0% found this document useful (0 votes)
3 views

Network Transport Layers

The document explains the OSI and TCP/IP models, which are frameworks that describe how data moves through networks. The OSI model consists of seven layers, while the TCP/IP model has four layers, focusing on practical communication protocols. Additionally, it provides a step-by-step guide for launching an EC2 instance and configuring its security group on Amazon Web Services.

Uploaded by

oyadav773
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Network Transport Layers

The document explains the OSI and TCP/IP models, which are frameworks that describe how data moves through networks. The OSI model consists of seven layers, while the TCP/IP model has four layers, focusing on practical communication protocols. Additionally, it provides a step-by-step guide for launching an EC2 instance and configuring its security group on Amazon Web Services.

Uploaded by

oyadav773
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

If you’ve ever wondered how the internet works behind the scenes.

There are two


types of frameworks used to understand how data moves through a network.They
are:

1. OSI model (Open Systems Interconnection Model): It provides a theoretical


framework with seven layers.

2. TCP/IP model( Transmission Control Protocol/ Internet Protocol): It provides a


practical framework with four layers.

OSI model:

7. Application Layer : (interacts directly with users and applications)

It receives information directly from users and displays incoming data to the user.
6. Presentation Layer: (Formats data so devices can understand each other.)

In general, it represents translation of application format to network format, or from


network formatting to application format. Layer 6 is responsible for Data translation,
encryption and decryption and compression

5. Session Layer: (Starts, maintains, and ends communication between devices.)

This session layer creates and maintains the sessions that two systems need in
order to speak to each other. Layer 5 defines, when sessions are created and
opened, How long sessions remain open to successfully exchange data, when to
close sessions and more.

4. Transport Layer: ( Ensures the delivery is complete and correct)

It ensures complete data transfer, error recovery, and flow control between hosts.
This layer segments and reassembles data for efficient transmission and provides
reliability with error detection and correction mechanisms.
3. Network Layer:( Delivers data packets between networks)

The network layer handles the routing of data packets across different networks. It
determines the best path for data to travel and manages IP addressing.

Think of it as a delivery truck finding the fastest route to get a package to its
destination.

2. Data Link Layer (Ensures data doesn’t collide and gets delivered safely)

The Data Link Layer is responsible for node-to-node data transfer and error
detection and correction. It ensures that data is transmitted to the correct device on a
local network segment.

1. Physical Layer: (Handles cables, connectors, and signals)

At the bottom of our OSI model we have the Physical Layer, the layer transmits raw
bit stream data(1’s and 0s) on the physical medium. Layer 1 concerns the physical
and electrical connections the system uses.This can include everything from the
cable type, radio frequency link (as in a Wi-Fi network), as well as the layout of pins,
voltages, and other physical requirements. When a networking problem occurs,
many networking pros go right to the physical layer to check that all of the cables are
properly connected.
Example: Let’s understand how the OSI model works when you browse a web page
in your web browser.

Application Layer Web Browser In our url-clicking case, the application is the browser.
The browser selects which web server it is sending
data to, contacts the server and sends the request.
When a response is returned, the browser displays the
desired content on the web page.

Presentation Layer HTTP Usually a web page contains different formats of data:
HTML files, Javascript files, image files, etc.
Conversion of data from one format to another is the
job of the Presentation Layer. In the presentation
layer these files are transformed into XML format to be
displayed on the browser.

Session Layer When we request a web page, the web browser opens
a TCP/UDP connection to the web server. The web
server sends back the web page and closes the
connection. Each TCP/UDP connection is a session.

Transport Layer TCP To communicate with a web server your computer


must open a TCP connection to the web server and
request a web page. The TCP connection breaks up
the web page into manageable chunks, labels them
with numbers so they can be reassembled in the
correct order and TRANSPORTS the pieces across
the correct session.

Network Layer IP Internet protocol is a NETWORK layer protocol to


assign IP addresses to devices and to route data
across networks.This layer is responsible for routing
the data between devices on different networks. The
data is packaged into packets, which are then directed
to the correct destination using IP addresses.

Data link layer MAC address The data link layer deals with how data is transmitted
over physical links. It takes care of physical addressing
(MAC addresses) and error detection. When packets
are ready to be sent over a local network (like Ethernet
or Wi-Fi), the data link layer breaks them down into
frames, adding necessary header information like the
MAC address of the destination device.

Physical Layer CSMA /CD The data is transmitted over physical media.
OSI Model Summary:

TCP/IP model:

The TCP/IP model, also known as the Internet Protocol Suite, It’s the foundation
for how the internet works and how devices communicate with each other. The
model is more streamlined than the OSI model, consisting of just four layers instead
of seven.

Following picture shows the protocols used by each layer in TCP/IP mode:
Application Layer:

This is the level that users typically interact with, such as email systems and
messaging platforms. It combines the session, presentation, and application layers
of the OSI model.Example: Apps like Zoom, Gmail, or WhatsApp that directly interact
with you.

This layer defines the interfaces and protocols for software applications to
communicate with the network. It handles things like user authentication, web
browsing, and email sending.

Protocols:

●​ Hypertext Transfer Protocol. HTTP handles the communication between


a web server and a web browser.
●​ HTTP Secure. HTTPS handles secure communication between a web
server and a web browser.
●​ File Transfer Protocol. FTP handles transmission of files between
computers.
●​ Domain name system. DNS translates domain names into IP addresses.
●​ Simple mail transfer protocol. SMTP is used for email communications
and is responsible for the transmission of emails between mail servers.

Example:

●​ When you open a website in your browser using HTTPS, the Application

Layer ensures secure communication between your browser and the web

server.

●​ When you send an email via SMTP (Simple Mail Transfer Protocol), the

Application Layer handles the sending and receiving of em


Transport Layer: (The dispatcher ensures every part of your message is delivered.)

The transport layer handles host-to-host communication, data transfer and


reliability.

This is the level where data is divided into packets and numbered to create a
sequence. The transport layer then determines how much data must be sent,
where it should be sent to, and at what rate. It ensures that data packets are
sent without errors and in sequence and obtains the acknowledgment that the
destination device has received the data packets.

Protocols:

TCP (Transmission Control Protocol): A connection-oriented protocol that

ensures reliable, in-order delivery of data. It guarantees that packets are

delivered accurately and in the right sequence.

EXAMPLE: Youtube Videos

UDP (User Datagram Protocol): A connectionless protocol that delivers data

faster by not guaranteeing reliability, ordering, or error correction. It’s used in

applications where speed is more critical than accuracy,

EXAMPLE: Video streaming or online gaming.


Internet Layer: (the courier ensuring your package finds the best route.)

The internet layer is responsible for routing data across the network and
logical addressing. It determines the best path for data to travel from the
source to the destination across different networks.

Protocols:

●​ IPv4 (Internet Protocol version 4): The most widely used protocol for

addressing and routing data on the internet. It uses a 32-bit address

format (e.g., 192.168.1.1).

●​ IPv6 (Internet Protocol version 6): The successor to IPv4, which uses a

128-bit address format to accommodate the growing number of devices

on the internet.

Example:

●​ When you use IP (Internet Protocol) to send a request to a web server

located on another continent, your computer breaks down the data into

packets, adds routing information, and sends it to the server.

Network Layer:

This layer defines how data is physically transmitted over a network. It handles the

interaction with the hardware, including network interfaces and transmission media

(e.g., Ethernet, Wi-Fi).

It also ensures that the data is framed and transmitted correctly across the network’s

hardware. This layer also handles error detection and correction at the physical level.
Protocols:

●​ Ethernet: Defines how data is framed and transmitted over wired networks.

●​ ARP (Address Resolution Protocol): Resolves an IP address to a physical

MAC address within a local network.

Example:

●​ Your network card (Ethernet or Wi-Fi) sends data packets over an Ethernet

cable or Wi-Fi network to another device.

TCP/IP Model Summary:

●​ Application Layer: User interfaces, application protocols (HTTP, FTP, etc.).

●​ Transport Layer: Reliable communication, error correction (TCP/UDP).

●​ Internet Layer: Logical addressing, routing (IP).

●​ Network Access Layer: Physical network connections (Ethernet, Wi-Fi, etc.).

I
In this task, I'll launch the EC2 instance and will configure the security group.

The followings steps to quickly launch ec2 instance:

1.​ Open the Amazon EC2 console:​


Go to https://console.aws.amazon.com/ec2/.

2.​ Open the EC2 launch instance wizard:​


From the EC2 dashboard, choose Launch instance.​
The Launch an instance web-based form opens. Name your instance:​
Under Name and tags, for Name, enter a descriptive name like
“Batch-9-Junoon”, it helps identify your instance later.
3.​ In Application and OS image, choose the operating system that you want.
4.​ In instance type, choose the instance type according to your CPU and
memory requirement. Here I am using t2.micro, which will provide 1 CPU and
1 GB memory.
5.​ Proceed with a key pair: Enter key pair name, and file pair format that you
want and click on create keypair. A key pair can be used for secure login.
6.​ Next, configure storage. Here I am selecting15 GB storage.
7.​ Launch your instance:​
In the Summary panel on the right, choose Launch instance.
8.​ Amazon EC2 quickly launches your instance using the default settings. A
Success banner confirms the launch.

Congratulations! You've successfully launched your very first EC2 instance!


Security Group:

●​ Security groups are virtual firewalls that control incoming and outgoing traffic.
It defines a set of rules that specify which traffic is allowed or denied based on
IP addresses, port ranges, and protocols.
●​ Security groups are associated with EC2 instances at launch, and you can
modify them later. Inbound rules control the incoming traffic to your instance,
and outbound rules control the outgoing traffic from your instance.

Let's say you're setting up a web server on an EC2 instance, and you want to
configure its security group to control access.

1.​ Inbound Rules:


○​ Allow SSH (port 22) from a specific IP address \

This rule allows you to connect to the EC2 instance via SSH (secure
shell) for management purposes. In this case, only a specific IP
(192.168.1.1) is allowed to connect.

○​ Allow HTTP (port 80) from anywhere (since it's a public web server).

This rule allows anyone on the internet to access the web server on
port 80 (HTTP) for regular web traffic.
○​ Allow HTTPS (port 443) from anywhere

This allows encrypted web traffic to the server, meaning users can
access the site securely.

Outbound Rules:

○​ Allow all outbound traffic by default (since security groups are open by
default for outbound traffic).

If you don't specify a security group, Amazon EC2 uses the default
security group for the VPC. After you launch an instance, you can
change its security groups.

You might also like