Edge Computing with Amazon Web Services A Practical Guide to Architecting Secure Edge Cloud Infrastructure with AWS

Build scalable, cost-effective, high-performance, and secure architectures using AWS Outposts, AWS Local Zones, AWS Wavelength, and AWS Snow services along guided by best practices and practical examples Key Features Take advantage of the opportunities and challenges arising from the exponential gro...

Descripción completa

Detalles Bibliográficos
Otros Autores: Howard, Sean, 1965- author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing [2024]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009805128306719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Compute, Network, and Security Services at the Edge
  • Chapter 1: Getting Started with Edge Computing on AWS
  • The intersection of cloud and edge computing
  • Physics
  • Economics
  • Regulatory compliance
  • Inertia
  • The AWS edge computing strategy
  • Disconnected, denied, intermittent, or low-bandwidth
  • Multi-access edge computing
  • Immersive experiences
  • IIoT
  • Overview of the AWS edge computing toolbox
  • Localized AWS infrastructure and services
  • Developer tools and resources
  • Security and compliance
  • Consistent experience
  • Architectural guidance
  • Summary
  • Chapter 2: Understanding Network and Security for Near-Edge Computing
  • Understanding internet challenges
  • The impact of latency and packet loss
  • Causes of packet loss on the internet
  • TCP receive window (RWIN)
  • User Datagram Protocol (UDP)
  • Using a private wide-area network (WAN)
  • Multiprotocol Label Switching (MPLS)
  • Software-defined networking (SDN)
  • Software-defined WAN (SD-WAN)
  • Optimizing ingress with global server load balancing (GSLB)
  • Internet Control Message Protocol (ICMP) triangulation
  • IP geolocation database
  • Custom rules
  • Steering traffic at the network layer with IP Anycast
  • Addressing TCP issues with HTTP/3 and QUIC
  • Upsides of HTTP/3 and QUIC
  • Downsides of HTTP/3 and QUIC
  • Current status
  • Securing networks at the near edge
  • Identity and Access Management (IAM)
  • Encryption
  • Secure communication protocols
  • Device hardening
  • Network segmentation
  • Monitoring and logging
  • Security updates and vulnerability management
  • Physical security
  • Incident response and disaster recovery
  • Training and awareness
  • Summary
  • Chapter 3: Understanding Network and Security for Far-Edge Computing.
  • Introduction to radio frequency (RF) communications
  • Frequency and wavelength
  • Antennas
  • Modulation
  • Duplexing
  • Multipath propagation
  • Multiplexing
  • Utilizing cellular networks
  • 4G/LTE
  • 5G
  • Cellular Vehicle-to-Everything (C-V2X)
  • Narrow-Band IoT (NB-IoT)
  • Optimizing Wi-Fi (802.11x)-based connectivity
  • Wi-Fi-1 through Wi-Fi-6
  • Modulation and coding schemes (MSCs)
  • Spatial streams
  • WiFi and MIMO
  • MU-OFDMA
  • 802.11p (DSRC)
  • Connecting to low-powered devices with LoRaWAN
  • LoRa
  • Long range wide area network (LoRaWAN)
  • LoRaWAN network topology
  • Direct communication between devices
  • Geolocation
  • LoRaWAN device classes
  • Integrating SATCOM
  • SATCOM frequency bands
  • Satellite orbits
  • Global Navigation Satellite System (GNSS)
  • Summary
  • Part 2: Introducing AWS Edge Computing Services
  • Chapter 4: Addressing Disconnected Scenarios with AWS Snow Family
  • Introduction to the AWS Snow Family
  • Using AWS Snowball Edge
  • Migrating data to the cloud
  • Physical networking
  • Logical networking
  • Storage allocation
  • Using AWS Snowcone
  • Wi-Fi
  • Power supply
  • Data transfer targets
  • Summary
  • Chapter 5: Incorporating AWS Outposts into Your On-Premises Data Center
  • Introducing AWS Outposts
  • Using AWS Outposts Rack
  • Use cases
  • Ordering an AWS Outposts rack
  • Physical elements
  • Logical networking
  • Available services
  • High availability (HA)
  • Security
  • Using AWS Outposts Server
  • Ordering
  • Physical networking
  • Service link
  • Logical network interfaces (LNIs)
  • High Availability (HA)
  • Service availability
  • Storage
  • Summary
  • Chapter 6: Lowering First-Hop Latency with AWS Local Zones
  • Introduction to AWS Local Zones
  • Customer needs
  • AWS Outposts versus AWS Local Zones
  • AWS Dedicated Local Zones
  • AWS Local Zones pricing
  • Latency to AWS Local Zones.
  • Opting into AWS Local Zones
  • Connecting on-premises networks to AWS Local Zones
  • AWS Direct Connect
  • Routing internet traffic into AWS Local Zones
  • Application Load Balancer
  • Amazon Route53 for load balancing
  • AWS Local Zone as primary with parent region as secondary
  • Using AWS Global Accelerator
  • Traffic between AWS Local Zones
  • Summary
  • Chapter 7: Using AWS Wavelength Zones on Public 5G Networks
  • Introduction to AWS Wavelength Zones
  • Comparing AWS Wavelength deployments across global carriers
  • Connecting to AWS Wavelength from mobile devices
  • Enabling AWS Wavelength Zones
  • Carrier gateways
  • Application Load Balancer
  • Amazon Route53 for load balancing
  • Edge Discovery Service (EDS)
  • Extending a VPC into AWS Wavelength
  • Communication between AWS Wavelength Zones
  • Communicating to AWS endpoints
  • Integrating AWS Wavelength with other services
  • EC2 instances
  • Amazon ECS
  • Amazon EKS
  • Service pricing
  • Summary
  • Part 3: Building Distributed Edge Architectures with AWS Edge Computing Services
  • Chapter 8: Utilizing the Capabilities of the AWS Global Network at the Near Edge
  • Overview of the AWS Global Network
  • AWS Global Network
  • Processing at the near edge with Amazon CloudFront
  • Content distribution
  • Regional edge caches (RECs)
  • Amazon CloudFront Embedded POPs
  • HTTP/3 and QUIC
  • AWS Lambda@Edge
  • Amazon CloudFront functions
  • Leveraging IP Anycast with AWS Global Accelerator
  • TCP termination
  • Endpoint groups
  • Using the AWS global backbone as a private WAN
  • AWS Cloud WAN
  • Summary
  • Chapter 9: Architecting for Disconnected Edge Computing Scenarios
  • Overview of DDIL
  • Using AWS IoT services in DDIL scenarios
  • The AWS Snow family as an IoT gateway
  • Embedded Linux devices as IoT gateways
  • Tactical edge
  • Forward deployment of the AWS Snow family
  • EKS-A.
  • Forward deployment of AWS Outposts
  • Private 5G and DDIL
  • Using AWS Snowball Edge to host a private 5G core
  • Summary
  • Chapter 10: Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures
  • Overview of architecting 5G-based MEC solutions
  • Public MEC
  • Private MEC
  • Observability, security, and capacity of Wi-Fi versus 5G
  • Observability
  • Security
  • Capacity
  • Computer Vision
  • V2X
  • ISA devices
  • AWS IoT FleetWise
  • Software-defined video production
  • Summary
  • Chapter 11: Addressing the Requirements of Immersive Experiences with AWS
  • Overview of immersive experiences
  • Virtual Reality (VR)
  • Augmented Reality (AR)
  • Mixed Reality (MR)
  • XR development platforms
  • Online gaming with Unity
  • Dedicated servers
  • Game clients
  • Pixel streaming
  • Amazon GameLift plugin for Unity
  • Connected workers
  • Mobile edge computing (MEC) and connected workers
  • Workforce development and training
  • AR-enhanced sporting events
  • AR-integrated live video
  • Summary
  • Part 4: Implementing Edge Computing Solutions via Hands-On Examples and More
  • Chapter 12: Configuring an AWS Snowcone Device to Be an IOT Gateway
  • Ordering an AWS Snowcone device
  • Step 1 - Creating an S3 bucket
  • Step 2 - Creating a new job
  • Step 3 - Selecting the job type
  • Step 4 - Choosing a form factor
  • Step 5 - Selecting optional components
  • Step 6 - Setting encryption options
  • Step 7 - Confirming your selections
  • Step 8 - Saving output files
  • Step 9 - Setting up the physical environment
  • Deploying the backend in your AWS account
  • Step 1 - Installing and configuring AWS CLI v2
  • Step 2 - Cloning the code repository from GitHub
  • Step 3 - Copying the code repository to your S3 bucket
  • Step 4 - Deploying the CloudFormation templates.
  • Step 5 - Retrieving outputs from CloudFormation and passing them to environment variables
  • Step 6 - Configuring the AWS IoT Greengrass v2 service policy on your account
  • Preparing the device with the Snowball Edge CLI
  • Step 1 - Installing the AWS Snow CLI client
  • Step 2 - Configuring the AWS Snow CLI
  • Step 3 - Unlocking your Snow device with the CLI
  • Step 4 - Retrieving the output of the unlocking procedure
  • Step 5 - Creating a virtual network interface
  • Step 6 - Obtaining local credentials from your Snow device
  • Step 7 - Retrieving the certificate from your Snow device
  • Step 8 (optional) - Adding the EC2 endpoint URL to your AWS CLI config file
  • Configuring AWS IoT Greengrass on the Snow device
  • Step 1 - Creating an EC2 keypair on the Snow device
  • Step 2 - Obtaining the ImageId value from your Snow device
  • Step 3 - Launching the EC2 instance on your Snow device
  • Step 4 - Attaching the VNI to your EC2 instance
  • Step 5 - SSHing into your EC2 instance
  • Step 6 - Installing the AWS IoT Greengrass prerequisites into your EC2 instance
  • Step 7 - Installing the AWS IoT Greengrass v2 agent onto your EC2 instance
  • Walkthrough of what you've created
  • Controlling your EC2 instance remotely
  • Exploring the Greengrass components on your device
  • Summary
  • Chapter 13: Deploying a Distributed Edge Computing Application
  • Deploying a distributed EKS cluster with Terraform
  • Architecture
  • Components
  • Cost
  • Setting up your environment
  • Deploying the EKS cluster
  • Using Terraform to push a distributed application
  • Components
  • Deploying the distributed application
  • Testing the application from multiple sources
  • Checking the user experience from your desktop/laptop
  • Checking the user experience from your mobile device
  • Cleanup
  • Notes
  • Summary.
  • Chapter 14: Preparing for the Future of Edge Computing with AWS.