Q

How can I define the layered approach to protocols?

Learn what the network security advantages are in the layered approach to protocols and how to define the layered approach protocol, in this Q&A with Michael Gregg.

Can you please list the advantages and disadvantages of the layered approach to protocols? How can I define the

layered approach protocol?

A layered approach to protocols can be seen in models like OSI and TCP/IP. The OSI model defines networking into a seven-layer process. Within the OSI model, the data is passed down from layer-to-layer. It begins at the application layer and ends at the physical layer. While the OSI model was great in theory what has been implemented in its place is TCP/IP. The DoD TCP/IP is a four layer model what both have in common is the ability to layer security. As an example, at OSI Layer 2 tunneling and VPN protocols can be used to protect data. Security controls like L2TP, WEP, and WPA are available. OSI Layer 3 is the home of IPSec. Even at the application layer security can be added by means of protocols like SSH, DNSSEC, PGP, or Secure RPC.

This was first published in July 2007

Dig deeper on The OSI Model

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close