Mastering Networking Fundamentals for DevOps: A Theoretical Guide

Nidhi SinghNidhi Singh
5 min read

This week, I began my journey into networking fundamentals—and the very first thing I learned absolutely amazed me: how the internet is physically connected across the globe through high-speed undersea optical fiber cables. These cables are laid deep under oceans by specialized ships and act as the invisible threads that carry our emails, videos, cloud applications, and everything in between from one continent to another.

Understanding this physical layer of global connectivity gave me a whole new appreciation for the internet and formed a perfect foundation for diving into theoretical concepts like the OSI and TCP/IP models.

In this blog, I’ve documented my theoretical learning journey—covering models, protocols, cloud security basics, and essential commands—to build a solid base for DevOps networking.

1. The OSI and TCP/IP Models: The Foundation of Networking

Understanding how data travels through networks begins with conceptual frameworks like the OSI and TCP/IP models.

The OSI Model (Open Systems Interconnection)

The OSI model divides the process of communication between two networked systems into seven abstract layers:

OSI Model (7 Layers)

LayerNameReal-World Example
7ApplicationHTTP, SSH, FTP – Web browsing, file transfer
6PresentationSSL/TLS, JPEG – Data encryption, media formats
5SessionNetBIOS, RPC – Managing sessions between apps
4TransportTCP, UDP – Reliable or fast data transfer
3NetworkIP, ICMP – Routing, addressing
2Data LinkEthernet, MAC – LAN communication
1PhysicalCables, NICs – Physical transmission of data
  1. Physical Layer: Deals with the physical connection between devices (e.g., cables, switches).

  2. Data Link Layer: Responsible for node-to-node data transfer and error detection (e.g., MAC addresses, Ethernet).

  3. Network Layer: Manages data routing and addressing (e.g., IP addresses).

  4. Transport Layer: Ensures reliable data transmission with protocols like TCP and UDP.

  5. Session Layer: Establishes, manages, and terminates connections between applications.

  6. Presentation Layer: Translates data formats and encrypts/decrypts information (e.g., SSL/TLS).

  7. Application Layer: Interfaces with the end-user and supports services like HTTP, FTP, and DNS.

    The TCP/IP Model

    A simplified, practical model used widely in real-world networking. It consists of four layers:

  8. | Layer | Real-World Technologies | | --- | --- | | Application | HTTP, FTP, DNS, SSH | | Transport | TCP, UDP | | Internet | IP, ICMP | | Network Access | Ethernet, Wi-Fi |

    1. Network Access Layer: Similar to OSI’s physical and data link layers.

    2. Internet Layer: Responsible for IP addressing and routing.

    3. Transport Layer: Ensures reliable or fast communication.

    4. Application Layer: Covers protocols used in everyday networking.

These models are essential for troubleshooting, network design, and understanding protocol behavior.

🌍 Did You Know? Global internet communication is made possible by high-speed optical fiber cables that crisscross the ocean floors. These undersea cables, laid by specialized ships, are the physical infrastructure enabling real-time data transfer across continents.

2. Key Protocols and Port Numbers in DevOps

In DevOps, communication between tools, servers, and clients often happens over standardized protocols. Understanding their port numbers and roles can significantly streamline configuration and debugging tasks.

Protocol

PortUse Case in DevOps
HTTP80Web servers, API communication
HTTPS443Secure traffic for web apps and APIs
SSH22Remote server access, deployments
FTP20/21File transfers
DNS53Domain name resolution
SMTP25Sending alerts/emails from apps
MySQL3306Accessing databases
Redis6379In-memory caching, queues
Docker API2375/2376Remote Docker control

Security Tip: Always restrict access to known IPs and disable unused ports. For security, it is essential to understand which ports are exposed and ensure that only necessary ports are accessible based on the application’s need.

3. Introduction to AWS EC2 and Security Groups

Amazon Web Services (AWS) provides virtual servers through EC2 (Elastic Compute Cloud). Launching and securing an EC2 instance is a foundational cloud skill for DevOps engineers.

What is an EC2 Instance?

An EC2 instance is a resizable compute capacity in the cloud. It allows you to run virtual servers for hosting applications, testing environments, or deploying services.

What are Security Groups?

Security Groups act as virtual firewalls that control inbound and outbound traffic for your EC2 instances. They define which traffic is allowed to reach your instance and from where.

Best Practices:

  • Limit SSH (port 22) access to specific IP addresses.

  • Open only necessary ports (e.g., HTTP 80 or HTTPS 443 for web servers).

  • Use descriptive names and tags to manage access control logically.

This theoretical understanding of security groups is crucial before deploying any cloud-native service.

4. Networking Commands Every DevOps Engineer Should Know

Basic networking commands help diagnose connectivity issues and verify configurations. Here’s an overview of essential tools and their purposes:

  • ping: Checks if a remote host is reachable.

  • traceroute/tracert: Shows the route packets take to reach a host.

  • netstat: Displays active network connections and listening ports.

  • curl: Performs HTTP requests from the command line.

  • dig/nslookup: Performs DNS queries and verifies name resolution.

Familiarity with these commands enhances troubleshooting capabilities and supports more effective incident response.

Conclusion: Why Networking Knowledge Matters in DevOps

Networking is more than cables and connections—it is the medium through which DevOps tools, cloud services, and applications communicate. Understanding the layers of network models, the significance of ports and protocols, cloud security basics, and diagnostic commands can make you a more competent and confident DevOps engineer.

Whether you're studying for certifications, preparing for interviews, or building hands-on projects, mastering these concepts will give you a strong technical foundation.

2
Subscribe to my newsletter

Read articles from Nidhi Singh directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Nidhi Singh
Nidhi Singh