Skip to main content

Cloud Design Patterns – The Final Post

We arrive at our last appointment with Cloud Design Patterns.

After the first introductory post, we focused on patterns for the AWS cloud, and then Azure patterns. Now we’ll discuss a couple of vendor-non-specific sources of cloud design patterns:

Cloud Computing Patterns

CloudComputingPatterns.org is basically a marketing channel for pushing this Springer volume. The book itself seems quite useful and is well organized (but not particularly cheap). 

The book divides patterns into five major groups:

  1. Cloud Computing Fundamentals
  2. Cloud Offering Patterns
  3. Cloud Application Architecture Patterns
  4. Cloud Application Management Patterns
  5. Composite Cloud Application Patterns

Cloud Computing Fundamentals

Fundamentals include characteristic principles of Cloud Computing NIST and Cloud Service and Deployment models. So, for instance, how can the IAAS service model be designed to accommodate the widest possible range of use-cases:

“How can different customers share a physical hosting environment so that it can be used on-demand with a pay-per-use pricing model?”

The solution?

“A provider offers physical and virtual hardware, such as servers, storage and networking infrastructure that can be provisioned and decommissioned quickly through a self-service interface. “

Infrastructure as a service sketch
Of course, the actual book will likely contain much more on the subject.

Cloud Offering Patterns

Let’s take Blob Storage.

“How can large files be stored, organized and made available over a network?”

Cloud Computing Patterns’ answer:

“Data elements are organized in a folder hierarchy similar to a local file system. Each data element is given a unique identifier comprised of its location in the folder hierarchy and a file name. This unique identifier is passed to the storage offerings to retrieve a file over a network. ”

Blob Storage Sketch

Cloud Application Architectures

How about a Batch Processing Component?

“How can asynchronous processing requests be delayed to be handled when conditions for their processing are optimal?”

Solution:

“Asynchronous processing requests are accepted at all times but stored them (sic) until conditions are optimal for their processing. Based on the number of stored requests, environmental conditions, and custom rules, components are instantiated to handle the requests. Requests are only processed under non-optimal conditions if they cannot be delayed any longer. “

Batch processing component sketch image

Cloud Application Management

The Elastic Queue pattern:

“How can the number of required application component instances be adjusted based on monitored asynchronous accesses?”

And the solution:

“Queues that are used to distribute asynchronous requests among multiple application components instances are monitored. Based on the number of enqueued messages the Elastic Queue adjusts the number of application component instances handling these requests.“

Elastic Queue Sketch

Composite Cloud Applications

For the composite applications, we can evaluate the Three-Tier Cloud Application Pattern

“How can presentation logic, business logic, and data handling be decomposed into separate tiers that are scaled independently?”

The pattern provides the solution described by text and image:

“The application is decomposed into three tiers shown exemplarily in Figure, where each tier is elastically scaled independently. The presentation tier is comprised of a load balancer and an application component that implements the Stateless Component pattern and User Interface Component pattern. The business logic tier is comprised of an application component implementing the State in the other portal, less Component pattern in addition to the Processing Component pattern. “

Three-tier-cloud Application Sketch
The References and Context associated with each pattern described in this book are especially useful for a more full understanding.

CloudPatterns.org

CloudPatterns.org is a portal owned by Arcitura Education Inc, a global provider of vendor-neutral training and certification programs. Their online database of design patterns will obviously serve marketing goals, to attract professionals on courses and certifications of their list. But it’s very well organized and boasts rich content. They begin with:

Technology Mechanisms

Mechanisms are well-defined IT artifacts established within an IT industry and often unique to a certain computing model or platform. These mechanisms are often called Design Patterns to better define use-case problems and solutions. The Virtual Server, for instance, is a framework that’s useful for “hosting” related patterns. Similarly with the Hypervisor.
Hypervisor

Compound Patterns

… as an aside, this is the first time I have used the internet at 36,000 feet … very impressive …Compound patterns are effectively design models, composed of a set of very well defined models, or the design patterns. We can see something similar in the IAAS compound pattern from Cloud Computing Patterns.
IaaS compound pattern
Each element in the graph is either necessary or optional (shown as a dashed line) for the functioning of the compound pattern.

Cloud Design Patterns

CloudPattern provides a great definition of the whole idea behind patterns in their overview, in particular, this:

NIST Reference Architecture MappingThis content is provided for those interested in how a given pattern can relate to the components that comprise the National Institute of Standards (NIST) Cloud Computing Reference Architecture.

Nist Reference Architecture
Patterns can play significant roles for cloud computing, sometimes even allowing optimizations that don’t yet exist out of the box from mainstream platforms. The Storage Workload Management approach is one example.  Load Balanced Virtual Server Instances, and Zero Downtime that allows live migration are others.
Storage Workload Management
Load Balanced Virtual Server Instances
A pattern I particularly appreciate is Power Consumption Reduction, something that should be adopted by all the big cloud providers to optimize and more efficiently manage data center electricity consumption. This approach is often effectively used by private virtualized data centers but has been resisted in some operations due to the perception of higher latency. Maybe it could be introduced together with accurate forecasts of seasonal and daily load.
Power Consumption Reduction 1 Power Consumption Reduction 2
This ends our series of posts dedicated to the world of Cloud Design Patterns. I hope I’ve aroused your curiosity and helped you deepen and develop your understanding of this fascinating aspect of Cloud Computing.

Written by

Fabio Cecaro

Expert and Visionary of the Cloud Computing model, Cloud Solution Architect, President of EuroCloud Italy. Purist of the NIST definition of Cloud Computing. I began to deal with the Cloud since 2007 as a private researcher, then as an entrepreneur. To evangelize the area where I live, I founded one of the first five Europeans AWS User Group (Naples, Italy), co-founded the EuroCloud Italy association and organized CloudCamps. I have "baptized" many to the Cloud. My Nicknames: Mr.Cloud or Santa Cloud at Christmas time.

Related Posts

Giacomo Marinangeli
— March 29, 2019

NEW: Custom Hands-On Labs for Azure and Google Cloud Platform

Harvard Business Review recently estimated that some 90% of corporate training never gets applied on the job. Given the $200B training industry, that is a staggering amount of waste. One reason for the disconnect? Lack of context.Cloud Academy’s platform was built to make it extraor...

Read more
  • Azure
  • Content Engine
  • Google Cloud Platform
  • hands-on labs
Guy Hummel
— March 28, 2019

How to Become a Microsoft Certified Azure Solutions Architect

Microsoft Azure is the fastest growing cloud provider. Azure’s revenue grew an incredible 76% in the last quarter of 2018. As more and more businesses move their IT infrastructure to Microsoft’s cloud platform, the demand for Azure professionals keeps rising. Since there are relatively ...

Read more
  • Azure
  • microsoft azure
Nitheesh Poojary
— March 20, 2019

What is Heroku? Getting Started with PaaS Development

So just what is Heroku? It's a service for developers eager to get their applications online without having to worry about infrastructure details.Metered, pay-as-you-go Cloud Computing services come in all kinds of flavors. Infrastructure as a Service (IaaS) offerings like AWS allow e...

Read more
  • Azure
  • Development & deploy
Nitheesh Poojary
— March 12, 2019

Understanding Object Storage and Block Storage Use Cases

Cloud Computing, like any computing, is a combination of CPU, memory, networking, and storage. Infrastructure as a Service (IaaS) platforms allow you to store your data in either Block Storage or Object Storage formats.Understanding the differences between these two formats - and how ...

Read more
  • Azure
  • Storage
Thomas Mitchell
— January 22, 2019

Azure Hybrid Identity Authentication Methods

The move to the cloud is picking up steam.  As such, many corporations are beginning to find themselves supporting a mixture of on-prem apps as well as cloud apps. Users are finding that they need access to this mix of applications as well.  As one would expect, this can become a challe...

Read more
  • Azure
  • Hybrid Cloud
  • Hybrid Identity
Guy Hummel
— November 21, 2018

Google Cloud Certification: Preparation and Prerequisites

Google Cloud Platform (GCP) has evolved from being a niche player to a serious competitor to Amazon Web Services and Microsoft Azure. In 2018, research firm Gartner placed Google in the Leaders quadrant in its Magic Quadrant for Cloud Infrastructure as a Service for the first time. In t...

Read more
  • AWS
  • Azure
  • Google Cloud
Thomas Mitchell
— October 30, 2018

Azure Stack Use Cases and Applications

This is the second of a two-part series covering Azure Stack. Our first post provided an introduction to Azure Stack. Why would your organization consider using Azure Stack? What are the key differences between Azure Stack and Microsoft Azure? In this post, we'll begin to answer bot...

Read more
  • Azure
  • Hybrid Cloud
  • Virtualization
Guy Hummel
— October 3, 2018

Highlights from Microsoft Ignite 2018

Microsoft Ignite 2018 was a big success. Over 26,000 people attended Microsoft’s flagship conference for IT professionals in sunny Orlando, Florida. As usual, Microsoft made a huge number of announcements, ranging from minor to major in importance. To save you the trouble of sifting thr...

Read more
  • Azure
  • Ignite
Guy Hummel
— September 20, 2018

Planning for Microsoft Ignite 2018 Sessions: What Not to Miss

Cloud Academy is proud to be a sponsor of the Microsoft Ignite Conference to be held September 24 - 28 in Orlando, Florida. This is Microsoft’s biggest event of the year and is a great way to stay up to date on how to get the most from Microsoft’s products. In this post, I’ll help you p...

Read more
  • Azure
Cloud Academy Team
— September 18, 2018

How to Optimize Cloud Costs with Spot Instances: New on Cloud Academy

One of the main promises of cloud computing is access to nearly endless capacity. However, it doesn’t come cheap. With the introduction of Spot Instances for Amazon Web Services’ Elastic Compute Cloud (AWS EC2) in 2009, spot instances have been a way for major cloud providers to sell sp...

Read more
  • AWS
  • Azure
  • Google Cloud
  • SpotInst
Guy Hummel and Jeremy Cook
— August 23, 2018

What are the Benefits of Machine Learning in the Cloud?

A Comparison of Machine Learning Services on AWS, Azure, and Google CloudArtificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. There is every reason to beli...

Read more
  • AWS
  • Azure
  • Google Cloud
  • Machine Learning
Dwayne Monroe
— July 5, 2018

How Does Azure Encrypt Data?

In on-premises environments, data security is typically a siloed activity, with a company's security team telling the internal technology groups (server administration, database, networking, and so on) what needs to be protected against intrusion.This approach is absolutely a bad idea...

Read more
  • Azure