Govt Exams
The Network Layer (Layer 3) handles routing decisions and logical addressing using IP addresses. It determines the best path for data packets to travel across networks.
Session hijacking targets the Session Layer (Layer 5) by intercepting and taking control of established sessions between applications.
Layer 2 creates Frames with MAC addresses, Layer 3 creates Packets with IP addresses, and Layer 4 creates Segments (TCP) or Datagrams (UDP).
Internal inter-process communication (IPC) bypasses physical transmission and network routing, skipping Layers 1-3, and operates at Layers 4-7.
Load balancing based on IP addresses operates at the Network Layer (Layer 3) for Layer 3 load balancing, though advanced load balancers work at higher layers.
SSL/TLS operates at Layer 7 (Application Layer), encrypting application data. Lower layers (1-6) transparently carry encrypted data without understanding its content.
VLAN tagging operates at Layer 2 (Data Link Layer) using 802.1Q tags, and switches process these tags at Layer 2 to isolate traffic.
If frames arrive at Layer 2 but are dropped at Layer 3, the issue involves IP addressing, routing tables, or network configuration at the Network Layer.
Routers operate at Layer 3 (Network Layer) to route packets based on IP addresses, while other devices operate at lower layers.
Port-based filtering requires inspection at the Transport Layer (Layer 4) where ports (TCP/UDP) are defined and identified.