AWS Cloud infrastructure resides in data centers containing thousands of servers built into racks. Each rack has network routers and switches to route traffic.
Data Centers: Grouped together in Availability Zones (AZs)
Availability Zones: Connected with single digit millisecond latency network
AZs are grouped together in an AWS Region
Code for an AZ is its Region code followed by a letter identifier (e.g., us-east-1a)
Made up of one or more data centers with redundant power, networking, and connectivity
AWS Regions: Separate geographic areas located in countries
Latency between AWS Regions is 10s of milliseconds
Each Region has at least three isolated and physically separate AZs
When you request a new AWS account, network resources are dedicated to the account. An AWS account spans across AWS Regions and contains a default virtual, software defined network in each public accessible Region - called an Amazon Virtual Private Cloud (Amazon VPC).
VPC Characteristics:
Belongs to one Region and can span multiple AZs
Logically isolated from other virtual networks in the AWS cloud and the internet
Can’t be accessed unless you add configuration to allow access
AWS Services Integration:
Services like Amazon EC2 and Amazon RDS operate inside a VPC
Can connect to AWS serverless services like AWS Lambda and Amazon CloudWatch (operate outside customer VPC)
Amazon VPC is a programmatically defined, logically isolated virtual network similar to a traditional data center network. Key characteristics include:
Region-specific: Belongs to one Region
Customizable: Control traffic flow to and from the VPC
IP Address Sizing: Sized by a range of private IP addresses called a CIDR block
Private subnet - Background processing doesn’t require internet exposure
Web Applications
Public or private subnet - Can be public or private behind load balancer (AWS recommends private with load balancer)
NAT Gateway/Instance
Public subnet - Must have internet gateway access
Amazon VPC provides programmatically defined, logically isolated virtual networking with flexible subnet configurations for public and private resource placement. NAT gateways enable secure internet access for private subnet resources while maintaining isolation from inbound internet traffic.