Tactical edge – Architecting for Disconnected Edge Computing Scenarios

Tactical edge refers to edge computing environments that support military operations. Such situations are characterized by limited connectivity, high mobility, and the most intense security requirements. At the tactical edge, the most common needs include deploying, managing, and securing the following technologies: IoT: Cameras and sensors of every description get cheaper every day. The number […]

The Yocto Project – Architecting for Disconnected Edge Computing Scenarios

You are likely aware that many of the smart devices in your home or workplace run on Linux. If you’ve ever wondered what distribution they run, the answer is probably none. They probably use a custom-compiled Linux kernel that minimizes its footprint and maximizes its security profile. This is typically accomplished via the Yocto Project. […]

The AWS Snow family as an IoT gateway – Architecting for Disconnected Edge Computing Scenarios

When running AWS IoT Greengrass on an AWS Snow family device, customers find the ability to host small ML models that have been pre-trained in the cloud particularly useful. Here are some real-world examples: Transcription/translation: Passengers on trains cannot always hear the announcer (or hear them clearly). To improve accessibility, passengers can subscribe to an […]

Overview of DDIL – Architecting for Disconnected Edge Computing Scenarios

In this chapter, we will explore some of the most challenging edge computing scenarios – that is, those where connectivity back to an AWS region might be intermittent or non-existent. It is difficult to effectively run a globally distributed system when the endpoints aren’t consistently reporting back. Even in such circumstances, AWS services allow customers […]

Amazon CloudFront Embedded POPs – Utilizing the Capabilities of the AWS Global Network at the Near Edge

In addition to the 450+ edge POPs that AWS maintains around the world, there are additional dedicated POPs positioned inside the networks of many ISPs/broadband providers around the world. These are known as Amazon CloudFront Embedded POPs, and they are based on AWS Outposts Rack or AWS Outposts Server (depending on the circumstances). Figure 8.8 […]

Amazon CloudFront special request headers – Utilizing the Capabilities of the AWS Global Network at the Near Edge

In Chapter 2, we discussed the mechanisms Global Server Load Balancing (GSLB) systems such as Amazon Route53 use to determine the geographic location of a client’s IP address on the internet. Amazon CloudFront makes use of these same facilities to determine which edge location is closest to a given user so that it can steer […]

HTTP request headers and URL query strings – Utilizing the Capabilities of the AWS Global Network at the Near Edge

When a client on the internet uses their browser to make a request for a URL to a server, more information that the URL itself is passed in the form of HTTP request headers. This includes information such as the name and version of the web browser (user-agent), the language the client prefers (accept-language), and […]

Content distribution – Utilizing the Capabilities of the AWS Global Network at the Near Edge

Amazon CloudFront uses a construct known as distributions to establish and govern this behavior. When a new distribution is created, it is pointed at an origin – this is the server or service that holds the content we want to cache in our POPs. Amazon CloudFront supports several types of origins – including S3 buckets, […]

AWS regional edge – Utilizing the Capabilities of the AWS Global Network at the Near Edge

When you create a VPC and attach an internet gateway or NAT gateway, the AZs in the associated region need a mechanism to connect to the internet or other regions: Figure 8.2 – AWS regional transit centers This is why, in addition to the direct interconnects AZs have with each other, each region also has […]

TOP