Book description
Build scalable, cost-effective, high-performance, and secure architectures using AWS Outposts, AWS Local Zones, AWS Wavelength, and AWS Snow services guided by best practices and practical examples
Key Features
- Take advantage of the opportunities and challenges arising from the exponential growth of connected devices
- Use AWS edge compute services to extend your applications to wherever they are needed
- Follow guided tutorials for building an IIoT gateway and a distributed edge application with AWS services
- Purchase of the print or Kindle book includes a free PDF eBook
Book Description
The surge in connected edge devices has driven organizations to capitalize on the opportunities presented by the massive amounts of data generated by these devices. However, adapting to this landscape demands significant changes in application architectures.
This book serves as your guide to edge computing fundamentals, shedding light on the constraints and risks inherent in selecting solutions within this domain. You’ll explore an extensive suite of edge computing services from AWS, gaining insights into when and how to use AWS Outposts, AWS Wavelength, AWS Local Zones, AWS Snow Family, and AWS IoT Greengrass. With detailed use cases, technical requirements, and architectural patterns, you’ll master the practical implementation of these services and see how they work in real life through step-by-step examples, using the AWS CLI and AWS Management Console. To conclude, you’ll delve into essential security and operational considerations to maximize the value delivered by AWS services.
By the end of this book, you'll be ready to design powerful edge computing architectures and handle complex edge computing use cases across multiple AWS services.
What you will learn
- Overcome network challenges faced at the near and far edge
- Leverage services in over 450 points of presence at the edge of the AWS global backbone
- Deploy edge solutions in disconnected scenarios using AWS Snow Family
- Build multi-access edge (MEC) solutions with 5G and AWS Wavelength
- Reduce latency for your users with AWS Local Zones
- Configure AWS Snowcone as an IIoT gateway with AWS IoT Greengrass
- Extend your AWS VPC into your on-premise data center with AWS Outposts
- Deploy distributed applications for core, near, and far edge cloud services
Who this book is for
This book is designed for cloud architects, cloud engineers, solutions architects, and IoT architects tasked with building edge compute solutions using AWS. If you want to master the full range of edge computing services offered by AWS, this book is for you. A basic understanding of AWS services and networking is assumed.
Table of contents
- Edge Computing with Amazon Web Services
- Contributors
- About the author
- Special contribution
- About the reviewer
- Preface
- Part 1: Compute, Network, and Security Services at the Edge
- Chapter 1: Getting Started with Edge Computing on AWS
- Chapter 2: Understanding Network and Security for Near-Edge Computing
- Chapter 3: Understanding Network and Security for Far-Edge Computing
- Part 2: Introducing AWS Edge Computing Services
- Chapter 4: Addressing Disconnected Scenarios with AWS Snow Family
- Chapter 5: Incorporating AWS Outposts into Your On-Premises Data Center
- Chapter 6: Lowering First-Hop Latency with AWS Local Zones
- Chapter 7: Using AWS Wavelength Zones on Public 5G Networks
- Part 3: Building Distributed Edge Architectures with AWS Edge Computing Services
- Chapter 8: Utilizing the Capabilities of the AWS Global Network at the Near Edge
- Chapter 9: Architecting for Disconnected Edge Computing Scenarios
- Chapter 10: Utilizing Public 5G Networks for Multi-Access Edge (MEC) Architectures
- Chapter 11: Addressing the Requirements of Immersive Experiences with AWS
- Part 4: Implementing Edge Computing Solutions via Hands-On Examples and More
-
Chapter 12: Configuring an AWS Snowcone Device to Be an IOT Gateway
-
Ordering an AWS Snowcone device
- Step 1 – Creating an S3 bucket
- Step 2 – Creating a new job
- Step 3 – Selecting the job type
- Step 4 – Choosing a form factor
- Step 5 – Selecting optional components
- Step 6 – Setting encryption options
- Step 7 – Confirming your selections
- Step 8 – Saving output files
- Step 9 – Setting up the physical environment
-
Deploying the backend in your AWS account
- Step 1 – Installing and configuring AWS CLI v2
- Step 2 – Cloning the code repository from GitHub
- Step 3 – Copying the code repository to your S3 bucket
- Step 4 – Deploying the CloudFormation templates
- Step 5 – Retrieving outputs from CloudFormation and passing them to environment variables
- Step 6 – Configuring the AWS IoT Greengrass v2 service policy on your account
-
Preparing the device with the Snowball Edge CLI
- Step 1 – Installing the AWS Snow CLI client
- Step 2 – Configuring the AWS Snow CLI
- Step 3 – Unlocking your Snow device with the CLI
- Step 4 – Retrieving the output of the unlocking procedure
- Step 5 – Creating a virtual network interface
- Step 6 – Obtaining local credentials from your Snow device
- Step 7 – Retrieving the certificate from your Snow device
- Step 8 (optional) – Adding the EC2 endpoint URL to your AWS CLI config file
-
Configuring AWS IoT Greengrass on the Snow device
- Step 1 – Creating an EC2 keypair on the Snow device
- Step 2 – Obtaining the ImageId value from your Snow device
- Step 3 – Launching the EC2 instance on your Snow device
- Step 4 – Attaching the VNI to your EC2 instance
- Step 5 – SSHing into your EC2 instance
- Step 6 – Installing the AWS IoT Greengrass prerequisites into your EC2 instance
- Step 7 – Installing the AWS IoT Greengrass v2 agent onto your EC2 instance
- Walkthrough of what you’ve created
- Summary
-
Ordering an AWS Snowcone device
- Chapter 13: Deploying a Distributed Edge Computing Application
- Chapter 14: Preparing for the Future of Edge Computing with AWS
- Index
- Other Books You May Enjoy
Product information
- Title: Edge Computing with Amazon Web Services
- Author(s):
- Release date: February 2024
- Publisher(s): Packt Publishing
- ISBN: 9781835081082
You might also like
book
AWS Security
Running your systems in the cloud doesn’t automatically make them secure. Learn the tools and new …
book
Mastering AWS Security - Second Edition
Explore the depths of AWS security and learn how to design, implement, and maintain a secure …
article
From ChatGPT to HackGPT: Meeting the Cybersecurity Threat of Generative AI
Emerging generative AI technologies such as ChatGPT are putting new tools in the hands of hackers. …
book
Edge Computing Systems with Kubernetes
Understand how to use K3s and k3OS for different use cases and discover best practices for …