STCLOUD_mod5_networking_content_delivery FULL

original file

Announcements

Module 5 Networking and Content Delivery

Networks

_attachments/Pasted image 20250723210251.png

end device/host A ← switch ← subnet 1 ← port A ← router → port B → subnet 2 → end device/host B

IP Addresses

_attachments/Pasted image 20250723202345.png

there is an addressing scheme to identify hosts

IPv4 (32b) 192.0.2.0
IPv6 (128-bit) 2600:1f18:22ba:8c00:ba86:a05e:a5ba:00FF

NAT Network Address Translation

Classless Inter-Domain Routing (CIDR)

_attachments/Pasted image 20250723213259.png

Open Systems Interconnection (OSI) model

_attachments/Pasted image 20250723213418.png

APP LAYER: application, presentation, session
TRANSPORT LAYER
NETWORK LAYER: internet
NETWORK ACCESS: data link, physical

Module 5 Section 2: Amazon VPC/Network Services

(24:59)

Amazon VPC (Virtual Private Cloud)

Terminologies: VPCs and subnets

_attachments/Pasted image 20250724013149.png
region first → VPC next → availability zone for the subnet

Terminologies: IP Addressing

_attachments/Pasted image 20250729161817.png

Prefix length PL is /16 or /28 represent the network bits

How to get the host bits?

you don't have to memorize how to get these addresses, that's for CSNETWK but you have to know that you HAVE flexibility in choosing these things

Reserved IP Addresses (5)

_attachments/Pasted image 20250729164713.png
Example: a VPC with an IPv4 CIDR lock of 10.0.0.0/16 has 65,536 total IP Addresses. The VPC has 4 equal-sized subnets. Only 251 IP addresses are available for use by each subnet.

The reserved IP addresses:
_attachments/Pasted image 20250729164724.png

if you chose a /28 prefix length

_attachments/Pasted image 20250729165734.png
_attachments/Pasted image 20250729170017.png

Public IP address Types

public IP is important because we're dealing with public cloud → which needs internet access → reachable via the network

Route table and routes

57:17
_attachments/Pasted image 20250729180854.png

Module 5 Section 3: VPC Networking

58:06

Internet Gateway

don't have to memorize this, just appreciate how it works
_attachments/Pasted image 20250729183122.png

Network Address Translation (NAT) gateway

_attachments/Pasted image 20250729183129.png

_attachments/Pasted image 20250729184446.png

Section 4 VPC Security

1:06:48

Security Groups

_attachments/Pasted image 20250729190313.png

Custom Security Group Examples

_attachments/Pasted image 20250729191407.png

Inbound Rules

first 2 inbound rules

Network Access Control Lists (Network ACLs)

_attachments/Pasted image 20250729194107.png

_attachments/Pasted image 20250729194144.png

Custom Network ACL Example

_attachments/Pasted image 20250729200700.png

1st rule: Rule # 100 → HTTPS → port 443 web traffic from any IP → ALLOW

for the 1st and 2nd rule in Inbound, you need a complementary outbound rule that does the same thing so in/out traffic will be allowed

3rd rule: Rule * → all IPv4 traffic → all ports and protocols → 0.0.0.0/0 (wildcard) → DENY

Tip

put descriptions and labels on your rules so you can understand and remember what they do, convert them to english

Summary: Security Groups vs Network ACLS

1:20:20

Attribute Security Groups Network ACLs
Scope Instance-level (Host-based Firewall) Subnet level (Network Firewall)
Supported Rules Allow rules only, deny by default Allow and deny rules
State Stateful (return traffic (from you) is automatically allowed, regardless of rules) Stateless (return traffic must be explicitly allowed by rules)
Order of rules all rules are evaluated before decision to allow traffic rules are evaluated in number order before decision to allow traffic, lowest number first

Module 5 Section 5: Amazon Route 53 (DNS)

1:25:03

Amazon Route 53 (DNS Service)

_attachments/Pasted image 20250729201419.png

Amazon Route 53 supported Routing

recording ended here

Use Case: Multi-region Deployment

_attachments/Pasted image 20250729215857.png

Amazon Route 53 DNS failover

_attachments/Pasted image 20250729215915.png

DNS failover for a multi-tiered web application

_attachments/Pasted image 20250729220020.png

Module 5 Section 6 Amazon CloudFront

Content Delivery and Network Latency

_attachments/Pasted image 20250729220045.png

Content Delivery Network (CDN)

Amazon CloudFront Infrastructure

_attachments/Pasted image 20250729220220.png

Amazon CloudFront benefits