Module - 05 - Networking and Content Delivery
Module - 05 - Networking and Content Delivery
Delivery
AWS Academy Cloud Foundations
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Module overview
Topics Activities
• Label a network diagram
• Networking basics
• Design a basic VPC architecture
• Amazon VPC
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Networks
Subnet 1 Subnet 2
Router
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 5
IP addresses
192 . 0 . 2 . 0
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 6
IPv4 and IPv6 addresses
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 7
Classless Inter-Domain Routing (CIDR)
192 . 0 . 2 . 0 / 24
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 8
Open Systems Interconnection (OSI) model
Numb Protocol/
Layer Function
er Address
HTTP(S), FTP, DHCP,
Application 7 Means for an application to access a computer network
LDAP
Data link 2 Transfer data in the same LAN network (hubs and switches) MAC
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 9
Section 2: Amazon VPC
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Amazon VPC
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 12
IP addressing
• When you create a VPC, you assign it to
an IPv4 CIDR block (range of private VPC
IPv4 addresses).
• You cannot change the address range
x.x.x.x/16 or 65,536 addresses
after you create the VPC.
(max)
• The largest IPv4 CIDR block size is /16.
to
• The smallest IPv4 CIDR block size is x.x.x.x/28 or 16 addresses
/28. (min)
• IPv6 is also supported (with a different
block size limit).
• CIDR blocks of subnets cannot overlap.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 13
Reserved IP addresses
Example: A VPC with an IPv4 CIDR block of 10.0.0.0/16 has 65,536 total IP
addresses.
The VPC has four equal-sized subnets. Only 251 IP addresses are available
for use by each subnet. IP Addresses for
CIDR block Reserved for
VPC: 10.0.0.0/16 10.0.0.0/24
Subnet 1 Subnet 2
10.0.0.0 Network address
(10.0.0.0/24) (10.0.2.0/24)
251 IP addresses 251 IP addresses Internal
10.0.0.1
communication
Network broadcast
10.0.0.255
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. address 14
Public IP address types
Public IPv4 address Elastic IP address
• Manually assigned through • Associated with an AWS
an Elastic IP address account
• Automatically assigned • Can be allocated and
through the auto-assign remapped anytime
public IP address settings at • Additional costs might apply
the subnet level
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 15
Elastic network interface
• An elastic network interface is a virtual network interface that you can:
• Attach to an instance.
• Detach from the instance, and attach to another instance to redirect network
traffic.
• Its attributes follow when it is reattached to a new instance.
• Each instance in your VPC has a default network interface that is
assigned a private IPv4 address from the IPv4 address range of your
VPC.
Subnet: 10.0.1.0/24
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 16
Route tables and routes
• A route table contains a set of
rules (or routes) that you can
Main (Default) Route Table
configure to direct network
traffic from your subnet. Destination Targe
t
• Each route specifies a 10.0.0.0/16 local
destination and a target.
• By default, every route table
contains a local route for
communication within the VPC.
VPC CIDR block
• Each subnet must be associated
with a route table (at most one).
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 17
• A VPC is a logically isolated section of the
Section 2 key AWS Cloud.
takeaways • A VPC belongs to one Region and requires a
CIDR block.
• A VPC is subdivided into subnets.
• A subnet belongs to one Availability Zone
and requires a CIDR block.
• Route tables control traffic for a subnet.
• Route tables have a built-in local route.
• You add additional routes to the table.
• The local route cannot be deleted.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 18
Section 3: VPC networking
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Internet gateway
AWS Cloud
Region
Availability Zone
VPC: 10.0.0.0/16
Public Subnet Route Table
Public
subnet:10.0.1.0/24 Destinatio Target
n
10.0.0.0/16 local
0.0.0.0/0 igw-id
Private subnet: Route Internet
10.0.2.0/24 table gateway
(igw-id)
Internet
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 20
Network address translation (NAT) gateway
AWS Cloud
Region
Availability Zone
VPC: 10.0.0.0/16
Public subnet:10.0.1.0/24 Public Subnet Route Table
Public route Destinatio Target
table n
NAT gateway 10.0.0.0/16 local
(nat-gw-id)
0.0.0.0/0 igw-id
Private subnet: 10.0.2.0/24 Internet
Private route gateway Private Subnet Route Table
table (igw-id) Destinati Target
Internet on
10.0.0.0/1 local
6
0.0.0.0/0 nat-gw-
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. id 21
VPC sharing
AWS Cloud
Region
Account D (participant)
Account B Account C
(participant) (participant)
NAT gateway Internet
gateway
EC2 EC2 EC2 RDS Amazon
instance instance instance instance EC2 instance Redshift
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 22
VPC peering
AWS Cloud
You can connect VPCs in
your own AWS account,
VPC A: 10.0.0.0/16 VPC B: 10.3.0.0/16 between AWS accounts,
or between AWS Regions.
Peering
connection Restrictions:
(pcx-id) • IP spaces cannot
overlap.
• Transitive peering is
Route Table for VPC A Route Table for VPC B not supported.
Destination Targe Destination Targe
t t
• You can only have one
10.0.0.0/16 local 10.3.0.0/16 local peering resource
10.3.0.0/16 pcx-id 10.0.0.0/16 pcx-id between the same two
VPCs.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 23
AWS Site-to-Site VPN
AWS Cloud
Public subnet route table
Region Destinatio Target
n
Availability Zone
10.0.0.0/16 local
VPC: 10.0.0.0/16 Site-to-Site
VPN 0.0.0.0/0 igw-id
Public
subnet:10.1.0.0/24 connection
Private subnet route table
Internet Destination Targe
t
10.0.0.0/16 local
Private subnet: Route Virtual Customer
10.0.2.0/24 192.168.10.0/2 vgw-
table gateway gateway 4 id
(vgw-id)
Region
Availability Zone Internet
VPC: 10.0.0.0/16
Public
subnet:10.1.0.0/24
802.1q
VLAN AWS Direct
Connect
AWS Direct
Custom VPN Amazon VPC Amazon Connect
er connection VPC peering VPC gateway
gateway Amazon Amazon
VPC VPC
VPN
connection
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 27
Activity: Label this network diagram
AWS Cloud
L A?
D?
B? Public
C?
subnet:10.0.1.0/24 J? M? Internet
E? F?
L?
Destinatio Target
Private subnet: n
G?
10.0.2.0/24 N? P?
K?
0.0.0.0/0 O?
H?
I? 10.0.0.0/16
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 28
Activity: Solution
AWS Cloud
Region
Availability Zone
VPC Public
Public subnet
Internet Route table Internet
subnet:10.0.1.0/24
gateway
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 29
Recorded
Amazon VPC
demonstration
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 30
Section 3 key • There are several VPC networking
options, which include:
takeaways
• Internet gateway
• NAT gateway
• VPC endpoint
• VPC peering
• VPC sharing
• AWS Site-to-Site VPN
• AWS Direct Connect
• AWS Transit Gateway
• You can use the VPC Wizard to
implement your design.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 31
Section 4: VPC security
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Security groups (1 of 2)
AWS Cloud
Region
Availability Zone
VPC: 10.0.0.0/16
Public
subnet:10.0.1.0/24
Security group
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 33
Security groups (2 of 2)
• Security groups have rules that control inbound and outbound instance
traffic.
• Default security groups deny all inbound traffic and allow all outbound
traffic.
Inbound
• Security
Source groups are Port
Protocol stateful.
Range Description
sg-xxxxxxxx All All Allow inbound traffic from network interfaces
assigned to the same security group.
Outbound
Destination Protocol Port Description
Range
0.0.0.0/0 All All Allow all outbound IPv4 traffic.
::/0 All All Allow all outbound IPv6 traffic.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 34
Custom security group examples
Region
Availability Zone
VPC: 10.0.0.0/16
Public
subnet:10.0.0.0/24
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 36
Network access control lists (network ACLs 2 of 2)
• A network ACL has separate inbound and outbound rules, and each rule can
either allow or deny traffic.
• Default network ACLs allow all inbound and outbound IPv4 traffic.
• Network ACLs are stateless.
Inbound
Rule Type Protocol Port Range Source Allow/Deny
100 All IPv4 All All 0.0.0.0/0 ALLOW
traffic
* All IPv4 All All 0.0.0.0/0 DENY
traffic Outbound
Rule Type Protocol Port Range Destination Allow/Deny
100 All IPv4 All All 0.0.0.0/0 ALLOW
traffic
* All IPv4 All All 0.0.0.0/0 DENY
traffic
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 37
Custom network ACLs examples
• Custom network ACLs deny all inbound and outbound traffic until
you add rules.
• You can specify both allow and deny rules.
• Rules are evaluated in number Inbound
order, starting with the lowest
number.
Rule Type Protocol Port Range Source Allow/Deny
100 HTTPS TCP 443 0.0.0.0/0 ALLOW
120 SSH TCP 22 192.0.2.0/24 ALLOW
* All IPv4 All All 0.0.0.0/0 DENY
traffic
Outbound
Rule Type Protocol Port Range Destination Allow/Deny
100 HTTPS TCP 443 0.0.0.0/0 ALLOW
120 SSH TCP 22 192.0.2.0/24 ALLOW
* All IPv4 All All 0.0.0.0/0 DENY
traffic
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 38
Security groups versus network ACLs
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 39
Activity: Design a VPC
Scenario: You have a small business with a website that is hosted on an
Amazon Elastic Compute Cloud (Amazon EC2) instance. You have
customer data that is stored on a backend database that you want to
keep private. You want to use Amazon VPC to set up a VPC that meets the
following requirements:
• Your web server and database server must be in separate subnets.
• The first address of your network must be 10.0.0.0. Each subnet must
have 256 total IPv4 addresses.
• Your customers must always be able to access your web server.
• Your database server must be able to access the internet to make patch
updates.
• Your architecture must be highly available and use at least one custom
firewall layer.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 40
Section 4 key • Build security into your VPC
architecture:
takeaways
• Isolate subnets if possible.
• Choose the appropriate gateway device or
VPN connection for your needs.
• Use firewalls.
• Security groups and network ACLs are
firewall options that you can use to
secure your VPC.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 41
Lab 2:
Build Your VPC
and Launch a
Web Server
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 42
Lab 2: Scenario
In this lab, you use Amazon VPC to create your own VPC and
add some components to produce a customized network. You
create a security group for your VPC. You also create an EC2
instance and configure it to run a web server and to use the
security group. You then launch the EC2 instance into the VPC.
Amazon Amazon
VPC EC2
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 43
Lab 2: Tasks
• Create a VPC.
Security
group • Create a VPC security group.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 44
Lab 2: Final product
AWS Cloud
Public Route Table
Region
Destinati
Target
Availability Zone A Availability Zone B on
VPC: 10.0.0.0/16 10.0.0.0/16 Local
Internet
Public subnet 1: gateway Public subnet 2:
Internet
10.0.0.0/24 10.0.2.0/24 0.0.0.0/0
gateway
Security
NAT
group
Web Private Route Table
gateway
server Destinati
Target
Private subnet Private subnet
on
1: 2: 10.0.0.0/16 Local
10.0.1.0/24 10.0.3.0/24
0.0.0.0/0 NAT gateway
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 45
~ 30 minutes
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 46
Lab debrief:
Key takeaways
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 47
Section 5: Amazon Route 53
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Amazon Route 53
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 49
Amazon Route 53 DNS resolution
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 50
Amazon Route 53 supported routing
• Simple routing – Use in single-server environments
• Weighted round robin routing – Assign weights to resource record sets to
specify the frequency
• Latency routing – Help improve your global applications
• Geolocation routing – Route traffic based on location of your users
• Geoproximity routing – Route traffic based on location of your resources
• Failover routing – Fail over to a backup site if your primary site becomes
unreachable
• Multivalue answer routing – Respond to DNS queries with up to eight
healthy records selected at random
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 51
Use case: Multi-region deployment
Amazon Route 53
some-elb-name.us-west- Use
2.elb.amazonaws.com r
some-elb-name.ap-southeast-
2.elb.amazonaws.com
Name Type Value
example.com ALIAS some-elb-name.us-west-2.elb.amazonaws.com
some-elb-name.ap-southeast-
example.com ALIAS
2.elb.amazonaws.com
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 52
Amazon Route 53 DNS failover
Improve the availability of your applications that run on AWS
by:
• Configuring backup and failover scenarios for your own
applications
• Enabling highly available multi-region architectures on AWS
• Creating health checks
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 53
DNS failover for a multi-tiered web application
Record Sets AWS Cloud
CNAME www
elastic_load_balancer
Availability Zone Availability Zone
Routing Policy = Failover
A B
Record Type = Primary
Primary
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 55
Section 6: Amazon CloudFront
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Content delivery and network latency
Hop
Router
Hop Hop
Origin server
Ho
Router
p
Router
Hop
Hop
Client
Router Hop
User
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 57
Content delivery network (CDN)
• Is a globally distributed system of caching servers
• Caches copies of commonly requested files (static content)
• Delivers a local copy of the requested content from a nearby
cache edge or Point of Presence
• Accelerates delivery of dynamic content
• Improves application performance and scaling
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 58
Amazon CloudFront
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 59
Amazon CloudFront infrastructure
Edge locations
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 61
Amazon CloudFront pricing
Data transfer out
• Charged for the volume of data transferred out from Amazon CloudFront
edge location to the internet or to your origin.
HTTP(S) requests
• Charged for number of HTTP(S) requests.
Invalidation requests
• No additional charge for the first 1,000 paths that are requested for
invalidation each month. Thereafter, $0.005 per path that is requested for
invalidation.
Dedicated IP custom SSL
• $600 per month for each custom SSL certificate that is associated with one
or more CloudFront distributions that use the Dedicated IP version of custom
SSL certificate support.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 62
Section 6 key • A CDN is a globally distributed system
of caching servers that accelerates
takeaways delivery of content.
• Amazon CloudFront is a fast CDN
service that securely delivers data,
videos, applications, and APIs over a
global infrastructure with low latency
and high transfer speeds.
• Amazon CloudFront offers many
benefits.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 63
Module wrap-up
Module 5: Networking and Content Delivery
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserve
Module summary
In summary, in this module you learned how to:
• Recognize the basics of networking
• Describe virtual networking in the cloud with Amazon VPC
• Label a network diagram
• Design a basic VPC architecture
• Indicate the steps to build a VPC
• Identify security groups
• Create your own VPC and added additional components to it to produce a
customized network
• Identify the fundamentals of Amazon Route 53
• Recognize the benefits of Amazon CloudFront
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 65
Complete the knowledge check
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 66
Sample exam question
Which AWS networking service enables a company to create a virtual network within AWS?
Choice Response
A AWS Config
B Amazon Route 53
D Amazon VPC
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 67
Sample exam question answer
Which AWS networking service enables a company to create a virtual network within AWS?
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 68
Additional resources
• Amazon VPC Overview pag:
https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-
vpc.html
• Amazon Virtual Private Cloud Connectivity Options whitepaper:
https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-opti
ons/introduction.html
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 70
VPC sharing
AWS Cloud
Region
Account D (participant)
Account B Account C
(participant) (participant)
NAT gateway Internet
gateway
Datab RDS Amazon
Web Web
ase EC2 instance Redshift
server server 2 instance
Server
1 on on
Amazon Amazon
EC2 EC2
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. 71