Network Transport Layers
Network Transport Layers
OSI model:
It receives information directly from users and displays incoming data to the user.
6. Presentation Layer: (Formats data so devices can understand each other.)
This session layer creates and maintains the sessions that two systems need in
order to speak to each other. Layer 5 defines, when sessions are created and
opened, How long sessions remain open to successfully exchange data, when to
close sessions and more.
It ensures complete data transfer, error recovery, and flow control between hosts.
This layer segments and reassembles data for efficient transmission and provides
reliability with error detection and correction mechanisms.
3. Network Layer:( Delivers data packets between networks)
The network layer handles the routing of data packets across different networks. It
determines the best path for data to travel and manages IP addressing.
Think of it as a delivery truck finding the fastest route to get a package to its
destination.
2. Data Link Layer (Ensures data doesn’t collide and gets delivered safely)
The Data Link Layer is responsible for node-to-node data transfer and error
detection and correction. It ensures that data is transmitted to the correct device on a
local network segment.
At the bottom of our OSI model we have the Physical Layer, the layer transmits raw
bit stream data(1’s and 0s) on the physical medium. Layer 1 concerns the physical
and electrical connections the system uses.This can include everything from the
cable type, radio frequency link (as in a Wi-Fi network), as well as the layout of pins,
voltages, and other physical requirements. When a networking problem occurs,
many networking pros go right to the physical layer to check that all of the cables are
properly connected.
Example: Let’s understand how the OSI model works when you browse a web page
in your web browser.
Application Layer Web Browser In our url-clicking case, the application is the browser.
The browser selects which web server it is sending
data to, contacts the server and sends the request.
When a response is returned, the browser displays the
desired content on the web page.
Presentation Layer HTTP Usually a web page contains different formats of data:
HTML files, Javascript files, image files, etc.
Conversion of data from one format to another is the
job of the Presentation Layer. In the presentation
layer these files are transformed into XML format to be
displayed on the browser.
Session Layer When we request a web page, the web browser opens
a TCP/UDP connection to the web server. The web
server sends back the web page and closes the
connection. Each TCP/UDP connection is a session.
Data link layer MAC address The data link layer deals with how data is transmitted
over physical links. It takes care of physical addressing
(MAC addresses) and error detection. When packets
are ready to be sent over a local network (like Ethernet
or Wi-Fi), the data link layer breaks them down into
frames, adding necessary header information like the
MAC address of the destination device.
Physical Layer CSMA /CD The data is transmitted over physical media.
OSI Model Summary:
TCP/IP model:
The TCP/IP model, also known as the Internet Protocol Suite, It’s the foundation
for how the internet works and how devices communicate with each other. The
model is more streamlined than the OSI model, consisting of just four layers instead
of seven.
Following picture shows the protocols used by each layer in TCP/IP mode:
Application Layer:
This is the level that users typically interact with, such as email systems and
messaging platforms. It combines the session, presentation, and application layers
of the OSI model.Example: Apps like Zoom, Gmail, or WhatsApp that directly interact
with you.
This layer defines the interfaces and protocols for software applications to
communicate with the network. It handles things like user authentication, web
browsing, and email sending.
Protocols:
Example:
● When you open a website in your browser using HTTPS, the Application
Layer ensures secure communication between your browser and the web
server.
● When you send an email via SMTP (Simple Mail Transfer Protocol), the
This is the level where data is divided into packets and numbered to create a
sequence. The transport layer then determines how much data must be sent,
where it should be sent to, and at what rate. It ensures that data packets are
sent without errors and in sequence and obtains the acknowledgment that the
destination device has received the data packets.
Protocols:
The internet layer is responsible for routing data across the network and
logical addressing. It determines the best path for data to travel from the
source to the destination across different networks.
Protocols:
● IPv4 (Internet Protocol version 4): The most widely used protocol for
● IPv6 (Internet Protocol version 6): The successor to IPv4, which uses a
on the internet.
Example:
located on another continent, your computer breaks down the data into
Network Layer:
This layer defines how data is physically transmitted over a network. It handles the
interaction with the hardware, including network interfaces and transmission media
It also ensures that the data is framed and transmitted correctly across the network’s
hardware. This layer also handles error detection and correction at the physical level.
Protocols:
● Ethernet: Defines how data is framed and transmitted over wired networks.
Example:
● Your network card (Ethernet or Wi-Fi) sends data packets over an Ethernet
I
In this task, I'll launch the EC2 instance and will configure the security group.
● Security groups are virtual firewalls that control incoming and outgoing traffic.
It defines a set of rules that specify which traffic is allowed or denied based on
IP addresses, port ranges, and protocols.
● Security groups are associated with EC2 instances at launch, and you can
modify them later. Inbound rules control the incoming traffic to your instance,
and outbound rules control the outgoing traffic from your instance.
Let's say you're setting up a web server on an EC2 instance, and you want to
configure its security group to control access.
This rule allows you to connect to the EC2 instance via SSH (secure
shell) for management purposes. In this case, only a specific IP
(192.168.1.1) is allowed to connect.
○ Allow HTTP (port 80) from anywhere (since it's a public web server).
This rule allows anyone on the internet to access the web server on
port 80 (HTTP) for regular web traffic.
○ Allow HTTPS (port 443) from anywhere
This allows encrypted web traffic to the server, meaning users can
access the site securely.
Outbound Rules:
○ Allow all outbound traffic by default (since security groups are open by
default for outbound traffic).
If you don't specify a security group, Amazon EC2 uses the default
security group for the VPC. After you launch an instance, you can
change its security groups.