include:
- Based on the company’s need, discuss at least (2) two following topics:
- Designing Resilient Architecture
- Designing High-Performing Architecture
- Designing Secure Applications and Architectures
- Designing Cost-Optimized Architectures
- Be between five to seven pages (plus an appendix for architectural diagram, cover page, and table of content)
- Address the topics listed in the architectural plan template
- Develop an architectural diagram using AWS icons
- Include technical details for all the core services utilized
Be sure to remove all the instructional red text and hyperlinks located throughout the Cloud Architecture Plan Template.
Cloud Architecture Plan
Instructor’s Name:
Student’s Name:
Date Submitted:
Table of Contents
Proposed AWS Infrastructure. 3
Provide a summary of your report that highlights key information located in the body of the paper.
Briefly introduce your project and include the current structure of the company. Explain what you have learned in the course about Don & Associates and build on the company profile using your imagination.
Continue to use your imagination: Explain what the company is struggling with and how the company could benefit from moving to the cloud. Focus on at least two of the following categories:
o Designing Resilient Architecture
o Designing High-Performing Architecture
o Designing Secure Applications and Architectures
o Designing Cost-Optimized Architectures
State any assumptions you made as part of the process.
Describe the proposed AWS infrastructure in written detail and include an architectural diagram.
Provide an overview of the cloud services. List the core services needed and briefly describe how each help meets the company’s business needs.
Leverage the AWS Shared Responsibility Model and explain the customer’s responsibility in securing their cloud resources.
Briefly conclude your project and include recommendations for the future.
Include references for any external material used in the paper. The recommended style is APA 7th Edition.
Solution
Abstract
Thanks to the development of broadband Internet, many modern business tasks can now be managed more effectively at a distant server than on your Company's in-house technology. You're currently using cloud computing if your organization uses Dropbox to store files, slack to ease internal communication, or Salesforce to manage customer connections. Your small business may use cloud computing to streamline operations with an in-depth explanation of the concept. Through cloud computing, most businesses have received several benefits that have helped them improve their business dynamics and improve their general business profitability. That is why modern technology, cloud computing, is gaining acceptance from businesses. The report, there will be a highlight of the benefits that companies get from cloud computing. Through a servey conducted on ELSA company, several ideas were gathered which justified that companies in the modern society need to incorporate and advance to cloud computing. The report also has a fictitious company AWS Architecture that displays how operations are conducted in small and large businesses using cloud computing technologies. The report also had a proposed AWS infrastructure with detailed information about the business, including an architectural diagram that illustrated the business operations.
Cloud Architecture Plan
ELSA is one of the fastest-growing English companies, relying on AWS cloud computing to support millions of customers. Utilizing app-based and short classes, the Company combines AI-based and speech technologies to help non-native English students improve their speech and articulation. The Company employs its ELSA talk app, which features nine native dialects and allows users to practice and learn native English in over a hundred countries. It was initially introduced in 2015, and its debut market was Vietnam in 2016. Since then, the Company has made significant development, expanding its market share regularly, and now serves around fifteen million pupils. The tremendous development of internet demand due to the current covid-19 epidemic society curfews around the world has helped them expand their consumer base. As a result, ELSA has reaped the benefits of its radical upgrade and cloud architecture in servicing its clients via the speaking app, enabling users to acquire spoken English from any of their nine native languages.
The requirement is to keep its cloud computing infrastructure adaptable and versatile in the database, compute, and storage configurations. This aided in processing vast amounts of data from the users' numerous everyday activities. Furthermore, ELSA's developers and researchers required continual access to real-time and archived client-generated data to improve its branded speech algorithms. Since ELSA uses AWS as its worldwide computing infrastructure, it has contributed to this success by delivering content promptly to its clients and processing over five million users' recordings every day. Since its inception, the Company has maintained high levels of customer satisfaction, with the ELSA Speak app receiving five stars in the Google Play Store and four stars in the Apple Store, respectively.
Through Don and associates, I have learned several things, including that the Internet is transforming the way we do business and communicate as a society. Computers and laptops are traditionally where software and hardware are housed. In other words, the gadget can only be used by one user at a time to access the services it provides. With the emergence of Cloud computing, many users can simultaneously access system information outside of their computing environment. You can also use the cloud to store apps and data on your server or personal computer. Don & Associates, a financial consulting firm, is interested in cloud computing to improve its service and expand its presence in multiple states.
Additionally, it was assumed that the Company would solve the problem experienced by Don & Associates' through the use of services of cloud computing. By migrating the architecture of cloud computing, the company saves a lot of money. Cloud computing does not provide a significant expenditure in hardware or technical know-how to run, it become possible for almost anybody accessing the internet to utilize it. Due to the Company's status as a private one, it will use the Private Cloud computing model. IT services are made available over a private IT infrastructure for exclusive use by the Company.
Statement of Need
The Company under question has been facing several challenges that have brought setbacks to its performance and the kind of resilience that the Company has when dealing with the adversities and shocks that might face it. Some of the challenges include the risk of security facing most companies. This is a challenge that can lead to great adversities and impacts that can also lead to the organization's closure. That is why there is a need to ensure that the organization has policies and strategies that help it maintain its resilience whenever there are setbacks. Resilience is achieved through the designing of a resilient architecture as well as designing a high-performing architecture that will help the Company improve its performance and productivity.
Concerning designing a resilient architecture, it means that several aspects will be taken into consideration, including the security of the Company and all the aspects of advancement in the technology that might compromise the operations of the organization and its normal operations. The resilience architecture will be mainly to ensure that the company's security and the information and its internal operations are secure and safe for use. Some strategies are set to help the Company have an update if the security information and updates on all the new security breaches and how they can be mitigated. In designing a high-performing architecture, different aspects got considered in the sense that for performance to be high, there is the need to consider the production time and the production process. That is because the minor details of the products can change the major production (Luy & Zhang, 2021). That calls for the development of an architecture that can minimize the time lot during the production and architecture with a smooth-running process that will minimize the production time and facilitate smooth performance in the organization.
Assumptions
Different assumptions were made concerning the fictitious organization. The assumptions included the fact that there was a controversy on which form of cloud computing model the organization could adopt. A conclusion, private cloud computing was the most suitable for the organization because of the reasons included; private cloud computing is more cost-effective when compared to the public cloud. Secondly, cloud computing has better elasticity options when compared to the public cloud. Thirdly, the organization will have flexibility while its unique needs are met. Private cloud computing is also secure and more compliant as compared to the public cloud as well as its disaster recovery methods are better than the public cloud.
Proposed AWS Infrastructure
AWS, which has a market share of around 80 percent in this business, owes much of its dominance to its leadership in the public cloud sector and the magic quadrant which are Infrastructure as a Service (IaaS). Aside from that, AWS provides a broad range of services and a worldwide network of data centers that is constantly growing. AWS may manage a huge number of resources and users, in addition to being business-ready (Dineva & Atanasova). In terms of weaknesses, AWS has a huge one: cost. It's challenging for many firms to understand AWS's cost structure because AWS frequently lowers its costs. It becomes difficult to adequately manage such expenses even while running a large number of workloads on the services.
Architectural diagram
Technical Description
The cloud-based services make sure that the organization's information is backed up in the servers I secure and can be easily accessible. It ensures that all its components are integrated to help minimize the data redundancy and duplication of data. There are several measures that are taken to help evaluate any form of data that is uploaded to the cloud. One of the core services is to endure a smooth performance in the organization of interns accessing and uploading information and data to the cloud (Adbulsalam & Hedabou, 2021). That helps meet the Company's business needs in the sense that the performance of the Company will increase as well as their production.
The firm mainly has a server room at its headquarters, where all of the Company's servers are housed. The Company's physical Infrastructure is only housed in the Company's headquarters, and all of the servers are on Windows Server (Power et al., 2021). In an incident, such as a fire in the server room, having this kind of equipment is hazardous to the Company's operations. The ability to back up and restore data in the cloud is an additional benefit that should be implemented as soon as possible.
Cloud Security
AWS and the client share responsibilities for compliance and security. To help alleviate the client's operational burden, AWS operates, manages, and controls all the components of a service's Infrastructure, from the host operating system and virtualization layer down to physical security. AWS offers a secure group firewall, which must be configured by the customer. Still, the client is responsible for the guest operating system (including updates and security patches) and any other associated application software (Singh & Chatterjee, 2017). Customer duties vary based on the services they use, the incorporation of those services into their IT system, and applicable laws. Because of the joint responsibility, the deployment is possible thanks to customers' freedom and control over their responsibilities. Security "of" the Cloud vs. Security "in" the Cloud is a typical term for this division of responsibilities.
Conclusion
In conclusion, the study states that With AWS, you'll have access to best-in-class cloud computing architecture across all five pillars. Cost-effective systems that are efficiency, operational dependability, security, data integrity, and database architecture. Finally, installing apps used by the organization across many regions globally will be simple, resulting in decreased latencies and a better customer experience at a reasonable cost. Some of the recommendations that were recommended include the fact that. The recommendations include the establishment of both private and public security forces. Virtual private cloud computing resources can be launched in the AWS Batch environment. It is necessary to construct an AWS Batch job queue. A job definition" is needed to carry out the tasks.
References
Abdulsalam, Y. S., & Hedabou, M. (2021). Security and Privacy in Cloud Computing: Technical Review. Future Internet, 14(1), 11. https://doi.org/10.3390/fi14010011
Dineva, K., & Atanasova, T. (2021). Design of Scalable IoT Architecture Based on AWS for Smart Livestock. Animals, 11(9), 2697. https://doi.org/10.3390/ani11092697
Lyu, B., Yuan, H., Lu, L., & Zhang, Y. (2021). Resource-constrained neural architecture search on edge devices. IEEE Transactions on Network Science and Engineering, 9(1), 134-142.
Powers, J. G., Werner, K. K., Gill, D. O., Lin, Y. L., & Schumacher, R. S. (2021). Cloud Computing Efforts for the Weather Research and Forecasting Model. Bulletin of the American Meteorological Society, 102(6), E1261-E1274.https://doi.org/10.1175/BAMS-D-20-0219.1
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115. https://doi.org/10.1016/j.jnca.2016.11.027
About Author
Tough Essay Due? Hire Tough Essay Writers!
We have subject matter experts ready 24/7 to tackle your specific tasks and deliver them ON TIME, ready to hand in. Our writers have advanced degrees, and they know exactly what’s required to get you the best possible grade.
Find the right expert among 500+
We hire Gradewriters writers from different fields, thoroughly check their credentials, and put them through trials.
View all writers