Govt. Exams
Entrance Exams
Layer 2 creates Frames with MAC addresses, Layer 3 creates Packets with IP addresses, and Layer 4 creates Segments (TCP) or Datagrams (UDP).
Internal inter-process communication (IPC) bypasses physical transmission and network routing, skipping Layers 1-3, and operates at Layers 4-7.
Load balancing based on IP addresses operates at the Network Layer (Layer 3) for Layer 3 load balancing, though advanced load balancers work at higher layers.
SSL/TLS operates at Layer 7 (Application Layer), encrypting application data. Lower layers (1-6) transparently carry encrypted data without understanding its content.
VLAN tagging operates at Layer 2 (Data Link Layer) using 802.1Q tags, and switches process these tags at Layer 2 to isolate traffic.
If frames arrive at Layer 2 but are dropped at Layer 3, the issue involves IP addressing, routing tables, or network configuration at the Network Layer.
The correct sequence during encapsulation is: Layer 7 (Data) → Layer 4 (Segments) → Layer 3 (Packets) → Layer 2 (Frames) → Layer 1 (Bits).
End-to-end encryption is best implemented at Layer 6-7 (Presentation/Application) to ensure data remains encrypted from source to destination. Additional Layer 2 encryption protects link-level transmission.
ARP operates at Layer 2 (Data Link Layer). ARP spoofing maps IP addresses to attacker-controlled MAC addresses, enabling man-in-the-middle attacks and traffic redirection.
IPv4 and IPv6 operate at Layer 3 (Network Layer). Dual-stack (running both simultaneously) or tunneling (encapsulating IPv6 in IPv4) addresses compatibility during migration.