OSI-TCP-layers
Question 1 |
Assume that source S and destination D are connected through five intermediate routers R1, R2,R3,R4 and R5. Determine how many times each packet has to visit the Network layer and the Data Link layer during transmission from S to D?
Network Layer: 7 times, Data Link Layer: 12 times | |
Network Layer: 5 times, Data Link Layer: 12 times | |
Network Layer: 12 times, Data Link Layer: 12 times | |
Network Layer: 7 times, Data Link Layer: 7 times |
Question 1 Explanation:
The packet will visit network layer 7 times(5 times at router and 1 time at source and another time at destination) , once at each node [S, R, R,R,R,R, D] and packet will visit Data Link layer 12 times. One time at S and one time at D, then two times for each intermediate router R[5*2=10] as data link layer is used for link to link communication.
Question 2 |
Which of the following statements about Secure Shell Protocol (SSH) is FALSE?
SSH cannot be used for file transfer and e-mail tasks. | |
SSH provides a secure client/server communication. | |
SSH runs on top of the TCP/IP layer. | |
SSH is a network protocol. |
Question 2 Explanation:
→Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
→ Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH.
Question 3 |
Match the following:
(a)-(iv), (b)-(iii), (c)-(i), (d)-(ii) | |
(a)-(iii), (b)-(iv), (c)-(ii), (d)-(i) | |
(a)-(iv), (b)-(ii), (c)-(iii), (d)-(i) | |
(a)-(iv), (b)-(iii), (c)-(ii), (d)-(i) |
Question 3 Explanation:
Data link layer→ Framing
Network layer→ Routing
Transport layer→ Connection control
Presentation layer→ Encryption
Network layer→ Routing
Transport layer→ Connection control
Presentation layer→ Encryption
Question 4 |
Encryption and decryption of data is performed in ---------------
Presentation layer | |
Physical layer | |
Data link layer | |
Session layer |
Question 4 Explanation:
Encryption and Decryption of data is performed in presentation layer.
Question 5 |
The physical layer of a network _________
Defines the electrical characteristics of signals passed between the computer and communication devices | |
Controls error detection and corrector | |
Constructs packets of data and sends them across the network
| |
All the given options
|
Question 5 Explanation:
The physical layer of a network defines the electrical characteristics of signals passed between the computer and communication devices.
Question 6 |
End-to End connectivity is provided from host-to-host in _________
Session Layer | |
Network Layer | |
Data link Layer
| |
Transport Layer |
Question 6 Explanation:
Transport layer provides end to end connectivity.
Network layer provides host to host connectivity.
Data link layer provides hop to hop connectivity.
Network layer provides host to host connectivity.
Data link layer provides hop to hop connectivity.
Question 7 |
Which layer is associated with log in and log out from the network?
Presentation | |
Transport | |
Data link | |
Session
|
Question 7 Explanation:
Login and Logout is done for authentication of the user, and authentication and authorization is the responsibility of session layer.
Question 8 |
Match the following
a-iv, b-i, c-ii, d-iii | |
a-i, b-iv, c-ii, d-iii | |
a-iv, b-i, c-iii, d-ii | |
a-iv, b-ii, c-i, d-iii |
Question 8 Explanation:
Session layer → Manage dialogue control
Application layer → Virtual terminal software
Presentation layer → Semantics of the information transmitted
Transport layer → Flow control
Application layer → Virtual terminal software
Presentation layer → Semantics of the information transmitted
Transport layer → Flow control