Skip to content

Domain 3: Networking Services

CLF-C02 Exam Domain 3 - Part 4 | 34% of Scored Content

Learning Objectives

By the end of this section, you will be able to:

  • Define the AWS global infrastructure (Domain 3, Task 3.2)
  • Understand Amazon VPC components and architecture
  • Configure public and private subnets
  • Understand VPC networking features
  • Compare Route 53 routing policies
  • Identify AWS networking services for different use cases

AWS Global Infrastructure

Domain 3, Task 3.2: Define the AWS global infrastructure

Overview

The AWS global infrastructure is built around Regions and Availability Zones, providing a reliable, secure, and high-performance environment for running applications.

Components Overview

┌─────────────────────────────────────────────────────────────┐
│                    AWS Global Infrastructure                │
├─────────────────────────────────────────────────────────────┤
│                                                             │
│  34+ Geographic Regions                                     │
│    └── 108+ Availability Zones                              │
│         └── 600+ Edge Locations                             │
│              └── 13 Regional Edge Caches                    │
│                                                             │
└─────────────────────────────────────────────────────────────┘

1. AWS Regions

Definition: A geographic area where AWS has multiple, isolated data centers.

Key Points:

  • 34+ regions worldwide (US, EU, AP, etc.)
  • Each region is completely independent
  • Data residency and compliance requirements
  • Latency considerations for users
  • Connected through high-bandwidth, low-latency networking

Common Regions:

Region CodeLocation
us-east-1N. Virginia
us-west-2Oregon
eu-west-1Ireland
eu-central-1Frankfurt
ap-southeast-1Singapore
ap-northeast-1Tokyo

Use Cases for Multiple Regions:

  • Disaster Recovery: Deploy applications in multiple regions for business continuity
  • Low Latency: Serve end users in different geographic locations
  • Data Sovereignty: Meet data residency requirements by storing data in specific countries
  • Compliance: Satisfy regulatory requirements for data location

2. Availability Zones (AZs)

Definition: One or more discrete data centers within an AWS Region.

Key Characteristics:

  • Each AZ is isolated from failures in other AZs
  • Connected with low-latency, high-bandwidth networking (within region)
  • Power, networking, and connectivity are independent
  • No single point of failure across AZs
  • Best Practice: Distribute applications across multiple AZs for high availability

Architecture:

┌─────────────────────────────────────┐
│         AWS Region (us-east-1)      │
├─────────────────────────────────────┤
│                                     │
│  ┌─────────┐  ┌─────────┐  ┌──────┐ │
│  │   AZ1   │  │   AZ2   │  │ AZ3  │ │
│  │ Data    │  │ Data    │  │ Data │ │
│  │ Center  │  │ Center  │  │      │ │
│  └─────────┘  └─────────┘  └──────┘ │
│      │            │            │    │
│      └────────────┴────────────┘    │
│         Low Latency Network         │
└─────────────────────────────────────┘

Achieving High Availability:

  • Use multiple AZs for redundancy
  • If one AZ fails, traffic fails over to another AZ
  • Load Balancers distribute traffic across AZs
  • Multi-AZ RDS automatically replicates to another AZ

3. Edge Locations

Definition: Sites that CloudFront uses to cache content closer to end users.

Purpose:

  • Content delivery via CloudFront (CDN)
  • Lower latency for end users
  • 600+ locations worldwide
  • Reduce load on origin servers

Use Cases:

  • Static content delivery (images, videos, CSS, JS)
  • Dynamic content delivery with Lambda@Edge
  • Live and on-demand video streaming
  • API acceleration

4. Regional Edge Caches

Purpose:

  • Sit between CloudFront edge locations and AWS Region
  • Cache content for longer periods
  • Reduce origin load for popular content
  • Improve cache hit rates

How It Works:

User → Edge Location (miss) → Regional Edge Cache → Origin

5. AWS Local Zones

Purpose:

  • Place compute, storage, database, and other services
  • Closer to large population, industry, and IT centers
  • Low-latency applications (5-10ms latency)

Use Cases:

  • Real-time gaming
  • Media rendering
  • Machine learning inference at the edge
  • Healthcare applications requiring low latency

6. AWS Wavelength

Purpose:

  • Deploy AWS services at the edge of 5G networks
  • Ultra-low latency applications (1-2ms)
  • For ML inference, gaming, IoT

Use Cases:

  • Connected vehicles
  • Industrial automation
  • Live event streaming
  • Augmented reality (AR) and virtual reality (VR)

Relationships Between Components

ComponentDescriptionRelationship
RegionsGeographic areasContains multiple AZs, independent from each other
AZsIsolated data centersWithin regions, connected by low-latency network
Edge LocationsCDN caching pointsGlobally distributed, cache content from regions
Regional Edge CachesIntermediate cachingBetween edge locations and regions
Local ZonesExtension of regionsLocated near metropolitan areas
Wavelength Zones5G edge infrastructureLocated at carrier edge locations

High Availability Strategies

StrategyDescriptionComponent
Multi-AZDistribute resources across AZsWithin a single region
Multi-RegionDeploy resources across regionsAcross geographic regions
Cross-Zone Load BalancingDistribute traffic across AZsELB feature (enabled by default)
Global AcceleratorImprove availability and performanceUses AWS global network

Amazon VPC (Virtual Private Cloud)

Overview

Amazon VPC enables you to launch AWS resources into a virtual network that you define.

Key Characteristics

FeatureDescription
Isolated NetworkYour own private cloud
CIDR BlockDefine IP address range
SubnetsSegments of IP addresses
Multiple AZsDistribute across availability zones
Hybrid ConnectivityConnect to on-premises via VPN/Direct Connect

VPC Components

1. VPC Basics

CIDR Block:

  • IPv4: Example 10.0.0.0/16 (65,536 addresses)
  • IPv6: Optional, can be associated
  • Smallest: /28 (16 addresses)
  • Largest: /16 (65,536 addresses)

Reserved IPs (5 per subnet):

  • 10.0.0.0: Network address
  • 10.0.0.1: VPC router
  • 10.0.0.2: DNS server
  • 10.0.0.3: Future use
  • 10.0.0.255: Network broadcast

2. Subnets

Definition: A segment of a VPC's IP address range.

Types:

TypeDescriptionInternet Access
Public SubnetHas route to Internet GatewayYes
Private SubnetNo direct route to internetNo (via NAT only)

Subnet Sizing:

  • /24: 256 IPs (251 usable after AWS reserves 5)
  • /26: 64 IPs
  • /28: 16 IPs

1 subnet = 1 AZ (A subnet is tied to a specific AZ)

3. Internet Gateway (IGW)

Purpose: Allows communication between resources in VPC and internet.

Characteristics:

  • Horizontally scaled, redundant, highly available
  • One per VPC (can have multiple, but not recommended)
  • Required for public subnets
  • Two-way communication: VPC ↔ Internet

4. NAT Gateway (NAT)

Purpose: Allows instances in private subnets to connect to internet, but prevents internet from initiating connections.

Characteristics:

  • Created in public subnet
  • Elastic IP required
  • Scaled automatically (up to 45 Gbps)
  • AZ-specific (create NAT in each AZ for HA)
  • One-way communication: Private subnet → Internet

NAT Gateway vs NAT Instance:

FeatureNAT GatewayNAT Instance
ScalabilityAutomaticManual
AvailabilityHighly availableSingle point of failure
ManagementAWS-managedSelf-managed
BandwidthUp to 45 GbpsLimited by instance

5. Route Tables

Purpose: Routes network traffic between subnets and internet gateways.

Components:

  • Routes: Rules for where to send traffic
  • Associations: Which subnets use the route table

Example Route Table:

Destination      Target
10.0.0.0/16  →  Local
0.0.0.0/0    →  igw-12345 (Internet Gateway)

Main vs Custom Route Tables:

  • Main: Default route table, automatically associated with new subnets
  • Custom: Created by you, explicitly associated with subnets

6. Security Groups vs NACLs

FeatureSecurity GroupNACL
ScopeInstance levelSubnet level
StateStatefulStateless
RulesAllow onlyAllow and Deny
EvaluationAll rulesNumbered order
DefaultAllow all outboundAllow all

Security Group:

  • Virtual firewall at instance level
  • Stateful: Return traffic automatically allowed
  • Allow rules only (no deny)
  • Best Practice: Use security groups for most security needs

NACL (Network Access Control List):

  • Stateless firewall at subnet level
  • Stateless: Return traffic must be explicitly allowed
  • Ordered rules (1-32766)
  • Use Case: Rarely needed, for specific subnet-level controls

7. VPC Peering

Purpose: Connect two VPCs privately.

Characteristics:

  • One-to-one relationship (cannot transit)
  • Same region (standard) or different regions (inter-region)
  • No single point of failure
  • Bandwidth: Same as within VPC

Limitations:

  • No transitive peering: A-B, B-C ≠ A-C
  • Cannot have overlapping CIDRs

8. VPC Endpoints

Purpose: Private connection to AWS services without internet gateway.

Types:

TypeDescriptionUse Case
Interface EndpointENIs in subnet, private IPsS3, DynamoDB, etc.
Gateway EndpointVPC component, target in route tableS3, DynamoDB

Gateway Endpoint Example:

Route Table:
Destination      Target
10.0.0.0/16  →  Local
0.0.0.0/0    →  igw-12345
s3.amazonaws.com → vpce-12345 (Gateway Endpoint)

Benefits:

  • No internet gateway required
  • No data transfer charges
  • Private connectivity

AWS Direct Connect

Overview

AWS Direct Connect establishes a dedicated network connection from your premises to AWS.

Key Characteristics

FeatureDescription
Dedicated ConnectionBypasses internet
Lower LatencyMore consistent network experience
Higher BandwidthUp to 100 Gbps
CostConnection fee + data transfer

Direct Connect vs VPN

FeatureDirect ConnectVPN
ConnectionDedicated physicalOver internet
EncryptionOptional (you manage)Built-in (IPsec)
LatencyLower, consistentVariable
CostHigherLower
Setup TimeWeeksMinutes
Use CaseLarge data transfer, complianceRemote access, smaller scale

Amazon Route 53

Overview

Amazon Route 53 is a highly available and scalable Domain Name System (DNS) web service.

Key Features

FeatureDescription
Domain RegistrationRegister domain names
DNS HostingManage DNS records
Health ChecksMonitor endpoint health
Routing PoliciesControl traffic routing
99.99% SLAAvailability guarantee

DNS Records

Common Record Types:

TypeDescriptionExample
AIPv4 address1.2.3.4
AAAAIPv6 address2001:0db8::1
CNAMEAlias to another namewww.example.com
AliasAWS resource alias (Route 53 specific)S3 bucket, CloudFront

Alias vs CNAME:

  • Alias: Route 53 specific, free, can point to AWS resources (S3, CloudFront, ELB)
  • CNAME: Standard DNS, not allowed for root domain, points to any DNS name

Routing Policies

PolicyDescriptionUse Case
SimpleSingle resourceSingle resource serving all traffic
WeightedDistribute by percentageA/B testing, gradual rollout
LatencyLowest latencyGlobal applications
FailoverActive/passiveDisaster recovery
GeolocationBased on user locationLocalized content
GeoproximityBias resources to locationsTraffic steering
Multivalue AnswerMultiple recordsDNS-level load balancing
IP-basedBased on client IP subnetUnicast routing

Examples:

Simple Routing:

example.com → 192.0.2.1 (single IP)

Weighted Routing:

example.com → 192.0.2.1 (weight 10)  → 10% traffic
           → 192.0.2.2 (weight 90)  → 90% traffic

Latency Routing:

example.com → US East (if fastest)
           → US West (if fastest)
           → EU (if fastest)

Failover Routing:

example.com → Primary (healthy)
           → Secondary (if primary unhealthy)

AWS CloudFront

Overview

Amazon CloudFront is a fast content delivery network (CDN) service.

Key Characteristics

FeatureDescription
Global Edge Network600+ edge locations worldwide
CachingContent cached closer to users
DDoS ProtectionAWS Shield Standard (free)
Custom SSLUsing AWS Certificate Manager
OriginS3, EC2, ELB, or external server

CloudFront Components

Distributions:

  • Web Distribution: Websites, APIs
  • RTMP Distribution: Media streaming (legacy)

Origins:

  • S3 Bucket: Static content
  • EC2 Instance: Custom origin
  • ELB: Load balanced applications
  • MediaPackage: Video streaming

Behaviors:

  • Path Pattern: Which requests go to which origin
  • Cached Methods: GET, HEAD (default)
  • TTL: Time-to-live for cache
  • Compressed: Auto-compress files

CloudFront Pricing

Pricing Components:

  • Data Transfer Out: Per GB to internet
  • Requests: Per 10,000 requests
  • Regional: Varies by edge location

Other Networking Services

Purpose: Expose services privately to other VPCs.

Use Cases:

  • Expose SaaS services privately
  • Connect to partner services
  • Hybrid cloud connectivity

2. AWS Transit Gateway

Purpose: Hub-and-spoke model for connecting VPCs and on-premises networks.

Benefits:

  • Simplify network topology
  • Single point of control
  • Transitive routing (unlike VPC peering)

Architecture:

         Transit Gateway (Hub)
              /     |     \
          VPC A   VPC B   VPC C

3. Elastic Load Balancing (ELB)

Overview: Distributes incoming traffic across multiple targets.

Types:

TypeLayerUse Case
Application Load BalancerLayer 7HTTP/HTTPS traffic, content-based routing
Network Load BalancerLayer 4TCP, UDP, TLS, ultra-low latency
Gateway Load BalancerLayer 3Virtual appliances (firewalls, IDS)
Classic Load BalancerLayer 4/7Legacy (deprecated for new use)

Application Load Balancer Features:

  • Content-based routing (path-based, host-based)
  • WebSockets support
  • HTTP/2 support
  • Integration with WAF, Shield

Network Load Balancer Features:

  • Ultra-low latency
  • Static IP addresses
  • Preserves source IP
  • TLS termination

Cross-Zone Load Balancing:

  • Distributes traffic across AZs
  • Enabled by default (ALB, NLB)
  • Can be disabled (NLB only)

Exam Tips - Networking Services

High-Yield Topics

  1. AWS Global Infrastructure:

    • Regions = Geographic areas with multiple AZs, independent from each other
    • AZs = Isolated data centers within regions, no single point of failure
    • Edge Locations = CDN caching points for CloudFront
    • Local Zones = Near metropolitan areas (5-10ms latency)
    • Wavelength Zones = At 5G edge (1-2ms latency)
    • Multi-AZ = High availability within a region
    • Multi-Region = Disaster recovery across geographic areas
  2. VPC Components:

    • Internet Gateway = Public internet access (two-way)
    • NAT Gateway = Private subnet outbound access (one-way)
    • Route Tables = Control traffic flow
    • Security Groups = Instance-level, stateful
    • NACLs = Subnet-level, stateless
  3. Public vs Private Subnet:

    • Public = Route to IGW
    • Private = No IGW route (uses NAT)
  4. VPC Peering:

    • One-to-one only
    • Cannot transit (A-B, B-C ≠ A-C)
    • Cannot have overlapping CIDRs
  5. Route 53 Routing Policies:

    • Simple = Single resource
    • Weighted = Percentage distribution
    • Latency = Lowest latency
    • Failover = Active/passive
  6. CloudFront:

    • CDN with 600+ edge locations
    • Caches content closer to users
    • Supports multiple origins
  7. Direct Connect vs VPN:

    • Direct Connect = Dedicated, lower latency, higher cost
    • VPN = Over internet, higher latency, lower cost

Additional Resources

DigitalCloud Training Cheat Sheets

Official AWS Documentation

AWS Networking Resources


Next: Analytics Services

Released under the MIT License.