Govt Exams
The Network Layer (Layer 3) handles routing, IP addressing, and logical addressing to forward packets across different networks using routers.
The correct sequence during encapsulation is: Layer 7 (Data) → Layer 4 (Segments) → Layer 3 (Packets) → Layer 2 (Frames) → Layer 1 (Bits).
End-to-end encryption is best implemented at Layer 6-7 (Presentation/Application) to ensure data remains encrypted from source to destination. Additional Layer 2 encryption protects link-level transmission.
ARP operates at Layer 2 (Data Link Layer). ARP spoofing maps IP addresses to attacker-controlled MAC addresses, enabling man-in-the-middle attacks and traffic redirection.
IPv4 and IPv6 operate at Layer 3 (Network Layer). Dual-stack (running both simultaneously) or tunneling (encapsulating IPv6 in IPv4) addresses compatibility during migration.
Effective traffic optimization requires understanding at Layer 4 (TCP/UDP characteristics), Layer 5 (session management), and Layer 7 (application protocols and patterns) to make informed decisions.
The Data Link Layer (Layer 2) uses CRC (Cyclic Redundancy Check) to detect frame corruption. Corrupted frames are discarded; higher layers handle retransmission if necessary.
The Transport Layer (Layer 4) uses port numbers to manage multiple simultaneous connections and ensures proper multiplexing and demultiplexing of data streams.
Layer 2 (Data Link Layer) operates with MAC addresses and frames. IP addresses (Layer 3) and application data (Layer 7) would not be directly visible at Layer 2 without further analysis.
The Session Layer (Layer 5) manages dialogues between applications, handling session establishment, maintenance, synchronization, and termination.