Why layered architecture is used in OSI reference model? Discuss.

1 Answer

Answer :

image

The OSI reference model is as shown in the figure.There are seven layers in the model. Physical layer, Data link layer, Network layer, Transport layer, Session layer, Presentation layer, Application layer. Each layer performs unique and specific task and it offers services to the layer above it. Each computer on a network uses a series of protocols to perform the functions assigned to each layer. At the top of the stack is the application layer and at the bottom is the physical medium which actually connects the computers to form a network. The figure shows the OSI model with two hosts A and B, communicating with each other Interface: an interface defines the operations and services offered by lower layer to the upper layer. This is an interface between each pair of adjacent layers as shown in the figure. Peer: the entities comprising the corresponding layers on different machines are called as peers. The communication actually takes place between the peers using the protocols. Exchange of information: at the physical layer the communication is direct that is, machine A sends a stream of bits to machine B. at higher layers each layer in the sending machines adds its own information to the message it receives from the layer just above it and passes the whole package to the layer just below it. The information added by each layer is in the form of headers or trailers. At layer 1 the entire package is converted to a form that can be transferred to the receiving machine. 

Related questions

Description : Explain the function of each layer of OSI reference model with neat diagram.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization) Function of OSI model: i. It provides way to understand how internetwork operates. ... Network virtual terminal file transfer access and management mail services and directory services

Description : The............ layer of OSI model can use the trailer of the frame for error detection. A) Physical B) Data link C) Transport D) Presentation

Last Answer : A) Physical

Description : The layer one of the OSI model is A) Physical layer B) Link layer C) Router layer D) Broadcast layer

Last Answer : A) Physical layer

Description : In which OSI layers does the FDDI protocol operate? A) Physical B) Data link C) Network D) A and B

Last Answer : D) A and B

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which of the following OSI layers correspond to TCP/IP's application layer? A) Application B) IP Address C) Session D) All of the above

Last Answer : D) All of the above

Description : TCP/IP ..................layer corresponds to the OSI models to three layers. A) Application B) Presentation C) Session D) Transport

Last Answer : A) UDP

Description : Find out the OSI layer, which performs token management. A) Network Layer B) Transport Layer C) Session Layer D) Presentation Layer

Last Answer : C) Session Layer

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : In the TCP/IP protocol architecture, the Network Access Layer includes ………………………………...layers of the OSI Reference Model. A. presentation, session, application B. physical, data link, network C. data link, network D. physical, data link

Last Answer : B. physical, data link, network

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Explain the architecture of Bluetooth technology with suitable diagram.

Last Answer : Bluetooth is short range wireless technology. Range of Bluetooth is 10 meters. Bluetooth Architecture defines 2 types of networks. 1)Piconet 2)Scatternet Piconet: - It is a Bluetooth network that ... . This node is called bridge slave. This node cannot be the master of two piconets.

Description : Give the name of protocols used by different layers of TCP/IP. Discuss the function of ARP and RARP.

Last Answer : TCP/IP Model contains following layer. 1) Host-to-Network Layer - It defines characteristics of transmission media. It also concern with delivery of data when two systems are attached to same network ... such broadcasts are not forwarded by routers, so a RARP server is needed on each network. 

Description : Discuss the role of the HUB. Differentiate between Active Hub and Passive Hub.

Last Answer : HUB: Hub is a connecting device; it is also known as multiport repeater. It is normally used for connecting stations in a physical star topology All networks require a central location to bring media segments ... . They are much expensive than passive hubs. 4. They are not much expensive.

Description : Discuss any four network features.

Last Answer : 1) File sharing: File sharing is the primary feature of network. Due to use of networks, the sharing of files becomes easier. File sharing requires a shared directory or disk drive to which ... has internet services such as FTP servers or Usenet servers. 7) Network security: Internal & External

Description : Discuss hybrid topology with suitable diagram. 

Last Answer : Discuss hybrid topology with suitable dig. Hybrid topology is one that uses two or more basic topologies together Fig.1 depicts this. In this case, the bus, star & ring topologies are used to ... many networks are quite complex but they can be reduced to some form of hybrid topology.

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Explain the services provided by transport layer in TCP/IP model.

Last Answer : Responsibility of process to process delivery of message Ensure that whole message arrives in order. 1. Service point addressing: -several programs run at a time on computer. Delivery is ... transport layer without error(damage or loss or duplication). Error correction is done by retransmission.

Description : The power flow problem mathematical model for a linear transmission network (A) is non-linear (B) is linear (C) considers time variation of generation (D) does not consider tap-changing transformers

Last Answer : The power flow problem mathematical model for a linear transmission network is non-linear

Description : Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : b. One layer may duplicate lower layer functionality

Description : .Which of the following statements can be associated with OSI model? a. A structured way to discuss and easier update system components b. One layer may duplicate lower layer functionality c. ... no way requires information from another layer d. It is an application specific network model

Last Answer : Functionality at one layer no way requires information from another layer

Description : Explain the seven layers of the OSI reference model.

Last Answer : Below are the seven layers of the OSI reference model:  Physical Layer: This layer converts data bits into radio signals. An example of this is Ethernet.  Data Link layer: At data ... which both end user and application interact with. This layer provides services like email, file transfer, etc.

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Which of the following layers of the OSI reference model is concerned with the syntax of data exchanged between application entities? a. Presentation layer b. Application layer c. Transportation layer d. Session layer

Last Answer : a. Presentation layer

Description : The number of layers in ISO OSI reference model is __________ a. 5 b. 7 c. 6 d. 10

Last Answer : b. 7

Description : The physical address to each machine is provided by which layer in an OSI reference model? A. Physical layer B. Data Link Layer C. Network Layer D. Transport Layer

Last Answer : B. Data Link Layer

Description : The physical address to each machine is provided by which layer in an OSI reference model? A. Physical layer B. Data Link Layer C. Network Layer D. Transport Layer

Last Answer : B. Data Link Layer

Description : Who developed standards for the OSI reference model? A. ISO B. ANSI C. IEEE D. ACM

Last Answer : A. ISO

Description : How many layers are there in the OSI reference model of networking? a. 8 b. 7 c. 5 d. 4

Last Answer : b. 7

Description : Who developed standards for the OSI reference model? a. ISO - International Standards Organization b. ANSI - American National Standards Institute c. IEEE - Institute of Electrical and Electronics Engineers d. ACM - Association for Computing Machinery

Last Answer : a. ISO - International Standards Organization

Description : Which layer of OSI reference model is responsible for decomposition of messages and generation of sequence numbers to ensure correct re-composition from end to end of the network? (A) Physical (B) Data-link (C) Transport (D) Application

Last Answer : (C) Transport 

Description : Which layers of the OSI reference model are host-to-host layers ? (A) Transport, Session, Presentation, Application (B) Network, Transport, Session, Presentation (C) Data-link, Network, Transport, Session (D) Physical, Data-link, Network, Transport

Last Answer : (A) Transport, Session, Presentation, Application

Description : Give function of each layer of OSI reference model.

Last Answer : OSI model (open system interconnection) model was developed by ISO (international standard organization)  Function of OSI model: i. It provides way to understand how internetwork operates. ... virtual terminal file transfer access and management mail services and directory services

Description : Compare between OSI and TCP/IP reference model.

Last Answer : OSI reference model TCP/IP network model 1)It has 7 layers 1) It has 4 layers 2)Transport layer guarantees delivery of packets 2) Transport layer does not guarantees delivery of ... a problem of protocol filtering into a model  10)The model does not fit any protocol stack. 

Description : Which of the following is true with respect to layered architecture? a) Each layer is allowed to depend on the layer above it being present and correct b) A layer may call other layers above and below it, as long as it uses themc) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : At the lower layer of SSL, a protocol for transferring data using a variety of predefined cipher and authentication combinations called the ………………. A) SSL handshake protocol B) SSL authentication protocol C) SSL record protocol D) SSL cipher protocol

Last Answer : C) SSL record protocol

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : The................is used to provide integrity check, authentication and encryption to IPdatagram. A) SSL B) ESP C) TSL D) PSL

Last Answer : B) ESP

Description : The primary goal of the......................protocol is to provide a private channel between communicating application, which ensures privacy of data authentication of the partners, and integrity. A) SSL B) ESP C) TSL D) PSL

Last Answer : A) SSL

Description : A ..................is an extension of an enterprise’s private intranet across a public Network such as the Internet across a public Network such as the Internet, creating a secure private connection. A) VNP B) VPN C) VSN D) VSPN

Last Answer : B) VPN

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : .................... is used to carry traffic of one protocol over network that does not support that protocol directly. A) Tunneling

Last Answer : A) Tunneling

Description : The components of IP security includes …………………. A) Authentication Header (AH) B) Encapsulating Security Payload (ESP) C) Internet key Exchange (IKE) D) All of the above

Last Answer : D) All of the above