Practically Speaking About Cloud Computing: CDN and Amazon CloudFront

Practically Speaking About Cloud Computing:

CDN and Amazon CloudFront:

High performance websites need efficient content delivery networks. A content delivery network or content distribution network (CDN) is a collection of servers distributed across various geo-graphical locations. The distribution of the web servers in the network makes it accessible from nearest point with lesser hops. The server with quick reach is chosen to deliver the content. Akamai and Limelight are leaders in providing Content Delivery Network services to global high performance rich media content websites. Amazon CloudFront is an innovative offering by Amazon Web Services in this space. Tightly coupled with Amazon S3 service, Amazon CloudFront offers a truly world class web service content delivery that is easy and affordable; not only for large enterprises but also to the SMBs.

Amazon CloudFront Concept:

The concept of CDN, simply explained, is that the original object is distributed through edge servers available in proximity location. The typical object may include web pages, images, videos or anything that can be served through HTTP or if it is video streaming with RTMP – Real Time Messaging Protocol. Object is stored in Origin Server. With Amazon CloudFront this is in S3 Storage bucket. Refer CloudTweaks earlier blog post on S3. Once the object is stored in S3 bucket, we create the distribution with CloudFront service. An edge location is a geographically spread Amazon site nearest to the web user. This edge location catches the object stored in Origin Server and delivers to the user. Amazon CloudFront service manages the distribution efficiently.

How the Above Services Are Priced?

1. Storage: For storing the objects in S3, We pay the normal S3 Storage charges.
2. Data Transfer: Additionally, we get the S3 GET Requests and Data Transfer Out charges.
3. Serving from Edge Location: CloudFront charges for requests and data transfer out.

Video Sharing:

The share of video is ever increasing in the web. In one of the reports presented by Limelight Networks, a leading CDN provider, in this month, the share of video has surpassed 51% of total internet traffic. Among the internet users’ video is becoming the preferred web content. Amazon CloudFront can be used to stream on demand video files. It uses Adobe Flash Media Server 3.5 to steam on demand video content with RTMP Real Time Messaging Protocol. Also, supports, dynamic streaming, with the ability to switch between different quality streams while playback.

Private Content Delivery:

Private content distribution is possible with CloudFront. We can restrict the access to our content to paid users. This distribution can be done in any one of the two ways:
• Securing the object in the S3 bucket itself, so that the end users have access only through CloudFront.
• By giving special URLs to end users. The URLs contain the restriction of private content.

CloudFront Access Logs:

Amazon CloudFront provides with optional log files containing the information about end user usage. This is an option. There is no extra charge for enabling this option of access logging.

Summary:

It is no secret that cloud based content delivery network goes with an attractive pay as you go option. Even among the cloud CDN services, Amazon works out cheaper because of its integrated service offerings. The Streaming Media.com lists Amazon CloudFront as the 2010 Editor’s picks first choice. For those who need a simple and effective content delivery service at affordable cost, Amazon CloudFront stands as one of the best choice

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…