WEEK 1 Networking Fundamentals .....
What is Internet?
It is a global network of interconnected computers and devices that communicate using standardized protocols. It enables data exchange, online communication, and access to information from anywhere in the world. It involve the huge amount of optic fiber cables under the oceans which is owned by tier 1 companies likes AT&T, Verizon. This companies rent their cables to tier 2 companies like BSNL, Jio, Airtel. And thereafter we get this internet services into our devices.
๐ Understanding OSI and TCP/IP Models, Common Protocols, and AWS EC2 Security Groups
๐น OSI & TCP/IP Models: An Overview
๐ OSI Model (Open Systems Interconnection)
The OSI model is a conceptual framework used to understand network interactions in seven layers:
Physical Layer โก - Deals with physical connections (cables, switches, etc.)
Data Link Layer ๐ถ - Handles MAC addresses and error detection (e.g., Ethernet, Wi-Fi)
Network Layer ๐ - Manages IP addressing and routing (e.g., IPv4, IPv6)
Transport Layer ๐ - Ensures reliable data transfer (e.g., TCP, UDP)
Session Layer ๐ - Manages sessions between applications (e.g., RPC, NetBIOS)
Presentation Layer ๐จ - Formats and encrypts data (e.g., SSL, TLS)
Application Layer ๐ - Interface for end-users (e.g., HTTP, FTP, SMTP)
๐ TCP/IP Model
A simplified version of OSI, the TCP/IP model consists of four layers:
Network Interface Layer โก (Combines Physical & Data Link layers)
Internet Layer ๐ (Equivalent to OSI's Network layer)
Transport Layer ๐ (Handles data transport, similar to OSI Transport layer)
Application Layer ๐ฉ (Includes OSI's Application, Presentation, and Session layers)
๐ Real-World Examples of Each Layer
OSI Model:
Application Layer (๐): Web browsing using HTTP/HTTPS
Transport Layer (๐): Sending an email using TCP
Network Layer (๐): Routing data via IP
Data Link Layer (๐ก): Wi-Fi communication
Physical Layer (โก): Ethernet cables
TCP/IP Model:
Application Layer (๐จ): Using SMTP for sending emails
Transport Layer (๐ก): Streaming video via UDP
Internet Layer (๐): Web browsing using IP routing
๐ Commonly Used Protocols & Their Port Numbers
Protocol | Description | Port Number |
HTTP ๐ | Web browsing | 80 |
HTTPS ๐ | Secure web browsing | 443 |
FTP ๐ | File Transfer Protocol | 21 |
SSH ๐ | Secure shell access | 22 |
DNS ๐ | Domain Name System | 53 |
๐ AWS EC2 Security Groups: Securing Your Cloud Instances
๐ What are Security Groups?
Security Groups act as virtual firewalls for your AWS EC2 instances, controlling inbound and outbound traffic.
๐ Security Group Rules
Inbound Rules ๐ฅ: Define what traffic is allowed to enter the instance (e.g., Allow SSH on port 22)
Outbound Rules ๐ค: Specify allowed outgoing traffic (e.g., Allow HTTP requests to the internet)
๐ Importance of Security Groups
โ Enhanced Security ๐ - Blocks unauthorized access โ Granular Control ๐๏ธ - Configurable rules for different instances โ Default Deny ๐ซ - Restricts all traffic unless explicitly allowed
๐ Example Security Group Configuration
Rule Type | Protocol | Port Range | Source |
SSH ๐ | TCP | 22 | Your IP (e.g., 192.168.1.1/32) |
HTTP ๐ | TCP | 80 | Anywhere (0.0.0.0/0) |
HTTPS ๐ | TCP | 443 | Anywhere (0.0.0.0/0) |
๐ฏ Best Practices for AWS Security Groups
Use Least Privilege ๐ซ - Only allow necessary ports
Restrict SSH Access ๐ - Limit to known IPs
Enable Logging & Monitoring ๐ - Track access logs
๐น By understanding the OSI and TCP/IP models, commonly used network protocols, and AWS EC2 security best practices, you can build and secure robust network architectures! ๐