Cloud Application Deployment Options

Instructor: Giorgos-Nektarios Panayotidis

George-Nektarios has worked as a tutor and student consultant for five years and has a 4-year university degree in Applied Informatics.

How is cloud application deployment done and what should be taken into consideration? The main factors, that is, processing requirements, data storage, bandwidth options, communication protocols and licenses are looked into in this lesson.

Cultivating the Cloud's Virtual Field

Let's assume that you have a field in your possession. How would you decide what type of soil and field management you would pick in order to cultivate a certain crop? Tough, isn't it? Now, imagine that the crop is the application, the field is the cloud, the type of soil is the cloud service type (IaaS, PaaS, SaaS) to choose and the type of field of management is the cloud type (public, hybrid, enterprise/private) and you've got the cloud application deployment problem before your eyes. Deploying an application onto the cloud isn't always an easy task and this is exactly what we will discuss in this lesson, by analyzing the main factors in this decision-making process.

Processing Requirements

Processing requirements are the first consideration one needs to make; one may in fact discover that they have a twofold manifestation. Specifically, they are sometimes considered as the requirements and regulations imposed on data processing. In this respect, the private cloud inherently tends to offer more control and security over data of a sensitive nature.

More often, though, processing requirements refer to processing performance and speed. In this regard, the public cloud is a great option for those who wish or need to make use of the public cloud's inherent parallel processing capability. Parallel processing implies multi-thread programming, ability to run in multiple processing environments and, at least, considerable speeds processing up.

Data Storage

Data storage requirements, particularly in terms of data security and privacy, are important and similar in nature to processing requirements. It is a common tale that, on premise, private cloud solutions are regarded generally safer than public or hybrid ones. Actually, data security in the public cloud is regarded as the greater challenge to be tackled. Still, there are considerations to make for every cloud type and service available; what's more, appropriate application deployment parameters may wipe out the danger associated with deploying in the (public) cloud. There are needs that, if met, are sufficient to render an application safe as to data security issues. Some of the matters one has to look into, before deployment, are as follows:

  • Protection of sensitive/confidential data of all kinds
  • Data mobility
  • Data deletion
  • Legal and regulatory compliance issues

Bandwidth Options

Bandwidth requirements are another important consideration to make before application deployment, because bandwidth in an internet-run public cloud is generally limited and definitely more limited in comparison to an enterprise cloud. Other considerations to make include the following:

  • Public-cloud based network performance
  • Network capacity (user accounts, number of concurrently run applications, network components) evaluation
  • Distribution of workloads in the cloud
  • Setting the priority of data (determining relative value of data and therefore data protection levels)

Communication Protocol

With regard to communication protocols, a Cloud Service Provider (CSP) should definitely use Internet Protocol (IP) and, preferably, Transmission Control Protocol (TCP). Maybe the most important implication of the communication protocol used is communications security. To this end, research suggests that SSL and VPN technologies are put to use. Furthermore, some form of data encryption should be employed by the CSP as well as ''network segmentation,'' a practice of cloud network users' isolation for security purposes, which turns them into network ''tenants.'' An emphasis is placed here on highly-sensitive networks' isolation.

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support