Cloud Infrastructure

Cloud infrastructure consists of the software and hardware needed to create computing resources shared over the internet. While cloud computing is out of sight, out of mind for many people, cloud environments are built using a combination of hardware and software, just like any other computing device. Cloud infrastructure can be spread out over a wide geographic area and is typically housed in data centers—physical buildings where servers and networking equipment operate.

Four main components comprise cloud infrastructure:

  • Hardware. Physical devices that include servers, firewalls, routers, load balancers, and switches.
  • Storage. Disks for memory storage and data backup.
  • Virtualization. Technology that abstracts a piece of hardware’s resources.
  • Network. The actual wires, routers, and switches that build the various different networks within a data center.

While the two terms are closely related, cloud infrastructure should not be confused with cloud architecture. You can think of cloud infrastructure as the tools needed to build a cloud environment. Cloud architecture is a plan on how to specifically use those tools to build a cloud environment.

Cloud infrastructure also plays a role in infrastructure as a service (IaaS). With IaaS, IT companies sell parts of cloud infrastructure—like servers and storage—as a service. Common examples of IaaS include Microsoft Azure, Amazon Web Services (AWS), and Google Cloud.

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...